Docsity
Docsity

Prepare for your exams
Prepare for your exams

Study with the several resources on Docsity


Earn points to download
Earn points to download

Earn points by helping other students or get them with a premium plan


Guidelines and tips
Guidelines and tips

SFPC Practice Test: 100 Security Clearance & Info Protection Questions, Exams of Military leadership

A comprehensive practice test for the security forces protection course (sfpc), covering 100 multiple-choice questions with answers. The test focuses on key aspects of security clearance and information protection, including limited access authorization (laa), security clearance eligibility, statement of reasons (sor), security program areas, foreign government information (fgi), and classified information handling. It is a valuable resource for individuals preparing for the sfpc exam or seeking to enhance their understanding of security clearance and information protection principles.

Typology: Exams

2024/2025

Available from 01/31/2025

Martin-Ray-1
Martin-Ray-1 🇺🇸

5

(8)

6.1K documents

1 / 39

Toggle sidebar

This page cannot be seen from the preview

Don't miss anything!

bg1
1 | P a g e
SFPC Practice Test 100 Questions with
Answers 100% Verified and Graded
Which of the following limitations is true regarding Limited Access
Authorization (LAA) to non-U.S. citizens?
a. LAAs shall only be granted access at the Secret and Confidential
levels.
b. A favorably completed and adjudicated Tier 3 or National Agency
Check with Local Agency Check (NACLC). investigation within the last
five years is required.
c. An LAA is the same as a security clearance eligibility.
d. Access to classified information Is not limited to a specific program
or project. - Correct Ans: ✅A
Which of the following is not considered when making a security
clearance eligibility determination?
a. Education Level
b. Alcohol consumption
c. Financial considerations
d. Psychological Conditions - Correct Ans: ✅A
A position designated as a DoD noncritical-sensitive civilian position
may fall under any of the following criteria, EXCEPT:
a. A position not requiring eligibility for access to classified
information, but having the potential to cause significant or serious
damage to the national security.
pf3
pf4
pf5
pf8
pf9
pfa
pfd
pfe
pff
pf12
pf13
pf14
pf15
pf16
pf17
pf18
pf19
pf1a
pf1b
pf1c
pf1d
pf1e
pf1f
pf20
pf21
pf22
pf23
pf24
pf25
pf26
pf27

Partial preview of the text

Download SFPC Practice Test: 100 Security Clearance & Info Protection Questions and more Exams Military leadership in PDF only on Docsity!

SFPC Practice Test 100 Questions with

Answers 100% Verified and Graded

Which of the following limitations is true regarding Limited Access Authorization (LAA) to non-U.S. citizens?

a. LAAs shall only be granted access at the Secret and Confidential levels.

b. A favorably completed and adjudicated Tier 3 or National Agency Check with Local Agency Check (NACLC). investigation within the last five years is required.

c. An LAA is the same as a security clearance eligibility.

d. Access to classified information Is not limited to a specific program

or project. - Correct Ans: ✅A

Which of the following is not considered when making a security clearance eligibility determination?

a. Education Level

b. Alcohol consumption

c. Financial considerations

d. Psychological Conditions - Correct Ans: ✅A

A position designated as a DoD noncritical-sensitive civilian position may fall under any of the following criteria, EXCEPT:

a. A position not requiring eligibility for access to classified information, but having the potential to cause significant or serious damage to the national security.

b. A position requiring eligibility for access to Top Secret information.

c. A position requiring eligibility for access to confidential information.

d. A position requiring eligibility for access to secret information. -

Correct Ans: ✅B

What information must a statement of reasons (SOR) include?

a. SOR must state why an unfavorable national security eligibility determination is being proposed.

b. SOR must explain each security concern and state the specific facts that trigger each security concern.

c. The SOR must identify applicable adjudicative guideline(s) for each concern, and provide the disqualifying conditions and mitigating conditions for each guideline.

d. All of the Above - Correct Ans: ✅D

Which type of briefing is used to obtain confirmation that a cleared employee agrees never to disclose classified information to an unauthorized person?

a. Special Briefings - Courier

b. Original Classification Authority (OCA) Briefing

c. Special Briefings - Non-Disclosure

d. Debriefing - Correct Ans: ✅C

Which of the following would be considered a public safety crime?

a. Theft of ammunition shipment for the purpose of criminal or gang related activity.

b. Theft of sensitive, proprietary information relating to US aerospace and defense technologies.

c. Deliberate destruction of DoD assets or interruption of normal operations.

d. Theft of an item and use of it outside of its intended purpose or

without permission. - Correct Ans: ✅A

Which of the following security program areas would you find practitioners who train and/

or advise Original Classification Authorities in the application of the process for making

classification determinations?

A. Information Security

B. Physical Security

C. Personnel Security

D. Industrial Security - Correct Ans: ✅A. Information Security

Which of the following security program areas would you find practitioners working with a

facility's Antiterrorism Officer to deploy defensive measures designed to reduce the facility's

vulnerability from terrorist attacks?

A. Information Security

B. Physical Security

C. Personnel Security

D. Industrial Security - Correct Ans: ✅B. Physical Security

Which of the following security programs areas would you find practitioners involved with

processes that monitor employees for new information that could affect their security clearance

eligibility status?

