{"id":111195,"date":"2023-07-29T12:18:05","date_gmt":"2023-07-29T12:18:05","guid":{"rendered":"https:\/\/learnexams.com\/blog\/?p=111195"},"modified":"2023-07-29T12:18:12","modified_gmt":"2023-07-29T12:18:12","slug":"sfpc-practice-test-2023-complete-160-questions-and-correct-detailed-answers-100-verified-answers-agradetop-rated-exam","status":"publish","type":"post","link":"https:\/\/www.learnexams.com\/blog\/2023\/07\/29\/sfpc-practice-test-2023-complete-160-questions-and-correct-detailed-answers-100-verified-answers-agradetop-rated-exam\/","title":{"rendered":"SFPC PRACTICE TEST 2023 COMPLETE 160 QUESTIONS AND CORRECT DETAILED ANSWERS (100% VERIFIED ANSWERS) |AGRADE|TOP RATED EXAM"},"content":{"rendered":"\n<p>Which of the following security program areas would you find practitioners who train and\/<br>or advise Original Classification Authorities in the application of the process for making<br>classification determinations?<br>A. Information Security<br>B. Physical Security<br>C. Personnel Security<br>D. Industrial Security<br>A. Information Security<\/p>\n\n\n\n<p>Which of the following security program areas would you find practitioners working with a<br>facility&#8217;s Antiterrorism Officer to deploy defensive measures designed to reduce the facility&#8217;s<br>vulnerability from terrorist attacks?<br>A. Information Security<br>B. Physical Security<br>C. Personnel Security<br>D. Industrial Security<br>B. Physical Security<\/p>\n\n\n\n<p>Which of the following security programs areas would you find practitioners involved with<br>processes that monitor employees for new information that could affect their security clearance<br>eligibility status?<br>A. Foreign Disclosure<br>B. Information Security<br>C. International Security<br>D. Operations Security<br>E. Personnel Security<br>F. Physical Security<br>G. Research and Technology Protection<br>H. Information Assurance<br>E. Personnel Security<\/p>\n\n\n\n<p>Two security professionals &#8211; Paul and Ashley &#8211; are discussing security program areas.<br>Paul says that Information Security practitioners train and\/or advise Original Classification<br>Authorities in the application of the process for making classification determinations.<br>Ashley says that Physical Security practitioners work with a facility&#8217;s Antiterrorism Officer to<br>deploy defensive measures designed to reduce the facility&#8217;s vulnerability from terrorist attacks.<br>Who is correct?<br>A. Paul is correct<br>B. Ashley is correct<br>C. Paul and Ashley are both correct<br>D. Paul and Ashley are both incorrect<br>C. Paul and Ashley are both correct<\/p>\n\n\n\n<p>Two security professionals &#8211; Paul and Ashley &#8211; are discussing security program areas.<br>Paul says that Information Security practitioners work with a facility&#8217;s Antiterrorism Officer to<br>deploy defensive measures designed to reduce the facility&#8217;s vulnerability from terrorist attacks.<br>Ashley says that Personnel Security practitioners train and\/or advise Original Classification<br>Authorities in the application of the process for making classification determinations.<br>Who is correct?<br>A. Paul is correct<br>B. Ashley is correct<br>C. Paul and Ashley are both correct<br>D. Paul and Ashley are both incorrect<br>D. Paul and Ashley are both incorrect<\/p>\n\n\n\n<p>Which of the following is a true statement regarding the special handling requirements of Foreign Government Information (FGI)?<\/p>\n\n\n\n<p>a. When the classification marking on a document containing FGI is not in English, or when the foreign government marking requires a different degree of protection than<br>the same U.S. classification designation, a U.S. marking that results in a degree of protection equivalent to that required by the foreign government shall be applied.<br>b. A U.S. document containing FGI cannot be declassified or downgraded below the highest level of FGI contained in the document without the permission of the foreign government or international organization that originated the information.<br>c. Those holding security clearances issued by the U.S. government cannot access U.S. documents containing FGI without written consent from the originating foreign government.<br>d. The receiving DoD Components must maintain records for 1 year of the receipt, internal distribution, destruction, annual inventory, access, reproduction, and transmittal of foreign government Top Secret information.<br>B<\/p>\n\n\n\n<p>Which of the following is a requirement for access to North Atlantic Treaty Organization (NATO) information?<br>a. Personnel has been subject of a Single Scope Background Investigation (SSBI), including a National Agency Check (NAC) on the spouse and all members of the individual&#8217;s immediate family of 18 years of age or over who are United States citizens other than by birth or who are resident aliens.<br>b. Personnel has been subject of a favorably adjudicated background investigation (BI) (10-year scope), Tier 5, current within five years prior to the assignment, and completed a NATO brief.<br>c. Personnel has been subject of a favorably adjudicated BI (10-year scope), Defense National Agency Check with Inquiries (DNACI)\/ National Agency Check with Inquiries (NACI) or NACI Entrance National Agency Check (ENTNAC), current within five years prior to the assignment.<br>d. Personnel requiring access to NATO COSMIC (Top Secret) or SECRET information must at least possess the equivalent interim U.S. security clearance.<br>B<\/p>\n\n\n\n<p>According to Executive Order 13556, which of the following<br>is considered a type of controlled unclassified information (CUI)?<br>a. Communications Security (COMSEC) Information<br>b. Declassified Information<br>c. Law Enforcement Sensitive (LES) Information<br>d. North Atlantic Treaty Organization (NATO) Information<br>C. Law Enforcement Sensitive Information<\/p>\n\n\n\n<p>What is the purpose of marking classified materials?<br>a. To alert holders to the presence of classified information, how to properly protect it, and for how long.<br>b. To deter foreign adversaries from committing actions aimed at accessing such information.<br>c. To provide guidance for interpretation and analysis of classified information.<br>d. To alert holders to the methods used to collect classified information.<br>A<\/p>\n\n\n\n<p>What is included in the markings of classified information?<br>a. Derivative classifier as the authority to make declassification determinations.<br>b. Agencies and authorities that have previously accessed the classified information.<br>c. Document holder as the sole authority to make transfer and dissemination determinations.<br>d. Sources and reasons for the classification.<br>C<\/p>\n\n\n\n<p>What is the purpose of the Controlled<br>Access Program Coordination (CAPCO) register?<br>a. To identify the categories, types, and levels of Special Access Programs (SAPs.)<br>b. To define the authorities for classifying, declassifying, and regrading sensitive documents.<br>c. To identify the official classification and control markings, and their authorized abbreviations and portion markings.<br>d. To define the requirements, restrictions, and measures necessary to safeguard classified information from unauthorized disclosure.<br>C<\/p>\n\n\n\n<p>When a classified data spill occurs, who is responsible for ensuring that policy requirements for addressing an unauthorized disclosure are met?<br>a. Activity Security Manager<br>b. Information Assurance Staff<br>c. Information Assurance Manager<br>d. Information Assurance Officer<br>A<\/p>\n\n\n\n<p>There are five information assurance attributes that are important to protect and defend DoD networks and information. If there was a loss in non- repudiation, what would this cause in relation to information assurance?**<br>a. Data is no longer reliable, accurate, nor trusted.<br>b. Data may potentially be available to unauthorized users via electronic form.<br>c. General communications are no longer trusted.<br>d. Potential of unauthorized access to classified data.<br>e. Data is no longer available to authorized users, and missions cannot be conducted.<br>B<\/p>\n\n\n\n<p>Which of the following examples describes<br>a security violation rather than a security infraction?<br>a. On a busy day, Karen printed classified documents on the printer in her open storage\/secure room. She forgot about the documents and they remained on the printer for about an hour before she retrieved them.<br>b. Karen was late for a meeting in a different area of her building. She put a classified document in a folder she believed was marked for carrying classified materials. When handing out the materials, Karen realized that the folder was not marked for carrying classified materials, she had put the documents in the wrong folder.<br>c. At the end of the day, Karen was leaving and taking with her unclassified documents she would review at home. When she began to review those documents that night, she realized that classified materials had slipped in between the unclassified materials.<br>d. Karen was working a mission related to Mexican Drug cartel operating out of Playa Carmen. Her husband planned a golf trip with friends to that area. She advised him not to go, and believing that it was a safety issue, she provided sensitive details about the cartel to make sure that he did not go.<br>C<\/p>\n\n\n\n<p>The inability to deny you are the sender of an email would be an indication of a lapse in:**<br>a. Non-Repudiation<br>b. Confidentiality<br>c. Integrity<br>d. Availability<br>A. Non-repudiation<\/p>\n\n\n\n<p>Unauthorized disclosure and loss of privacy is a lapse in:**<br>a. Confidentiality<br>b. Integrity<br>c. Availability<br>d. Authentication<br>A<\/p>\n\n\n\n<p>Which of the following is the first action done to downgrade, declassify<br>or remove classification markings? a. Through the appropriate chain of command, contact the original classification authority (OCA) to confirm that information does not have an extended classification period.<br>b. Change the classification authority block to indicate &#8220;Declassify ON:&#8221; to show the new declassification instructions.<br>c. Take all classification markings off the document and redistribute.<br>d. Request a waiver from the Information Security Oversight. Office (ISOO) to remove the declassification markings.<br>A<\/p>\n\n\n\n<p>All of the<br>following are requirements to perform classified activities from non-traditional locations (e.g., the employees home), EXCEPT:<br>a. The employee must be trained to operate classified information systems.<br>b. The employee must be trained on protection and storage of classified information and Communications Security (COMSEC) materials.<br>c. The employee must receive written approval for use of classified information and equipment at home.<br>d. The employee must have an office space that meets requirements comparable to the Sensitive Compartmented Information Facility (SCIF).<br>B<\/p>\n\n\n\n<p>What is the purpose of the Personnel Security Program (PSP)?<br>a. To define original classification for DoD assets and information.<br>b. To designate individuals for positions requiring access to classified information.<br>c. To ensure that only loyal, trustworthy, and reliable individuals may access classified information or perform sensitive duties.<br>d. To describe the safeguarding requirements personnel must employ when handling classified materials at a cleared contractor facility.<br>C<\/p>\n\n\n\n<p>DoD reciprocally accepts existing national security eligibility determinations or clearances from other Government agencies in accordance with which of the following policy documents?<br>a. Office of Management and Budget Memorandum M-05-24, &#8220;Implementation of Homeland Security Presidential Directive (HSPD) 12 &#8211; Policy for a Common Identification Standard for Federal Employees and Contractors,&#8221;.<br>b. Executive Order 13467, &#8220;Reforming Processes Related to Suitability for Government Employment, Fitness for Contractor Employees, and Eligibility for Access to Classified National Security Information&#8221;.<br>c. Sections 301 and 7532 of title 5, United States Code.<br>d. Executive Order 13526, &#8220;Classified National Security Information&#8221;.<br>B<\/p>\n\n\n\n<p>Review of Tier 5 on an individual disclosed that the subject had been a member of<br>an anarchist organization dedicated to disestablishing existing Federal laws and overthrowing the U.S. government by any means necessary, including violence. Although the subject terminated his membership with the organization upon learning he would be investigated for<br>a clearance for his new position, he still maintains social contact with several members of the anarchist organization. Based on this information, which of the following adjudicative guidelines is most appropriate for an adjudicator to apply to the case?<br>a. Psychological Conditions<br>b. Foreign Preference<br>c. Allegiance to the United States<br>d. Criminal Activity<br>C<\/p>\n\n\n\n<ol class=\"wp-block-list\" start=\"19\">\n<li>Which of the following is considered an element of the Personnel Security Program (PSP)?<br>a. Risk Assessment and Analysis<br>b. Implementation<br>c. Classification<br>d. Continuous Evaluation<br>D<\/li>\n<\/ol>\n\n\n\n<p>Limited access to classified information for<br>specific programs may be approved for non-U.S. citizens only under which of the following conditions?<br>a. The subject is eligible to access material marked by a foreign government that is equivalent to a U.S. Top Secret classification marking.<br>b. The subject will only have one-time access to specific material, after which the material will be appropriately destroyed or returned to the originating U.S. agency<br>c. The subject will only have access to classified U.S. documents containing Foreign Government Information (FGI) originating from the foreign country of which the subject is a citizen.<br>d. The prior 10 years of the subject&#8217;s life can be appropriately investigated.<br>D<\/p>\n\n\n\n<p>Which of the following is the investigative requirement for access to<br>Single Integrated Operational<br>Plan-Extremely Sensitive Information (SIOP- ESI)?<br>a. Individual has a valid favorably adjudicated Tier 5 or Single Scope Background (SSBI) Investigation.<br>b. Individual has a valid favorable adjudicated Tier 3 or National Agency Check with Local Agency Check (NACLC) investigation.<br>c. Individual has a valid favorably adjudicated Tier 3 or Access National Agency Check with Written Inquiries and Credit Check (ANACI) investigation.<br>d. Individual has a valid favorably adjudicated Tier.<br>A<\/p>\n\n\n\n<p>Which of the following is not qualifying criteria for personnel assigned to nuclear weapons personnel reliability assurance positions?<br>a. Individual must be a U.S. Citizen<br>b. Individual has a security clearance eligibility in accordance with the position<br>c. Individual is subject to a periodic reinvestigation every three years<br>d. Individual must be continuous evaluated<br>C<\/p>\n\n\n\n<p>Which of the following is correct regarding the investigation requirement for initial assignment to a Presidential Support Activities (i.e. Yankee White) Category 2 position?<br>a. Favorably completed Tier 5\/Single Scope Background Investigation (SSBI) within 36 months preceding selection.<br>b. Favorably completed Tier 3\/National Agency Check with Local Agency Check (NACLC) within 36 months preceding selection.<br>c. Favorably completed Tier 5\/SSBI within 24 months preceding selection.<br>d. Favorably completed Tier 3\/NACLC within 24 months preceding selection.<br>A<\/p>\n\n\n\n<p>Which of the following adjudication processes refers to a person&#8217;s identifiable character traits and conduct sufficient to decide whether employment or continued employment would or would not protect the integrity or promote the efficiency of the Federal service?<br>a. Homeland Security Presidential Directory (HSPD) 12 credentialing<br>b. National security adjudication<br>c. Suitability adjudication<br>d. Continuous evaluation<br>C<\/p>\n\n\n\n<p>All unclassified DoD information in the possession or control of non-DoD entities on non-DoD information systems, to the<br>extent provided by the applicable grant, shall minimally be safeguarded under which of the following standards?<br>a. Information holders must use the Secret Internet Protocol Router Network (SIPRNET) to transmit such information.<br>b. Such information may be store in an open storage area, provided the room is equipped with an Intrusion Detection System (IDS) with the personnel responding to an alarm within 15 minutes of the alarm annunciation.<br>c. Such information must be stored in a General Services Administration (GSA)-approved security container equipped with a lock meeting FF-L-2740 standards.<br>d. Organizational wireless connections holding such information must be encrypted, and those accessing such information must use encrypted wireless connections where available when traveling.<br>D<\/p>\n\n\n\n<p>Copies of personnel security investigative reports must be destroyed by DoD recipient organizations, within how many days following completion<br>of the necessary personnel security determination?<br>a. 30 days<br>b. 45 days<br>c. 60 days<br>d. 90 days<br>D<\/p>\n\n\n\n<p>Which of the following limitations is true regarding Limited Access Authorization (LAA) to non-U.S. citizens?<br>a. LAAs shall only be granted access at the Secret and Confidential levels.<br>b. A favorably completed and adjudicated Tier 3 or National Agency Check with Local Agency Check (NACLC). investigation within the last five years is required.<br>c. An LAA is the same as a security clearance eligibility.<br>d. Access to classified information Is not limited to a specific program or project.<br>A<\/p>\n\n\n\n<ol class=\"wp-block-list\" start=\"28\">\n<li>Which of the following is not considered when making a security clearance eligibility determination?<br>a. Education Level<br>b. Alcohol consumption<br>c. Financial considerations<br>d. Psychological Conditions<br>A<\/li>\n<\/ol>\n\n\n\n<p>A position designated as a DoD noncritical-sensitive civilian position may fall under any of the following criteria, EXCEPT:<br>a. A position not requiring eligibility for access to classified information, but having the potential to cause significant or serious damage to the national security.<br>b. A position requiring eligibility for access to Top Secret information.<br>c. A position requiring eligibility for access to confidential information.<br>d. A position requiring eligibility for access to secret information.<br>B<\/p>\n\n\n\n<p>What information must a statement of reasons (SOR) include?<br>a. SOR must state why an unfavorable national security eligibility determination is being proposed.<br>b. SOR must explain each security concern and state the specific facts that trigger each security concern.<br>c. The SOR must identify applicable adjudicative guideline(s) for each concern, and provide the disqualifying conditions and mitigating conditions for each guideline.<br>d. All of the Above<br>D<\/p>\n\n\n\n<p>Which type of briefing is used to obtain confirmation that a cleared employee agrees never to disclose classified information to an unauthorized person?<br>a. Special Briefings &#8211; Courier<br>b. Original Classification Authority (OCA) Briefing<br>c. Special Briefings &#8211; Non-Disclosure<br>d. Debriefing<br>C<\/p>\n\n\n\n<p>___________is the security system performance goal of immediate indication of deliberate attempts, security probing and warning for inadvertent or mistaken intention<br>is an example of which system security capability?<br>a. Detect<br>b. Assessment<br>c. Deterrence<br>d. Delay<br>C<\/p>\n\n\n\n<p>Two security professionals &#8211; Paul and Ashley &#8211; are discussing secure rooms, containers, and vaults. Paul says weapons or sensitive items such as funds, jewels, or precious metals should not be stored in the same security container as classified information. Ashley says the General Service Administration approves security containers used to store classified information. Who is correct?<br>a. Paul is correct<br>b. Ashley is correct<br>c. Paul and Ashley are both correct<br>d. Paul and Ashley are both incorrect<br>C<\/p>\n\n\n\n<p>Which of the following is not a distinct phase of the Intrusion Detection System?<br>a. Detection<br>b. Control<br>c. Assessment<br>d. Response<br>B<\/p>\n\n\n\n<p>Which of the following would be considered a public safety crime?<br>a. Theft of ammunition shipment for the purpose of criminal or gang related activity.<br>b. Theft of sensitive, proprietary information relating to US aerospace and defense technologies.<br>c. Deliberate destruction of DoD assets or interruption of normal operations.<br>d. Theft of an item and use of it outside of its intended purpose or without permission.<br>A<\/p>\n\n\n\n<p>Which of the following best describes the goal of the Physical Security Program?<br>a. To ensure that industry safeguards the classified information in their possession, while performing work on contracts, bids, or research and development efforts on behalf of the government.<br>b. To protect assets against compromise resulting from activities such as espionage, sabotage, terrorism, damage or loss, and criminal.<br>c. To ensure that only loyal, trustworthy, and reliable individuals may access classified information or perform sensitive duties.<br>d. To create uniform policies and procedures for defense acquisition by all executive agencies.<br>B<\/p>\n\n\n\n<p>Preventing unauthorized access to information<br>and equipment, safeguarding DoD assets against espionage and criminal activity, and providing the means to counter threats when preventative measures are ignored, best characterize the primary functions of which of the following programs or processes? a. Physical Security Program<br>b. Operations Security (OPSEC) process<br>c. Security incident response process<br>d. Personnel Security Program<br>A<\/p>\n\n\n\n<p>The process of integrating active and passive complementary physical security measures to ensure the protection of DoD assets is known as which of the following concepts?<br>a. Area security<br>b. Threat-vulnerability assessment<br>c. Security-in-depth<br>d. Point security<br>C<\/p>\n\n\n\n<p>The stealing of sensitive, proprietary information related to U.S. aerospace and defense technologies with the intent to provide such information to a foreign adversary is an example of which type of threat to DoD assets?<br>a. Criminal activity<br>b. Economic espionage<br>c. Treason<br>d. Terrorism<br>B<\/p>\n\n\n\n<p>When a Terrorism Threat Level is escalated from LOW to MODERATE, a DoD Component Head should employ which of the following countermeasures?<br>a. Cease all flying except for specifically authorized operational sorties.<br>b. Direct the execution of advance site reviews to facilitate the antiterrorism planning process.<br>c. Encourage dependent family members to complete Level I Antiterrorism Awareness Training before any travel outside the continental United States (OCONUS).<br>d. Conduct an immediate Terrorism Vulnerability Assessment for off-installation housing, schools, daycare centers, transportation.<br>C<\/p>\n\n\n\n<p>Requests for authorizing disclosure of classified information during visits must include all the following information, EXCEPT:<br>a. The explanation of the government purpose to perform when disclosing classified information.<br>b. The subject of the meeting, scope of classified topics and classification level<br>c. Expected time and location of the meeting.<br>d. The main content of the invitation to send to the participants.<br>C<\/p>\n\n\n\n<p>Two security professionals &#8211; Paul and Ashley<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>are discussing the security procedures for visits and meetings. Paul says visits must serve a specific U.S. Government purpose. Ashley says DoD Components should, as a minimum, establish procedures that include verification of the identity, personnel security clearance, access (if appropriate), and need-to-know for all visitors. Who is correct?<br>a. Paul is correct<br>b. Ashley is correct<br>c. Paul and Ashley are both correct<br>d. Paul and Ashley are both incorrect<br>A<\/li>\n<\/ul>\n\n\n\n<p>Executive Order 12829, signed in January 1993, mandated that which of the following entities be responsible for implementing and monitoring the National industrial Security Program (NISP)?<br>a. Director of the Information Security Oversight Office (ISOO)<br>b. Secretary of Defense<br>c. National Security Council (NSC)<br>d. Director, Defense Security Services (DSS)<br>A<\/p>\n\n\n\n<p>What is the role of the government contracting activity (GCA), or cleared prime contractor, when a contractor that does not have a Facility Clearance (FCL) wants to bid on a Request<br>for Proposal (RFP) that requires access to classified information? a. The GCA must issue a formal letter rejecting the contractor&#8217;s bid since the contractor does not have the requisite FCL.