








Study with the several resources on Docsity
Earn points by helping other students or get them with a premium plan
Prepare for your exams
Study with the several resources on Docsity
Earn points to download
Earn points by helping other students or get them with a premium plan
Community
Ask the community for help and clear up your study doubts
Discover the best universities in your country according to Docsity users
Free resources
Download our free guides on studying techniques, anxiety management strategies, and thesis advice from Docsity tutors
SFPC Practice Test questions with correct answers.
Typology: Exams
1 / 14
This page cannot be seen from the preview
Don't miss anything!
Which of the following security program areas would you find practitioners who train and/ or advise Original Classification Authorities in the application of the process for making classification determinations? A. Information Security B. Physical Security C. Personnel Security D. Industrial Security - correct answer -A. Information Security Which of the following security program areas would you find practitioners working with a facility's Antiterrorism Officer to deploy defensive measures designed to reduce the facility's vulnerability from terrorist attacks? A. Information Security B. Physical Security C. Personnel Security D. Industrial Security - correct answer -B. Physical Security Which of the following security programs areas would you find practitioners involved with processes that monitor employees for new information that could affect their security clearance eligibility status? A. Foreign Disclosure B. Information Security C. International Security D. Operations Security E. Personnel Security F. Physical Security G. Research and Technology Protection H. Information Assurance - correct answer -E. Personnel Security Two security professionals - Paul and Ashley - are discussing security program areas. Paul says that Information Security practitioners train and/or advise Original Classification Authorities in the application of the process for making classification determinations. Ashley says that Physical Security practitioners work with a facility's Antiterrorism Officer to deploy defensive measures designed to reduce the facility's vulnerability from terrorist attacks. Who is correct? A. Paul is correct B. Ashley is correct C. Paul and Ashley are both correct D. Paul and Ashley are both incorrect - correct answer -C. Paul and Ashley are both correct Two security professionals - Paul and Ashley - are discussing security program areas. Paul says that Information Security practitioners work with a facility's Antiterrorism Officer to deploy defensive measures designed to reduce the facility's vulnerability from terrorist attacks. Ashley says that Personnel Security practitioners train and/or advise Original Classification Authorities in the application of the process for making classification determinations. Who is correct? A. Paul is correct B. Ashley is correct C. Paul and Ashley are both correct D. Paul and Ashley are both incorrect - correct answer -D. Paul and Ashley are both incorrect Which of the following is a true statement regarding the special handling requirements of Foreign Government Information (FGI)?
a. When the classification marking on a document containing FGI is not in English, or when the foreign government marking requires a different degree of protection than the same U.S. classification designation, a U.S. marking that results in a degree of protection equivalent to that required by the foreign government shall be applied. b. A U.S. document containing FGI cannot be declassified or downgraded below the highest level of FGI contained in the document without the permission of the foreign government or international organization that originated the information. c. Those holding security clearances issued by the U.S. government cannot access U.S. documents containing FGI without written consent from the originating foreign government. d. The receiving DoD Components must maintain re - correct answer -B Which of the following is a requirement for access to North Atlantic Treaty Organization (NATO) information? a. Personnel has been subject of a Single Scope Background Investigation (SSBI), including a National Agency Check (NAC) on the spouse and all members of the individual's immediate family of 18 years of age or over who are United States citizens other than by birth or who are resident aliens. b. Personnel has been subject of a favorably adjudicated background investigation (BI) (10-year scope), Tier 5, current within five years prior to the assignment, and completed a NATO brief. c. Personnel has been subject of a favorably adjudicated BI (10-year scope), Defense National Agency Check with Inquiries (DNACI)/ National Agency Check with Inquiries (NACI) or NACI Entrance National Agency Check (ENTNAC), current within five years prior to the assignment. d. Personnel requiring access to NATO COSMIC (Top Secret) or - correct answer -B According to Executive Order 13556, which of the following is considered a type of controlled unclassified information (CUI)? a. Communications Security (COMSEC) Information b. Declassified Information c. Law Enforcement Sensitive (LES) Information d. North Atlantic Treaty Organization (NATO) Information - correct answer -C. Law Enforcement Sensitive Information What is the purpose of marking classified materials? a. To alert holders to the presence of classified information, how to properly protect it, and for how long. b. To deter foreign adversaries from committing actions aimed at accessing such information. c. To provide guidance for interpretation and analysis of classified information. d. To alert holders to the methods used to collect classified information. - correct answer -A What is included in the markings of classified information? a. Derivative classifier as the authority to make declassification determinations. b. Agencies and authorities that have previously accessed the classified information. c. Document holder as the sole authority to make transfer and dissemination determinations. d. Sources and reasons for the classification. - correct answer -C What is the purpose of the Controlled Access Program Coordination (CAPCO) register? a. To identify the categories, types, and levels of Special Access Programs (SAPs.) b. To define the authorities for classifying, declassifying, and regrading sensitive documents. c. To identify the official classification and control markings, and their authorized abbreviations and portion markings. d. To define the requirements, restrictions, and measures necessary to safeguard classified information from unauthorized disclosure. - correct answer -C When a classified data spill occurs, who is responsible for ensuring that policy requirements for addressing an unauthorized disclosure are met? a. Activity Security Manager b. Information Assurance Staff c. Information Assurance Manager d. Information Assurance Officer - correct answer -A There are five information assurance attributes that are important to protect and defend DoD networks and information. If