A. Foreign Disclosure

B. Information Security

C. International Security

D. Operations Security

E. Personnel Security

F. Physical Security

G. Research and Technology Protection

H. Information Assurance - Correct Ans: ✅E. Personnel Security

Two security professionals - Paul and Ashley - are discussing security program areas.

Paul says that Information Security practitioners train and/or advise Original Classification

Authorities in the application of the process for making classification determinations.

D. Paul and Ashley are both incorrect - Correct Ans: ✅D. Paul and Ashley are both incorrect

Which of the following is a true statement regarding the special handling requirements of Foreign Government Information (FGI)?

a. When the classification marking on a document containing FGI is not in English, or when the foreign government marking requires a different degree of protection than

the same U.S. classification designation, a U.S. marking that results in a degree of protection equivalent to that required by the foreign government shall be applied.

b. A U.S. document containing FGI cannot be declassified or downgraded below the highest level of FGI contained in the document without the permission of the foreign government or international organization that originated the information.

c. Those holding security clearances issued by the U.S. government cannot access U.S. documents containing FGI without written consent from the originating foreign government.

d. The receiving DoD Components must maintain re - Correct Ans:

✅B

Which of the following is a requirement for access to North Atlantic Treaty Organization (NATO) information?

a. Personnel has been subject of a Single Scope Background Investigation (SSBI), including a National Agency Check (NAC) on the spouse and all members of the individual's immediate family of 18

years of age or over who are United States citizens other than by birth or who are resident aliens.

b. Personnel has been subject of a favorably adjudicated background investigation (BI) (10-year scope), Tier 5, current within five years prior to the assignment, and completed a NATO brief.

c. Personnel has been subject of a favorably adjudicated BI (10-year scope), Defense National Agency Check with Inquiries (DNACI)/ National Agency Check with Inquiries (NACI) or NACI Entrance National Agency Check (ENTNAC), current within five years prior to the assignment.

d. Personnel requiring access to NATO COSMIC (Top Secret) or -

Correct Ans: ✅B

According to Executive Order 13556, which of the following

is considered a type of controlled unclassified information (CUI)?

a. Communications Security (COMSEC) Information

b. Declassified Information

c. Law Enforcement Sensitive (LES) Information

d. North Atlantic Treaty Organization (NATO) Information - Correct

Ans: ✅C. Law Enforcement Sensitive Information

What is the purpose of marking classified materials?

a. To alert holders to the presence of classified information, how to properly protect it, and for how long.

b. To deter foreign adversaries from committing actions aimed at accessing such information.

When a classified data spill occurs, who is responsible for ensuring that policy requirements for addressing an unauthorized disclosure are met?

a. Activity Security Manager

b. Information Assurance Staff

c. Information Assurance Manager

d. Information Assurance Officer - Correct Ans: ✅A

There are five information assurance attributes that are important to protect and defend DoD networks and information. If there was a loss in non- repudiation, what would this cause in relation to information assurance?**

a. Data is no longer reliable, accurate, nor trusted.

b. Data may potentially be available to unauthorized users via electronic form.

c. General communications are no longer trusted.

d. Potential of unauthorized access to classified data.

e. Data is no longer available to authorized users, and missions

cannot be conducted. - Correct Ans: ✅B

Which of the following examples describes

a security violation rather than a security infraction?

a. On a busy day, Karen printed classified documents on the printer in her open storage/secure room. She forgot about the documents and they remained on the printer for about an hour before she retrieved them.

b. Karen was late for a meeting in a different area of her building. She put a classified document in a folder she believed was marked for carrying classified materials. When handing out the materials, Karen realized that the folder was not marked for carrying classified materials, she had put the documents in the wrong folder.

c. At the end of the day, Karen was leaving and taking with her unclassified documents she would review at home. When she began to review those documents that night, she realized that classified materials had slipped in between the unclassified materials.

d. Karen was working a mission rela - Correct Ans: ✅C

The inability to deny you are the sender of an email would be an indication of a lapse in:**

a. Non-Repudiation

b. Confidentiality

c. Integrity

d. Availability - Correct Ans: ✅A. Non-repudiation

Unauthorized disclosure and loss of privacy is a lapse in:**

a. Confidentiality

b. Integrity

c. Availability

d. Authentication - Correct Ans: ✅A

Which of the following is the first action done to downgrade, declassify

b. To designate individuals for positions requiring access to classified information.

c. To ensure that only loyal, trustworthy, and reliable individuals may access classified information or perform sensitive duties.

d. To describe the safeguarding requirements personnel must employ when handling classified materials at a cleared contractor

facility. - Correct Ans: ✅C

DoD reciprocally accepts existing national security eligibility determinations or clearances from other Government agencies in accordance with which of the following policy documents?

a. Office of Management and Budget Memorandum M-05-24, "Implementation of Homeland Security Presidential Directive (HSPD) 12 - Policy for a Common Identification Standard for Federal Employees and Contractors,".

b. Executive Order 13467, "Reforming Processes Related to Suitability for Government Employment, Fitness for Contractor Employees, and Eligibility for Access to Classified National Security Information".

c. Sections 301 and 7532 of title 5, United States Code.

d. Executive Order 13526, "Classified National Security Information".

