
































Study with the several resources on Docsity
Earn points by helping other students or get them with a premium plan
Prepare for your exams
Study with the several resources on Docsity
Earn points to download
Earn points by helping other students or get them with a premium plan
Community
Ask the community for help and clear up your study doubts
Discover the best universities in your country according to Docsity users
Free resources
Download our free guides on studying techniques, anxiety management strategies, and thesis advice from Docsity tutors
SPED TEST LATEST ACTUAL EXAM QUESTIONS AND CORRECT ANSWERS FOR GUARANTEED PASS.pdf
Typology: Exams
1 / 40
This page cannot be seen from the preview
Don't miss anything!
question-Controlled positions that provide support functions to the Nuclear PRP (personal reliability program) requires this PSI type completed within 5yrs prior to assignment to the position - answer-ANACI question-Which is NOT one of the three things you must identify before conducting a risk analysis - answer-Risks question-Which is not a category of targeted violence - answer-Stealing question-Original classification authority (OCA) is delegated to a position - answer-False question-Which of the following is true about SCGs - answer-The OCA contact information can be found on the front cover of the SCG Meghan says that upon receipt of the reply to the SOR, the CAF can choose to issue a letter of Denial (LOD) to the local command. Bob says that upon receipt of the LOD package, the local command must terminate all classified access, terminate assignment to sensitive duties and update local records. - answer-Both are correct question-Original Classification process begins with Determining whether or not the - answer- information is official government information. question-M says that a SOR package describes the reasons for the proposed denial as specifically as national security and privacy consideration permit B says that an SOR package provides detailed instructions and materials that prepare the local command and the applicant for a potential due process phase - answer-Both are correct
question-All security violations involve a compromise of classified information - answer-False question-_____________ Can't grant interim clearances - answer-DoD CAF question-M says that derivative classifiers use the SCG to determine if something is classified, it's classification level. Downgrading and declassification instructions, special control notices, and other info critical to the proper classification, marking and dissemination of the items in question. B says that the SCG is a document used by the component or agency's information Security Program based on properly marked source document created by OCA's - answer-M is correct question-__________________ensures that a party in an electronic exchange can't deny their participation or the authentic city of the message. - answer-Non-repudiation question-Three levels of classification for national security information are Top Secret, secret and confidential which are delineated - answer-by E.O 13526 question-How can non us citizens gain security clearance - answer-Only US citizens gain a security clearance question-Which is not a key contract document - answer-SCG question-Who serves as a Subject matter expert (SME) for individual contracts? - answer-COR question-What agency creates the DoD destruction standard - answer-NSA question-Access of an individual with an LAA is limited only to the approved program and project - answer-True question-What are the steps of the information Security program ISP lifecycle - answer- Classification, safeguarding, dissemination, declassification and destruction
question-Which wrapping must identify the highest classification level of the information the package contains? - answer-Inner wrapping question-Who provides industry with the contract and contract specific security classification guidance? - answer-GCA question-Required markings for derivatively classified documents include - answer-Page markings question-The FSO sends the competed SF 86 to the_______________ for processing - answer- PSMO question-What is described as the integration of physical security measures for the protection of national security and other DoD assets as accomplished through the application of active and passive complementary security controls. - answer-Security in- depth question-Which step in the RMF process does not evaluate risk - answer-Select security controls question-What is the main purpose of the Risk management process - answer-To determine where and how to allocate security resources question-What is posted at the boundary of each restricted area? - answer-Warning signs question-M says that sensitivity of the positions most important duty determines its position sensitivity B says that a position may be designated as critical sensitive even though the position does not have any requirement for accessing classified information - answer-Both are correct question-Contractors may make interim determinations for subcontractors - answer-False
question-Which policy is titled "counterintelligence awareness and reporting (CIAR) - answer- DODD 5240. question-PSI records must be double wrapped if they are going to be mailed or transported - answer-True question-At minimum. Lock and key control procedures should include - answer-Key/log register question-Who is the final authority to designate agencies to conduct investigations of person who are proposed for national security eligibility - answer-DNI question-Which is not part of the FSO role? - answer-Established and maintain the Insider Threat program question-The insider threat program senior official ITPSO is a____________ position - answer- Industry question-The initial determination that an employee requires a PCL is generally made by the - answer-PM question-Which is untrue about adjudication? - answer-Adjudication is the DoD standard procedure for collecting information about an individual's background, activities, and personal behavior for the purpose of making a personnel security decision. question-Which is not a physical security countermeasure? - answer-Doors question-A security infraction occurs when - answer-Any knowing, willful or negligent action contradicts EO 13526, but does not compromise classified question-Which is not one of the four Cognizant Security Agencies (CSAs)? - answer- Department of State
