Docsity
Docsity

Prepare for your exams
Prepare for your exams

Study with the several resources on Docsity


Earn points to download
Earn points to download

Earn points by helping other students or get them with a premium plan


Guidelines and tips
Guidelines and tips

SPED TEST LATEST ACTUAL EXAM QUESTIONS AND CORRECT ANSWERS FOR GUARANTEED PASS.pdf, Exams of Medicine

SPED TEST LATEST ACTUAL EXAM QUESTIONS AND CORRECT ANSWERS FOR GUARANTEED PASS.pdf

Typology: Exams

2024/2025

Available from 07/08/2025

samuel-tutor
samuel-tutor 🇺🇸

85 documents

1 / 40

Toggle sidebar

This page cannot be seen from the preview

Don't miss anything!

bg1
SPED TEST LATEST ACTUAL EXAM
QUESTIONS AND CORRECT ANSWERS
FOR GUARANTEED PASS
question-Controlled positions that provide support functions to the Nuclear PRP (personal
reliability program) requires this PSI type completed within 5yrs prior to assignment to the
position - answer-ANACI
question-Which is NOT one of the three things you must identify before conducting a risk
analysis - answer-Risks
question-Which is not a category of targeted violence - answer-Stealing
question-Original classification authority (OCA) is delegated to a position - answer-False
question-Which of the following is true about SCGs - answer-The OCA contact information can
be found on the front cover of the SCG
Meghan says that upon receipt of the reply to the SOR, the CAF can choose to issue a letter of
Denial (LOD) to the local command.
Bob says that upon receipt of the LOD package, the local command must terminate all classified
access, terminate assignment to sensitive duties and update local records. - answer-Both are
correct
question-Original Classification process begins with Determining whether or not the - answer-
information is official government information.
question-M says that a SOR package describes the reasons for the proposed denial as specifically
as national security and privacy consideration permit
B says that an SOR package provides detailed instructions and materials that prepare the local
command and the applicant for a potential due process phase - answer-Both are correct
pf3
pf4
pf5
pf8
pf9
pfa
pfd
pfe
pff
pf12
pf13
pf14
pf15
pf16
pf17
pf18
pf19
pf1a
pf1b
pf1c
pf1d
pf1e
pf1f
pf20
pf21
pf22
pf23
pf24
pf25
pf26
pf27
pf28

Partial preview of the text

Download SPED TEST LATEST ACTUAL EXAM QUESTIONS AND CORRECT ANSWERS FOR GUARANTEED PASS.pdf and more Exams Medicine in PDF only on Docsity!

SPED TEST LATEST ACTUAL EXAM

QUESTIONS AND CORRECT ANSWERS

FOR GUARANTEED PASS

question-Controlled positions that provide support functions to the Nuclear PRP (personal reliability program) requires this PSI type completed within 5yrs prior to assignment to the position - answer-ANACI question-Which is NOT one of the three things you must identify before conducting a risk analysis - answer-Risks question-Which is not a category of targeted violence - answer-Stealing question-Original classification authority (OCA) is delegated to a position - answer-False question-Which of the following is true about SCGs - answer-The OCA contact information can be found on the front cover of the SCG Meghan says that upon receipt of the reply to the SOR, the CAF can choose to issue a letter of Denial (LOD) to the local command. Bob says that upon receipt of the LOD package, the local command must terminate all classified access, terminate assignment to sensitive duties and update local records. - answer-Both are correct question-Original Classification process begins with Determining whether or not the - answer- information is official government information. question-M says that a SOR package describes the reasons for the proposed denial as specifically as national security and privacy consideration permit B says that an SOR package provides detailed instructions and materials that prepare the local command and the applicant for a potential due process phase - answer-Both are correct

question-All security violations involve a compromise of classified information - answer-False question-_____________ Can't grant interim clearances - answer-DoD CAF question-M says that derivative classifiers use the SCG to determine if something is classified, it's classification level. Downgrading and declassification instructions, special control notices, and other info critical to the proper classification, marking and dissemination of the items in question. B says that the SCG is a document used by the component or agency's information Security Program based on properly marked source document created by OCA's - answer-M is correct question-__________________ensures that a party in an electronic exchange can't deny their participation or the authentic city of the message. - answer-Non-repudiation question-Three levels of classification for national security information are Top Secret, secret and confidential which are delineated - answer-by E.O 13526 question-How can non us citizens gain security clearance - answer-Only US citizens gain a security clearance question-Which is not a key contract document - answer-SCG question-Who serves as a Subject matter expert (SME) for individual contracts? - answer-COR question-What agency creates the DoD destruction standard - answer-NSA question-Access of an individual with an LAA is limited only to the approved program and project - answer-True question-What are the steps of the information Security program ISP lifecycle - answer- Classification, safeguarding, dissemination, declassification and destruction