<br>b. The contractor must submit a sponsorship request to DSS, who will decide whether to allow the contractor to bid on the contract.<br>c. The GCA must sponsor the contractor for a facility security clearance by submitting a sponsorship request to DSS, which initiates the facility clearance process.<br>d. The GCA must ensure that the all owners and senior management of the uncleared contractor are U.S. citizens and are eligible to be processed for a personnel security clearance.<br>C<\/p>\n\n\n\n<p>What is the purpose of the Federal Acquisition Regulations (FAR)?<br>a. To codify and publish uniform policies and procedures for acquisition by all executive agencies.<br>b. To manage DoD funds and prioritize the development of vital research and technology.<br>c. To provide small businesses and minority owned companies an opportunity to compete in the government acquisition process.<br>d. To promote uniform standards and best practices of technology acquisition across U.S. industry.<br>A<\/p>\n\n\n\n<p>What is the role of the security professional during the &#8220;Award Contract&#8221; step of the contracting process?<br>a. To ensure the appropriate classification level for the bid, and to define unique security requirements associated with the product.<br>b. To interface with the Cognizant Security Organization (CSO) to ensure oversight is performed and review results of and previous assessments on behalf of component.<br>c. To ensure that the contractor follows proper safeguarding and disposition guidance.<br>d. To review and define the specific security requirements with the contracting officer &#8211; specifically, block 13 of DD Form 254.<br>D<\/p>\n\n\n\n<p>What is the purpose of DD Form 254?<br>a. To convey security classification guidance and to advise contractors on the handling procedures for classified material.<br>b. To document the formal agreement between the US government and a cleared contractor in which the contactor agrees to maintain a security program in compliance with the NISPOM and the government agrees to security guidance and program oversight.<br>c. To validate details regarding the foreign ownership, control or influence affecting that cleared contractor facility.<br>d. It replaces the actual contract document for any contract requiring access to classified information.<br>A<\/p>\n\n\n\n<p>As part of Operations Security (OPSEC), a program coordinator should use which of the following tools to assess assets as part of the risk management process for critical information?<br>a. Critical Information List<br>b. Threat vulnerability matrix<br>c. Risk Rating Table<br>d. Security Classification Guide<br>A<\/p>\n\n\n\n<p>What is the role of the Special Access Program Oversight Committee (SAPOC) during the maintenance phase<br>of the Special Access Program (SAP) lifecycle?<br>a. To ensure that the SAP has adequate Internal Review and Audit Compliance (IRAC) support, including accessed auditors at supporting offices, to meet program audit needs.<br>b. To review existing programs annually to determine whether to revalidate them as SAPs.<br>c. To provide oversight of SAP program and budget accomplishments.<br>d. To provide oversight of SAP audits and inspections.<br>B<\/p>\n\n\n\n<p>Which of the following describes a Special Access Program (SAP) that is established to protect sensitive research, development, testing and evaluation, modification, and procurement activities?<br>a. Research and Technology SAP<br>b. Operations and Support SAP<br>c. Acquisition SAP<br>d. Intelligence SAP<br>C<\/p>\n\n\n\n<p>Which type of briefing is used to identify security responsibilities, provide a basic understanding of DoD security policies, and explain the importance of protecting government assets?<br>a. Indoctrination Briefing<br>b. Original Classification Authority (OCA)<br>Briefing<br>c. Foreign Travel Briefing<br>d. Debriefing<br>A<\/p>\n\n\n\n<p>Which type of briefing is used to reinforce the information provided during the initial security briefing and to keep cleared employees informed of appropriate changes in security regulations?<br>a. Annual Refresher Briefings<br>b. Indoctrination Briefings<br>c. Attestation Briefings<br>d. Courier Briefings<br>A<\/p>\n\n\n\n<p>Which step of the Operations Security (OPSEC) process would be applied when conducting exercises, red teaming and analyzing operations?<br>a. Conduct a Risk Assessment<br>b. Apply OPSEC Countermeasures<br>c. Conduct a Threat Analysis<br>d. Conduct a Vulnerability Analysis<br>B<\/p>\n\n\n\n<p>Which step of the Operations Security (OPSEC) process would be applied when identifying potential adversaries and the associated capabilities and intentions<br>to collect, analyze, and exploit critical information and indicators?<br>a. Conduct a Vulnerability Analysis<br>b. Conduct a Threat Analysis<br>c. Conduct a Risk Assessment<br>d. Apply OPSEC Countermeasures<br>B<\/p>\n\n\n\n<p>Please determine which of the following is an element of an Operations Security (OPSEC) Assessment.<br>a. Small in scale and focused on evaluating the effectiveness of the OPSEC program.<br>b. Conducted on an annual basis.<br>c. Uses external resources collectively to conduct with or without the use of indigenous resources.<br>d. Determines the likelihood that critical information can be protected based on procedures that are currently in place.<br>C<\/p>\n\n\n\n<p>To provide access to Social Media sites, the DoD agency must provide all of the following, EXCEPT:<br>a. Protection against malware and advance threats.<br>b. Blocked access to prohibited sites and content.<br>c. Individual compliance with Joint Ethics Regulations and guidelines.<br>d. Constant monitoring to deter inappropriate site access.<br>D<\/p>\n\n\n\n<p>Who&#8217;s responsibility is it during the categorize steps to identify a potential impact (low, moderate, or high) due<br>to loss of confidentiality, integrity, and availability if a security breach occurs?**<br>a. Information System Owner (ISO)<br>b. Information Owner (IO)<br>c. Information System Security Manager (ISSM)<br>d. Authorizing Official (AO)<br>B<\/p>\n\n\n\n<p>Please determine which of the following is an example of reportable foreign intelligence contacts, activities, indicators, and behaviors.<br>a. Authorizing others to acquire unauthorized access to classified or sensitive information systems.<br>b. Unauthorized downloads or uploads of sensitive data.<br>c. Network spillage incidents or information compromise.<br>d. Use of DoD account credentials by unauthorized parties.<br>A<\/p>\n\n\n\n<p>Limiting nonsecure computer e-mail messages to nonmilitary activities and not providing operational information in nonsecure e-mail messages are functions of which OPSEC measure?<br>a. Operational and Logistic Measures<br>b. Technical Measures<br>c. Administrative Measures<br>d. Operations Security and Military Deception<br>B<\/p>\n\n\n\n<p>Which of the following is NOT a category of Information Technology (IT)?**<br>a. Platform Information Technology (PIT)<br>b. Information Technology Services<br>c. Information Technology Products<br>d. Information Technology Applications<br>D<\/p>\n\n\n\n<p>What step within the Risk Management Framework (RMF) does system categorization occur?**<br>a. Categorize Information System<br>b. Select Security Controls<br>c. Implement Security Controls<br>d. Assess Security Controls<br>e. Authorize<br>f. Monitor Security Controls<br>A<\/p>\n\n\n\n<p>At what step of the Risk Management Framework (RMF) would you develop a<br>system-level continuous monitoring strategy?&#8221; **<br>a. Categorize Information System<br>b. Select Security Controls<br>c. Implement Security Controls<br>d. Assess Security Controls<br>e. Authorize<br>f. Monitor Security Controls<br>B<\/p>\n\n\n\n<p>One responsibility of the Information System Security Manager (ISSM) during Step 6 of the Risk Management Framework (RMF) is:**<br>a. Review and approve the security plan and system-level continuous monitoring strategy developed and implemented by the DoD Components.<br>b. Monitor the system for security relevant events and configuration changes that affect the security posture negatively.<br>c. Determine and documents a risk level in the Security Assessment Report (SAR) for every non-compliant security control in the system baseline.<br>d. Coordinate the organization of the Information System (IS) and Platform Information Technology (PIT) systems with the Program Manager (PM)\/System Manager (SM), Information System Owner (ISO), Information Owner (IO), mission owner(s), Action Officer (AO) or their designated representatives.<br>B<\/p>\n\n\n\n<p>What family of controls does Security Functionality<br>Verification belong to?**<br>a. System and Communications Protection<br>b. Maintenance<br>c. System and Information Integrity<br>d. Audit and Accountability<br>C<\/p>\n\n\n\n<p>What does &#8220;AO&#8221; stand for?<br>Authorizing Official<\/p>\n\n\n\n<p>What is a SAR as related to cyber security?<br>System Assessment Report<\/p>\n\n\n\n<p>What activities occur when authorizing the system? (select all that apply)<br>a. Implement decommissioning strategy<br>b. Develop, review, and approve Security Assessment Plan<br>c. Prepare the Plan of Action and Milestones (POA&amp;M)<br>d. Submit security authorization package<br>C &amp; D<\/p>\n\n\n\n<p>What activities occur when assessing security controls? (Select all that apply)<br>A. prepare the plan of action and milestones (POA&amp;M)<br>B. conduct final risk determination<br>C. Develop, plan, and approve Security Assessment Plan<br>D. Prepare Security Assessment Report<br>C &amp; D<\/p>\n\n\n\n<p>What activities occur when monitoring security controls? (Select all that apply)<br>A. Prepare the Plan of Action and Milestones (POA&amp;M)<br>B. Develop, review, and approve Security Assessment Plan<br>C. Implement decommissioning strategy<br>D. Determine impact of changes<br>C &amp; D<\/p>\n\n\n\n<p>What are the cybersecurity attributes?<br>Select all that apply.<br>A Confidentiality<br>B Integrity<br>C Availability<br>D Authentication<br>E Non-repudiation<br>All of the above<\/p>\n\n\n\n<p>Why do you need to be aware of cybersecurity?<br>A To uphold all elements of the National Industrial Security Program Operating Manual<br>B To appropriately manage risk by mitigating threats and vulnerabilities<br>C To examine your own actions and activities to uphold personal accountability<br>D To ensure all appropriate measures are taken to protect a place and ensure only people with permission enter and leave it<br>B<\/p>\n\n\n\n<p>What are the cybersecurity drivers?<br>A NIST 800-30 Rev 1 Guide for Conducting Risk Assessments<br>B DoD 8530.01 Cybersecurity Activities Support to DoD Information Network Operations<br>C DoD 8510.01 Risk Management Framework<br>D DoD 8500.01<br>E DoD Security Policy<br>All of the above<\/p>\n\n\n\n<p>Which skills do security personnel need?<br>A. Protect information systems.<br>B. Identify all cybersecurity concepts.<br>C. Identify fundamental cybersecurity concepts that are related to the protection of classified and controlled unclassified information.<br>D. Examine their role in protecting DoD&#8217;s information systems and the information they process, transmit, and store.<br>D<\/p>\n\n\n\n<p>What is the primary responsibility of security personnel?<br>A Monitor, evaluate, and provide advice to the Secretary of Defense<br>B Protect classified information and controlled unclassified information<br>C Direct the operation of and assure the security of the global DoD network<br>D Coordinate all DoD network operations<br>B<\/p>\n\n\n\n<p>What is security personnel&#8217;s primary skill in relationship to cybersecurity?<br>A Analyze duties<br>B Manage risk<br>C Execute training<br>D Respond to incidents<br>B<\/p>\n\n\n\n<p>What are the components of the Risk Management System? (Select all that apply)<br>A Revision<br>B Analysis<br>C Evaluation<br>D Assessment<br>E Mitigation<br>C, D &amp; E<\/p>\n\n\n\n<p>What are the steps in the Risk Management Framework (RMF)? (Select all that apply)<br>A Monitor Security Controls<br>B Categorize System<br>C Authorize System<br>D Assess Security Controls<br>E Select Security Controls<br>F Implement Security Controls<br>All of the above<\/p>\n\n\n\n<p>What threat environments should you consider? (Select all that apply)<br>A Adversarial<br>B Environmental<br>C Structural<br>D Accidental<br>All of the above<\/p>\n\n\n\n<p>What should you look for when assessing vulnerabilities? (Select all that apply)<br>A Residual risk<br>B Ease<br>C Likelihood<br>D Related threats<br>D Rewards<br>All of the above<\/p>\n\n\n\n<p>Which steps of the RMF are designed to mitigate risk? (Select all that apply)<br>A Assess Security Controls<br>B Monitor Security Controls<br>C Select Security Controls<br>D Authorize System<br>E Implement Security Controls<br>F Categorize System<br>C &amp; E<\/p>\n\n\n\n<p>Which of the following are the activities that occur when performing RMF Step 2, Select Security Controls? (Select all that apply)<br>A Common Control Identification<br>B Monitoring Strategy<br>C Security Baseline and Overlay Selection<br>D Security Plan and Review Approval<br>All of the above<\/p>\n\n\n\n<p>What activities occur during implementation of security controls? (Select all that apply)<br>A Communicate updates to appropriate audiences<br>B Seek approvals from CIO<br>C Create appropriate training and communication plans<br>D Ensure consistency with DoD architectures<br>E Document security control implementation in the security plan<br>F Identify security controls available for inheritance<br>D, E &amp; F<\/p>\n\n\n\n<p>Which steps of the RMF are designed to evaluate risk? (Select all that apply)<br>A Select Security Controls<br>B Assess Security Controls<br>C Monitor Security Controls<br>D Authorize System<br>E Categorize System<br>F Implement Security Controls<br>B, C &amp; D<\/p>\n\n\n\n<p>What activities occur when assessing security controls? (Select all that apply)<br>A Prepare the Plan of Action and Milestones (POA&amp;M)<br>B Conduct final risk determination<br>C Develop, plan, and approve Security Assessment Plan<br>D Prepare Security Assessment Report (SAR)<br>C &amp; D<\/p>\n\n\n\n<p>Select ALL of the correct responses. What activities occur during implementation of security<br>controls?<br>A Ensure consistency with DoD architectures<br>B Document security control implementation in the security plan<br>C Seek approvals from CIO<br>D Identify security controls available for inheritance<br>E Communicate updates to appropriate audiences<br>F Create appropriate training and communication plans<br>A, B &amp; D<\/p>\n\n\n\n<p>Which role leads the day-to-day defense?<br>A Authorizing Official (AO)<br>B US Cyber Command (USCYBERCOM)<br>C Security personnel<br>D DoD Chief Information Officer (CIO)<br>B<\/p>\n\n\n\n<p>The cybersecurity attributes are confidentiality, integrity, availability, authentication, and:<br>A Validity<br>B Non-repudiation<br>C Architecture<br>D Stability<br>B<\/p>\n\n\n\n<p>True or false? Cybersecurity is important so that risk is eliminated.<br>True<br>False<br>False<\/p>\n\n\n\n<p>Select ALL of the correct responses. What are the Risk Management Framework (RMF) steps<br>designed to mitigate risk?<br>A Categorize System<br>B Select Security Controls<br>C Implement Security Controls<br>D Assess Security Controls<br>B &amp; C<\/p>\n\n\n\n<p>What activities occur in Step 4 of the Risk Management Framework (RMF), Assess Security<br>Controls?<br>A Develop, plan, and approve Security Assessment Plan<br>B Prepare the Security Assessment Report (SAR)<br>C Conduct remediation actions on non-compliant security controls<br>D All of the above<br>D<\/p>\n\n\n\n<p>Select ALL of the correct responses. What are all cybersecurity attributes susceptible to?<br>A Vulnerabilities<br>B Threats<br>C Disclosure<br>D Authorization<br>A &amp; B<\/p>\n\n\n\n<p>Select ALL of the correct responses. Which of the following are cybersecurity skill standards needed<br>by security personnel?<br>A Identify and manage all cybersecurity concepts<br>B Explain their role in protecting DoD&#8217;s information systems<br>C Identify fundamental cybersecurity concepts that are related to the protection of classified and<br>controlled unclassified information<br>D Conduct assessment and evaluation of all IT systems<br>B &amp; C<\/p>\n\n\n\n<p>Which steps of the Risk Management Framework (RMF) are designed to evaluate risk?<br>A. Assess Security Controls, Monitor Security Controls, Categorize System<br>B. Assess Security Controls, Implement Security Controls, Authorize System<br>C. Implement Security Controls, Monitor Security Controls, Authorize System<br>D. Assess Security Controls, Monitor Security Controls, Authorize System<br>D<\/p>\n\n\n\n<p>In which step of the Risk Management Framework (RMF) would you implement the<br>decommissioning strategy?<br>A. Step 3 &#8211; Implement security controls<br>B. Step 4 &#8211; Assess security controls<br>C. Step 5 &#8211; Authorize system<br>D. Step 6 &#8211; Monitor security controls<br>D<\/p>\n\n\n\n<p>What evolving threats are attempts by hackers to damage or destroy a computer network or system?<br>A. Insider Threat<br>B. Social Media<br>C. Cyber Attack<br>D. Mobile Computing<br>C<\/p>\n\n\n\n<p>What is the first step in the Risk Management Framework (RMF)?<br>A. Categorize System<br>B. Authorize System<br>C. Implement Security Controls<br>D. Select Security Controls<br>E. Assess Security Controls<br>F. Monitor Security Controls<br>A<\/p>\n\n\n\n<p>Select ALL of the correct responses. What is included in the security authorization package?<br>A Security Assessment Report (SAR)<br>B Plan of Action and Milestones (POA&amp;M)<br>C Security Plan<br>D None of the above<br>A, B &amp; C<\/p>\n\n\n\n<p>Indicators of insider threats<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li>Failure to report overseas travel or contact with foreign nationals<\/li>\n\n\n\n<li>Seeking to gain higher clearance or expand access outside job scope<\/li>\n\n\n\n<li>Engaging in classified conversations without NTK<\/li>\n\n\n\n<li>Working inconsistent hours<\/li>\n\n\n\n<li>Exploitable behavior traits<\/li>\n\n\n\n<li>Repeated security violations<\/li>\n\n\n\n<li>Unexplainable affluence\/living above one&#8217;s means<\/li>\n\n\n\n<li>Illegal downloads of information\/files<\/li>\n<\/ol>\n\n\n\n<p>Elements that should be considered in identifying Critical Program<br>Information<br>Elements which if compromised could:<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li>cause significant degradation in mission effectiveness,<\/li>\n\n\n\n<li>shorten expected combat-effective life of system<\/li>\n\n\n\n<li>reduce technological advantage<\/li>\n\n\n\n<li>significantly alter program direction; or<\/li>\n\n\n\n<li>enable adversary to defeat, counter, copy, or reverse engineer technology\/capability.<\/li>\n<\/ol>\n\n\n\n<p>Elements that security professional should consider when assessing and managing risks to DoD assets (risk management process)<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li>Assess assets<\/li>\n\n\n\n<li>Assess threats<\/li>\n\n\n\n<li>Assess Vulnerabilities<\/li>\n\n\n\n<li>Assess risks<\/li>\n\n\n\n<li>Determine countermeasure options<\/li>\n\n\n\n<li>Make RM decision<\/li>\n<\/ol>\n\n\n\n<p>The three categories of Special Access Programs<br>acquisition, intelligence, and operations &amp; support<\/p>\n\n\n\n<p>Types of threats to classified information<br>Insider Threat, Foreign Intelligence Entities (FIE), criminal activities, cyber threats, business competitors<\/p>\n\n\n\n<p>The concept of an insider threat<br>An employee who may represent a threat to<br>national security. These threats encompass potential espionage, violent acts against the Government or the nation, and unauthorized disclosure of classified information<\/p>\n\n\n\n<p>The purpose of the Foreign Visitor Program<br>To track and approve access by a foreign entity to information that is classified; and to approve access by a foreign entity to information that is unclassified, related to a U.S. Government contract, or plant visits covered by ITAR.<\/p>\n\n\n\n<p>Special Access Program<br>A program established for a specific class of<br>classified information that imposes safeguarding and access requirements that exceed those normally required for information at the same classification level.<\/p>\n\n\n\n<p>Enhanced security requirements for protecting Special Access Program (SAP) information<br>Within Personnel Security:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Access Rosters;<\/li>\n\n\n\n<li>Billet Structures (if required);<\/li>\n\n\n\n<li>Indoctrination Agreement;<\/li>\n\n\n\n<li>Clearance based on appropriate investigation completed within last 5\/6<br>years;<\/li>\n\n\n\n<li>Individual must materially contribute to program and have need to know (NTK);<\/li>\n\n\n\n<li>SAP personnel subject to random counterintelligence scope polygraph;<\/li>\n\n\n\n<li>Polygraph examination, if approved by the DepSecDef, may be used as a<br>mandatory access determination;<\/li>\n\n\n\n<li>Tier review process;<\/li>\n\n\n\n<li>Personnel must have Secret or TS clearance;<\/li>\n\n\n\n<li>SF-86 must be current within one year;<\/li>\n\n\n\n<li>Limited Access;<\/li>\n\n\n\n<li>Waivers required for foreign cohabitants, spouses, and immediate family<br>members.<br>Within Industrial Security:<br>The SecDef or DepSecDef can approve carve-out provision to relieve Defense<br>Security Service of industrial security oversight responsibilities.<br>Within Physical Security:<\/li>\n\n\n\n<li>Access Control;<\/li>\n\n\n\n<li>Maintain SAP Facility;<\/li>\n\n\n\n<li>Access Roster;<\/li>\n\n\n\n<li>All SAPs must have unclassified nickname\/ Codeword (optional).<br>Within Information Security:<\/li>\n\n\n\n<li>The use of HVSACO;<\/li>\n\n\n\n<li>Transmission requirements (order of precedence).<\/li>\n<\/ul>\n\n\n\n<p>Responsibilities of the Government SAP Security Officer\/Contractor Program<br>Security Officer (GSSO\/<br>CPSO)<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Possess personnel clearance and Program access at least equal to highest level of Program classified information involved.<\/li>\n\n\n\n<li>Provide security administration and management for organization.<\/li>\n\n\n\n<li>Ensure personnel processed for access to SAP meet prerequisite personnel clearance and\/or investigative requirements specified.<\/li>\n\n\n\n<li>Ensure adequate secure storage and work spaces.<\/li>\n\n\n\n<li>Ensure strict adherence to the provisions of NISPOM, its supplement, and the Overprint.<\/li>\n\n\n\n<li>When required, establish and oversee classified material control program for each SAP.<\/li>\n\n\n\n<li>When required, conduct an annual inventory of accountable<br>classified material.<\/li>\n\n\n\n<li>When required, establish SAPF.<\/li>\n\n\n\n<li>Establish and oversee visitor control program.<\/li>\n\n\n\n<li>Monitor reproduction\/duplication\/destruction capability of SAP information<\/li>\n\n\n\n<li>Ensure adherence to special communications capabilities within SAPF.<\/li>\n\n\n\n<li>Provide for initial Program indoctrination of employees after access is approved; rebrief and debrief personnel<\/li>\n\n\n\n<li>Establish and oversee specialized procedures for transmission of<br>SAP material to and from Program elements<\/li>\n\n\n\n<li>When required, ensure contractual specific security requirements are accomplished.<\/li>\n\n\n\n<li>Establish security training and briefings specifically tailored to unique requirements of SAP.<\/li>\n<\/ul>\n\n\n\n<p>The five Cognizant<br>Security Agencies (CSAs)<br>Department of Defense<br>(DoD), Director of National Intelligence (DNI), Department of Energy (DoE), Department of Homeland Security (DHS) and the Nuclear Regulatory Commission (NRC).<\/p>\n\n\n\n<p>Cognizant Security Agencies (CSA)s&#8217; role in the National Industrial Security Program (NISP).<br>Establish general industrial security programs and oversee\/administer security requirements<\/p>\n\n\n\n<p>Primary authorities governing foreign disclosure of classified military information<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li>Arms Export Control Act<\/li>\n\n\n\n<li>National Security Decision Memorandum 119<\/li>\n\n\n\n<li>National Disclosure Policy-1<\/li>\n\n\n\n<li>International Traffic in Arms Regulation (ITAR)<\/li>\n\n\n\n<li>E.O.s 12829, 13526<\/li>\n\n\n\n<li>Bilateral Security Agreements<\/li>\n\n\n\n<li>DoD 5220.22-M, &#8220;NISPOM,&#8221;<\/li>\n<\/ol>\n\n\n\n<p>Factors for determining<br>whether U.S. companies are under Foreign Ownership, Control or Influence<br>(FOCI)<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li>Record of economic and government<br>espionage against the U.S. targets<\/li>\n\n\n\n<li>Record of enforcement\/engagement<br>in unauthorized technology transfer<\/li>\n\n\n\n<li>Type and sensitivity of information that shall be accessed<\/li>\n\n\n\n<li>Source, nature and extent of FOCI<\/li>\n\n\n\n<li>Record of compliance with pertinent U.S. laws, regulations and contracts<\/li>\n\n\n\n<li>Nature of bilateral &amp; multilateral security &amp; information exchange agreements<\/li>\n\n\n\n<li>Ownership\/control, in whole or part, by foreign government<\/li>\n<\/ol>\n\n\n\n<p>The purpose and function of the Militarily Critical Technologies List (MCTL).