  • Correct Ans: ✅B

Review of Tier 5 on an individual disclosed that the subject had been a member of

an anarchist organization dedicated to disestablishing existing Federal laws and overthrowing the U.S. government by any means necessary, including violence. Although the subject terminated his

membership with the organization upon learning he would be investigated for

a clearance for his new position, he still maintains social contact with several members of the anarchist organization. Based on this information, which of the following adjudicative guidelines is most appropriate for an adjudicator to apply to the case?

a. Psychological Conditions

b. Foreign Preference

c. Allegiance to the United States

d. Criminal Activity - Correct Ans: ✅C

  1. Which of the following is considered an element of the Personnel Security Program (PSP)?

a. Risk Assessment and Analysis

b. Implementation

c. Classification

d. Continuous Evaluation - Correct Ans: ✅D

Limited access to classified information for

specific programs may be approved for non-U.S. citizens only under which of the following conditions?

a. The subject is eligible to access material marked by a foreign government that is equivalent to a U.S. Top Secret classification marking.

b. Individual has a security clearance eligibility in accordance with the position

c. Individual is subject to a periodic reinvestigation every three years

d. Individual must be continuous evaluated - Correct Ans: ✅C

Which of the following is correct regarding the investigation requirement for initial assignment to a Presidential Support Activities (i.e. Yankee White) Category 2 position?

a. Favorably completed Tier 5/Single Scope Background Investigation (SSBI) within 36 months preceding selection.

b. Favorably completed Tier 3/National Agency Check with Local Agency Check (NACLC) within 36 months preceding selection.

c. Favorably completed Tier 5/SSBI within 24 months preceding selection.

d. Favorably completed Tier 3/NACLC within 24 months preceding

selection. - Correct Ans: ✅A

Which of the following adjudication processes refers to a person's identifiable character traits and conduct sufficient to decide whether employment or continued employment would or would not protect the integrity or promote the efficiency of the Federal service?

a. Homeland Security Presidential Directory (HSPD) 12 credentialing

b. National security adjudication

c. Suitability adjudication

d. Continuous evaluation - Correct Ans: ✅C

All unclassified DoD information in the possession or control of non- DoD entities on non-DoD information systems, to the

extent provided by the applicable grant, shall minimally be safeguarded under which of the following standards?

a. Information holders must use the Secret Internet Protocol Router Network (SIPRNET) to transmit such information.

b. Such information may be store in an open storage area, provided the room is equipped with an Intrusion Detection System (IDS) with the personnel responding to an alarm within 15 minutes of the alarm annunciation.

c. Such information must be stored in a General Services Administration (GSA)-approved security container equipped with a lock meeting FF-L-2740 standards.

d. Organizational wireless connections holding such information must be encrypted, and those accessing such information must use encrypted wireless connections where available when traveling. -

Correct Ans: ✅D

Copies of personnel security investigative reports must be destroyed by DoD recipient organizations, within how many days following completion

of the necessary personnel security determination?

a. 30 days

b. 45 days

c. 60 days

d. 90 days - Correct Ans: ✅D

b. Threat-vulnerability assessment

c. Security-in-depth

d. Point security - Correct Ans: ✅C

The stealing of sensitive, proprietary information related to U.S. aerospace and defense technologies with the intent to provide such information to a foreign adversary is an example of which type of threat to DoD assets?

a. Criminal activity

b. Economic espionage

c. Treason

d. Terrorism - Correct Ans: ✅B

When a Terrorism Threat Level is escalated from LOW to MODERATE, a DoD Component Head should employ which of the following countermeasures?

a. Cease all flying except for specifically authorized operational sorties.

b. Direct the execution of advance site reviews to facilitate the antiterrorism planning process.

c. Encourage dependent family members to complete Level I Antiterrorism Awareness Training before any travel outside the continental United States (OCONUS).

d. Conduct an immediate Terrorism Vulnerability Assessment for off- installation housing, schools, daycare centers, transportation. -

Correct Ans: ✅C

Requests for authorizing disclosure of classified information during visits must include all the following information, EXCEPT:

a. The explanation of the government purpose to perform when disclosing classified information.

b. The subject of the meeting, scope of classified topics and classification level

c. Expected time and location of the meeting.

d. The main content of the invitation to send to the participants. -

Correct Ans: ✅C

Two security professionals - Paul and Ashley

  • are discussing the security procedures for visits and meetings. Paul says visits must serve a specific U.S. Government purpose. Ashley says DoD Components should, as a minimum, establish procedures that include verification of the identity, personnel security clearance, access (if appropriate), and need-to-know for all visitors. Who is correct?

a. Paul is correct

b. Ashley is correct

c. Paul and Ashley are both correct

d. Paul and Ashley are both incorrect - Correct Ans: ✅A

Executive Order 12829, signed in January 1993, mandated that which of the following entities be responsible for implementing and monitoring the National industrial Security Program (NISP)?

a. Director of the Information Security Oversight Office (ISOO)

b. Secretary of Defense