Docsity
Docsity

Prepare for your exams
Prepare for your exams

Study with the several resources on Docsity


Earn points to download
Earn points to download

Earn points by helping other students or get them with a premium plan


Guidelines and tips
Guidelines and tips

SFPC TEST ACTUAL EXAM-WITH 100% VERIFIED SOLUTIONS 2024/2025, Exams of International Law

A study guide for the SFPC (Security Fundamentals Professional Certification) exam, covering classified information, security clearances, information assurance, and security program areas. It provides detailed guidance on handling and protecting classified data, and discusses the roles of security professionals. Suitable for individuals with security clearances or involved in security program management within the DoD or related organizations.

Typology: Exams

2024/2025

Available from 10/24/2024

Exemplary
Exemplary šŸ‡ŗšŸ‡ø

3.7

(3)

232 documents

1 / 25

Toggle sidebar

This page cannot be seen from the preview

Don't miss anything!

bg1
SFPC TEST ACTUAL EXAM-WITH
100% VERIFIED SOLUTIONS
2024/2025
What specifies classification levels, special requirements, and declassification
instructions for classified programs, projects, and plans?
Security Classification Guide
Which of the following is a true statement regarding the special handling
requirements of Foreign Government Information (FGI)?
A)
When the classification marking on a document containing FGI is not in English, or
when the foreign government marking requires a different degree of protection than
the same U.S. classification designation, a U.S. marking that results in a degree of
protection equivalent to that required by the foreign government shall be applied.
B)
A U.S. document containing FGI cannot be declassified or downgraded below the
highest level of FGI contained in the document without the permission of the foreign
government or international organization that originated the information.
C)
Those holding security clearances issued by the U.S. government cannot access
U.S. documents containing FGI without written consent from the originating foreign
government.
D)
The receiving DoD Components must maintain records for 1 year of the receipt,
internal distribution, destruction, annual inventory, access, reproduction, and
transmittal of foreign government Top Secret information.
B) A U.S. document containing FGI cannot be declassified or downgraded below the
highest level of FGI contained in the document without the permission of the foreign
government or international organization that originated the information.
Two security professionals - Paul and Ashley - are discussing the destruction of
classified information. Paul says the destruction of classified documents and material
shall be accomplished by means that eliminate risk of reconstruction of the classified
information they contain. Ashley says the material that has been identified for
destruction shall continue to be protected, as appropriate, for its classification until it
is actually destroyed. Who is correct?
Paul and Ashley are both correct.
pf3
pf4
pf5
pf8
pf9
pfa
pfd
pfe
pff
pf12
pf13
pf14
pf15
pf16
pf17
pf18
pf19

Partial preview of the text

Download SFPC TEST ACTUAL EXAM-WITH 100% VERIFIED SOLUTIONS 2024/2025 and more Exams International Law in PDF only on Docsity!

SFPC TEST ACTUAL EXAM-WITH

100% VERIFIED SOLUTIONS

What specifies classification levels, special requirements, and declassification instructions for classified programs, projects, and plans? Security Classification Guide Which of the following is a true statement regarding the special handling requirements of Foreign Government Information (FGI)? A) When the classification marking on a document containing FGI is not in English, or when the foreign government marking requires a different degree of protection than the same U.S. classification designation, a U.S. marking that results in a degree of protection equivalent to that required by the foreign government shall be applied. B) A U.S. document containing FGI cannot be declassified or downgraded below the highest level of FGI contained in the document without the permission of the foreign government or international organization that originated the information. C) Those holding security clearances issued by the U.S. government cannot access U.S. documents containing FGI without written consent from the originating foreign government. D) The receiving DoD Components must maintain records for 1 year of the receipt, internal distribution, destruction, annual inventory, access, reproduction, and transmittal of foreign government Top Secret information. B) A U.S. document containing FGI cannot be declassified or downgraded below the highest level of FGI contained in the document without the permission of the foreign government or international organization that originated the information. Two security professionals - Paul and Ashley - are discussing the destruction of classified information. Paul says the destruction of classified documents and material shall be accomplished by means that eliminate risk of reconstruction of the classified information they contain. Ashley says the material that has been identified for destruction shall continue to be protected, as appropriate, for its classification until it is actually destroyed. Who is correct? Paul and Ashley are both correct.

A paragraph of a document which includes an "(N)" as part of the portion marking indicates what specific type of classified information is contained in the paragraph? Critical Nuclear Weapons Design Information (CNWDI) What are the investigative and briefing requirements for access to NATO information? Favorably adjudicated background investigation (T3 (10-year scope) T5 within 5 years prior to assignment), and completed a NATO Briefing. According to E.O. 13556, which is considered a type of controlled unclassified information?

  • Communications Security (COMSEC) Information
  • Declassified Information
  • Law Enforcement Sensitive (LES) Information
  • North Atlantic Treaty Organization (NATO) Information Law Enforcement Sensitive Information What is the purpose of marking classified materials? To alert holders to the presence of classified information, how to properly protect it, and for how long. What is included in the markings of classified information? Document holder as the sole authority to make transfer and dissemination determinations. What is the purpose of the Controlled Access Program Coordination (CAPCO) register? To identify the official classification and control markings, and their authorized abbreviations and portion markings.