<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li>Serves as technical reference for development and implementation of DoD technology, security policies on international transfers of<br>defense-related goods, services, and technologies as administered by the Director, Defense Technology Security<br>Administration (DTSA).<\/li>\n\n\n\n<li>Formulation of export control proposals and export license review<\/li>\n<\/ol>\n\n\n\n<p>Security Infraction<br>Failure to comply with security requirements which cannot reasonably be expected to and does not result in loss, compromise, or suspected compromise of classified information<\/p>\n\n\n\n<p>DoD Manual 5200.01, Volumes 1-3<br>Manual that governs DoD Information Security Program<\/p>\n\n\n\n<p>DoDI 5200.01<br>Authorizes the publication of DoDM 5200.01 Vol 1-3, the DoD Information Security Program<\/p>\n\n\n\n<p>E.O. 13526<br>Executive order that governs DoD Information Security Program<\/p>\n\n\n\n<p>ISOO 32 CFR Parts 2001 &amp; 2003,<br>&#8220;Classified National Security<br>Information; Final Rule&#8221;<br>Provides guidance to all government agencies on classification, downgrading, declassification, and safeguarding of classified national security information<\/p>\n\n\n\n<p>Security Violation<br>Knowing, willful, or negligent action that results in or could be expected to result in loss, suspected compromise, or compromise of classified information<\/p>\n\n\n\n<p>Unauthorized Disclosure<br>Communication or physical<br>transfer of classified or controlled unclassified information (CUI) to unauthorized recipient<\/p>\n\n\n\n<p>Three classification levels<br>TS &#8211; grave damage to national security<br>S &#8211; serious damage to national security<br>C &#8211; damage to national security<\/p>\n\n\n\n<p>Single Scope Background Investigation (SSBI)<br>For military, contractors, and civilians:<br>\u00b7 Critical\/Special-Sensitive<br>\u00b7 TS, &#8220;Q&#8221; info, war-related plans, policymaking, revenue and funds, SCI, SAPs<br>\u00b7 Equivalent to Tier 5<\/p>\n\n\n\n<p>Access National Agency Check with Inquiries (ANACI)<br>For civilians:<br>\u00b7 Noncritical-Sensitive positions<br>\u00b7 Confidential\/Secret, &#8220;L&#8221; info, systems containing PII<br>\u00b7 Equivalent to Tier 3<\/p>\n\n\n\n<p>National Agency Check with Local Agency and Credit Check (NACLC)<br>For military and contractors:<br>\u00b7 Noncritical-Sensitive<br>\u00b7 Confidential\/Secret clearance eligibility<br>\u00b7 Equivalent to Tier 3<\/p>\n\n\n\n<p>NACI<br>National Agency Check with Inquiries for civilians and contractors:<br>\u00b7 Non-Sensitive positions<br>\u00b7 Low Risk<br>\u00b7 HSPD-12 Credentialing<\/p>\n\n\n\n<p>National Agency Check (NAC)<br>The fingerprint portion of personnel security investigation (PSI)<\/p>\n\n\n\n<p>The purpose of due process in<br>Personnel Security Program (PSP)<br>Ensures fairness by providing subject opportunity to appeal unfavorable adjudicative determination<\/p>\n\n\n\n<p>Personnel security program (PSP) security clearance eligibility process<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li>designation: check position responsibilities to validate need for investigation<\/li>\n\n\n\n<li>pre-investigation: initiate e-QIP, review for completeness\/correctness, submit to DCSA (investigative entity)<\/li>\n\n\n\n<li>investigation: conduct based on risk\/sensitivity level of position; conducted by DCSA (investigation results sent to DoDCAF)<\/li>\n\n\n\n<li>adjudication: evaluation of investigation report against 13 adjudicative guidelines (DoDCAF makes eligibility determination)<\/li>\n\n\n\n<li>reinvestigation\/continuous evaluation: favorably adjudicated personnel reviewed to determine whether still eligible to maintain security clearance<\/li>\n<\/ol>\n\n\n\n<p>SF 312 Classified Information Non-Disclosure Agreement<br>Contractual agreement between the US Gov&#8217;t and cleared employee that must be executed as a condition of access<br>Agreement to never disclose classified information to an unauthorized person<\/p>\n\n\n\n<p>Procedures for initiating<br>Personnel Security Investigations (PSIs)<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li>Validate need for investigation<\/li>\n\n\n\n<li>Initiate e-QIP<\/li>\n\n\n\n<li>Review Personnel Security Questionnaire (PSQ) for completeness<\/li>\n\n\n\n<li>Submit electronically to OPM<\/li>\n<\/ol>\n\n\n\n<p>T\/F: Only U.S. citizens may be granted a security clearance.<br>True<\/p>\n\n\n\n<p>T\/F: A security clearance guarantees that any individual will be granted access to classified information.<br>False. Individual must also have NTK and sign a SF 312.<\/p>\n\n\n\n<p>T\/F: Any individual with an official need to know to conduct assigned duties will be granted a clearance.<br>False. The granting of a clearance is based on the favorable determination of an individual&#8217;s integrity, loyalty, and trustworthiness by examining them against the 13 adjudicative guidelines.<\/p>\n\n\n\n<p>T\/F: Non U.S. citizens are restricted from gaining access to classified.<br>False. While non-U.S. citizens are restricted from receiving security clearances, they can gain limited access to classified information through a Limited Access Authorization (LAA). Only goes up to Secret level (NOT TOP SECRET).<\/p>\n\n\n\n<p>T\/F: Non-US citizens are restricted from receiving security clearances.<br>True.<\/p>\n\n\n\n<p>T\/F: An individual must have a need for regular access to classified or sensitive information to establish a need for a security clearance.<br>True.<\/p>\n\n\n\n<p>T\/F: Ease of movement within a facility is an acceptable justification for obtaining a security clearance.<br>False. Seeking ease of movement is not an acceptable justification for obtaining a security clearance.<\/p>\n\n\n\n<p>DoD position sensitivity types<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li>Critical\/Special Sensitive&#8211;&gt; TS<\/li>\n\n\n\n<li>Non-Critical Sensitive&#8211;&gt; Confidential and Secret<\/li>\n\n\n\n<li>Non-Sensitive&#8211;&gt; not national security positions<\/li>\n<\/ol>\n\n\n\n<p>T\/F: Civilians in non-sensitive positions may receive security clearances.<br>False. Only individuals in sensitive positions receive security clearances.<\/p>\n\n\n\n<p>Investigative requirement for a Critical\/Special-Sensitive position<br>Single scope background investigation (SSBI aka T5), SSBI-PR (T5R), or PPR<\/p>\n\n\n\n<p>Investigative requirement for a Non-Critical Sensitive position<br>ANACI or NACLC (T3)<\/p>\n\n\n\n<p>Revocation<br>When current security clearance eligibility determination is rescinded<\/p>\n\n\n\n<p>Denial<br>Initial request for security clearance eligibility is not granted<\/p>\n\n\n\n<p>What is the purpose of the Statement of Reasons (SOR)?<br>Provide comprehensive and detailed written explanation of why preliminary unfavorable adjudicative determination was made. Can be appealed!<\/p>\n\n\n\n<p>The 13 Adjudicative Guidelines<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li>Allegiance to United States<\/li>\n\n\n\n<li>Foreign Influence<\/li>\n\n\n\n<li>Foreign Preference<\/li>\n\n\n\n<li>Sexual Behavior<\/li>\n\n\n\n<li>Personal Conduct<\/li>\n\n\n\n<li>Financial Considerations<\/li>\n\n\n\n<li>Alcohol Consumption<\/li>\n\n\n\n<li>Drug Involvement<\/li>\n\n\n\n<li>Psychological Conditions<\/li>\n\n\n\n<li>Criminal Conduct<\/li>\n\n\n\n<li>Handling Protected Information<\/li>\n\n\n\n<li>Outside Activities<\/li>\n\n\n\n<li>Use of Information Technology Systems<\/li>\n<\/ol>\n\n\n\n<p>Categories of approved classified material storage locations<br>Storage Containers<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li>Security containers (e.g., field safes, cabinets)<\/li>\n\n\n\n<li>Vaults (including modular vaults)<\/li>\n\n\n\n<li>Open storage area (secure area\/secure room)<br>Storage Facilities<\/li>\n\n\n\n<li>SCIF (SCI information)<\/li>\n\n\n\n<li>AA&amp;E storage facility (arms, ammunition, and explosives)<\/li>\n\n\n\n<li>Nuclear storage facility (nuclear weapons)<\/li>\n<\/ol>\n\n\n\n<p>Construction requirements for vault doors<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li>Constructed of hardened steel<\/li>\n\n\n\n<li>Hung on non-removable hinge pins or with interlocking leaves.<\/li>\n\n\n\n<li>Equipped with a GSA-approved combination lock.<\/li>\n\n\n\n<li>Emergency egress hardware (deadbolt or metal bar extending across width of door).<\/li>\n<\/ol>\n\n\n\n<p>The purpose of intrusion detection systems<br>To deter, detect, and document unauthorized entry into secured areas<\/p>\n\n\n\n<p>The purpose of barriers<br>-Define physical limits of installation<br>-Channel traffic<br>-Impede access<br>-Shield activities within installation from direct observation<\/p>\n\n\n\n<p>The purpose of an Antiterrorism Program<br>Protect DoD personnel, their families, installations, facilities, information, and other material resources from terrorist acts<\/p>\n\n\n\n<p>Force Protection Condition (FPCONS) levels<br>Measures taken to protect personnel and assets from attack; issued by COCOMs and installation commanders\/facility directors<\/p>\n\n\n\n<p>Levels: Normal, Alpha, Bravo, Charlie, Delta<\/p>\n\n\n\n<p>The concept of security-in-depth<br>Layered and complementary security controls sufficient to deter, detect, and document unauthorized entry and movement within installation\/facility.<\/p>\n\n\n\n<p>e-QIP<br>System used to document personal information from Personnel Security Questionnaire<\/p>\n\n\n\n<p>Personnel Security Investigation (PSI)<br>The first phase of the security clearance process; used by DoD as standard for uniform collection of relevant and important background information about individual.<\/p>\n\n\n\n<p>JCAVS<br>A security manager uses this system to communicate with the DoD CAF<\/p>\n\n\n\n<p>JAMS<br>This sub-system (used by adjudicators) and JCAVS make up the JPAS\/DISS system<\/p>\n\n\n\n<p>DISS<br>A DoD system of record for personnel security clearance information<\/p>\n\n\n\n<p>Scattered Castles<br>Intelligence Community (IC) Personnel Security Database that verifies personnel security access and visit certifications.<\/p>\n\n\n\n<p>Access<br>Occurs when individual has security eligibility, NTK, and a signed SF 312 (NDA); permitted to access classified information<\/p>\n\n\n\n<p>PSIs are used to determine the eligibility of an individual for <strong><em><strong>_<\/strong><\/em><\/strong> or retention to sensitive duties.<br>Assignment<\/p>\n\n\n\n<p>True or False: The DoD CAF is the only authority who can grant an interim clearance.<br>False<\/p>\n\n\n\n<p>DoD CAF responsibilities<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li>Making adjudicative decisions by applying whole person concept<\/li>\n\n\n\n<li>A repository for investigative records<\/li>\n\n\n\n<li>Initiating special investigations<\/li>\n<\/ol>\n\n\n\n<p>Sensitive Duties<br>Duties that have a great impact on National Security<\/p>\n\n\n\n<p>Continuous Evaluation\/Vetting<br>Ongoing review of individual&#8217;s background to determine whether they should continue to hold security clearance or not<\/p>\n\n\n\n<p>Reinvestigation<br>Periodic investigation conducted at predetermined intervals; CE supplements reinvestigations of all cleared personnel<\/p>\n\n\n\n<p>True<br>True or False: Special access requirements are designed to provide an additional layer of security to some of our nation&#8217;s most valuable assets.<\/p>\n\n\n\n<p>True or False: There is no difference between a threat and a vulnerability.<br>False. Threats and vulnerabilities are related but distinct. Threats to national security exploit vulnerabilities.<\/p>\n\n\n\n<p>E.O. 12968<br>The Executive Order (E.O.) that establishes a uniform Personnel Security Program<\/p>\n\n\n\n<p>DoD 5200.2-R<br>Implements and maintains the DoD personnel security policies and procedures<\/p>\n\n\n\n<p>USD(I) Memorandum, August 30, 2006<br>Defines the Adjudicative Guidelines<\/p>\n\n\n\n<p>Scope<br>This refers to when adjudicators must ensure that an investigation meets the minimum timeframe and element requirements before reviewing the investigation.<\/p>\n\n\n\n<p>Administrative Judge<br>During due process, military and civilian personnel may request an in-person appearance before this individual.<\/p>\n\n\n\n<p>Termination Briefing<br>Given employment is terminated, clearance eligibility is withdrawn, or if individual will be absent from duty 60 days or more. Also given to those inadvertently exposed to classified information.<\/p>\n\n\n\n<p>Foreign Travel Briefing<br>Given to cleared personnel who plan to travel in or through foreign countries, or attend meetings attended by representatives of other countries.<\/p>\n\n\n\n<p>Refresher Briefing<br>Presented annually to personnel who have access to classified information or assignment to sensitive duties.<\/p>\n\n\n\n<p>Aims of Special Access Programs (SAPs)<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li>Protect technological breakthroughs<\/li>\n\n\n\n<li>Cover exploitation of adversary vulnerabilities<\/li>\n\n\n\n<li>Protect sensitive operational plans<\/li>\n\n\n\n<li>Reduce intelligence on U.S. capabilities<\/li>\n<\/ol>\n\n\n\n<p>Protection Level<br>Communicates how SAP is acknowledged and protected<\/p>\n\n\n\n<p>Acknowledged SAP<br>Existence-openly recognized<br>Purpose-identified<br>Program details-classified<br>Funding-generally unclassified<\/p>\n\n\n\n<p>Unacknowledged<br>Existence-protected<br>Purpose-protected<br>Program details-classified<br>Funding-classified, unacknowledged, not directly linked to program<\/p>\n\n\n\n<p>Waived<br>Unacknowledged SAPs with waived reporting requirements; reporting and access controls are more restrictive<\/p>\n\n\n\n<p>4 Phases of SAP Lifecycle<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li>Establishment (is extra protection warranted?)<\/li>\n\n\n\n<li>Management and Administration (continued need? processes followed?)<\/li>\n\n\n\n<li>Apportionment (proper measures in place? approval received)<\/li>\n\n\n\n<li>Disestablishment (program no longer needed?)<\/li>\n<\/ol>\n\n\n\n<p>Component-level SAP Central Offices<br>Manage and oversee list of SAP facilities<br>Exist for each military component, the Joint Chiefs of Staff, Defense Advanced Research Projects Agency (DARPA), and Missile Defense Agency (MDA)<\/p>\n\n\n\n<p>Special Access Program Oversight Committee (SAPOC)<br>The final SAP approving body chaired by the Deputy Secretary of Defense; make final approval decision<\/p>\n\n\n\n<p>Senior Review Group (SRG)<br>Principal working-level body executing governance process. Make unanimous recommendation which is forwarded to DepSecDef for decision<\/p>\n\n\n\n<p>SAP Senior Working Group (SWG)<br>Coordinate, deconflict, and integrate SAPs<\/p>\n\n\n\n<p>DoD Special Access Central Office (SAPCO)<br>&#8220;One voice to Congress&#8221;\/DoD SAP legislative liaison&#8211;&gt; notifies Congress of SAP approval decision<\/p>\n\n\n\n<p>OSD-level SAP Central Offices<br>Exercise oversight for specific SAP category under their purview:<br>Acquisition-Office of USD for Acquisition, Technology, and Logistics<br>Intelligence-Office of USD for Intelligence<br>Operations &amp; Support-Office of USD for Policy<\/p>\n\n\n\n<p>Authorization, Appropriations, and Intelligence Congressional<br>Congressional committees granted SAP access<\/p>\n\n\n\n<p>PIE-FAO<br>Personnel, information, equipment, facilities, activities, and operations<\/p>\n\n\n\n<p>Antiterrorism Officer (individual involved in PHYSEC)<br>Responsible for antiterrorism program<\/p>\n\n\n\n<p>CI Support (individual involved in PHYSEC)<br>Responsible for providing valuable information on the capabilities, intentions, and threats of adversaries<\/p>\n\n\n\n<p>OPSEC Officer (individual involved in PHYSEC)<br>Analyzes threats to assets and their vulnerabilities<\/p>\n\n\n\n<p>Physical Security Officer (individual involved in PHYSEC)<br>Management, implementation, and direction of all physical security programs<\/p>\n\n\n\n<p>Law Enforcement (individual involved in PHYSEC)<br>Must be integrated into intelligence gathering process; part of coordinating emergency responses and criminal incidents on a Federal installation<\/p>\n\n\n\n<p>Criticality<br>Determination based on asset&#8217;s importance to national security and effect of loss<\/p>\n\n\n\n<p>Area Security<br>Security is geared towards protecting entire area of installation or facility<\/p>\n\n\n\n<p>Threat<br>Intention and capability of adversary to undertake detrimental actions<\/p>\n\n\n\n<p>Point Security<br>Security focused on resource itself<\/p>\n\n\n\n<p>Barrier Types<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li>Active-require action by personnel to permit entry<\/li>\n\n\n\n<li>Passive-effectiveness relies on bulk\/mass; no moving parts<\/li>\n\n\n\n<li>natural-define boundaries and provide protection<\/li>\n<\/ol>\n\n\n\n<p>True or False: Site lighting is used to enable guard force personnel to observe activities inside or outside the installation<br>True<\/p>\n\n\n\n<p>True or False: Standby lighting is used when regular lighting is not available<br>False. Emergency lighting is used when regular lighting it not available. Standby lighting is activated by alarms or motion and operate as effective intruder deterrents.<\/p>\n\n\n\n<p>Two-way radio<br>Assist in security; must always be back-up communication systems in addition to radios<\/p>\n\n\n\n<p>Intrusion Detection Systems (IDS)<br>Detect, deter, and document intrusion. DO NOT prevent. Sends signal through wires when triggered<\/p>\n\n\n\n<p>Closed Circuit Televisions (CCTV)<br>Has camera that captures visual image, converts image to video signal, and transmits image to remote location; provides video evidence and captures activity personnel may not have seen<\/p>\n\n\n\n<p>Automated access control systems<br>Allows biometric (e.g., fingerprints, hand geometry, iris scan) and non-biometric (e.g., card swipe reader, key system, pin) forms of identification<\/p>\n\n\n\n<p>Common Access Card (CAC)<br>Form of manual access control. Enables self-authentication on security websites and securely log into computer systems<\/p>\n\n\n\n<p>Mechanical combination lock<br>Form of built-in combination lock. Operated entirely by mechanical means. Combination only changed with key.<\/p>\n\n\n\n<p>Combination padlock<br>Permitted for securing confidential and secret info. May require supplemental controls.<\/p>\n\n\n\n<p>Electromechanical combination lock<br>Form of built-in combination lock. Permitted for securing classified info. Ex: X-07\/08\/09\/10 and CDX-07\/08\/09\/10<\/p>\n\n\n\n<p>Low security padlock<br>Key-operated padlock that has limited resistance to forced entry<\/p>\n\n\n\n<p>SCIF<br>A facility used by intelligence community to store SCI<\/p>\n\n\n\n<p>General Services Administration (GSA)<br>The governing authority to approve security containers<\/p>\n\n\n\n<p>Secure rooms<br>Areas designed and authorized for open storage of large volumes of classified information. Built to commercial construction standards and less secure than vault.<\/p>\n\n\n\n<p>Vaults<br>Open storage of large volumes of classified information. Constructed to meet strict forcible entry standards, including reinforced concrete on all walls, ceiling, and floor, plus a hardened steel gray doors with GSA labels. More secure than secure rooms.<\/p>\n\n\n\n<p>Terrorist threat levels<br>Analytical assessment of terrorist activity based on info about terrorist groups (operational capability, intentions, activity, operational environment); issued by DIA for countries and COCOMs for geographic areas<br>Levels: high, significant, moderate, low<\/p>\n\n\n\n<p>High terrorist threat level<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li>Anti-U.S. terrorists are operationally active<\/li>\n\n\n\n<li>Use large casualty-producing attacks as preferred method of operation<\/li>\n\n\n\n<li>Substantial DoD presence<\/li>\n\n\n\n<li>Operating environment favors terrorist<\/li>\n<\/ol>\n\n\n\n<p>Significant terrorist threat level<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li>Anti-U.S. terrorists are present<\/li>\n\n\n\n<li>Attack personnel or use large casualty-producing attacks as preferred method<\/li>\n\n\n\n<li>Limited operational activity<\/li>\n\n\n\n<li>Operating environment is neutral<\/li>\n<\/ol>\n\n\n\n<p>Moderate terrorist threat level<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li>Anti-U.S. terrorists are present<\/li>\n\n\n\n<li>No indications of anti-U.S. activity<\/li>\n\n\n\n<li>Operating environment favors host nation or U.S.<\/li>\n<\/ol>\n\n\n\n<p>Low terrorist threat level<br>No terrorist group is detected or terrorist group is non-threatening<\/p>\n\n\n\n<p>Physical security plan (PSP)<br>Comprehensive written plan providing appropriate and economical use of personnel and equipment to prevent\/minimize criminal\/disruptive activities. Should include special\/general guard orders, access and material control, protective barrier\/lighting systems, locks, and Intrusion Detection Systems (IDS)<\/p>\n\n\n\n<p>Defense Counterintelligence and Security Agency (DCSA)<br>Replaced Defense Security Service (DSS). Operates as cognizant security office (CSO) for DoD. Investigative service provider for DoD clearance suitability investigations and forward findings to DoDCAF.<\/p>\n\n\n\n<p>A contractor must adhere to the security rules of the <strong><em>__<\/em><\/strong> commander when working at a government installation<br>Installation<\/p>\n\n\n\n<p>National Industrial Security Program (NISP)<br>The program that covers protection of classified information by government contractors<\/p>\n\n\n\n<p>Chapter 8 of the NISPOM<br>If you are a government contractor working on a contractor-owned system at a contractor facility, you must follow the security provisions of this reference<\/p>\n\n\n\n<p>Facility security officer (FSO) responsibilities<br>*industry role<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li>Manage day-to-day security program operations at contractor facility (FCLs, PCLs, security education, safeguarding, reporting to government, self-inspections)<\/li>\n\n\n\n<li>Ensure compliance with NISP and contract documentation<\/li>\n\n\n\n<li>Work with DCSA to monitor classified info and educate personnel<\/li>\n<\/ol>\n\n\n\n<p>True or False: A SAP can retain security cognizance if necessary.<br>True.<\/p>\n\n\n\n<p>Contracting Officer<br>*Government role<br>Enter into, administer, and\/or terminate contracts<\/p>\n\n\n\n<p>Contracting Officer&#8217;s Representative (COR)<br>*Government role<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li>assigned to specific contract<\/li>\n\n\n\n<li>communicate security requirements<\/li>\n\n\n\n<li>verify\/sponsor FCL<\/li>\n\n\n\n<li>subject matter expert with regular contact with contractor<\/li>\n<\/ol>\n\n\n\n<p>Statement of Work (SOW)<br>Outlines project background and end-product objectives (what is to be completed as part of contract)<\/p>\n\n\n\n<p>DD Form 441: DoD Security Agreement<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Legally binding contract between government and contractor<\/li>\n\n\n\n<li>Contractor agrees to comply with NISPOM and acknowledge government review to ensure compliance<\/li>\n\n\n\n<li>Government agrees to process contractor PCLs and provide guidance\/oversight<br>(must be completed before work begins)<\/li>\n<\/ul>\n\n\n\n<p>DD Form 254: DoD Contract Security Classification Specification<br>Outlines security requirements and classification guidance (coordinated between contract knowledge, program knowledge, subject matter expert, and industrial\/info security knowledge)<\/p>\n\n\n\n<p>A cleared individual can only have access at the <strong><em>_<\/em><\/strong> level as the facility clearance<br>Same<\/p>\n\n\n\n<p>For the purpose of a visit to another cleared facility, a clearance can be verified by looking in <strong><em>__<\/em><\/strong><br>DISS<\/p>\n\n\n\n<p>The issuance of <strong><em>__<\/em><\/strong> is the responsibility of the DoD CAF<br>Eligibility<\/p>\n\n\n\n<p>Secret<br>Unauthorized disclosure of this information could reasonably be expected to cause serious damage to our national security.<\/p>\n\n\n\n<p>Top Secret<br>Unauthorized disclosure of this information could reasonably be expected to cause exceptionally grave damage to our national security.<\/p>\n\n\n\n<p>Confidential<br>Unauthorized disclosure of this information could reasonably be expected to cause damage to our national security.<\/p>\n\n\n\n<p>Derivative Classification<br>Incorporating, paraphrasing, restating, or generating info already classified and marking newly developed material consistent with original source document<\/p>\n\n\n\n<p>The five requirements for Derivative Classification<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li>Observe and respect the OCA&#8217;s original classification determination.<\/li>\n\n\n\n<li>Apply the required markings.<\/li>\n\n\n\n<li>Only use authorized sources.<\/li>\n\n\n\n<li>Use caution when paraphrasing.