accordance with which of the following policy documents? a. Office of Management and Budget Memorandum M-05-24, "Implementation of Homeland Security Presidential Directive (HSPD) 12 - Policy for a Common Identification Standard for Federal Employees and Contractors,". b. Executive Order 13467, "Reforming Processes Related to Suitability for Government Employment, Fitness for Contractor Employees, and Eligibility for Access to Classified National Security Information". c. Sections 301 and 7532 of title 5, United States Code. d. Executive Order 13526, "Classified National Security Information". - correct answer -B Review of Tier 5 on an individual disclosed that the subject had been a member of an anarchist organization dedicated to disestablishing existing Federal laws and overthrowing the U.S. government by any means necessary, including violence. Although the subject terminated his membership with the organization upon learning he would be investigated for a clearance for his new position, he still maintains social contact with several members of the anarchist organization. Based on this information, which of the following adjudicative guidelines is most appropriate for an adjudicator to apply to the case? a. Psychological Conditions b. Foreign Preference c. Allegiance to the United States d. Criminal Activity - correct answer -C
selection. c. Favorably completed Tier 5/SSBI within 24 months preceding selection. d. Favorably completed Tier 3/NACLC within 24 months preceding selection. - correct answer -A Which of the following adjudication processes refers to a person's identifiable character traits and conduct sufficient to decide whether employment or continued employment would or would not protect the integrity or promote the efficiency of the Federal service? a. Homeland Security Presidential Directory (HSPD) 12 credentialing b. National security adjudication c. Suitability adjudication d. Continuous evaluation - correct answer -C All unclassified DoD information in the possession or control of non-DoD entities on non-DoD information systems, to the extent provided by the applicable grant, shall minimally be safeguarded under which of the following standards? a. Information holders must use the Secret Internet Protocol Router Network (SIPRNET) to transmit such information. b. Such information may be store in an open storage area, provided the room is equipped with an Intrusion Detection System (IDS) with the personnel responding to an alarm within 15 minutes of the alarm annunciation. c. Such information must be stored in a General Services Administration (GSA)-approved security container equipped with a lock meeting FF-L-2740 standards. d. Organizational wireless connections holding such information must be encrypted, and those accessing such information must use encrypted wireless connections where available when traveling. - correct answer -D Copies of personnel security investigative reports must be destroyed by DoD recipient organizations, within how many days following completion of the necessary personnel security determination? a. 30 days b. 45 days c. 60 days d. 90 days - correct answer -D Which of the following limitations is true regarding Limited Access Authorization (LAA) to non-U.S. citizens? a. LAAs shall only be granted access at the Secret and Confidential levels. b. A favorably completed and adjudicated Tier 3 or National Agency Check with Local Agency Check (NACLC). investigation within the last five years is required. c. An LAA is the same as a security clearance eligibility. d. Access to classified information Is not limited to a specific program or project. - correct answer -A
c. Security-in-depth d. Point security - correct answer -C The stealing of sensitive, proprietary information related to U.S. aerospace and defense technologies with the intent to provide such information to a foreign adversary is an example of which type of threat to DoD assets? a. Criminal activity b. Economic espionage c. Treason d. Terrorism - correct answer -B When a Terrorism Threat Level is escalated from LOW to MODERATE, a DoD Component Head should employ which of the following countermeasures? a. Cease all flying except for specifically authorized operational sorties. b. Direct the execution of advance site reviews to facilitate the antiterrorism planning process. c. Encourage dependent family members to complete Level I Antiterrorism Awareness Training before any travel outside the continental United States (OCONUS). d. Conduct an immediate Terrorism Vulnerability Assessment for off-installation housing, schools, daycare centers, transportation. - correct answer -C Requests for authorizing disclosure of classified information during visits must include all the following information, EXCEPT: a. The explanation of the government purpose to perform when disclosing classified information. b. The subject of the meeting, scope of classified topics and classification level c. Expected time and location of the meeting. d. The main content of the invitation to send to the participants. - correct answer -C Two security professionals - Paul and Ashley
d. To promote uniform standards and best practices of technology acquisition across U.S. industry. - correct answer -A What is the role of the security professional during the "Award Contract" step of the contracting process? a. To ensure the appropriate classification level for the bid, and to define unique security requirements associated with the product. b. To interface with the Cognizant Security Organization (CSO) to ensure oversight is performed and review results of and previous assessments on behalf of component. c. To ensure that the contractor follows proper safeguarding and disposition guidance. d. To review and define the specific security requirements with the contracting officer - specifically, block 13 of DD Form 254.
