A security infraction involves loss, compromise, or suspected compromise. {Ans: False}Which of the following are parts of the OPSEC process? (Select all that apply) {Ans: Analysis of threats, Application of appropriate countermeasures, Conduct vulnerability assessments}Top Secret documents can be transmitted by which of the following methods? (Select all that apply) {Ans: Defense Courier Service, Secure Fax}Which level of classified information could cause damage to national security if compromised? {Ans: Confidential}Prior to foreign travel, you must ensure that your Antiterrorism/Force Protection Level 1 training is current. {Ans: True}What form is used to record end-of-day security checks? {Ans: SF 701}Which of the following is required to access classified information? (Select all that apply) {Ans: Signed SF 312, Approval of the Original Classification Authority (OCA), Clearance eligibility at the appropriate level, Need-to-know, Approval of your supervisor.}Derivative classifiers are required to have all of the following except ________. {Ans: Approval of the original classification authority (OCA).}The Personnel Security Program establishes _______ for Personnel Security determinations and overall program management responsibilities. {Ans: Policies and procedures.}You may be subject to sanctions if you negligently disclose classified information. {Ans: True}Which method may be used to transmit Confidential