<br>5\/ Always take the appropriate steps to resolve any doubt you have.<\/li>\n<\/ol>\n\n\n\n<p>Original Classification<br>Initial determination that information requires protection against unauthorized disclosure<\/p>\n\n\n\n<p>Compilation<br>Unclassified (or lower classified) information combined to create classified (or higher classified) information<\/p>\n\n\n\n<p>Contained in<br>Incorporating classified information from source document into new document and no additional analysis needed to determine classification<\/p>\n\n\n\n<p>Revealed by<br>Classified information that has been restated or paraphrased (not explicitly stated word-for-word) from source document but classification deduced from interpretation or analysis<\/p>\n\n\n\n<p>Original Classification Authority (OCA)<br>-Authorized to make initial classification determination<br>-Request for OCA contains mission justification and position title<br>-Delegated in writing by president to occupant of position, not to an individual by name<br>-Not able to delegate further unless &#8220;acting&#8221;<br>-Specifies highest level OCA can classify piece of information and their jurisdiction<br>-OCA training<br>-Demonstrable and continuing need for such authority at least 2x a year<\/p>\n\n\n\n<p>Security Classification Guides (SCG)<br>Preferred method of classification determination communication. Contains classification levels, downgrading and declassification instructions, and special handling requirements for programs, projects, plans, etc.<\/p>\n\n\n\n<p>3 Types of Authorized Sources<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li>Security classification guide (SCG)<\/li>\n\n\n\n<li>properly marked source document<\/li>\n\n\n\n<li>DD Form 254<\/li>\n<\/ol>\n\n\n\n<p>*when conflict is present, SCG always takes precedence<\/p>\n\n\n\n<p>6 Step Original Classification Process<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li>Official (is info owned\/produced\/controlled by government?)<\/li>\n\n\n\n<li>Eligibility (does it fall into one of eight classification eligibility categories? are there prohibitions or limitations against classification? has info already been classified?)<\/li>\n\n\n\n<li>Impact (does unauthorized disclosure create potential for damage to national security?)<\/li>\n\n\n\n<li>Classification Level (confidential, secret, TS)<\/li>\n\n\n\n<li>Duration (downgrade? declassify?)<\/li>\n\n\n\n<li>Communication (via SCG or properly marked source document)<\/li>\n<\/ol>\n\n\n\n<p>8 classification eligibility categories<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li>military plans\/weapon systems\/operations<\/li>\n\n\n\n<li>foreign government information (FGI)<\/li>\n\n\n\n<li>intelligence activities\/sources\/methods<\/li>\n\n\n\n<li>foreign relations\/activities of U.S.<\/li>\n\n\n\n<li>scientific\/technological\/economic matters relating to national security<\/li>\n\n\n\n<li>programs for safeguarding nuclear materials\/facilities<\/li>\n\n\n\n<li>vulnerabilities\/capabilities of systems\/installations\/projects\/plans relating to national security<\/li>\n\n\n\n<li>weapons of mass destruction (WMDs)<\/li>\n<\/ol>\n\n\n\n<p>classification prohibitions<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li>concealing violations of law, inefficiency, or administrative error<\/li>\n\n\n\n<li>preventing embarrassment<\/li>\n\n\n\n<li>restraining competition<\/li>\n\n\n\n<li>preventing\/delaying release of information that does not require protection<\/li>\n<\/ol>\n\n\n\n<p>Declassification<br>Change in status from classified to unclassified<\/p>\n\n\n\n<p>Automatic declassification<br>Permanently Valuable Historical records are declassified 25 years from original classification date<\/p>\n\n\n\n<p>Systematic declassification review<br>Information exempt from automatic declassification is reviewed for possible declassification<\/p>\n\n\n\n<p>Mandatory Declassification Review (MDR)<br>Process for public to request review for declassification and public release of classified information<\/p>\n\n\n\n<p>Scheduled Declassification<br>OCA, at the time of original classification, sets date or event for declassification within 25 years<\/p>\n\n\n\n<p>Custodians<br>People who are in possession of, or who are otherwise charged with safeguarding classified information<\/p>\n\n\n\n<p>Options an OCA has when determining declassification<br>Specific Date, Specific Event, or 50X1-HUM Exemption<\/p>\n\n\n\n<p>Restricted Data (RD) and Formerly Restricted Data (FRD)<br>-Concerns design, manufacture, and use of atomic weapons<br>-Exempt from declassification date requirement<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Can ONLY be originally classified\/declassified by Department of Energy<\/li>\n<\/ul>\n\n\n\n<p>Practices to follow when handling classified information<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li>Properly destroy preliminary drafts, worksheets, and other material after they have served their purpose<\/li>\n\n\n\n<li>Use approved secure communications circuits for telephone conversations to discuss classified information<\/li>\n\n\n\n<li>Follow proper procedures when copying classified information<\/li>\n\n\n\n<li>Use security forms such as SF 701 and SF 702<\/li>\n<\/ol>\n\n\n\n<p>SF 702: Security Container Check Sheet<br>Record opening and closing of security container<\/p>\n\n\n\n<p>SF 701: Activity Security Checklist<br>End-of-the-day security checks<\/p>\n\n\n\n<p>SF 700: Security Container Information<br>Record identification info for each container and record combination<\/p>\n\n\n\n<p>Actual compromise<br>An unauthorized disclosure of classified information<\/p>\n\n\n\n<p>Neither confirm nor deny<br>If classified information appears in the public media, DoD personnel must be careful not to make any statement of comment that would confirm the accuracy or verify the classified status of the information<\/p>\n\n\n\n<p>Potential Compromise<br>The possibility of compromise could exist but it is not known with certainty<\/p>\n\n\n\n<p>DISA, Joint Interoperability Test Command (JITC)<br>This organization maintains a register of certified security digital facsimiles<\/p>\n\n\n\n<p>COMSEC<br>The protection resulting from the measures designed to deny unauthorized persons information of value that might be derived from the possession and study of telecommunications and to ensure the authenticity of such communications. Requires more stringent protection requirements<\/p>\n\n\n\n<p>When a document has been sealed within a properly marked inner wrapping you must\u2026<br>Insert the inner wrapping into an outer wrapping<\/p>\n\n\n\n<p>Marking for inner wrapper used for transportation of classified information<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li>recipient mailing address (include name of recipient)<\/li>\n\n\n\n<li>sender&#8217;s address<\/li>\n\n\n\n<li>highest classification of document<\/li>\n\n\n\n<li>special markings<\/li>\n<\/ol>\n\n\n\n<p>Marking for outer wrapper used for transportation of classified information<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li>recipient mailing address (NO INDIVIDUAL NAMES)<\/li>\n\n\n\n<li>sender&#8217;s address<\/li>\n\n\n\n<li>NO CLASSIFICATION MARKINGS<\/li>\n<\/ol>\n\n\n\n<p>When can secret information be sent via USPS express?<br>Only when it is the most effective means considering security, time, cost, and accountability<\/p>\n\n\n\n<p>What kind of information can never be sent via USPS?<br>Top Secret<\/p>\n\n\n\n<p>Methods to send confidential information<br>Defense Courier Service (DCS), cleared courier\/escort, USPS First Class, USPS priority mail express, USPS registered mail, and USPS certified mail (plus others-refer to CDSE course IF107.16)<\/p>\n\n\n\n<p>Methods to send secret information<br>Defense Courier Service (DCS), cleared courier\/escort, USPS registered mail, USPS priority mail express (plus others-refer to CDSE course IF107.16)<\/p>\n\n\n\n<p>Methods to send top secret information<br>ONLY 6 methods<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li>direct contact<\/li>\n\n\n\n<li>cryptographic systems<\/li>\n\n\n\n<li>Defense Courier Service (DCS)<\/li>\n\n\n\n<li>Department of State Courier Service<\/li>\n\n\n\n<li>DoD Component Courier Service<\/li>\n\n\n\n<li>Cleared courier\/escort<\/li>\n<\/ol>\n\n\n\n<p>True or False: Hand carrying classified information should only be done as a last resort<br>True<\/p>\n\n\n\n<p>Responsibilities of couriers<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li>Ensure preparation of all documents (e.g., personal travel documents, inventory of classified materials [two copies: one for courier, one in security office], letter of authorization [for commercial air travel, one per flight])<\/li>\n\n\n\n<li>do not discuss material in public<\/li>\n\n\n\n<li>do not deviate from authorized travel schedule<\/li>\n\n\n\n<li>do not leave materials unattended\/unsecured<\/li>\n\n\n\n<li>do not store material in unauthorized manner<\/li>\n\n\n\n<li>do not open material en-route<\/li>\n\n\n\n<li>can open package at customs (must be away from public view and must reseal package)<\/li>\n\n\n\n<li>protect material in case of emergency<\/li>\n\n\n\n<li>inventory material upon return<\/li>\n\n\n\n<li>ultimately: liable and responsible for materials<\/li>\n<\/ol>\n\n\n\n<p>When is a DD Form 2501 Courier Authorization Card issued?<br>When a continuing need is identified<\/p>\n\n\n\n<p>True or False: When someone is carrying classified information, written authorization is always required<br>True.<\/p>\n\n\n\n<p>Microfiche destruction method<br>Burned, shredded, destroyed with chemicals that destroy imprints<\/p>\n\n\n\n<p>Typewriter ribbon destruction method<br>Burned or shredded<\/p>\n\n\n\n<p>Floppy disk destruction method<br>Burned, overwritten, or demagnetized<\/p>\n\n\n\n<p>Document destruction method<br>Burned, shredded, or chemically decomposed of<\/p>\n\n\n\n<p>Videotape destruction method<br>Burned, shredded, or demagnetized<\/p>\n\n\n\n<p>Homeland Security Presidential Directive 12 (HSPD-12)<br>Requires government-wide development and implementation of standard for secure and reliable forms of identification for Federal employees and contractors.<\/p>\n\n\n\n<p>DoD 5200.08-R<br>Physical Security Program regulation<\/p>\n\n\n\n<p>Describe the following cyber security principles critical to the protection of information and information networks: least privilege, defense-in-depth, situational awareness.<br>Least privilege: The principle that a security architecture should be designed so that each entity is granted the minimum system resources and authorizations that the entity needs to perform its function.<\/p>\n\n\n\n<p>Situational Awareness: Within a volume of time and space, the perception of an enterprise&#8217;s security posture and its threat environment; the comprehension\/meaning of both taken together (risk); and the projection of their status into the near future.<\/p>\n\n\n\n<p>Defense-in-depth: Security strategy integrating people, technology, and operations capabilities to establish variable barriers across multiple layers and missions of the organization.<\/p>\n\n\n\n<p>National Security Council (NSC)<br>Provides overall policy direction for the Information Security Program<\/p>\n\n\n\n<p>Information Security Oversight Office (ISOO)<br>-Oversee and manages information security program under guidance of NSC.<br>-NSC provides overall policy direction<br>-ISOO is the operating arm<br>-Annual report to president about each agency&#8217;s security classification program, analysis and reports<\/p>\n\n\n\n<p>Under Secretary of Defense for Intelligence USD(I)<br>Has primary responsibility for providing guidance, oversight, and approval authority of policies and procedures that govern DoD Information Security Program<\/p>\n\n\n\n<p>What is the Executive Order that designates the three levels of classified information?<br>EO 13526<\/p>\n\n\n\n<p>Who has designated primary and direct responsibility for SAPS within the DoD?<br>Deputy Secretary of Defense (DepSecDef)<\/p>\n\n\n\n<p>How is classified information prepared for transit?<br>Minimize risk of accidental exposure and facilitate detection of tampering<\/p>\n\n\n\n<p>EO 12869<br>Establishes National Industrial Security Program<\/p>\n\n\n\n<p>DoD 5220.22-M<br>National Industrial Security Program Operating Manual (NISPOM)<\/p>\n\n\n\n<p>What is net national advantage?<br>Information that is or will be valuable to the US either directly or indirectly<\/p>\n\n\n\n<p>What does critical program information include?<br>Both classified military information and controlled unclassified information<\/p>\n\n\n\n<p>Requirements for interim clearance<br>No need for immediate access, SF86 submitted, investigation opened by ISP, and all minimum requirements for interim eligibility satisfied<\/p>\n\n\n\n<p>This designation is applied to positions that include duties that require access to &#8220;Secret&#8221; information.<br>Non-critical sensitive<\/p>\n\n\n\n<p>This designation is applied to positions that include duties associated with special programs such as Special Access Programs (SAP) and SCI.<br>Special-sensitive<\/p>\n\n\n\n<p>Characteristics of each Force Protection Conditions (FPCONS)<br>Normal: general global threat of possible terrorist activity&#8211;> routine security posture (i.e., access control at all installations)<br>Alpha: increased general threat of possible terrorist activity against personnel\/facilities; nature and extent unpredictable&#8211;> ALPHA measures must be capable of being maintained indefinitely<br>Bravo: increased\/more predictable threat or terrorist activity&#8211;> sustaining BRAVO measures may affect operational capability and military\/civilian relationships<br>Charlie: incident occurs or intelligence indicates some form of terrorist action is likely against personnel\/facility&#8212;> sustaining CHARLIE measures may create hardship and affect activity of unit\/personnel<br>Delta: immediate area where terrorist attack has occurred of when intelligence indicates terrorist action against specific location\/person is imminent (localized condition)&#8211;> not to be sustained for extended period of time<\/p>\n\n\n\n<p>What specifies classification levels, special requirements, and declassification instructions for classified programs, projects, and plans?<br>Security Classification Guide<\/p>\n\n\n\n<p>Which of the following is a true statement regarding the special handling requirements of Foreign Government Information (FGI)?<br>A)When the classification marking on a document containing FGI is not in English, or when the foreign government marking requires a different degree of protection than the same U.S. classification designation, a U.S. marking that results in a degree of protection equivalent to that required by the foreign government shall be applied.<br>B) A U.S. document containing FGI cannot be declassified or downgraded below the highest level of FGI contained in the document without the permission of the foreign government or international organization that originated the information.<br>C) Those holding security clearances issued by the U.S. government cannot access U.S. documents containing FGI without written consent from the originating foreign government.<br>D) The receiving DoD Components must maintain records for 1 year of the receipt, internal distribution, destruction, annual inventory, access, reproduction, and transmittal of foreign government Top Secret information.<br>B) A U.S. document containing FGI cannot be declassified or downgraded below the highest level of FGI contained in the document without the permission of the foreign government or international organization that originated the information.<\/p>\n\n\n\n<p>Two security professionals &#8211; Paul and Ashley &#8211; are discussing the destruction of classified information. Paul says the destruction of classified documents and material shall be accomplished by means that eliminate risk of reconstruction of the classified information they contain. Ashley says the material that has been identified for destruction shall continue to be protected, as appropriate, for its classification until it is actually destroyed. Who is correct?<br>Paul and Ashley are both correct.<\/p>\n\n\n\n<p>A paragraph of a document which includes an &#8220;(N)&#8221; as part of the portion marking indicates what specific type of classified information is contained in the paragraph?<br>Critical Nuclear Weapons Design Information (CNWDI)<\/p>\n\n\n\n<p>What are the investigative and briefing requirements for access to NATO information?<br>Favorably adjudicated background investigation (T3 (10-year scope) T5 within 5 years prior to assignment), and completed a NATO Briefing.<\/p>\n\n\n\n<p>According to E.O. 13556, which is considered a type of controlled unclassified information?<br>-Communications Security (COMSEC) Information<br>-Declassified Information<br>-Law Enforcement Sensitive (LES) Information<br>-North Atlantic Treaty Organization (NATO) Information<br>Law Enforcement Sensitive Information<\/p>\n\n\n\n<p>What is the purpose of marking classified materials?<br>To alert holders to the presence of classified information, how to properly protect it, and for how long.<\/p>\n\n\n\n<p>What is included in the markings of classified information?<br>Document holder as the sole authority to make transfer and dissemination determinations.<\/p>\n\n\n\n<p>What is the purpose of the Controlled Access Program Coordination (CAPCO) register?<br>To identify the official classification and control markings, and their authorized abbreviations and portion markings.<\/p>\n\n\n\n<p>When a classified data spill occurs, who is responsible for ensuring that policy requirements for addressing an unauthorized disclosure are met?<br>Activity Security Manager<\/p>\n\n\n\n<p>There are five information assurance attributes that are important to protect and defend DoD networks and information. If there was a loss in non-repudiation, what would this cause in relation to information assurance?<br>Data may potentially be available to unauthorized users via electronic form.<\/p>\n\n\n\n<p>What are the 5 information assurance attributes that are important to protect and defend DoD networks and information?<br>Confidentiality<br>Integrity<br>Availability<br>Authenticity<br>Non-repudiation<\/p>\n\n\n\n<p>At the end of the day, Karen was leaving and taking with her unclassified documents she would review at home. When she began to review those documents that night, she realized that classified materials had slipped in between the unclassified materials. Is this a security violation or infraction?<br>Security Violation<\/p>\n\n\n\n<p>The ability to deny you are the sender of an email would be an indication of a lapse in what?<br>Integrity<\/p>\n\n\n\n<p>Unauthorized disclosure and loss of privacy is a lapse in what?<br>Confidentiality<\/p>\n\n\n\n<p>What is the first action done to downgrade, declassify or remove classification markings?<br>Contact the Original Classification Authority through the appropriate chain of command to confirm that the information does not have an extended classification period.<\/p>\n\n\n\n<p>What are some requirements to perform classified activities from a non-traditional location? (e.g. the employee&#8217;s home)<br>Employee must be trained to properly operate classified information systems, on the protection and storage of classified information, and Communications Security (COMSEC) materials.<\/p>\n\n\n\n<p>The employee must receive written approval for use of classified information and equipment at home.<\/p>\n\n\n\n<p>What is the purpose of the Personnel Security Program?<br>To ensure that only loyal, trustworthy, and reliable individuals may access classified information or perform sensitive duties.<\/p>\n\n\n\n<p>DoD reciprocally accepts existing national security eligibility determinations or clearances from other Government agencies in accordance with which policy document?<br>Executive Order 13467, &#8220;Reforming Processes Related to Suitability for Government Employment, Fitness for Contractor Employees, and Eligibility for Access to Classified National Security Information&#8221;<\/p>\n\n\n\n<p>Review of Tier 5 on an individual disclosed that the subject had been a member of an anarchist organization dedicated to disestablishing existing Federal laws and overthrowing the U.S. government by any means necessary, including violence. Although the subject terminated his membership with the organization upon learning he would be investigated for a clearance for his new position, he still maintains social contact with several members of the anarchist organization. Based on this information, which of the adjudicative guidelines is most appropriate for an adjudicator to apply to the case?<br>Allegiance to the United States<\/p>\n\n\n\n<p>Which of the following is an element of the Personnel Security Program?<br>-Risk Assessment and Analysis<br>-Implementation<br>-Classification<br>-Continuous Vetting<br>Continuous Vetting (Formerly Continuous Evaluation)<\/p>\n\n\n\n<p>Limited access to classified information for specific programs may be approved for non-US citizens only if the following condition is met.<br>The prior ten years of the subject&#8217;s life can be appropriately investigated.<\/p>\n\n\n\n<p>What is the investigative requirement for access to Single Integrated Operational Plan &#8211; Extremely Sensitive Information (SIOP-ESI)?<br>Individual has a valid favorably adjudicated Tier 5 or Single Scope Background (SSBI) Investigation.<\/p>\n\n\n\n<p>What is the criteria for personnel to be qualified for assignment to nuclear weapons personnel reliability assurance positions?<br>Individual is a U.S. Citizen<br>Individual has a security clearance eligibility in accordance with the position<br>Individual must be continuously evaluated<\/p>\n\n\n\n<p>What is the investigation requirement for initial assignment to a Presidential Support Activity (i.e. Yankee White) Category 2 position?<br>Favorably completed Tier 5\/Single Scope Background Investigation (SSBI) within 36 months preceding selection.<\/p>\n\n\n\n<p>What is the name of the adjudication process that refers to a person&#8217;s identifiable character traits and conduct sufficient to decide whether employment or continued employment would or would not protect the integrity or promote the efficiency of Federal service?<br>Suitability Adjudication<\/p>\n\n\n\n<p>All unclassified DoD information in the possession or control of non-DoD entities on non-DoD information systems, to the extent provided by the applicable grant, shall minimally be safeguarded under what standards?<br>Organizational wireless connections holding such information must be encrypted, and those accessing such information must use encrypted wireless connections where available when traveling.<\/p>\n\n\n\n<p>Copies of personnel security investigative reports must be destroyed by DoD recipient organizations, within how many days following completion of the necessary personnel security determination?<br>90 Days<\/p>\n\n\n\n<p>What level(s) of access may be granted with Limited Access Authorization for non-U.S. citizens?<br>LAAs shall only be granted access at the Secret and Confidential Levels<\/p>\n\n\n\n<p>Which of the following is not considered when making a security clearance eligibility determination?<br>Education Level<br>Alcohol Consumption<br>Financial Considerations<br>Psychological Conditions<br>Education Level<\/p>\n\n\n\n<p>A position that does not require eligibility for access to classified information, but having the potential to cause significant or serious damage to national security may be designated as what position sensitivity?<br>noncritical sensitive<\/p>\n\n\n\n<p>What information must be included in a Statement of Reasons (SOR)?<br>Why an unfavorable national security eligibility determination is being proposed.<br>Explain each security concern and state the specific facts that trigger each security concern.<br>Identify all applicable adjudicative guidelines for each concern, and provide the disqualifying conditions and mitigating conditions for each guideline.<\/p>\n\n\n\n<p>Which type of briefing is used to obtain confirmation that a cleared employee agrees never to disclose classified information to an unauthorized person?<br>Special Briefings &#8211; Non-Disclosure<\/p>\n\n\n\n<p>What is the security system performance goal of immediate indication of deliberate attempts, security probing and warning for inadvertent or mistaken intention is an example of which system security capability?<br>Deterrence<\/p>\n\n\n\n<p>Two security professionals &#8211; Paul and Ashley &#8211; are discussing secure rooms, containers, and vaults. Paul says weapons or sensitive items such as funds, jewels, or precious metals should not be stored in the same security container as classified information. Ashley says the General Service Administration approves security containers used to store classified information. Who is correct?<br>Both are correct.<\/p>\n\n\n\n<p>Which of the following is not a distinct phase of the Intrusion Detection System?