Unauthorized disclosure and loss of privacy is a lapse in what? Confidentiality What is the first action done to downgrade, declassify or remove classification markings? Contact the Original Classification Authority through the appropriate chain of command to confirm that the information does not have an extended classification period. What are some requirements to perform classified activities from a non-traditional location? (e.g. the employee's home) Employee must be trained to properly operate classified information systems, on the protection and storage of classified information, and Communications Security (COMSEC) materials. The employee must receive written approval for use of classified information and equipment at home. What is the purpose of the Personnel Security Program? To ensure that only loyal, trustworthy, and reliable individuals may access classified information or perform sensitive duties. DoD reciprocally accepts existing national security eligibility determinations or clearances from other Government agencies in accordance with which policy document?

Executive Order 13467, "Reforming Processes Related to Suitability for Government Employment, Fitness for Contractor Employees, and Eligibility for Access to Classified National Security Information" Review of Tier 5 on an individual disclosed that the subject had been a member of an anarchist organization dedicated to disestablishing existing Federal laws and overthrowing the U.S. government by any means necessary, including violence. Although the subject terminated his membership with the organization upon learning he would be investigated for a clearance for his new position, he still maintains social contact with several members of the anarchist organization. Based on this information, which of the adjudicative guidelines is most appropriate for an adjudicator to apply to the case? Allegiance to the United States Which of the following is an element of the Personnel Security Program?

  • Risk Assessment and Analysis
  • Implementation
  • Classification
  • Continuous Vetting Continuous Vetting (Formerly Continuous Evaluation) Limited access to classified information for specific programs may be approved for non-US citizens only if the following condition is met. The prior ten years of the subject's life can be appropriately investigated. What is the investigative requirement for access to Single Integrated Operational Plan - Extremely Sensitive Information (SIOP-ESI)?

Copies of personnel security investigative reports must be destroyed by DoD recipient organizations, within how many days following completion of the necessary personnel security determination? 90 Days What level(s) of access may be granted with Limited Access Authorization for non- U.S. citizens? LAAs shall only be granted access at the Secret and Confidential Levels Which of the following is not considered when making a security clearance eligibility determination? Education Level Alcohol Consumption Financial Considerations Psychological Conditions Education Level A position that does not require eligibility for access to classified information, but having the potential to cause significant or serious damage to national security may be designated as what position sensitivity? noncritical sensitive What information must be included in a Statement of Reasons (SOR)? Why an unfavorable national security eligibility determination is being proposed.

Explain each security concern and state the specific facts that trigger each security concern. Identify all applicable adjudicative guidelines for each concern, and provide the disqualifying conditions and mitigating conditions for each guideline. Which type of briefing is used to obtain confirmation that a cleared employee agrees never to disclose classified information to an unauthorized person? Special Briefings - Non-Disclosure What is the security system performance goal of immediate indication of deliberate attempts, security probing and warning for inadvertent or mistaken intention is an example of which system security capability? Deterrence Two security professionals - Paul and Ashley - are discussing secure rooms, containers, and vaults. Paul says weapons or sensitive items such as funds, jewels, or precious metals should not be stored in the same security container as classified information. Ashley says the General Service Administration approves security containers used to store classified information. Who is correct? Both are correct. Which of the following is not a distinct phase of the Intrusion Detection System?

  • Detection
  • Control
  • Assessment
  • Response Control

When a Terrorism Threat Level is escalated from LOW to MODERATE, a DoD Component Head should employ which of the following countermeasures?

  • Cease all flying except for specifically authorized operational sorties.
  • Direct the execution of advance site reviews to facilitate the antiterrorism planning process.
  • Encourage dependent family members to complete Level I Antiterrorism Awareness Training before any travel outside the continental United States (OCONUS).
  • Conduct an immediate Terrorism Vulnerability Assessment for off-installation housing, schools, daycare centers, transportation. Encourage dependent family members to complete Level I Antiterrorism Awareness Training before any travel outside the continental United States (OCONUS). What information must a request to authorize disclosure of classified information during a visit include? Explanation of the government purpose to perform when disclosing classified information. The subject of the meeting, scope of classified topics, and classification level. The main content of the invitation to send to the participants. Two security professionals - Paul and Ashley - are discussing the security procedures for visits and meetings. Paul says visits must serve a specific U.S. Government purpose. Ashley says DoD Components should, as a minimum, establish procedures that include verification of the identity, personnel security clearance, access (if appropriate), and need-to-know for all visitors. Who is correct? Paul is correct. Executive Order 12829, signed in January 1993, mandated that which entity be responsible for implementing and monitoring the National Industrial Security Program (NISP)?