question-Which wrapping must identify the highest classification level of the information the package contains? - answer-Inner wrapping question-Who provides industry with the contract and contract specific security classification guidance? - answer-GCA question-Required markings for derivatively classified documents include - answer-Page markings question-The FSO sends the competed SF 86 to the_______________ for processing - answer- PSMO question-What is described as the integration of physical security measures for the protection of national security and other DoD assets as accomplished through the application of active and passive complementary security controls. - answer-Security in- depth question-Which step in the RMF process does not evaluate risk - answer-Select security controls question-What is the main purpose of the Risk management process - answer-To determine where and how to allocate security resources question-What is posted at the boundary of each restricted area? - answer-Warning signs question-M says that sensitivity of the positions most important duty determines its position sensitivity B says that a position may be designated as critical sensitive even though the position does not have any requirement for accessing classified information - answer-Both are correct question-Contractors may make interim determinations for subcontractors - answer-False

question-Which policy is titled "counterintelligence awareness and reporting (CIAR) - answer- DODD 5240. question-PSI records must be double wrapped if they are going to be mailed or transported - answer-True question-At minimum. Lock and key control procedures should include - answer-Key/log register question-Who is the final authority to designate agencies to conduct investigations of person who are proposed for national security eligibility - answer-DNI question-Which is not part of the FSO role? - answer-Established and maintain the Insider Threat program question-The insider threat program senior official ITPSO is a____________ position - answer- Industry question-The initial determination that an employee requires a PCL is generally made by the - answer-PM question-Which is untrue about adjudication? - answer-Adjudication is the DoD standard procedure for collecting information about an individual's background, activities, and personal behavior for the purpose of making a personnel security decision. question-Which is not a physical security countermeasure? - answer-Doors question-A security infraction occurs when - answer-Any knowing, willful or negligent action contradicts EO 13526, but does not compromise classified question-Which is not one of the four Cognizant Security Agencies (CSAs)? - answer- Department of State

question-The determination of an individual's trustworthiness for a position that does not require access to classified information is an example - answer-An adjudicative decision question-OCAs are given specific area of jurisdiction - answer-True question-Which is not a step in the Risk Management Framework - answer-Detect security controls question-Which Arms, ammunition and Explosive (AA&E) Security Risk category (SRC) indicates the highest level of risk? - answer-SRC 1 question-Unauthorized release of PSI records is violation of the Privacy Act of 1974 - answer- True question-Classifying information M says original classification refers to the initial determination that information requires protection against unauthorized disclosure in the interest of the US national security B says that original classification entails the use of a 6 step process that results in the information custodian making a classification determination - answer-M is correct question-A security clearance guarantees that any individual will be granted access to classified - answer-False question-Who prepares the Security Assessment Report (SAR) - answer-SCA question-Permitting unauthorized individuals to look over your shoulder at your computer screen while you have confidential data displayed is considered a breach of - answer-Confidentiality question-What level of classification does Restricted data fall under? - answer-TS or Secret

question-What are the security objectives utilized in RMF for the categorization of information systems? - answer-Confidentiality, integrity, availability. question-A security infraction, compared to a security violation does not place classified information at risk. - answer-False question-Which of the following is a true statement regarding the special handling requirements of Foreign Government Information (FGI) - answer-A U.S. document question-Two security professionals - Paul and Ashley - are discussing the destruction of classified information. Paul says the destruction of classified documents and material shall be accomplished by means that eliminate risk of reconstruction of the classified information they contain. Ashley says the material that has been identified for destruction shall continue to be protected, as appropriate, for its classification until it is actually destroyed. Who is correct? - answer-Paul and Ashley are both correct question-A paragraph of a document which includes an "(N)" as part of the portion marking indicates what specific type of classified information is contained in the paragraph? - answer-The additional (N) in the portion marking

question-The inability to deny you are the sender of an email would be an indication of a lapse in:** - answer-Non-Repudiation question-Unauthorized disclosure and loss of privacy is a lapse in:** - answer-Confidentiality question-Which of the following is the first action done to downgrade, declassify or remove classification markings? - answer-Through the appropriate chain of command, contact the original classification authority (OCA) to confirm that information does not have an extended classification period. question-All of the following are requirements to perform classified activities from non-traditional locations (e.g., the employees home), EXCEPT: - answer-The employee must have an office space that meets requirements comparable to the Sensitive Compartmented Information Facility (SCIF). question-What Policy governs Cybersecurity? - answer-DODI 8500. question-DOD participates in __________ and __________ as a vested stakeholder to create a more standardized approach to Cybersecurity. - answer-CNSS and NIST question-What factors do organizations need to take into account when implementing a holistic approach to organizational risk management? - answer-Supporting Information Systems Relationships between mission/business process Strategic Goals and Objectives All the above

question-What broad groups does DOD use to categorize information technology? - answer- Information Systems PIT IT Services IT Products question-PIT systems refer to: - answer-platform information technology question-What is the last step in the RMF Process? - answer-Monitor step question-To which step do the following tasks belong: Information Types System Registration Asset Identification System Stakeholders - answer-Prepare step question-In what Step does the system disposal strategy developed and implemented as needed?