<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Detection<\/li>\n\n\n\n<li>Control<\/li>\n\n\n\n<li>Assessment<\/li>\n\n\n\n<li>Response<br>Control<\/li>\n<\/ul>\n\n\n\n<p>Which of the following would be considered a public safety crime?<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Theft of ammunition shipment for the purpose of criminal or gang related activity.<\/li>\n\n\n\n<li>Theft of sensitive, proprietary information relating to US aerospace and defense technologies.<\/li>\n\n\n\n<li>Deliberate destruction of DoD assets or interruption of normal operations.<\/li>\n\n\n\n<li>Theft of an item and use of it outside of its intended purpose or without permission.<br>Theft of ammunition shipment for the purpose of criminal or gang related activity.<\/li>\n<\/ul>\n\n\n\n<p>Preventing unauthorized access to information and equipment, safeguarding DoD assets against espionage and criminal activity, and providing the means to counter threats when preventative measures are ignored, best characterize the primary functions of which program or process?<br>Physical Security Program<\/p>\n\n\n\n<p>The process of integrating active and passive complementary physical security measures to ensure the protection of DoD assets is known as what concept?<br>Security-In-Depth<\/p>\n\n\n\n<p>The stealing of sensitive, proprietary information related to U.S. aerospace and defense technologies with the intent to provide such information to a foreign adversary is an example of which type of threat to DoD assets?<br>Economic Espionage<\/p>\n\n\n\n<p>When a Terrorism Threat Level is escalated from LOW to MODERATE, a DoD Component Head should employ which of the following countermeasures?<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Cease all flying except for specifically authorized operational sorties.<\/li>\n\n\n\n<li>Direct the execution of advance site reviews to facilitate the antiterrorism planning process.<\/li>\n\n\n\n<li>Encourage dependent family members to complete Level I Antiterrorism Awareness Training before any travel outside the continental United States (OCONUS).<\/li>\n\n\n\n<li>Conduct an immediate Terrorism Vulnerability Assessment for off-installation housing, schools, daycare centers, transportation.<br>Encourage dependent family members to complete Level I Antiterrorism Awareness Training before any travel outside the continental United States (OCONUS).<\/li>\n<\/ul>\n\n\n\n<p>What information must a request to authorize disclosure of classified information during a visit include?<br>Explanation of the government purpose to perform when disclosing classified information.<br>The subject of the meeting, scope of classified topics, and classification level.<br>The main content of the invitation to send to the participants.<\/p>\n\n\n\n<p>Two security professionals &#8211; Paul and Ashley &#8211; are discussing the security procedures for visits and meetings. Paul says visits must serve a specific U.S. Government purpose. Ashley says DoD Components should, as a minimum, establish procedures that include verification of the identity, personnel security clearance, access (if appropriate), and need-to-know for all visitors. Who is correct?<br>Paul is correct.<\/p>\n\n\n\n<p>Executive Order 12829, signed in January 1993, mandated that which entity be responsible for implementing and monitoring the National Industrial Security Program (NISP)?<br>The National Security Council shall provide overall policy direction for the NISP, but the Director of the Information Security Oversight Office (ISOO) (in consultation with the National Security Advisor) is responsible for implementation and monitoring.<\/p>\n\n\n\n<p>What is the role of the government contracting activity (GCA), or cleared prime contractor, when a contractor that does not have a Facility Clearance (FCL) wants to bid on a Request for Proposal (RFP) that requires access to classified information?<br>The GCA must sponsor the contractor for a facility security clearance by submitting a sponsorship request to DSS, which initiates the facility clearance process.<\/p>\n\n\n\n<p>What is the purpose of the Federal Acquisition Regulations (FAR)?<br>To codify and publish uniform policies and procedures for acquisition by all executive agencies.<\/p>\n\n\n\n<p>What is the briefing given when an individual&#8217;s employment is terminated, clearance eligibility is withdrawn, or if the individual will be absent from duty for more than 60 days.<br>Termination Briefing<\/p>\n\n\n\n<p>Which executive order governs the DoD Information Security Program?<br>E.O. 13526<\/p>\n\n\n\n<p>What is the ISOO document that governs the DoD Information Security Program?<br>32 CFR Parts 2001 &amp; 2003, &#8220;Classified National Security Information; Final Rule&#8221;<\/p>\n\n\n\n<p>An event that results in or could be expected to result in the loss or compromise of classified information.<br>Security Violation<\/p>\n\n\n\n<p>Unauthorized disclosure of this information could reasonably be expected to cause serious damage to national security.<br>Secret<\/p>\n\n\n\n<p>Unauthorized disclosure of this information could reasonably be expected to cause exceptionally grave damage to our national security.<br>Top Secret<\/p>\n\n\n\n<p>Unauthorized disclosure of this information could reasonably be expected to cause damage to our national security.<br>Confidential<\/p>\n\n\n\n<p>Unclassified information or classified information (at a lower level) that when the information is combined or associated reveals additional factors that qualifies for classified information.<br>Compilation<\/p>\n\n\n\n<p>This document contains classification levels, special requirements, and duration instructions for programs, projects, plans, etc.<br>Security Classification Guide<\/p>\n\n\n\n<p>What is the declassification system where information exempted from automatic declassification is reviewed for possible declassification?<br>Systematic Declassification Review<\/p>\n\n\n\n<p>What is the declassification system where Permanently Valuable Historical records are declassified when they are 25 years old?<br>Automatic Declassification<\/p>\n\n\n\n<p>What is the declassification system where an Original Classification Authority (OCA), at the time the information is originally classified, sets a date or event for declassification?<br>Mandatory Declassification Review<\/p>\n\n\n\n<p>What is the six step process an OCA applies in making classification determinations?<br>Original Classification Process<\/p>\n\n\n\n<p>What are options an OCA has when determining declassification?<br>Specific Date, Specific Event, or by the 50X1-HUM Exemption<\/p>\n\n\n\n<p>What are some examples of practices to follow when handling classified information?<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Properly destroying preliminary drafts, worksheets, and other material after they have served their purpose.<\/li>\n\n\n\n<li>Use of approved secure communication circuits for telephone conversations to discuss classified information.<\/li>\n\n\n\n<li>Following proper procedures when copying classified information<\/li>\n\n\n\n<li>Using security forms such as the SF 701 and SF 702.<\/li>\n<\/ul>\n\n\n\n<p>What is the SF 702?<br>Security Container Check Sheet &#8211; Used to record the opening and closing of your security container.<\/p>\n\n\n\n<p>What is the SF 701?<br>The Activity Security Checklist &#8211; It is intended to verify that you did not accidentally leave classified materials unsecured, as well as, to ensure the area is safe and secure.<\/p>\n\n\n\n<p>What is the term for an unauthorized disclosure of classified information?<br>Actual Compromise<\/p>\n\n\n\n<p>What is the term for the possibility that a compromise could exist, but it is not known with certainty?<br>Potential Compromise<\/p>\n\n\n\n<p>What must DoD personnel be careful not to do if classified information appears in the public media?<br>Neither Confirm Nor Deny &#8211; DoD personnel must be careful not to make any statement or comment that would confirm the accuracy or verify the classified status of the information.<\/p>\n\n\n\n<p>What organization maintains a register of certified security digital facsimiles?<br>DISA, Joint Interoperability Test Command (JITC)<\/p>\n\n\n\n<p>What is the term for the protection resulting from the measures designed to deny unauthorized persons information of value that might be derived from the possession and study of telecommunications to ensure the authenticity of such communications?<br>COMSEC<\/p>\n\n\n\n<p>This level of classified information can be sent via USPS express only when it is the most effective means considering security, time, cost, and accountability.<br>Secret<\/p>\n\n\n\n<p>What methods may be used to send hard copy Confidential information?<br>Defense Courier Service (DCS)<br>First Class Mail<br>Registered Mail<br>Certified Mail<\/p>\n\n\n\n<p>This level of classified information may NEVER be sent via USPS<br>Top Secret<\/p>\n\n\n\n<p>What method of transportation for classified information should only be utilized as a last resort?<br>Hand Carry<\/p>\n\n\n\n<p>What is required when someone is hand carrying classified information?<br>Written Authorization<br>Authorization may be contained in a letter, a courier card, or other written document.<\/p>\n\n\n\n<p>What is a DD Form 2501? How long may it be issued for?<br>Courier Authorization Card. Issued for no more than 2 years at a time.<\/p>\n\n\n\n<p>What is the proper destruction method for typewriter ribbon?<br>Burned or Shredded<\/p>\n\n\n\n<p>What is the proper destruction method for floppy disks?<br>Burned<br>Overwritten<br>Demagnetized<\/p>\n\n\n\n<p>Compromise of what type of information can significantly alter program direction, shorten combat effective life of a system, or require additional research, development, test, and evaluation resources to counter impact of loss?<br>Critical Information<\/p>\n\n\n\n<p>How is the level of classification of the Program Protection Plan determined?<br>Determined based on the level of classification of its content.<\/p>\n\n\n\n<p>What is the term for the initial determination that information requires protection against unauthorized disclosure in the interest of U.S. National Security?<br>Original Classification<\/p>\n\n\n\n<p>What takes precedence when there is a conflict between marking guidance in the source document and the Security Classification Guide (SCG)?<br>Security Classification Guide<\/p>\n\n\n\n<p>What refers to an individual&#8217;s responsibility to properly mark newly developed material consistent with the classification marking specified in authorized sources?<br>Derivative Classification<\/p>\n\n\n\n<p>What is the DoD Cybersecurity Policy? (Select All that Apply)<br>A. Risk Management<br>B. Operational Resilience<br>C. Integration and Interoperability<br>D. Cyberspace Defense<br>E. Performance<br>F. Identity Assurance<br>G. Mission Partners<br>All Items<\/p>\n\n\n\n<p>Which of the following security program areas would you find practitioners who train and\/<br>or advise Original Classification Authorities in the application of the process for making<br>classification determinations?<br>A. Information Security<br>B. Physical Security<br>C. Personnel Security<br>D. Industrial Security<br>A. Information Security<\/p>\n\n\n\n<p>Which of the following security program areas would you find practitioners working with a<br>facility&#8217;s Antiterrorism Officer to deploy defensive measures designed to reduce the facility&#8217;s<br>vulnerability from terrorist attacks?<br>A. Information Security<br>B. Physical Security<br>C. Personnel Security<br>D. Industrial Security<br>B. Physical Security<\/p>\n\n\n\n<p>Which of the following security programs areas would you find practitioners involved with<br>processes that monitor employees for new information that could affect their security clearance<br>eligibility status?<br>A. Foreign Disclosure<br>B. Information Security<br>C. International Security<br>D. Operations Security<br>E. Personnel Security<br>F. Physical Security<br>G. Research and Technology Protection<br>H. Information Assurance<br>E. Personnel Security<\/p>\n\n\n\n<p>Two security professionals &#8211; Paul and Ashley &#8211; are discussing security program areas.<br>Paul says that Information Security practitioners train and\/or advise Original Classification<br>Authorities in the application of the process for making classification determinations.<br>Ashley says that Physical Security practitioners work with a facility&#8217;s Antiterrorism Officer to<br>deploy defensive measures designed to reduce the facility&#8217;s vulnerability from terrorist attacks.<br>Who is correct?<br>A. Paul is correct<br>B. Ashley is correct<br>C. Paul and Ashley are both correct<br>D. Paul and Ashley are both incorrect<br>C. Paul and Ashley are both correct<\/p>\n\n\n\n<p>Two security professionals &#8211; Paul and Ashley &#8211; are discussing security program areas.<br>Paul says that Information Security practitioners work with a facility&#8217;s Antiterrorism Officer to<br>deploy defensive measures designed to reduce the facility&#8217;s vulnerability from terrorist attacks.<br>Ashley says that Personnel Security practitioners train and\/or advise Original Classification<br>Authorities in the application of the process for making classification determinations.<br>Who is correct?<br>A. Paul is correct<br>B. Ashley is correct<br>C. Paul and Ashley are both correct<br>D. Paul and Ashley are both incorrect<br>D. Paul and Ashley are both incorrect<\/p>\n\n\n\n<p>Which of the following is a true statement regarding the special handling requirements of Foreign Government Information (FGI)?<\/p>\n\n\n\n<p>a. When the classification marking on a document containing FGI is not in English, or when the foreign government marking requires a different degree of protection than<br>the same U.S. classification designation, a U.S. marking that results in a degree of protection equivalent to that required by the foreign government shall be applied.<br>b. A U.S. document containing FGI cannot be declassified or downgraded below the highest level of FGI contained in the document without the permission of the foreign government or international organization that originated the information.<br>c. Those holding security clearances issued by the U.S. government cannot access U.S. documents containing FGI without written consent from the originating foreign government.<br>d. The receiving DoD Components must maintain records for 1 year of the receipt, internal distribution, destruction, annual inventory, access, reproduction, and transmittal of foreign government Top Secret information.<br>B<\/p>\n\n\n\n<p>Which of the following is a requirement for access to North Atlantic Treaty Organization (NATO) information?<br>a. Personnel has been subject of a Single Scope Background Investigation (SSBI), including a National Agency Check (NAC) on the spouse and all members of the individual&#8217;s immediate family of 18 years of age or over who are United States citizens other than by birth or who are resident aliens.<br>b. Personnel has been subject of a favorably adjudicated background investigation (BI) (10-year scope), Tier 5, current within five years prior to the assignment, and completed a NATO brief.<br>c. Personnel has been subject of a favorably adjudicated BI (10-year scope), Defense National Agency Check with Inquiries (DNACI)\/ National Agency Check with Inquiries (NACI) or NACI Entrance National Agency Check (ENTNAC), current within five years prior to the assignment.<br>d. Personnel requiring access to NATO COSMIC (Top Secret) or SECRET information must at least possess the equivalent interim U.S. security clearance.<br>B<\/p>\n\n\n\n<p>According to Executive Order 13556, which of the following<br>is considered a type of controlled unclassified information (CUI)?<br>a. Communications Security (COMSEC) Information<br>b. Declassified Information<br>c. Law Enforcement Sensitive (LES) Information<br>d. North Atlantic Treaty Organization (NATO) Information<br>C. Law Enforcement Sensitive Information<\/p>\n\n\n\n<p>What is the purpose of marking classified materials?<br>a. To alert holders to the presence of classified information, how to properly protect it, and for how long.<br>b. To deter foreign adversaries from committing actions aimed at accessing such information.<br>c. To provide guidance for interpretation and analysis of classified information.<br>d. To alert holders to the methods used to collect classified information.<br>A<\/p>\n\n\n\n<p>What is included in the markings of classified information?<br>a. Derivative classifier as the authority to make declassification determinations.<br>b. Agencies and authorities that have previously accessed the classified information.<br>c. Document holder as the sole authority to make transfer and dissemination determinations.<br>d. Sources and reasons for the classification.<br>C<\/p>\n\n\n\n<p>What is the purpose of the Controlled<br>Access Program Coordination (CAPCO) register?<br>a. To identify the categories, types, and levels of Special Access Programs (SAPs.)<br>b. To define the authorities for classifying, declassifying, and regrading sensitive documents.<br>c. To identify the official classification and control markings, and their authorized abbreviations and portion markings.<br>d. To define the requirements, restrictions, and measures necessary to safeguard classified information from unauthorized disclosure.<br>C<\/p>\n\n\n\n<p>When a classified data spill occurs, who is responsible for ensuring that policy requirements for addressing an unauthorized disclosure are met?<br>a. Activity Security Manager<br>b. Information Assurance Staff<br>c. Information Assurance Manager<br>d. Information Assurance Officer<br>A<\/p>\n\n\n\n<p>There are five information assurance attributes that are important to protect and defend DoD networks and information. If there was a loss in non- repudiation, what would this cause in relation to information assurance?**<br>a. Data is no longer reliable, accurate, nor trusted.<br>b. Data may potentially be available to unauthorized users via electronic form.<br>c. General communications are no longer trusted.<br>d. Potential of unauthorized access to classified data.<br>e. Data is no longer available to authorized users, and missions cannot be conducted.<br>B<\/p>\n\n\n\n<p>Which of the following examples describes<br>a security violation rather than a security infraction?<br>a. On a busy day, Karen printed classified documents on the printer in her open storage\/secure room. She forgot about the documents and they remained on the printer for about an hour before she retrieved them.<br>b. Karen was late for a meeting in a different area of her building. She put a classified document in a folder she believed was marked for carrying classified materials. When handing out the materials, Karen realized that the folder was not marked for carrying classified materials, she had put the documents in the wrong folder.<br>c. At the end of the day, Karen was leaving and taking with her unclassified documents she would review at home. When she began to review those documents that night, she realized that classified materials had slipped in between the unclassified materials.<br>d. Karen was working a mission related to Mexican Drug cartel operating out of Playa Carmen. Her husband planned a golf trip with friends to that area. She advised him not to go, and believing that it was a safety issue, she provided sensitive details about the cartel to make sure that he did not go.<br>C<\/p>\n\n\n\n<p>The inability to deny you are the sender of an email would be an indication of a lapse in:**<br>a. Non-Repudiation<br>b. Confidentiality<br>c. Integrity<br>d. Availability<br>A. Non-repudiation<\/p>\n\n\n\n<p>Unauthorized disclosure and loss of privacy is a lapse in:**<br>a. Confidentiality<br>b. Integrity<br>c. Availability<br>d. Authentication<br>A<\/p>\n\n\n\n<p>Which of the following is the first action done to downgrade, declassify<br>or remove classification markings? a. Through the appropriate chain of command, contact the original classification authority (OCA) to confirm that information does not have an extended classification period.<br>b. Change the classification authority block to indicate &#8220;Declassify ON:&#8221; to show the new declassification instructions.<br>c. Take all classification markings off the document and redistribute.<br>d. Request a waiver from the Information Security Oversight. Office (ISOO) to remove the declassification markings.<br>A<\/p>\n\n\n\n<p>All of the<br>following are requirements to perform classified activities from non-traditional locations (e.g., the employees home), EXCEPT:<br>a. The employee must be trained to operate classified information systems.<br>b. The employee must be trained on protection and storage of classified information and Communications Security (COMSEC) materials.<br>c. The employee must receive written approval for use of classified information and equipment at home.<br>d. The employee must have an office space that meets requirements comparable to the Sensitive Compartmented Information Facility (SCIF).<br>B<\/p>\n\n\n\n<p>What is the purpose of the Personnel Security Program (PSP)?<br>a. To define original classification for DoD assets and information.<br>b. To designate individuals for positions requiring access to classified information.<br>c. To ensure that only loyal, trustworthy, and reliable individuals may access classified information or perform sensitive duties.<br>d. To describe the safeguarding requirements personnel must employ when handling classified materials at a cleared contractor facility.<br>C<\/p>\n\n\n\n<p>DoD reciprocally accepts existing national security eligibility determinations or clearances from other Government agencies in accordance with which of the following policy documents?<br>a. Office of Management and Budget Memorandum M-05-24, &#8220;Implementation of Homeland Security Presidential Directive (HSPD) 12 &#8211; Policy for a Common Identification Standard for Federal Employees and Contractors,&#8221;.<br>b. Executive Order 13467, &#8220;Reforming Processes Related to Suitability for Government Employment, Fitness for Contractor Employees, and Eligibility for Access to Classified National Security Information&#8221;.<br>c. Sections 301 and 7532 of title 5, United States Code.<br>d. Executive Order 13526, &#8220;Classified National Security Information&#8221;.<br>B<\/p>\n\n\n\n<p>Review of Tier 5 on an individual disclosed that the subject had been a member of<br>an anarchist organization dedicated to disestablishing existing Federal laws and overthrowing the U.S. government by any means necessary, including violence. Although the subject terminated his membership with the organization upon learning he would be investigated for<br>a clearance for his new position, he still maintains social contact with several members of the anarchist organization. Based on this information, which of the following adjudicative guidelines is most appropriate for an adjudicator to apply to the case?<br>a. Psychological Conditions<br>b. Foreign Preference<br>c. Allegiance to the United States<br>d. Criminal Activity<br>C<\/p>\n\n\n\n<ol class=\"wp-block-list\" start=\"19\">\n<li>Which of the following is considered an element of the Personnel Security Program (PSP)?<br>a. Risk Assessment and Analysis<br>b. Implementation<br>c. Classification<br>d. Continuous Evaluation<br>D<\/li>\n<\/ol>\n\n\n\n<p>Limited access to classified information for<br>specific programs may be approved for non-U.S. citizens only under which of the following conditions?<br>a. The subject is eligible to access material marked by a foreign government that is equivalent to a U.S. Top Secret classification marking.<br>b. The subject will only have one-time access to specific material, after which the material will be appropriately destroyed or returned to the originating U.S. agency<br>c. The subject will only have access to classified U.S. documents containing Foreign Government Information (FGI) originating from the foreign country of which the subject is a citizen.<br>d. The prior 10 years of the subject&#8217;s life can be appropriately investigated.<br>D<\/p>\n\n\n\n<p>Which of the following is the investigative requirement for access to<br>Single Integrated Operational<br>Plan-Extremely Sensitive Information (SIOP- ESI)?<br>a. Individual has a valid favorably adjudicated Tier 5 or Single Scope Background (SSBI) Investigation.<br>b. Individual has a valid favorable adjudicated Tier 3 or National Agency Check with Local Agency Check (NACLC) investigation.<br>c. Individual has a valid favorably adjudicated Tier 3 or Access National Agency Check with Written Inquiries and Credit Check (ANACI) investigation.<br>d. Individual has a valid favorably adjudicated Tier.<br>A<\/p>\n\n\n\n<p>Which of the following is not qualifying criteria for personnel assigned to nuclear weapons personnel reliability assurance positions?