The National Security Council shall provide overall policy direction for the NISP, but the Director of the Information Security Oversight Office (ISOO) (in consultation with the National Security Advisor) is responsible for implementation and monitoring. What is the role of the government contracting activity (GCA), or cleared prime contractor, when a contractor that does not have a Facility Clearance (FCL) wants to bid on a Request for Proposal (RFP) that requires access to classified information? The GCA must sponsor the contractor for a facility security clearance by submitting a sponsorship request to DSS, which initiates the facility clearance process. What is the purpose of the Federal Acquisition Regulations (FAR)? To codify and publish uniform policies and procedures for acquisition by all executive agencies. What is the briefing given when an individual's employment is terminated, clearance eligibility is withdrawn, or if the individual will be absent from duty for more than 60 days. Termination Briefing Which executive order governs the DoD Information Security Program? E.O. 13526 What is the ISOO document that governs the DoD Information Security Program? 32 CFR Parts 2001 & 2003, "Classified National Security Information; Final Rule"

What is the declassification system where information exempted from automatic declassification is reviewed for possible declassification? Systematic Declassification Review What is the declassification system where Permanently Valuable Historical records are declassified when they are 25 years old? Automatic Declassification What is the declassification system where an Original Classification Authority (OCA), at the time the information is originally classified, sets a date or event for declassification? Mandatory Declassification Review What is the six step process an OCA applies in making classification determinations? Original Classification Process What are options an OCA has when determining declassification? Specific Date, Specific Event, or by the 50X1-HUM Exemption What are some examples of practices to follow when handling classified information?

  • Properly destroying preliminary drafts, worksheets, and other material after they have served their purpose.
  • Use of approved secure communication circuits for telephone conversations to discuss classified information.
  • Following proper procedures when copying classified information
  • Using security forms such as the SF 701 and SF 702. What is the SF 702? Security Container Check Sheet - Used to record the opening and closing of your security container. What is the SF 701? The Activity Security Checklist - It is intended to verify that you did not accidentally leave classified materials unsecured, as well as, to ensure the area is safe and secure. What is the term for an unauthorized disclosure of classified information? Actual Compromise What is the term for the possibility that a compromise could exist, but it is not known with certainty? Potential Compromise What must DoD personnel be careful not to do if classified information appears in the public media? Neither Confirm Nor Deny - DoD personnel must be careful not to make any statement or comment that would confirm the accuracy or verify the classified status of the information.

What method of transportation for classified information should only be utilized as a last resort? Hand Carry What is required when someone is hand carrying classified information? Written Authorization Authorization may be contained in a letter, a courier card, or other written document. What is a DD Form 2501? How long may it be issued for? Courier Authorization Card. Issued for no more than 2 years at a time. What is the proper destruction method for typewriter ribbon? Burned or Shredded What is the proper destruction method for floppy disks? Burned Overwritten Demagnetized Compromise of what type of information can significantly alter program direction, shorten combat effective life of a system, or require additional research, development, test, and evaluation resources to counter impact of loss? Critical Information

How is the level of classification of the Program Protection Plan determined? Determined based on the level of classification of its content. What is the term for the initial determination that information requires protection against unauthorized disclosure in the interest of U.S. National Security? Original Classification What takes precedence when there is a conflict between marking guidance in the source document and the Security Classification Guide (SCG)? Security Classification Guide What refers to an individual's responsibility to properly mark newly developed material consistent with the classification marking specified in authorized sources? Derivative Classification What is the DoD Cybersecurity Policy? (Select All that Apply) A. Risk Management B. Operational Resilience C. Integration and Interoperability D. Cyberspace Defense E. Performance F. Identity Assurance G. Mission Partners

processes that monitor employees for new information that could affect their security clearance eligibility status? A. Foreign Disclosure B. Information Security C. International Security D. Operations Security E. Personnel Security F. Physical Security G. Research and Technology Protection H. Information Assurance E. Personnel Security Two security professionals - Paul and Ashley - are discussing security program areas. Paul says that Information Security practitioners train and/or advise Original Classification Authorities in the application of the process for making classification determinations. Ashley says that Physical Security practitioners work with a facility's Antiterrorism Officer to deploy defensive measures designed to reduce the facility's vulnerability from terrorist attacks. Who is correct? A. Paul is correct B. Ashley is correct C. Paul and Ashley are both correct D. Paul and Ashley are both incorrect C. Paul and Ashley are both correct

Two security professionals - Paul and Ashley - are discussing security program areas. Paul says that Information Security practitioners work with a facility's Antiterrorism Officer to deploy defensive measures designed to reduce the facility's vulnerability from terrorist attacks. Ashley says that Personnel Security practitioners train and/or advise Original Classification Authorities in the application of the process for making classification determinations. Who is correct? A. Paul is correct B. Ashley is correct C. Paul and Ashley are both correct D. Paul and Ashley are both incorrect D. Paul and Ashley are both incorrect Which of the following is a true statement regarding the special handling requirements of Foreign Government Information (FGI)? a. When the classification marking on a document containing FGI is not in English, or when the foreign government marking requires a different degree of protection than the same U.S. classification designation, a U.S. marking that results in a degree of protection equivalent to that required by the foreign government shall be applied. b. A U.S. document containing FGI cannot be declassified or downgraded below the highest level of FGI contained in the document without the permission of the foreign government or international organization that originated the information. c. Those holding security clearances issued by the U.S. government cannot access U.S. documents containing FGI without written consent from the originating foreign government.