| Term 
 | Definition 
 
        | Orange - grave damage 5 years
 SSBI, PPR
 |  | 
        |  | 
        
        | Term 
 | Definition 
 
        | Red- serious damage every 10 and 15 years
 NACLC, ANACI
 |  | 
        |  | 
        
        | Term 
 | Definition 
 
        | Blue- Damage every 10 and 15 years
 |  | 
        |  | 
        
        | Term 
 | Definition 
 | 
        |  | 
        
        | Term 
 | Definition 
 | 
        |  | 
        
        | Term 
 | Definition 
 
        | Security Access Eligibility Report Used when getting SCI clearance but have to explain something in detail (something negative comes up)
 |  | 
        |  | 
        
        | Term 
 
        | Who has overall authority of and controls access to a SCIF? |  | Definition 
 | 
        |  | 
        
        | Term 
 | Definition 
 
        | Security container information |  | 
        |  | 
        
        | Term 
 | Definition 
 
        | Activity security checklist |  | 
        |  | 
        
        | Term 
 | Definition 
 
        | Security container checksheet |  | 
        |  | 
        
        | Term 
 | Definition 
 | 
        |  | 
        
        | Term 
 | Definition 
 | 
        |  | 
        
        | Term 
 | Definition 
 
        | Classified information nondisclosure agreement |  | 
        |  | 
        
        | Term 
 
        | State when safe combinations should be changed |  | Definition 
 
        | atleast annually, if combination is compromised, if individual with combination transfers |  | 
        |  | 
        
        | Term 
 | Definition 
 
        | Foreign disclosure office approve disclosure of classified/unclassified military information to foreign representatives
 |  | 
        |  | 
        
        | Term 
 | Definition 
 
        | Defense Courier Service national network of couriers/stations for secure transmission of classified documents and material
 |  | 
        |  | 
        
        | Term 
 
        | Describe the procedures for transportation via DCS |  | Definition 
 
        | <300 lb, minimum of flat envelope |  | 
        |  | 
        
        | Term 
 
        | Describe the procedures for handcarry |  | Definition 
 
        | classified material coversheet, double wrap information, CO must authorize, Accomplished by US carrier, advance arrangements must be made |  | 
        |  | 
        
        | Term 
 | Definition 
 | 
        |  | 
        
        | Term 
 | Definition 
 | 
        |  | 
        
        | Term 
 | Definition 
 | 
        |  | 
        
        | Term 
 | Definition 
 
        | incident has occured threat is imminent |  | 
        |  | 
        
        | Term 
 | Definition 
 | 
        |  | 
        
        | Term 
 | Definition 
 
        | emergency action plan to safeguard comsec in the event of an emergency
 |  | 
        |  | 
        
        | Term 
 
        | Emergency destuction procedure |  | Definition 
 
        | precautionary and complete destruction (only CO can authorize) |  | 
        |  | 
        
        | Term 
 
        | explain how and in what order material is destroyed during emergency destruction |  | Definition 
 
        | 1. superceded keying material and secondary variables 2. top secret primary keying material
 3. secret, confidential, unclassified keying material
 4. future keying material
 5. non essential classified manuals
 6. maintenance manuals
 7. operating manuals
 8. administrative manuals
 |  | 
        |  | 
        
        | Term 
 
        | define the difference between a security violation and a practice dangerous to security |  | Definition 
 
        | Violation- compromise of classified info to person not authorized and requires an investigation PDS-Potential to jeopardize security (reportable/non reportable)
 |  | 
        |  | 
        
        | Term 
 
        | Discuss the need for access lists, required documentation log, and two-person integrity |  | Definition 
 
        | access list-verified people authorized access to classified material RDL- account for personnel actions
 TPI- 2 people to deal with restricted access or sensitive material
 |  | 
        |  | 
        
        | Term 
 | Definition 
 | 
        |  | 
        
        | Term 
 
        | Identify who can be an CSM |  | Definition 
 
        | command security manager officer or civillian employee
 GS-11 or above
 US Citizen
 |  | 
        |  | 
        
        | Term 
 
        | State the duties and responsibilities of a CSM |  | Definition 
 
        | -implementing information security program -principle advisor to CO regarding classification
 -develop command security instruction
 -formulate security education program
 |  | 
        |  | 
        
        | Term 
 
        | Discuss how long a CO can administratively suspend access before DONCAF revokes a clearance |  | Definition 
 
        | must be reported no later then 10 days from the date of suspension |  | 
        |  | 
        
        | Term 
 
        | explain why the namy uses .mil email addresses on government systems |  | Definition 
 
        | US DOD has exclusive use of this domain |  | 
        |  |