<br>a. Individual must be a U.S. Citizen<br>b. Individual has a security clearance eligibility in accordance with the position<br>c. Individual is subject to a periodic reinvestigation every three years<br>d. Individual must be continuous evaluated<br>C<\/p>\n\n\n\n<p>Which of the following is correct regarding the investigation requirement for initial assignment to a Presidential Support Activities (i.e. Yankee White) Category 2 position?<br>a. Favorably completed Tier 5\/Single Scope Background Investigation (SSBI) within 36 months preceding selection.<br>b. Favorably completed Tier 3\/National Agency Check with Local Agency Check (NACLC) within 36 months preceding selection.<br>c. Favorably completed Tier 5\/SSBI within 24 months preceding selection.<br>d. Favorably completed Tier 3\/NACLC within 24 months preceding selection.<br>A<\/p>\n\n\n\n<p>Which of the following adjudication processes refers to a person&#8217;s identifiable character traits and conduct sufficient to decide whether employment or continued employment would or would not protect the integrity or promote the efficiency of the Federal service?<br>a. Homeland Security Presidential Directory (HSPD) 12 credentialing<br>b. National security adjudication<br>c. Suitability adjudication<br>d. Continuous evaluation<br>C<\/p>\n\n\n\n<p>All unclassified DoD information in the possession or control of non-DoD entities on non-DoD information systems, to the<br>extent provided by the applicable grant, shall minimally be safeguarded under which of the following standards?<br>a. Information holders must use the Secret Internet Protocol Router Network (SIPRNET) to transmit such information.<br>b. Such information may be store in an open storage area, provided the room is equipped with an Intrusion Detection System (IDS) with the personnel responding to an alarm within 15 minutes of the alarm annunciation.<br>c. Such information must be stored in a General Services Administration (GSA)-approved security container equipped with a lock meeting FF-L-2740 standards.<br>d. Organizational wireless connections holding such information must be encrypted, and those accessing such information must use encrypted wireless connections where available when traveling.<br>D<\/p>\n\n\n\n<p>Copies of personnel security investigative reports must be destroyed by DoD recipient organizations, within how many days following completion<br>of the necessary personnel security determination?<br>a. 30 days<br>b. 45 days<br>c. 60 days<br>d. 90 days<br>D<\/p>\n\n\n\n<p>Which of the following limitations is true regarding Limited Access Authorization (LAA) to non-U.S. citizens?<br>a. LAAs shall only be granted access at the Secret and Confidential levels.<br>b. A favorably completed and adjudicated Tier 3 or National Agency Check with Local Agency Check (NACLC). investigation within the last five years is required.<br>c. An LAA is the same as a security clearance eligibility.<br>d. Access to classified information Is not limited to a specific program or project.<br>A<\/p>\n\n\n\n<ol class=\"wp-block-list\" start=\"28\">\n<li>Which of the following is not considered when making a security clearance eligibility determination?<br>a. Education Level<br>b. Alcohol consumption<br>c. Financial considerations<br>d. Psychological Conditions<br>A<\/li>\n<\/ol>\n\n\n\n<p>A position designated as a DoD noncritical-sensitive civilian position may fall under any of the following criteria, EXCEPT:<br>a. A position not requiring eligibility for access to classified information, but having the potential to cause significant or serious damage to the national security.<br>b. A position requiring eligibility for access to Top Secret information.<br>c. A position requiring eligibility for access to confidential information.<br>d. A position requiring eligibility for access to secret information.<br>B<\/p>\n\n\n\n<p>What information must a statement of reasons (SOR) include?<br>a. SOR must state why an unfavorable national security eligibility determination is being proposed.<br>b. SOR must explain each security concern and state the specific facts that trigger each security concern.<br>c. The SOR must identify applicable adjudicative guideline(s) for each concern, and provide the disqualifying conditions and mitigating conditions for each guideline.<br>d. All of the Above<br>D<\/p>\n\n\n\n<p>Which type of briefing is used to obtain confirmation that a cleared employee agrees never to disclose classified information to an unauthorized person?<br>a. Special Briefings &#8211; Courier<br>b. Original Classification Authority (OCA) Briefing<br>c. Special Briefings &#8211; Non-Disclosure<br>d. Debriefing<br>C<\/p>\n\n\n\n<p>___________is the security system performance goal of immediate indication of deliberate attempts, security probing and warning for inadvertent or mistaken intention<br>is an example of which system security capability?<br>a. Detect<br>b. Assessment<br>c. Deterrence<br>d. Delay<br>C<\/p>\n\n\n\n<p>Two security professionals &#8211; Paul and Ashley &#8211; are discussing secure rooms, containers, and vaults. Paul says weapons or sensitive items such as funds, jewels, or precious metals should not be stored in the same security container as classified information. Ashley says the General Service Administration approves security containers used to store classified information. Who is correct?<br>a. Paul is correct<br>b. Ashley is correct<br>c. Paul and Ashley are both correct<br>d. Paul and Ashley are both incorrect<br>C<\/p>\n\n\n\n<p>Which of the following is not a distinct phase of the Intrusion Detection System?<br>a. Detection<br>b. Control<br>c. Assessment<br>d. Response<br>B<\/p>\n\n\n\n<p>Which of the following would be considered a public safety crime?<br>a. Theft of ammunition shipment for the purpose of criminal or gang related activity.<br>b. Theft of sensitive, proprietary information relating to US aerospace and defense technologies.<br>c. Deliberate destruction of DoD assets or interruption of normal operations.<br>d. Theft of an item and use of it outside of its intended purpose or without permission.<br>A<\/p>\n\n\n\n<p>Which of the following best describes the goal of the Physical Security Program?<br>a. To ensure that industry safeguards the classified information in their possession, while performing work on contracts, bids, or research and development efforts on behalf of the government.<br>b. To protect assets against compromise resulting from activities such as espionage, sabotage, terrorism, damage or loss, and criminal.<br>c. To ensure that only loyal, trustworthy, and reliable individuals may access classified information or perform sensitive duties.<br>d. To create uniform policies and procedures for defense acquisition by all executive agencies.<br>B<\/p>\n\n\n\n<p>Preventing unauthorized access to information<br>and equipment, safeguarding DoD assets against espionage and criminal activity, and providing the means to counter threats when preventative measures are ignored, best characterize the primary functions of which of the following programs or processes? a. Physical Security Program<br>b. Operations Security (OPSEC) process<br>c. Security incident response process<br>d. Personnel Security Program<br>A<\/p>\n\n\n\n<p>The process of integrating active and passive complementary physical security measures to ensure the protection of DoD assets is known as which of the following concepts?<br>a. Area security<br>b. Threat-vulnerability assessment<br>c. Security-in-depth<br>d. Point security<br>C<\/p>\n\n\n\n<p>The stealing of sensitive, proprietary information related to U.S. aerospace and defense technologies with the intent to provide such information to a foreign adversary is an example of which type of threat to DoD assets?<br>a. Criminal activity<br>b. Economic espionage<br>c. Treason<br>d. Terrorism<br>B<\/p>\n\n\n\n<p>When a Terrorism Threat Level is escalated from LOW to MODERATE, a DoD Component Head should employ which of the following countermeasures?<br>a. Cease all flying except for specifically authorized operational sorties.<br>b. Direct the execution of advance site reviews to facilitate the antiterrorism planning process.<br>c. Encourage dependent family members to complete Level I Antiterrorism Awareness Training before any travel outside the continental United States (OCONUS).<br>d. Conduct an immediate Terrorism Vulnerability Assessment for off-installation housing, schools, daycare centers, transportation.<br>C<\/p>\n\n\n\n<p>Requests for authorizing disclosure of classified information during visits must include all the following information, EXCEPT:<br>a. The explanation of the government purpose to perform when disclosing classified information.<br>b. The subject of the meeting, scope of classified topics and classification level<br>c. Expected time and location of the meeting.<br>d. The main content of the invitation to send to the participants.<br>C<\/p>\n\n\n\n<p>Two security professionals &#8211; Paul and Ashley<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>are discussing the security procedures for visits and meetings. Paul says visits must serve a specific U.S. Government purpose. Ashley says DoD Components should, as a minimum, establish procedures that include verification of the identity, personnel security clearance, access (if appropriate), and need-to-know for all visitors. Who is correct?<br>a. Paul is correct<br>b. Ashley is correct<br>c. Paul and Ashley are both correct<br>d. Paul and Ashley are both incorrect<br>A<\/li>\n<\/ul>\n\n\n\n<p>Executive Order 12829, signed in January 1993, mandated that which of the following entities be responsible for implementing and monitoring the National industrial Security Program (NISP)?<br>a. Director of the Information Security Oversight Office (ISOO)<br>b. Secretary of Defense<br>c. National Security Council (NSC)<br>d. Director, Defense Security Services (DSS)<br>A<\/p>\n\n\n\n<p>What is the role of the government contracting activity (GCA), or cleared prime contractor, when a contractor that does not have a Facility Clearance (FCL) wants to bid on a Request<br>for Proposal (RFP) that requires access to classified information? a. The GCA must issue a formal letter rejecting the contractor&#8217;s bid since the contractor does not have the requisite FCL.<br>b. The contractor must submit a sponsorship request to DSS, who will decide whether to allow the contractor to bid on the contract.<br>c. The GCA must sponsor the contractor for a facility security clearance by submitting a sponsorship request to DSS, which initiates the facility clearance process.<br>d. The GCA must ensure that the all owners and senior management of the uncleared contractor are U.S. citizens and are eligible to be processed for a personnel security clearance.<br>C<\/p>\n\n\n\n<p>What is the purpose of the Federal Acquisition Regulations (FAR)?<br>a. To codify and publish uniform policies and procedures for acquisition by all executive agencies.<br>b. To manage DoD funds and prioritize the development of vital research and technology.<br>c. To provide small businesses and minority owned companies an opportunity to compete in the government acquisition process.<br>d. To promote uniform standards and best practices of technology acquisition across U.S. industry.<br>A<\/p>\n\n\n\n<p>What is the role of the security professional during the &#8220;Award Contract&#8221; step of the contracting process?<br>a. To ensure the appropriate classification level for the bid, and to define unique security requirements associated with the product.<br>b. To interface with the Cognizant Security Organization (CSO) to ensure oversight is performed and review results of and previous assessments on behalf of component.<br>c. To ensure that the contractor follows proper safeguarding and disposition guidance.<br>d. To review and define the specific security requirements with the contracting officer &#8211; specifically, block 13 of DD Form 254.<br>D<\/p>\n\n\n\n<p>What is the purpose of DD Form 254?<br>a. To convey security classification guidance and to advise contractors on the handling procedures for classified material.<br>b. To document the formal agreement between the US government and a cleared contractor in which the contactor agrees to maintain a security program in compliance with the NISPOM and the government agrees to security guidance and program oversight.<br>c. To validate details regarding the foreign ownership, control or influence affecting that cleared contractor facility.<br>d. It replaces the actual contract document for any contract requiring access to classified information.<br>A<\/p>\n\n\n\n<p>As part of Operations Security (OPSEC), a program coordinator should use which of the following tools to assess assets as part of the risk management process for critical information?<br>a. Critical Information List<br>b. Threat vulnerability matrix<br>c. Risk Rating Table<br>d. Security Classification Guide<br>A<\/p>\n\n\n\n<p>What is the role of the Special Access Program Oversight Committee (SAPOC) during the maintenance phase<br>of the Special Access Program (SAP) lifecycle?<br>a. To ensure that the SAP has adequate Internal Review and Audit Compliance (IRAC) support, including accessed auditors at supporting offices, to meet program audit needs.<br>b. To review existing programs annually to determine whether to revalidate them as SAPs.<br>c. To provide oversight of SAP program and budget accomplishments.<br>d. To provide oversight of SAP audits and inspections.<br>B<\/p>\n\n\n\n<p>Which of the following describes a Special Access Program (SAP) that is established to protect sensitive research, development, testing and evaluation, modification, and procurement activities?<br>a. Research and Technology SAP<br>b. Operations and Support SAP<br>c. Acquisition SAP<br>d. Intelligence SAP<br>C<\/p>\n\n\n\n<p>Which type of briefing is used to identify security responsibilities, provide a basic understanding of DoD security policies, and explain the importance of protecting government assets?<br>a. Indoctrination Briefing<br>b. Original Classification Authority (OCA)<br>Briefing<br>c. Foreign Travel Briefing<br>d. Debriefing<br>A<\/p>\n\n\n\n<p>Which type of briefing is used to reinforce the information provided during the initial security briefing and to keep cleared employees informed of appropriate changes in security regulations?<br>a. Annual Refresher Briefings<br>b. Indoctrination Briefings<br>c. Attestation Briefings<br>d. Courier Briefings<br>A<\/p>\n\n\n\n<p>Which step of the Operations Security (OPSEC) process would be applied when conducting exercises, red teaming and analyzing operations?<br>a. Conduct a Risk Assessment<br>b. Apply OPSEC Countermeasures<br>c. Conduct a Threat Analysis<br>d. Conduct a Vulnerability Analysis<br>B<\/p>\n\n\n\n<p>Which step of the Operations Security (OPSEC) process would be applied when identifying potential adversaries and the associated capabilities and intentions<br>to collect, analyze, and exploit critical information and indicators?<br>a. Conduct a Vulnerability Analysis<br>b. Conduct a Threat Analysis<br>c. Conduct a Risk Assessment<br>d. Apply OPSEC Countermeasures<br>B<\/p>\n\n\n\n<p>Please determine which of the following is an element of an Operations Security (OPSEC) Assessment.<br>a. Small in scale and focused on evaluating the effectiveness of the OPSEC program.<br>b. Conducted on an annual basis.<br>c. Uses external resources collectively to conduct with or without the use of indigenous resources.<br>d. Determines the likelihood that critical information can be protected based on procedures that are currently in place.<br>C<\/p>\n\n\n\n<p>To provide access to Social Media sites, the DoD agency must provide all of the following, EXCEPT:<br>a. Protection against malware and advance threats.<br>b. Blocked access to prohibited sites and content.<br>c. Individual compliance with Joint Ethics Regulations and guidelines.<br>d. Constant monitoring to deter inappropriate site access.<br>D<\/p>\n\n\n\n<p>Who&#8217;s responsibility is it during the categorize steps to identify a potential impact (low, moderate, or high) due<br>to loss of confidentiality, integrity, and availability if a security breach occurs?**<br>a. Information System Owner (ISO)<br>b. Information Owner (IO)<br>c. Information System Security Manager (ISSM)<br>d. Authorizing Official (AO)<br>B<\/p>\n\n\n\n<p>Please determine which of the following is an example of reportable foreign intelligence contacts, activities, indicators, and behaviors.<br>a. Authorizing others to acquire unauthorized access to classified or sensitive information systems.<br>b. Unauthorized downloads or uploads of sensitive data.<br>c. Network spillage incidents or information compromise.<br>d. Use of DoD account credentials by unauthorized parties.<br>A<\/p>\n\n\n\n<p>Limiting nonsecure computer e-mail messages to nonmilitary activities and not providing operational information in nonsecure e-mail messages are functions of which OPSEC measure?<br>a. Operational and Logistic Measures<br>b. Technical Measures<br>c. Administrative Measures<br>d. Operations Security and Military Deception<br>B<\/p>\n\n\n\n<p>Which of the following is NOT a category of Information Technology (IT)?**<br>a. Platform Information Technology (PIT)<br>b. Information Technology Services<br>c. Information Technology Products<br>d. Information Technology Applications<br>D<\/p>\n\n\n\n<p>What step within the Risk Management Framework (RMF) does system categorization occur?**<br>a. Categorize Information System<br>b. Select Security Controls<br>c. Implement Security Controls<br>d. Assess Security Controls<br>e. Authorize<br>f. Monitor Security Controls<br>A<\/p>\n\n\n\n<p>At what step of the Risk Management Framework (RMF) would you develop a<br>system-level continuous monitoring strategy?&#8221; **<br>a. Categorize Information System<br>b. Select Security Controls<br>c. Implement Security Controls<br>d. Assess Security Controls<br>e. Authorize<br>f. Monitor Security Controls<br>B<\/p>\n\n\n\n<p>One responsibility of the Information System Security Manager (ISSM) during Step 6 of the Risk Management Framework (RMF) is:**<br>a. Review and approve the security plan and system-level continuous monitoring strategy developed and implemented by the DoD Components.<br>b. Monitor the system for security relevant events and configuration changes that affect the security posture negatively.<br>c. Determine and documents a risk level in the Security Assessment Report (SAR) for every non-compliant security control in the system baseline.<br>d. Coordinate the organization of the Information System (IS) and Platform Information Technology (PIT) systems with the Program Manager (PM)\/System Manager (SM), Information System Owner (ISO), Information Owner (IO), mission owner(s), Action Officer (AO) or their designated representatives.<br>B<\/p>\n\n\n\n<p>What family of controls does Security Functionality<br>Verification belong to?**<br>a. System and Communications Protection<br>b. Maintenance<br>c. System and Information Integrity<br>d. Audit and Accountability<br>C<\/p>\n\n\n\n<p>What does &#8220;AO&#8221; stand for?<br>Authorizing Official<\/p>\n\n\n\n<p>What is a SAR as related to cyber security?<br>System Assessment Report<\/p>\n\n\n\n<p>What activities occur when authorizing the system? (select all that apply)<br>a. Implement decommissioning strategy<br>b. Develop, review, and approve Security Assessment Plan<br>c. Prepare the Plan of Action and Milestones (POA&amp;M)<br>d. Submit security authorization package<br>C &amp; D<\/p>\n\n\n\n<p>What activities occur when assessing security controls? (Select all that apply)<br>A. prepare the plan of action and milestones (POA&amp;M)<br>B. conduct final risk determination<br>C. Develop, plan, and approve Security Assessment Plan<br>D. Prepare Security Assessment Report<br>C &amp; D<\/p>\n\n\n\n<p>What activities occur when monitoring security controls? (Select all that apply)<br>A. Prepare the Plan of Action and Milestones (POA&amp;M)<br>B. Develop, review, and approve Security Assessment Plan<br>C. Implement decommissioning strategy<br>D. Determine impact of changes<br>C &amp; D<\/p>\n\n\n\n<p>What are the cybersecurity attributes?<br>Select all that apply.<br>A Confidentiality<br>B Integrity<br>C Availability<br>D Authentication<br>E Non-repudiation<br>All of the above<\/p>\n\n\n\n<p>Why do you need to be aware of cybersecurity?<br>A To uphold all elements of the National Industrial Security Program Operating Manual<br>B To appropriately manage risk by mitigating threats and vulnerabilities<br>C To examine your own actions and activities to uphold personal accountability<br>D To ensure all appropriate measures are taken to protect a place and ensure only people with permission enter and leave it<br>B<\/p>\n\n\n\n<p>What are the cybersecurity drivers?<br>A NIST 800-30 Rev 1 Guide for Conducting Risk Assessments<br>B DoD 8530.01 Cybersecurity Activities Support to DoD Information Network Operations<br>C DoD 8510.01 Risk Management Framework<br>D DoD 8500.01<br>E DoD Security Policy<br>All of the above<\/p>\n\n\n\n<p>Which skills do security personnel need?<br>A. Protect information systems.<br>B. Identify all cybersecurity concepts.<br>C. Identify fundamental cybersecurity concepts that are related to the protection of classified and controlled unclassified information.<br>D. Examine their role in protecting DoD&#8217;s information systems and the information they process, transmit, and store.<br>D<\/p>\n\n\n\n<p>What is the primary responsibility of security personnel?<br>A Monitor, evaluate, and provide advice to the Secretary of Defense<br>B Protect classified information and controlled unclassified information<br>C Direct the operation of and assure the security of the global DoD network<br>D Coordinate all DoD network operations<br>B<\/p>\n\n\n\n<p>What is security personnel&#8217;s primary skill in relationship to cybersecurity?<br>A Analyze duties<br>B Manage risk<br>C Execute training<br>D Respond to incidents<br>B<\/p>\n\n\n\n<p>What are the components of the Risk Management System? (Select all that apply)<br>A Revision<br>B Analysis<br>C Evaluation<br>D Assessment<br>E Mitigation<br>C, D &amp; E<\/p>\n\n\n\n<p>What are the steps in the Risk Management Framework (RMF)? (Select all that apply)<br>A Monitor Security Controls<br>B Categorize System<br>C Authorize System<br>D Assess Security Controls<br>E Select Security Controls<br>F Implement Security Controls<br>All of the above<\/p>\n\n\n\n<p>What threat environments should you consider? (Select all that apply)<br>A Adversarial<br>B Environmental<br>C Structural<br>D Accidental<br>All of the above<\/p>\n\n\n\n<p>What should you look for when assessing vulnerabilities? (Select all that apply)<br>A Residual risk<br>B Ease<br>C Likelihood<br>D Related threats<br>D Rewards<br>All of the above<\/p>\n\n\n\n<p>Which steps of the RMF are designed to mitigate risk? (Select all that apply)<br>A Assess Security Controls<br>B Monitor Security Controls<br>C Select Security Controls<br>D Authorize System<br>E Implement Security Controls<br>F Categorize System<br>C &amp; E<\/p>\n\n\n\n<p>Which of the following are the activities that occur when performing RMF Step 2, Select Security Controls? (Select all that apply)<br>A Common Control Identification<br>B Monitoring Strategy<br>C Security Baseline and Overlay Selection<br>D Security Plan and Review Approval<br>All of the above<\/p>\n\n\n\n<p>What activities occur during implementation of security controls? (Select all that apply)<br>A Communicate updates to appropriate audiences<br>B Seek approvals from CIO<br>C Create appropriate training and communication plans<br>D Ensure consistency with DoD architectures<br>E Document security control implementation in the security plan<br>F Identify security controls available for inheritance<br>D, E &amp; F<\/p>\n\n\n\n<p>Which steps of the RMF are designed to evaluate risk? (Select all that apply)<br>A Select Security Controls<br>B Assess Security Controls<br>C Monitor Security Controls<br>D Authorize System<br>E Categorize System<br>F Implement Security Controls<br>B, C &amp; D<\/p>\n\n\n\n<p>What activities occur when assessing security controls? (Select all that apply)<br>A Prepare the Plan of Action and Milestones (POA&amp;M)<br>B Conduct final risk determination<br>C Develop, plan, and approve Security Assessment Plan<br>D Prepare Security Assessment Report (SAR)<br>C &amp; D<\/p>\n\n\n\n<p>Select ALL of the correct responses. What activities occur during implementation of security<br>controls?<br>A Ensure consistency with DoD architectures<br>B Document security control implementation in the security plan<br>C Seek approvals from CIO<br>D Identify security controls available for inheritance<br>E Communicate updates to appropriate audiences<br>F Create appropriate training and communication plans<br>A, B &amp; D<\/p>\n\n\n\n<p>Which role leads the day-to-day defense?<br>A Authorizing Official (AO)<br>B US Cyber Command (USCYBERCOM)<br>C Security personnel<br>D DoD Chief Information Officer (CIO)<br>B<\/p>\n\n\n\n<p>The cybersecurity attributes are confidentiality, integrity, availability, authentication, and:<br>A Validity<br>B Non-repudiation<br>C Architecture<br>D Stability<br>B<\/p>\n\n\n\n<p>True or false? Cybersecurity is important so that risk is eliminated.