c. Implement Security Controls d. Assess Security Controls e. Authorize f. Monitor Security Controls - correct answer -A At what step of the Risk Management Framework (RMF) would you develop a system-level continuous monitoring strategy?" ** a. Categorize Information System b. Select Security Controls c. Implement Security Controls d. Assess Security Controls e. Authorize f. Monitor Security Controls - correct answer -B One responsibility of the Information System Security Manager (ISSM) during Step 6 of the Risk Management Framework (RMF) is:** a. Review and approve the security plan and system-level continuous monitoring strategy developed and implemented by the DoD Components. b. Monitor the system for security relevant events and configuration changes that affect the security posture negatively. c. Determine and documents a risk level in the Security Assessment Report (SAR) for every non-compliant security control in the system baseline. d. Coordinate the organization of the Information System (IS) and Platform Information Technology (PIT) systems with the Program Manager (PM)/System Manager (SM), Information System Owner (ISO), Information Owner (IO), mission owner(s), Action Officer (AO) or their designated representatives. - correct answer -B What family of controls does Security Functionality Verification belong to?** a. System and Communications Protection b. Maintenance c. System and Information Integrity d. Audit and Accountability - correct answer -C What does "AO" stand for? - correct answer -Authorizing Official What is a SAR as related to cyber security? - correct answer -System Assessment Report What activities occur when authorizing the system? (select all that apply) a. Implement decommissioning strategy b. Develop, review, and approve Security Assessment Plan c. Prepare the Plan of Action and Milestones (POA&M) d. Submit security authorization package - correct answer -C & D What activities occur when assessing security controls? (Select all that apply) A. prepare the plan of action and milestones (POA&M) B. conduct final risk determination C. Develop, plan, and approve Security Assessment Plan D. Prepare Security Assessment Report - correct answer -C & D What activities occur when monitoring security controls? (Select all that apply) A. Prepare the Plan of Action and Milestones (POA&M) B. Develop, review, and approve Security Assessment Plan C. Implement decommissioning strategy D. Determine impact of changes - correct answer -C & D What are the cybersecurity attributes? Select all that apply. A Confidentiality
B Integrity C Availability D Authentication E Non-repudiation - correct answer -All of the above Why do you need to be aware of cybersecurity? A To uphold all elements of the National Industrial Security Program Operating Manual B To appropriately manage risk by mitigating threats and vulnerabilities C To examine your own actions and activities to uphold personal accountability D To ensure all appropriate measures are taken to protect a place and ensure only people with permission enter and leave it
A Authorizing Official (AO) B US Cyber Command (USCYBERCOM) C Security personnel D DoD Chief Information Officer (CIO) - correct answer -B The cybersecurity attributes are confidentiality, integrity, availability, authentication, and: A Validity B Non-repudiation C Architecture D Stability - correct answer -B True or false? Cybersecurity is important so that risk is eliminated. True False - correct answer -False Select ALL of the correct responses. What are the Risk Management Framework (RMF) steps designed to mitigate risk? A Categorize System B Select Security Controls C Implement Security Controls D Assess Security Controls - correct answer -B & C What activities occur in Step 4 of the Risk Management Framework (RMF), Assess Security Controls? A Develop, plan, and approve Security Assessment Plan B Prepare the Security Assessment Report (SAR) C Conduct remediation actions on non-compliant security controls D All of the above - correct answer -D Select ALL of the correct responses. What are all cybersecurity attributes susceptible to? A Vulnerabilities B Threats C Disclosure D Authorization - correct answer -A & B Select ALL of the correct responses. Which of the following are cybersecurity skill standards needed by security personnel? A Identify and manage all cybersecurity concepts B Explain their role in protecting DoD's information systems C Identify fundamental cybersecurity concepts that are related to the protection of classified and controlled unclassified information D Conduct assessment and evaluation of all IT systems - correct answer -B & C Which steps of the Risk Management Framework (RMF) are designed to evaluate risk? A. Assess Security Controls, Monitor Security Controls, Categorize System B. Assess Security Controls, Implement Security Controls, Authorize System C. Implement Security Controls, Monitor Security Controls, Authorize System D. Assess Security Controls, Monitor Security Controls, Authorize System - correct answer -D In which step of the Risk Management Framework (RMF) would you implement the decommissioning strategy? A. Step 3 - Implement security controls B. Step 4 - Assess security controls C. Step 5 - Authorize system D. Step 6 - Monitor security controls - correct answer -D What evolving threats are attempts by hackers to damage or destroy a computer network or system?
A. Insider Threat B. Social Media C. Cyber Attack D. Mobile Computing - correct answer -C What is the first step in the Risk Management Framework (RMF)? A. Categorize System B. Authorize System C. Implement Security Controls D. Select Security Controls E. Assess Security Controls F. Monitor Security Controls - correct answer -A Select ALL of the correct responses. What is included in the security authorization package? A Security Assessment Report (SAR) B Plan of Action and Milestones (POA&M) C Security Plan D None of the above - correct answer -A, B & C