question-The determination of an individual's trustworthiness for a position that does not require access to classified information is an example - answer-An adjudicative decision question-OCAs are given specific area of jurisdiction - answer-True question-Which is not a step in the Risk Management Framework - answer-Detect security controls question-Which Arms, ammunition and Explosive (AA&E) Security Risk category (SRC) indicates the highest level of risk? - answer-SRC 1 question-Unauthorized release of PSI records is violation of the Privacy Act of 1974 - answer- True question-Classifying information M says original classification refers to the initial determination that information requires protection against unauthorized disclosure in the interest of the US national security B says that original classification entails the use of a 6 step process that results in the information custodian making a classification determination - answer-M is correct question-A security clearance guarantees that any individual will be granted access to classified - answer-False question-Who prepares the Security Assessment Report (SAR) - answer-SCA question-Permitting unauthorized individuals to look over your shoulder at your computer screen while you have confidential data displayed is considered a breach of - answer-Confidentiality question-What level of classification does Restricted data fall under? - answer-TS or Secret
question-What are the security objectives utilized in RMF for the categorization of information systems? - answer-Confidentiality, integrity, availability. question-A security infraction, compared to a security violation does not place classified information at risk. - answer-False question-Which of the following is a true statement regarding the special handling requirements of Foreign Government Information (FGI) - answer-A U.S. document question-Two security professionals - Paul and Ashley - are discussing the destruction of classified information. Paul says the destruction of classified documents and material shall be accomplished by means that eliminate risk of reconstruction of the classified information they contain. Ashley says the material that has been identified for destruction shall continue to be protected, as appropriate, for its classification until it is actually destroyed. Who is correct? - answer-Paul and Ashley are both correct question-A paragraph of a document which includes an "(N)" as part of the portion marking indicates what specific type of classified information is contained in the paragraph? - answer-The additional (N) in the portion marking
question-The inability to deny you are the sender of an email would be an indication of a lapse in:** - answer-Non-Repudiation question-Unauthorized disclosure and loss of privacy is a lapse in:** - answer-Confidentiality question-Which of the following is the first action done to downgrade, declassify or remove classification markings? - answer-Through the appropriate chain of command, contact the original classification authority (OCA) to confirm that information does not have an extended classification period. question-All of the following are requirements to perform classified activities from non-traditional locations (e.g., the employees home), EXCEPT: - answer-The employee must have an office space that meets requirements comparable to the Sensitive Compartmented Information Facility (SCIF). question-What Policy governs Cybersecurity? - answer-DODI 8500. question-DOD participates in __________ and __________ as a vested stakeholder to create a more standardized approach to Cybersecurity. - answer-CNSS and NIST question-What factors do organizations need to take into account when implementing a holistic approach to organizational risk management? - answer-Supporting Information Systems Relationships between mission/business process Strategic Goals and Objectives All the above
question-What broad groups does DOD use to categorize information technology? - answer- Information Systems PIT IT Services IT Products question-PIT systems refer to: - answer-platform information technology question-What is the last step in the RMF Process? - answer-Monitor step question-To which step do the following tasks belong: Information Types System Registration Asset Identification System Stakeholders - answer-Prepare step question-In what Step does the system disposal strategy developed and implemented as needed?
classified information that imposes safeguarding and access requirements that exceed those normally required for information at the same classification level. question-Enhanced security requirements for protecting Special Access Program (SAP) information - answer-Within Personnel Security:
defense-related goods, services, and technologies as administered by the Director, Defense Technology Security Administration (DTSA).
S - serious damage to national security C - damage to national security question-Single Scope Background Investigation (SSBI) - answer-For military, contractors, and civilians: · Critical/Special-Sensitive · TS, "Q" info, war-related plans, policymaking, revenue and funds, SCI, SAPs · Equivalent to Tier 5 question-Access National Agency Check with Inquiries (ANACI) - answer-For civilians: · Noncritical-Sensitive positions · Confidential/Secret, "L" info, systems containing PII · Equivalent to Tier 3 question-National Agency Check with Local Agency and Credit Check (NACLC) - answer-For military and contractors: · Noncritical-Sensitive · Confidential/Secret clearance eligibility · Equivalent to Tier 3 question-NACI - answer-National Agency Check with Inquiries for civilians and contractors: · Non-Sensitive positions · Low Risk · HSPD-12 Credentialing question-National Agency Check (NAC) - answer-The fingerprint portion of personnel security investigation (PSI) question-The purpose of due process in
determination of an individual's integrity, loyalty, and trustworthiness by examining them against the 13 adjudicative guidelines. question-T/F: Non U.S. citizens are restricted from gaining access to classified. - answer-False. While non-U.S. citizens are restricted from receiving security clearances, they can gain limited access to classified information through a Limited Access Authorization (LAA). Only goes up to Secret level (NOT TOP SECRET). question-T/F: Non-US citizens are restricted from receiving security clearances. - answer-True. question-T/F: An individual must have a need for regular access to classified or sensitive information to establish a need for a security clearance. - answer-True. question-T/F: Ease of movement within a facility is an acceptable justification for obtaining a security clearance. - answer-False. Seeking ease of movement is not an acceptable justification for obtaining a security clearance. question-DoD position sensitivity types - answer-1. Critical/Special Sensitive--> TS
question-Denial - answer-Initial request for security clearance eligibility is not granted question-What is the purpose of the Statement of Reasons (SOR)? - answer-Provide comprehensive and detailed written explanation of why preliminary unfavorable adjudicative determination was made. Can be appealed! question-The 13 Adjudicative Guidelines - answer-1. Allegiance to United States