<br>True<br>False<br>False<\/p>\n\n\n\n<p>Select ALL of the correct responses. What are the Risk Management Framework (RMF) steps<br>designed to mitigate risk?<br>A Categorize System<br>B Select Security Controls<br>C Implement Security Controls<br>D Assess Security Controls<br>B &amp; C<\/p>\n\n\n\n<p>What activities occur in Step 4 of the Risk Management Framework (RMF), Assess Security<br>Controls?<br>A Develop, plan, and approve Security Assessment Plan<br>B Prepare the Security Assessment Report (SAR)<br>C Conduct remediation actions on non-compliant security controls<br>D All of the above<br>D<\/p>\n\n\n\n<p>Select ALL of the correct responses. What are all cybersecurity attributes susceptible to?<br>A Vulnerabilities<br>B Threats<br>C Disclosure<br>D Authorization<br>A &amp; B<\/p>\n\n\n\n<p>Select ALL of the correct responses. Which of the following are cybersecurity skill standards needed<br>by security personnel?<br>A Identify and manage all cybersecurity concepts<br>B Explain their role in protecting DoD&#8217;s information systems<br>C Identify fundamental cybersecurity concepts that are related to the protection of classified and<br>controlled unclassified information<br>D Conduct assessment and evaluation of all IT systems<br>B &amp; C<\/p>\n\n\n\n<p>Which steps of the Risk Management Framework (RMF) are designed to evaluate risk?<br>A. Assess Security Controls, Monitor Security Controls, Categorize System<br>B. Assess Security Controls, Implement Security Controls, Authorize System<br>C. Implement Security Controls, Monitor Security Controls, Authorize System<br>D. Assess Security Controls, Monitor Security Controls, Authorize System<br>D<\/p>\n\n\n\n<p>In which step of the Risk Management Framework (RMF) would you implement the<br>decommissioning strategy?<br>A. Step 3 &#8211; Implement security controls<br>B. Step 4 &#8211; Assess security controls<br>C. Step 5 &#8211; Authorize system<br>D. Step 6 &#8211; Monitor security controls<br>D<\/p>\n\n\n\n<p>What evolving threats are attempts by hackers to damage or destroy a computer network or system?<br>A. Insider Threat<br>B. Social Media<br>C. Cyber Attack<br>D. Mobile Computing<br>C<\/p>\n\n\n\n<p>What is the first step in the Risk Management Framework (RMF)?<br>A. Categorize System<br>B. Authorize System<br>C. Implement Security Controls<br>D. Select Security Controls<br>E. Assess Security Controls<br>F. Monitor Security Controls<br>A<\/p>\n\n\n\n<p>Select ALL of the correct responses. What is included in the security authorization package?<br>A Security Assessment Report (SAR)<br>B Plan of Action and Milestones (POA&amp;M)<br>C Security Plan<br>D None of the above<br>A, B &amp; C<\/p>\n\n\n\n<p>Which two attributes are most important from an information security perspective?<br>Select one:<br>A. Confidentiality and integrity<br>B. Confidentiality and authentication<br>C. Integrity and non-repudiation<br>D. Integrity and authentication<br>B.<\/p>\n\n\n\n<p>What cybersecurity attribute guards against improper modification to or destruction of information? For example, this attribute prevents a user from improperly or maliciously modifying a database.<br>Integrity<\/p>\n\n\n\n<p>What cybersecurity attribute ensures timely and reliable access to and use of information? For example, this attribute ensures that an information system is accessible when an authorized user needs it.<br>Availability<\/p>\n\n\n\n<p>What cybersecurity attribute is the mechanism that authorizes or allows access to computer systems and networks and the data that resides there? For example, a Common Access Card (CAC) is one method to provide system identification that applies this attribute.<br>Authentication<\/p>\n\n\n\n<p>What cybersecurity attribute ensures that a party in an electronic exchange cannot deny their participation or the authenticity of the message? For example, a digital signature in an email message confirms the identity of the sender.<br>Non-repudiation<\/p>\n\n\n\n<p>What cybersecurity attribute preserves authorized restrictions on information disclosure and includes the ability to protect personal privacy and proprietary information. For example, this attribute guards against a user without proper clearance accessing classified information.<br>Confidentiality<\/p>\n\n\n\n<p>Who prepares the Security Assessment Report (SAR)?<br>Select one:<br>a. USCYBERCOM<br>b. Security Controls Assessor (SCA)<br>c. Security Personnel<br>d. DoD CIO<br>B.<\/p>\n\n\n\n<p>Which step in the RMF is designed to assess risk?<br>A. Step 1 &#8211; Categorize System.<br>B. Step 2 &#8211; Select Security Controls.<br>C. Step 3 &#8211; Implement Security Controls.<br>D. Step 4 &#8211; Assess Security Controls.<br>E. Step 5 &#8211; Authorize System.<br>F. Step 6 &#8211; Monitor Security Controls.<br>A<\/p>\n\n\n\n<p>True or False? After you complete a risk management system component, you should constantly reassess as you deploy new solutions.<br>True<\/p>\n\n\n\n<p>True or false? Security personnel must be able to identify all cybersecurity concepts.<br>False<\/p>\n\n\n\n<p>What types and levels of vulnerabilities should you consider?<br>Select one or more:<br>a. Information system level<br>b. Physical security<br>c. Mission\/business process level<br>d. People<br>e. Organization level<br>f. None of the above<br>A-E<\/p>\n\n\n\n<p>What are the Risk Management Framework (RMF) steps designed to mitigate risk?<br>A. Step 1 &#8211; Categorize System.<br>B. Step 2 &#8211; Select Security Controls.<br>C. Step 3 &#8211; Implement Security Controls.<br>D. Step 4 &#8211; Assess Security Controls.<br>E. Step 5 &#8211; Authorize System.<br>F. Step 6 &#8211; Monitor Security Controls.<br>B and C<\/p>\n\n\n\n<p>When mitigating risk, what are your options?<br>Select one:<br>a. Limitation<br>b. Acceptance<br>c. Avoidance<br>d. All of the above<br>D<\/p>\n\n\n\n<p>Select ALL of the correct responses.<br>What does the information owner do when determining the impact of changes?<br>Select one or more:<br>a. Document in SAR for the AO to review<br>b. Provide written and signed report<br>c. Continuously monitors the system or information environment<br>d. Reports significant changes in the security posture of the system<br>e. Periodically assesses the quality of the security controls<br>C, D, and E<\/p>\n\n\n\n<p>Select ALL of the correct responses. What activities occur during implementation of security controls?<br>Select one or more:<br>a. Seek approvals from CIO<br>b. Document security control implementation in the security plan<br>c. Communicate updates to appropriate audiences<br>d. Create appropriate training and communication plans<br>e. Ensure consistency with DoD architectures<br>f. Identify security controls available for inheritance<br>B, E, and F<\/p>\n\n\n\n<p>What are the implied skills of security personnel?<br>Select one:<br>a. Counsel stakeholders on security-related concerns<br>b. Execute security awareness training<br>c. Analysis<br>d. All of the above<br>D<\/p>\n\n\n\n<p>Select ALL of the correct responses. Which steps of the Risk Management Framework (RMF) are designed to evaluate risk?<br>A. Step 1 &#8211; Categorize System.<br>B. Step 2 &#8211; Select Security Controls.<br>C. Step 3 &#8211; Implement Security Controls.<br>D. Step 4 &#8211; Assess Security Controls.<br>E. Step 5 &#8211; Authorize System.<br>F. Step 6 &#8211; Monitor Security Controls.<br>D, E, and F<\/p>\n\n\n\n<p>Select ALL of the correct responses. Which activities occur during Step 2, Select Security Controls?<br>Select one or more:<br>a. Unique Control Identification<br>b. Common Control Identification<br>c. Security Plan Review and Approval<br>d. Security Plan Creation<br>e. Monitoring Strategy<br>B, C, and E<\/p>\n\n\n\n<p>Which of the following is defined as defensive measures used to reduce the vulnerability of individuals and property to terrorist attacks, to include limited response and containment?<br>Select one:<br>a. Threat Level Indicators<br>b. Force Protection<br>c. Physical Security Plan<br>d. Antiterrorism<br>D<\/p>\n\n\n\n<p>Which of the following typically establish duties, roles, and responsibilities at individual assignments, checkpoints, and gates?<br>Select one:<br>a. Standard Operating Procedures<br>b. Executive Orders<br>c. Post Orders<br>C<\/p>\n\n\n\n<p>The <strong><em><strong><em>___________<\/em><\/strong><\/em><\/strong> is responsible for developing and refining antiterrorism program guidance, policy, and standards and integrating and aligning antiterrorism and mission assurance efforts when necessary.<br>Select one:<br>a. Mission Assurance Senior Steering Group<br>b. Antiterrorism Working Group<br>c. Antiterrorism Executive Committee<br>d. Threat Working Group<br>C<\/p>\n\n\n\n<p>What plan, should include, at a minimum, special and general guard orders, access and material control, protective barrier and lighting systems, locks, and intrusion detection systems.<br>Physical Security Plan<\/p>\n\n\n\n<p>Who is responsible for physical security planning, coordination, and integration of identified mission essential capabilities?<br>Select one:<br>a. OPSEC Officer<br>b. Installation Commander\/Facility Director<br>c. Antiterrorism Officer<br>d. CI Support<br>B<\/p>\n\n\n\n<p>What is the perceived imminence of intended aggression by a capable entity to harm a nation, a government, or its instrumentalities, such as intelligence, programs, operations, people, installations, or facilities?<br>Threat<\/p>\n\n\n\n<p>What regulation authorizes commanders to issue regulations for the protection or security of property and places under their command. This instruction also establishes guidelines to build consistent minimum standards for protecting DoD installations and resources?<br>A. DoD 5200.08-R<br>B. DoDM 5200.01<br>C. DoDI 5200.08<br>C<\/p>\n\n\n\n<p>What regulation implements DoD policies and minimum standards for the physical protection of DoD personnel, installations, operations, and related resources?<br>A. DoD 5200.08-R<br>B. DoDM 5200.01<br>C. DoDI 5200.08<br>A<\/p>\n\n\n\n<p>What regulation addresses the physical security aspects of protecting classified information within the information security program?<br>B<\/p>\n\n\n\n<p>Protective barriers, Site lighting, Security forces, Security systems, Facility access control, Lock and key systems, and Storage containers and facilities are all examples of what?<br>A. Protective Barriers<br>B. Physical Security Countermeasures<br>C. Security Systems<br>D. Intrusion Detection<br>B<\/p>\n\n\n\n<p>A Principal Authorizing Official (PAO) is appointed for each of the following DoD mission areas except:<br>Select one:<br>a. DoD portion of Intelligence<br>b. Unit<br>c. Enterprise Information Environment<br>d. Warfighting<br>e. Business<br>B<\/p>\n\n\n\n<p>Tier 1 of RMF guidance addresses risk management at the DoD <strong><em>__<\/em><\/strong> level.<br>Select one:<br>a. enterprise<br>b. local<br>c. unit<br>d. mission<br>A<\/p>\n\n\n\n<p>True or False? DoD 8510.01 requires all information systems and platform information technology (PIT) systems for both NSS and non-NSS to be categorized in accordance with CNSSI 1253.<br>True<\/p>\n\n\n\n<p>DoD Cybersecurity policy is located in DoDI <strong><em>__<\/em><\/strong>.<br>Select one:<br>a. 8500.10<br>b. 8500.03<br>c. 8500.01<br>d. 8510.01<br>C<\/p>\n\n\n\n<p>A <strong><em><strong>__<\/strong><\/em><\/strong> approach requires the management of risk at both the enterprise level and system level.<br>Select one:<br>a. top-down<br>b. cybersecurity<br>c. mission oriented<br>d. holistic<br>D<\/p>\n\n\n\n<p>The post-authorization period involving the continuous monitoring of an information system&#8217;s security controls, which includes <strong><em>__<\/em><\/strong> any proposed or actual changes to the information system or its environment of operation.<br>Select one:<br>a. analyzing and documenting<br>b. disclosing<br>c. discussing<br>d. reporting to AO<br>A<\/p>\n\n\n\n<p>True or False? The RMF provides a structured yet flexible approach for risk mitigation, resulting from the incorporation of information systems into the mission and business processes of an organization.<br>False<\/p>\n\n\n\n<p>Principle incident\/<br>events required to be reported to DoD counterintelligence (CI) organizations<br>espionage, sabotage, terrorism, cyber<\/p>\n\n\n\n<p>Indicators of insider threats<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li>Failure to report overseas travel or contact with foreign nationals<\/li>\n\n\n\n<li>Seeking to gain higher clearance or expand access outside the job scope<\/li>\n\n\n\n<li>Engaging in classified conversations without a need to know<\/li>\n\n\n\n<li>Working hours inconsistent with job assignment or insistence on working in private<\/li>\n\n\n\n<li>Exploitable behavior traits<\/li>\n\n\n\n<li>Repeated security violations<\/li>\n\n\n\n<li>Attempting to enter areas not granted access to<\/li>\n\n\n\n<li>Unexplainable affluence\/living above one&#8217;s means<\/li>\n\n\n\n<li>Anomalies (adversary taking actions which indicate they are knowledgeable to information)<\/li>\n\n\n\n<li>Illegal downloads of information\/files<\/li>\n<\/ol>\n\n\n\n<p>Elements that<br>should be considered in<br>identifying Critical Program<br>Information<br>Elements which if compromised could:<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li>cause significant degradation in mission effectiveness,<\/li>\n\n\n\n<li>shorten the expected combat-effective life of the system<\/li>\n\n\n\n<li>reduce technological advantage<\/li>\n\n\n\n<li>significantly alter program direction; or<\/li>\n\n\n\n<li>enable an adversary to defeat, counter, copy, or reverseengineer the technology or capability.<\/li>\n<\/ol>\n\n\n\n<p>asset, threat, vulnerability, risk, countermeasures<br>Elements that a<br>security professional should<br>consider when assessing and<br>managing risks to DoD assets<\/p>\n\n\n\n<p>The three categories of<br>Special Access Programs<br>acquisition, intelligence, and operations and support<\/p>\n\n\n\n<p>Three different types<br>of threats to classified<br>information<br>Insider Threat, Foreign Intelligence Entities (FIE) and Cybersecurity Threat<\/p>\n\n\n\n<p>The concept of an insider threat<br>An employee who may represent a threat to<br>national security. These threats encompass potential espionage, violent acts against the Government or the nation, and unauthorized disclosure of classified information, including the vast amounts of classified data available on interconnected United States Government computer networks and systems.<\/p>\n\n\n\n<p>The purpose of the<br>Foreign Visitor Program<br>To track and approve access by a foreign entity to information that is classified; and to approve access by a foreign entity to information that is unclassified, related to a U.S. Government contract, or plant visits covered by ITAR.<\/p>\n\n\n\n<p>Special Access<br>Program<br>A program established for a specific class of<br>classified information that imposes safeguarding and access requirements that exceed those normally required for information at the same classification level.<\/p>\n\n\n\n<p>Enhanced security requirements for protecting Special Access Program (SAP) information<br>Within Personnel Security:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Access Rosters;<\/li>\n\n\n\n<li>Billet Structures (if required);<\/li>\n\n\n\n<li>Indoctrination Agreement;<\/li>\n\n\n\n<li>Clearance based on an appropriate investigation completed within the last 5<br>years;<\/li>\n\n\n\n<li>Individual must materially contribute to the program in addition to having the<br>need to know;<\/li>\n\n\n\n<li>All individuals with access to SAP are subject to a random counterintelligence scope<br>polygraph examination;<\/li>\n\n\n\n<li>Polygraph examination, if approved by the DepSecDef, may be used as a<br>mandatory access determination;<\/li>\n\n\n\n<li>Tier review process;<\/li>\n\n\n\n<li>Personnel must have a Secret or Top Secret clearance;<\/li>\n\n\n\n<li>SF-86 must be current within one year;<\/li>\n\n\n\n<li>Limited Access;<\/li>\n\n\n\n<li>Waivers required for foreign cohabitants, spouses, and immediate family<br>members.<br>Within Industrial Security:<br>The SecDef or DepSecDef can approve a carve-out provision to relieve Defense<br>Security Service of industrial security oversight responsibilities.<br>Within Physical Security:<\/li>\n\n\n\n<li>Access Control;<\/li>\n\n\n\n<li>Maintain a SAP Facility;<\/li>\n\n\n\n<li>Access Roster;<\/li>\n\n\n\n<li>All SAPs must have an unclassified nickname\/ Codeword (optional).<br>Within Information Security:<\/li>\n\n\n\n<li>The use of HVSACO;<\/li>\n\n\n\n<li>Transmission requirements (order of precedence).<\/li>\n<\/ul>\n\n\n\n<p>Responsibilities of the Government SAP Security Officer\/Contractor Program<br>Security Officer (GSSO\/<br>CPSO)<br>From Revision 1 Department of Defense Overprint to the National<br>Industrial Security Program Operating Manual Supplement &#8211; 1 April<br>2004:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Possess a personnel clearance and Program access at least equal to<br>the highest level of Program classified information involved.<\/li>\n\n\n\n<li>Provide security administration and management for his\/her<br>organization.<\/li>\n\n\n\n<li>Ensure personnel processed for access to a SAP meet the prerequisite<br>personnel clearance and\/or investigative requirements specified.<\/li>\n\n\n\n<li>Ensure adequate secure storage and work spaces.<\/li>\n\n\n\n<li>Ensure strict adherence to the provisions of the NISPOM, its<br>supplement, and the Overprint.<\/li>\n\n\n\n<li>When required, establish and oversee a classified material control<br>program for each SAP.<\/li>\n\n\n\n<li>When required, conduct an annual inventory of accountable<br>classified material.<\/li>\n\n\n\n<li>When required, establish a SAPF.<\/li>\n\n\n\n<li>Establish and oversee a visitor control program.<\/li>\n\n\n\n<li>Monitor reproduction and\/or duplication and destruction capability<br>of SAP information<\/li>\n\n\n\n<li>Ensure adherence to special communications capabilities within the<br>SAPF.<\/li>\n\n\n\n<li>Provide for initial Program indoctrination of employees after their<br>access is approved; rebrief and debrief personnel as required.<\/li>\n\n\n\n<li>Establish and oversee specialized procedures for the transmission of<br>SAP material to and from Program elements<\/li>\n\n\n\n<li>When required, ensure contractual specific security requirements<br>such as TEMPEST Automated Information System (AIS), and<br>Operations Security (OPSEC) are accomplished.<\/li>\n\n\n\n<li>Establish security training and briefings specifically tailored to the<br>unique requirements of the SAP.<\/li>\n<\/ul>\n\n\n\n<p>The four Cognizant<br>Security Agencies (CSAs)<br>Department of Defense<br>(DoD), Director of National Intelligence (DNI), Department of Energy (DoE), and the Nuclear Regulatory Commission (NRC).<\/p>\n\n\n\n<p>Cognizant Security Agencies (CSA)s&#8217; role in the National Industrial Security Program (NISP).<br>Establish an industrial security program to safeguard classified information under its<br>jurisdiction.<\/p>\n\n\n\n<p>Critical Program Information<br>in DoD<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li>U.S. capability elements that contribute to the warfighter&#8217;s advantage throughout the<br>life cycle, which if compromised or subject<br>to unauthorized disclosure, decrease the advantage.<\/li>\n\n\n\n<li>Elements or components of a Research, Development, and Acquisition (RDA) program that, if compromised, could cause significant degradation in mission effectiveness; shorten the expected combat-effective life of the system;<br>reduce technological advantage; significantly alter program direction; or enable an adversary to defeat, counter, copy, or reverse engineer the technology or capability. Includes information<br>about applications, capabilities, processes and<br>end-items. Includes elements or components critical to a military system or network mission effectiveness. Includes technology that would<br>reduce the U.S. technological advantage if it came under foreign control.<\/li>\n<\/ol>\n\n\n\n<p>Primary authorities governing foreign disclosure of classified military information<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li>Arms Export Control Act<\/li>\n\n\n\n<li>National Security Decision Memorandum 119<\/li>\n\n\n\n<li>National Disclosure Policy-1<\/li>\n\n\n\n<li>International Traffic in Arms Regulation (ITAR)<\/li>\n\n\n\n<li>E.O.s 12829, 13526<\/li>\n\n\n\n<li>Bilateral Security Agreements<\/li>\n\n\n\n<li>DoD 5220.22-M, &#8220;NISPOM,&#8221;<\/li>\n<\/ol>\n\n\n\n<p>The purpose of the DD Form 254<br>Convey security requirements, classification guidance and provide handling procedures for classified material received and\/or generated on a classified contract.<\/p>\n\n\n\n<p>Factors for determining<br>whether U.S. companies are under Foreign Ownership, Control or Influence<br>(FOCI)<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li>Record of economic and government<br>espionage against the U.S. targets<\/li>\n\n\n\n<li>Record of enforcement\/engagement<br>in unauthorized technology transfer<\/li>\n\n\n\n<li>Type and sensitivity of the information that shall be accessed<\/li>\n\n\n\n<li>The source, nature and extent of FOCI<\/li>\n\n\n\n<li>Record of compliance with pertinent U.S. laws, regulations and contracts<\/li>\n\n\n\n<li>Nature of bilateral &amp; multilateral security &amp; information exchange<br>agreements<\/li>\n\n\n\n<li>Ownership or control, in whole or part, by a foreign government<\/li>\n<\/ol>\n\n\n\n<p>The purpose and the function of the Militarily Critical Technologies List (MCTL).<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li>Serves as a technical reference for the development and implementation of DoD technology, security policies on international transfers of<br>defense-related goods, services, and technologies as administered by the Director, Defense Technology Security<br>Administration (DTSA).<\/li>\n\n\n\n<li>Formulation of export control proposals and export license review<\/li>\n<\/ol>\n\n\n\n<p>Security Infraction<br>This event cannot reasonably be expected to and does not result in the loss, compromise, or suspected compromise of classified information<\/p>\n\n\n\n<p>DoD Manual 5200.01, Volumes 1-4<br>The manual that governs the DoD Information Security Program<\/p>\n\n\n\n<p>E.O. 13526<br>The executive order that governs the DoD Information Security Program<\/p>\n\n\n\n<p>32 CFR Parts 2001 &amp; 2003,<br>&#8220;Classified National Security<br>Information; Final Rule&#8221;<br>The Information Security Oversight Office (ISOO) document that governs the DoD Information Security Program<\/p>\n\n\n\n<p>Security Violation<br>An event that results in or could be expected to result in the loss or compromise of<br>classified information<\/p>\n\n\n\n<p>Unauthorized Disclosure<br>Communication or physical<br>transfer of classified or controlled unclassified information to an unauthorized recipient<\/p>\n\n\n\n<p>SSBI<br>Initial investigation for military, contractors, and civilians:<br>\u00b7 Special-Sensitive positions<br>\u00b7 Critical-Sensitive positions1<br>\u00b7 LAA<br>\u00b7 Top Secret clearance eligibility<br>\u00b7 IT-I duties<\/p>\n\n\n\n<p>ANACI<br>Initial investigation for civilians:<br>\u00b7 Noncritical-Sensitive positions2<br>\u00b7 Confidential and Secret clearance eligibility<br>\u00b7 IT-II duties<\/p>\n\n\n\n<p>NACLC<br>Initial National Agency Check with Law and Credit for military and contractors:<br>\u00b7 Secret or Confidential clearance eligibility<br>\u00b7 All military accessions and appointments<br>\u00b7 IT-II duties<br>\u00b7 IT-III duties (military only)<\/p>\n\n\n\n<p>NACI<br>National Agency Check with Inquiries for civilians and contractors:<br>\u00b7 Non-Sensitive positions<br>\u00b7 Low Risk<br>\u00b7 HSPD-12 Credentialing<\/p>\n\n\n\n<p>NAC<br>The fingerprint check portion of a PSI<\/p>\n\n\n\n<p>The purpose of due process in<br>Personnel Security Program (PSP)<br>Ensures fairness by providing the<br>subject the opportunity to appeal an<br>unfavorable adjudicative determination<\/p>\n\n\n\n<p>The key procedures for initiating<br>Personnel Security Investigations (PSIs)<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li>Validate the need for an investigation<\/li>\n\n\n\n<li>Initiate e-QIP<\/li>\n\n\n\n<li>Review Personnel Security Questionnaire (PSQ) for completeness<\/li>\n\n\n\n<li>Submit electronically to OPM<\/li>\n<\/ol>\n\n\n\n<p>DoD position sensitivity types<br>and their investigative requirements.<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li>Critical Sensitive<\/li>\n\n\n\n<li>Non-Critical Sensitive<\/li>\n\n\n\n<li>Non-Sensitive<\/li>\n<\/ol>\n\n\n\n<p>Investigative requirement for a Critical- Sensitive position<br>SSBI, SSBI-PR, or PPR<\/p>\n\n\n\n<p>Investigative requirement for a Non-Critical Sensitive position<br>ANACI or NACLC<\/p>\n\n\n\n<p>Investigative requirement for a Non-Sensitive position<br>NACI<\/p>\n\n\n\n<p>Revocation<br>The term when current security clearance eligibility determination is rescinded<\/p>\n\n\n\n<p>Denial<br>The term when an initial request for security clearance eligibility is not granted<\/p>\n\n\n\n<p>SOR<br>Statement of Reasons<\/p>\n\n\n\n<p>What is the purpose of the Statement of Reasons (SOR)?<br>The purpose of the SOR is to provide<br>a comprehensive and detailed written<br>explanation of why a preliminary<br>unfavorable adjudicative determination<br>was made.<\/p>\n\n\n\n<p>The 13 Adjudicative Guidelines<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li>Allegiance to the United States<\/li>\n\n\n\n<li>Foreign Influence<\/li>\n\n\n\n<li>Foreign Preference<\/li>\n\n\n\n<li>Sexual Behavior<\/li>\n\n\n\n<li>Personal Conduct<\/li>\n\n\n\n<li>Financial Considerations<\/li>\n\n\n\n<li>Alcohol Consumption<\/li>\n\n\n\n<li>Drug Involvement<\/li>\n\n\n\n<li>Psychological Conditions<\/li>\n\n\n\n<li>Criminal Conduct<\/li>\n\n\n\n<li>Handling Protected Information<\/li>\n\n\n\n<li>Outside Activities<\/li>\n\n\n\n<li>Use of Information Technology Systems<\/li>\n<\/ol>\n\n\n\n<p>Three different types of approved classified<br>material storage areas.<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li>GSA-approved storage containers<\/li>\n\n\n\n<li>Vaults (including modular vaults)<\/li>\n\n\n\n<li>Open storage area (secure rooms, to include SCIFs and bulk storage areas)<\/li>\n<\/ol>\n\n\n\n<p>Construction requirements for vault doors<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li>Constructed of metal<\/li>\n\n\n\n<li>Hung on non-removable hinge pins or with<br>interlocking leaves.<\/li>\n\n\n\n<li>Equipped with a GSA-approved combination lock.<\/li>\n\n\n\n<li>Emergency egress hardware (deadbolt or metal bar extending across width of door).<\/li>\n<\/ol>\n\n\n\n<p>The purpose of intrusion detection systems<br>To detect unauthorized penetration into a secured area<\/p>\n\n\n\n<p>The purpose of perimeter barriers<br>To define the physical limits of an installation, activity, or area, restrict, channel, impede access, or shield activities within the installation from immediate and direct observation<\/p>\n\n\n\n<p>The purpose of an Antiterrorism Program<br>Protect DoD personnel, their families, installations, facilities, information, and other material resources from terrorist acts<\/p>\n\n\n\n<p>Force Protection Condition levels<br>Normal, Alpha, Bravo, Charlie, Delta<\/p>\n\n\n\n<p>The concept of security-in-depth<br>Layered and complementary security controls sufficient to deter, detect, and document unauthorized entry and movement within an installation or facility.<\/p>\n\n\n\n<p>e-QIP<br>The system Mr. Smith needs to access when he needs to update his personal information on his Personnel Security Questionnaire for his re-investigation<\/p>\n\n\n\n<p>Personnel Security Investigation<br>The first phase of the security clearance process<\/p>\n\n\n\n<p>JCAVS<br>A security manager uses this system to communicate with the DoD CAF<\/p>\n\n\n\n<p>JAMS<br>This sub-system (used by adjudicators) and JCAVS make up the JPAS system<\/p>\n\n\n\n<p>JPAS<br>A DoD system of record for personnel security clearance information<\/p>\n\n\n\n<p>Scattered Castles<br>Intelligence Community (IC) Personnel Security Database that verifies personnel security access and visit certifications.<\/p>\n\n\n\n<p>Personnel Security Investigation (PSI)<br>The DoD uses this as the standard for the uniform collection of relevant and important background information about an individual.<\/p>\n\n\n\n<p>Access<br>PSIs are used to determine the eligibility of an individual for <strong><em><strong>_<\/strong><\/em><\/strong> to classified information.<\/p>\n\n\n\n<p>Acceptance<br>PSIs are used to determine the eligibility of an individual for <strong><em><strong>_<\/strong><\/em><\/strong> or retention to the armed forces.<\/p>\n\n\n\n<p>Assignment<br>PSIs are used to determine the eligibility of an individual for <strong><em><strong>_<\/strong><\/em><\/strong> or retention to sensitive duties.<\/p>\n\n\n\n<p>False<br>True or False: The DoD CAF is the only authority who can grant an interim clearance.<\/p>\n\n\n\n<p>DoD CAF responsibilities<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li>Making adjudicative decisions<\/li>\n\n\n\n<li>The DoD CAF is a repository for investigative records<\/li>\n\n\n\n<li>Initiating special investigations<\/li>\n\n\n\n<li>The DoD CAF adjudicate by applying the whole person concept<\/li>\n<\/ol>\n\n\n\n<p>Designation of Sensitive Duties<br>Duties that have a great impact on National Security<\/p>\n\n\n\n<p>Continuous Evaluation<br>This is used to monitor employees for new information or changes that could affect their status.<\/p>\n\n\n\n<p>Reinvestigation<br>This is part of the Continuous Evaluation Program (CEP). It is done at certain intervals based on duties or access.<\/p>\n\n\n\n<p>True<br>True or False: Special access requirements are designed to provide an additional layer of security to some of our nation&#8217;s most valuable assets.<\/p>\n\n\n\n<p>False. Threats and vulnerabilities are related but distinct. Threats to national security exploit vulnerabilities.<br>True or False: There is no difference between a threat and a vulnerability.<\/p>\n\n\n\n<p>E.O. 12968<br>The Executive Order (E.O.) that establishes a uniform Personnel Security Program<\/p>\n\n\n\n<p>DoD 5200.2-R<br>Implements and maintains the DoD personnel security policies and procedures<\/p>\n\n\n\n<p>USD(I) Memorandum, August 30, 2006<br>Defines the Adjudicative Guidelines<\/p>\n\n\n\n<p>DCII<br>This is a system of records of fraud investigations<\/p>\n\n\n\n<p>SII<br>This is a system of records of PSIs conducted by OPM<\/p>\n\n\n\n<p>Scope<br>This refers to when adjudicators must ensure that an investigation meets the minimum timeframe and element requirements before reviewing the investigation.<\/p>\n\n\n\n<p>Administrative Judge<br>During due process, military and civilian personnel may request an in-person appearance before this individual.<\/p>\n\n\n\n<p>DOHA<br>Administers due process for contractor personnel.<\/p>\n\n\n\n<p>PSAB\/Appeal Board<br>This board makes the final appeal determination for all personnel<\/p>\n\n\n\n<p>Termination Briefing<br>This briefing is given when an individual&#8217;s employment is terminated, clearance eligibility is withdrawn, or if the individual will be absent from duty for 60 days or more. It is also given to those who have been inadvertently exposed to classified information.<\/p>\n\n\n\n<p>Foreign Travel Briefing<br>This briefing that applies to cleared personnel who plan to travel in or through foreign countries, or attend meetings attended by representatives of other countries.<\/p>\n\n\n\n<p>Refresher Briefing<br>This briefing is presented annually to personnel who have access to classified information or assignment to sensitive duties.<\/p>\n\n\n\n<p>What SAPs aim to achieve<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li>Protect technological breakthroughs<\/li>\n\n\n\n<li>Cover exploitation of adversary vulnerabilities<\/li>\n\n\n\n<li>Protect sensitive operational plans<\/li>\n\n\n\n<li>Reduce intelligence on U.S. capabilities<\/li>\n<\/ol>\n\n\n\n<p>Protection Level<br>This communicates how the SAP is acknowledged and protected.<\/p>\n\n\n\n<p>Acknowledged<br>This protection level describes a SAP whose existence may be openly recognized. Its purpose may be identified. However, the details of the program (including its technologies, materials, and techniques) are classified as dictated by their vulnerability to exploitation and the risk of compromise. The funding is generally unclassified.<\/p>\n\n\n\n<p>Unacknowledged<br>This protection level describes a SAP whose existence and purpose are protected. The details, technologies, materials, and techniques are classified as dictated by their vulnerability to exploitation and the risk of compromise. The program funding is often classified, unacknowledged, or not directly linked to the program.<\/p>\n\n\n\n<p>SAP Lifecycle<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li>Establishment (is extra protection warranted?)<\/li>\n\n\n\n<li>Management and Administration (continued need? processed followed?)<\/li>\n\n\n\n<li>Apportionment (proper measures in place? approval received)<\/li>\n\n\n\n<li>Disestablishment (program no longer needed?)<\/li>\n<\/ol>\n\n\n\n<p>Component-level SAP Central Offices<br>Exist for each military component, the Joint Chiefs of Staff, Defense Advanced Research Projects Agency (DARPA), and Missile Defense Agency (MDA)<\/p>\n\n\n\n<p>Special Access Program Oversight Committee (SAPOC)<br>The final SAP approving body chaired by the Deputy Secretary of Defense<\/p>\n\n\n\n<p>Senior Review Group (SRG)<br>This group ensures there are no duplicative efforts across SAPs<\/p>\n\n\n\n<p>DoD Special Access Central Office (SAPCO)<br>DoD SAP legislative liaison that notifies Congress of SAP approval<\/p>\n\n\n\n<p>Authorization, Appropriations, and Intelligence Congressional<br>Congressional committees granted SAP access<\/p>\n\n\n\n<p>OSD-level SAP Central Offices<br>Exercise oversight authority for the specific SAP category under their purview.<\/p>\n\n\n\n<p>PIE-FAO<br>People, information, equipment, facilities, activities, and operations<\/p>\n\n\n\n<p>Antiterrorism Officer<br>This person is responsible for the installation&#8217;s antiterrorism program<\/p>\n\n\n\n<p>CI Support<br>Responsible for providing valuable information on the capabilities, intentions, and threats of adversaries<\/p>\n\n\n\n<p>OPSEC Officer<br>This person analyzes threats to assets and their vulnerabilities<\/p>\n\n\n\n<p>Security Officer<br>This person is charged with management, implementation, and direction of all physical security programs<\/p>\n\n\n\n<p>Law Enforcement<br>Must be integrated into our intelligence gathering process so that they can be part of coordinating emergency responses and criminal incidents on a Federal installation<\/p>\n\n\n\n<p>Criticality<br>Determination based on an asset&#8217;s importance to national security and effect of loss<\/p>\n\n\n\n<p>Area Security<br>Security is geared towards protecting an entire area of the installation or facility<\/p>\n\n\n\n<p>Threat<br>The intention and the capability of an adversary to undertake detrimental actions<\/p>\n\n\n\n<p>Point Security<br>Security focused on the resource itself<\/p>\n\n\n\n<p>Effective Protective Barriers<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li>Steel barriers<\/li>\n\n\n\n<li>Chain link fence<\/li>\n\n\n\n<li>Barbed wire<\/li>\n<\/ol>\n\n\n\n<p>Purpose of protective barriers<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li>Establishing boundaries<\/li>\n\n\n\n<li>Protecting the facility<\/li>\n\n\n\n<li>Stopping observation<\/li>\n<\/ol>\n\n\n\n<p>Controlling access<br>The establishment of a restricted area improves security by <strong><em><strong><em>__<\/em><\/strong><\/em><\/strong> and providing additional layers of security.<\/p>\n\n\n\n<p>True<br>True or False: Site lighting is used to enable guard force personnel to observe activities inside or outside the installation<\/p>\n\n\n\n<p>False<br>True or False: Standby lighting is used when regular lighting is not available<\/p>\n\n\n\n<p>Two-way radio<br>Using these assists in security; however, there must always be back-up communication systems in addition to these<\/p>\n\n\n\n<p>Intrusion Detection Systems<br>This device sends a signal through wires when it has been triggered<\/p>\n\n\n\n<p>Closed Circuit Televisions (CCTV)<br>This system has a camera that captures a visual image, converts the image to a video signal, and transmits the image to a remote location<\/p>\n\n\n\n<p>Automated access control systems<br>This system allows one to be identified by their eye, handprint, or fingerprint<\/p>\n\n\n\n<p>Common Access Card (CAC)<br>This enables individuals to be able to authenticate themselves on security websites and securely log into computer systems<\/p>\n\n\n\n<p>Mechanical combination lock<br>Older style of lock; may be used for classified storage in certain cases<\/p>\n\n\n\n<p>Combination padlock<br>Lock that complies with UL Standard 768-Group 1<\/p>\n\n\n\n<p>Electromechanical combination lock<br>Lock that complies with FF-L-2740 series lock specification<\/p>\n\n\n\n<p>Low security padlock<br>Lock that has limited resistance to forced entry<\/p>\n\n\n\n<p>SCIF<br>A facility used by the intelligence community<\/p>\n\n\n\n<p>GSA<br>The governing authority to approve security containers<\/p>\n\n\n\n<p>Secure rooms<br>Areas designed and authorized for the open storage of classified information. These facilities are usually build to commercial construction standards and do not afford the extra security inherent with a vault.<\/p>\n\n\n\n<p>Vaults<br>Constructed to meet strict forcible entry standards, including reinforced concrete on all walls, ceiling, and floor, plus a hardened steel door<\/p>\n\n\n\n<p>High terrorist threat level<br>The terrorist threat level indicating anti-U.S. terrorists are operationally active and use large casualty-producing attacks as their preferred method of operation. There is a substantial DoD presence, and the operating environment favors the terrorist.<\/p>\n\n\n\n<p>Low terrorist threat level<br>The terrorist threat level indicating no terrorist group is detected or the terrorist group in non-threatening<\/p>\n\n\n\n<p>Significant terrorist threat level<br>The terrorist threat level indicating anti-U.S. terrorists are present and attack personnel as their preferred method of operation, or a group uses large casualty-producing attacks as their preferred method but has limited operational activity. The operating environment is neutral.<\/p>\n\n\n\n<p>Moderate terrorist threat level<br>The terrorist threat level indicating terrorists are present but there are no indications of anti-U.S. activity. The operating environment favors the host nation or the U.S.<\/p>\n\n\n\n<p>Physical security plan<br>At a minimum, these should include special and general guard orders, access and material control, protective barrier lighting systems, locks, and Intrusion Detection Systems (IDS)<\/p>\n\n\n\n<p>Industrial<br>Much of U.S. classified information originates within this environment<\/p>\n\n\n\n<p>Defense Security Service<br>Security compliance is overseen by this organization if a contractor works at his\/her own facility<\/p>\n\n\n\n<p>Installation<br>A contractor must adhere to the security rules of the <strong><em>__<\/em><\/strong> commander when working at a government installation<\/p>\n\n\n\n<p>NISP<br>The program that covers protection of classified information<br>by government contractors<\/p>\n\n\n\n<p>FSO responsibilities<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li>Ensure compliance with the NISP<\/li>\n\n\n\n<li>Follow NISPOM guidelines<\/li>\n\n\n\n<li>Provide training for cleared individuals<\/li>\n<\/ol>\n\n\n\n<p>Chapter 8 of the NISPOM<br>If you are a government contractor working on a contractor-owned system at a contractor facility, you must follow the security provisions of this reference<\/p>\n\n\n\n<p>True<br>True or False: A SAP can retain security cognizance if necessary.<\/p>\n\n\n\n<p>Contracting Officer<br>A government employee with the authority to enter into, administer, and\/or terminate contracts and make related determinations and findings<\/p>\n\n\n\n<p>COTR<br>This government employee is a subject matter expert who has regular contact with the contractor<\/p>\n\n\n\n<p>Statement of Work (SOW)<br>The document that outlines in detail what will be required to complete a contract<\/p>\n\n\n\n<p>DD Form 441<br>The document that establishes the government&#8217;s authority to review the contractor&#8217;s security program to ensure compliance<\/p>\n\n\n\n<p>DD Form 254<br>The form a contractor could use to determine if classified storage is required, and at what level<\/p>\n\n\n\n<p>Same<br>A cleared individual can only have access at the <strong><em>_<\/em><\/strong> level as the facility clearance<\/p>\n\n\n\n<p>JPAS<br>For the purpose of a visit to another cleared facility, a clearance can be verified by looking in <strong><em>__<\/em><\/strong><\/p>\n\n\n\n<p>Eligibility<br>The issuance of <strong><em>__<\/em><\/strong> is the responsibility of the DoD CAF<\/p>\n\n\n\n<p>Secret<br>Unauthorized disclosure of this information could reasonably be expected to cause serious damage to our national security.<\/p>\n\n\n\n<p>Top Secret<br>Unauthorized disclosure of this information could reasonably be expected to cause exceptionally grave damage to our national security.<\/p>\n\n\n\n<p>Confidential<br>Unauthorized disclosure of this information could reasonably be expected to cause damage to our national security.<\/p>\n\n\n\n<p>Derivative Classification<br>This is defined as the incorporating, paraphrasing, restating, or generating in new form any information that is already classified.<\/p>\n\n\n\n<p>Original Classification<br>This is defined as an initial determination that information requires, in the interest of national security, protection against unauthorized disclosure.<\/p>\n\n\n\n<p>Compilation<br>This is defined as unclassified information or classified information (at a lower level) that when the information is combined or associated reveals additional factors that qualifies for classification.<\/p>\n\n\n\n<p>Original Classification Authority<br>The term used to identify individuals specifically authorized in writing to make initial classification decisions.<\/p>\n\n\n\n<p>Security Classification Guides (SCG)<br>This contains classification levels, special requirements and duration instructions for programs, projects, plans, etc.<\/p>\n\n\n\n<p>Original Classification Process<br>The six step process an OCA applies in making classification determinations<\/p>\n\n\n\n<p>Declassification<br>The authorized change in the status of information goes from classified information to unclassified information<\/p>\n\n\n\n<p>Automatic declassification<br>The declassification system where Permanently Valuable Historical records are declassified when they are 25 years old<\/p>\n\n\n\n<p>Systematic declassification review<br>The declassification system where information exempted from automatic declassification is reviewed for possible declassification<\/p>\n\n\n\n<p>Mandatory Declassification Review (MDR)<br>The declassification system where the public can ask for classified information be review for declassification and public release<\/p>\n\n\n\n<p>Scheduled Declassification<br>The declassification system where an OCA, at the time the information is originally classified, sets a date or event for declassification<\/p>\n\n\n\n<p>Custodians<br>People who are in possession of, or who are otherwise charged with safeguarding classified information<\/p>\n\n\n\n<p>Options an OCA has when determining declassification<br>Specific Date, Specific Event, or by the 50X1-HUM Exemption<\/p>\n\n\n\n<p>The 25-year rule<br>The process where records automatically become declassified after 25 years<\/p>\n\n\n\n<p>Restricted Data and Formerly Restricted Data<br>This type of information does not provide declassification instructions<\/p>\n\n\n\n<p>Practices to follow when handling classified information<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li>Properly destroy preliminary drafts, worksheets, and other material after they have served their purpose<\/li>\n\n\n\n<li>Use approved secure communications circuits for telephone conversations to discuss classified information<\/li>\n\n\n\n<li>Follow proper procedures when copying classified information<\/li>\n\n\n\n<li>Use security forms such as SF 701 and SF 702<\/li>\n<\/ol>\n\n\n\n<p>SF 702<br>Security Container Check Sheet, which is used to record the opening and closing of your security container<\/p>\n\n\n\n<p>SF 701<br>The Activity Security Checklist intended to verify that you did not accidentally leave classified materials unsecured, as well as, to ensure the area is safe and secure. The blank spaces can be utilized for additional warranted security and safety items, such as a block to remind personnel to complete tasks, such as turning off coffee pots.<\/p>\n\n\n\n<p>Actual compromise<br>An unauthorized disclosure of classified information<\/p>\n\n\n\n<p>Neither confirm nor deny<br>If classified information appears in the public media, DoD personnel must be careful not to make any statement of comment that would confirm the accuracy or verify the classified status of the information<\/p>\n\n\n\n<p>Potential Compromise<br>The possibility of compromise could exist but it is not known with certainty<\/p>\n\n\n\n<p>DISA, Joint Interoperability Test Command (JITC)<br>This organization maintains a register of certified security digital facsimiles<\/p>\n\n\n\n<p>COMSEC<br>The protection resulting from the measures designed to deny unauthorized persons information of value that might be derived from the possession and study of telecommunications and to ensure the authenticity of such communications.<\/p>\n\n\n\n<p>Insert the envelope into the outer envelope<br>When the document has been sealed within a properly marked inner envelope you must\u2026<\/p>\n\n\n\n<p>DCS<br>Defense Courier Service<\/p>\n\n\n\n<p>Secret information<br>This kind of information can be sent via USPS express only when it is the most effective means considering security, time, cost, and accountability.<\/p>\n\n\n\n<p>Top Secret information<br>This kind of information can never be sent via USPS<\/p>\n\n\n\n<p>Methods to send hard copy Confidential information<br>DCS, First Class mail, registered mail, and certified mail<\/p>\n\n\n\n<p>True<br>True or False: Hand carrying classified information should only be done as a last resort<\/p>\n\n\n\n<p>False<br>True or False: Anyone can determine the need for hand carrying classified information<\/p>\n\n\n\n<p>True<br>True or False: When someone is carrying classified information, written authorization is always required<\/p>\n\n\n\n<p>DD Form 2501<br>Courier Authorization Card<\/p>\n\n\n\n<p>Microfiche destruction<br>Burned or shredded to be destroyed. It can also be destroyed with chemicals that destroy the imprints.<\/p>\n\n\n\n<p>Typewriter ribbon destruction<br>Ribbons must be burned or shredded<\/p>\n\n\n\n<p>Floppy disk destruction<br>Must be burned, overwritten, or demagnetized<\/p>\n\n\n\n<p>Document destruction<br>Must be burned, shredded, or chemically decomposed of<\/p>\n\n\n\n<p>Videotape destruction<br>Must be burned, shredded, or demagnetized<\/p>\n\n\n\n<p>Initial Orientation Briefing<br>The initial briefing given to all personnel on the DoD Information Security Program<\/p>\n\n\n\n<p>Homeland Security Presidential Directive 12 (HSPD-12)<br>On August 27, 2004, President Bush signed this directive; Policy for a Common Identification Standard for Federal Employees and contractors. This requires government-wide development and implementation of a standard for secure and reliable forms of identification for Federal employees and contractors.<\/p>\n\n\n\n<p>DoD 5200.08-R<br>Physical Security Program regulation<\/p>\n\n\n\n<p>DoD Instruction 5200.08, Security of DoD Installations and Resources and the DoD Physical Security Review Board (PSRB)<br>This document authorizes commanders to issue regulations for the protection or security of property and places under their command. This document also establishes guidelines to build consistent minimum standards for protecting DoD installations and resources.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Which of the following security program areas would you find practitioners who train and\/or advise Original Classification Authorities in the application of the process for makingclassification determinations?A. Information SecurityB. Physical SecurityC. Personnel SecurityD. Industrial SecurityA. Information Security Which of the following security program areas would you find practitioners working with afacility&#8217;s Antiterrorism Officer to deploy [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","ast-disable-related-posts":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[],"tags":[],"class_list":["post-111195","post","type-post","status-publish","format-standard","hentry"],"_links":{"self":[{"href":"https:\/\/www.learnexams.com\/blog\/wp-json\/wp\/v2\/posts\/111195","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.learnexams.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.learnexams.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.learnexams.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.learnexams.com\/blog\/wp-json\/wp\/v2\/comments?post=111195"}],"version-history":[{"count":0,"href":"https:\/\/www.learnexams.com\/blog\/wp-json\/wp\/v2\/posts\/111195\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.learnexams.com\/blog\/wp-json\/wp\/v2\/media?parent=111195"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.learnexams.com\/blog\/wp-json\/wp\/v2\/categories?post=111195"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.learnexams.com\/blog\/wp-json\/wp\/v2\/tags?post=111195"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}