  • answer-Monitor Step Indicators of insider threats - answer-1. Failure to report overseas travel or contact with foreign nationals
  1. Seeking to gain higher clearance or expand access outside job scope
  2. Engaging in classified conversations without NTK
  3. Working inconsistent hours
  4. Exploitable behavior traits
  5. Repeated security violations
  6. Unexplainable affluence/living above one's means
  7. Illegal downloads of information/files question-Elements that should be considered in identifying Critical Program

classified information that imposes safeguarding and access requirements that exceed those normally required for information at the same classification level. question-Enhanced security requirements for protecting Special Access Program (SAP) information - answer-Within Personnel Security:

  • Access Rosters;
  • Billet Structures (if required);
  • Indoctrination Agreement;
  • Clearance based on appropriate investigation completed within last 5/ years;
  • Individual must materially contribute to program and have need to know (NTK);
  • SAP personnel subject to random counterintelligence scope polygraph;
  • Polygraph examination, if approved by the DepSecDef, may be used as a mandatory access determination;
  • Tier review process;
  • Personnel must have Secret or TS clearance;
  • SF-86 must be current within one year;
  • Limited Access;
  • Waivers required for foreign cohabitants, spouses, and immediate family members. Within Industrial Security: The SecDef or DepSecDef can approve carve-out provision to relieve Defense Security Service of industrial security oversight responsibilities. Within Physical Security:
  • Access Control;
  • Maintain SAP Facility;
  • Access Roster;
  • All SAPs must have unclassified nickname/ Codeword (optional). Within Information Security:
  • The use of HVSACO;
  • Transmission requirements (order of precedence). question-Responsibilities of the Government SAP Security Officer/Contractor Program Security Officer (GSSO/ CPSO) - answer-• Possess personnel clearance and Program access at least equal to highest level of Program classified information involved.
  • Provide security administration and management for organization.
  • Ensure personnel processed for access to SAP meet prerequisite personnel clearance and/or investigative requirements specified.
  • Ensure adequate secure storage and work spaces.
  • Ensure strict adherence to the provisions of NISPOM, its supplement, and the Overprint.
  • When required, establish and oversee classified material control program for each SAP.
  • When required, conduct an annual inventory of accountable classified material.
  • When required, establish SAPF.
  • Establish and oversee visitor control program.
  • Monitor reproduction/duplication/destruction capability of SAP information
  • Ensure adherence to special communications capabilities within SAPF.
  • Provide for initial Program indoctrination of employees after access is approved; rebrief and debrief personnel
  • Establish and oversee specialized procedures for transmission of SAP material to and from Program elements
  • When required, ensure contractual specific security requirements are accomplished.
  • Establish security training and briefings specifically tailored to unique requirements of SAP. question-The five Cognizant Security Agencies (CSAs) - answer-Department of Defense (DoD), Director of National Intelligence (DNI), Department of Energy (DoE), Department of Homeland Security (DHS) and the Nuclear Regulatory Commission (NRC).

defense-related goods, services, and technologies as administered by the Director, Defense Technology Security Administration (DTSA).

  1. Formulation of export control proposals and export license review question-Security Infraction - answer-Failure to comply with security requirements which cannot reasonably be expected to and does not result in loss, compromise, or suspected compromise of classified information question-DoD Manual 5200.01, Volumes 1- 3 - answer-Manual that governs DoD Information Security Program question-DoDI 5200.01 - answer-Authorizes the publication of DoDM 5200.01 Vol 1-3, the DoD Information Security Program question-E.O. 13526 - answer-Executive order that governs DoD Information Security Program question-ISOO 32 CFR Parts 2001 & 2003, "Classified National Security Information; Final Rule" - answer-Provides guidance to all government agencies on classification, downgrading, declassification, and safeguarding of classified national security information question-Security Violation - answer-Knowing, willful, or negligent action that results in or could be expected to result in loss, suspected compromise, or compromise of classified information question-Unauthorized Disclosure - answer-Communication or physical transfer of classified or controlled unclassified information (CUI) to unauthorized recipient question-Three classification levels - answer-TS - grave damage to national security

S - serious damage to national security C - damage to national security question-Single Scope Background Investigation (SSBI) - answer-For military, contractors, and civilians: · Critical/Special-Sensitive · TS, "Q" info, war-related plans, policymaking, revenue and funds, SCI, SAPs · Equivalent to Tier 5 question-Access National Agency Check with Inquiries (ANACI) - answer-For civilians: · Noncritical-Sensitive positions · Confidential/Secret, "L" info, systems containing PII · Equivalent to Tier 3 question-National Agency Check with Local Agency and Credit Check (NACLC) - answer-For military and contractors: · Noncritical-Sensitive · Confidential/Secret clearance eligibility · Equivalent to Tier 3 question-NACI - answer-National Agency Check with Inquiries for civilians and contractors: · Non-Sensitive positions · Low Risk · HSPD-12 Credentialing question-National Agency Check (NAC) - answer-The fingerprint portion of personnel security investigation (PSI) question-The purpose of due process in

determination of an individual's integrity, loyalty, and trustworthiness by examining them against the 13 adjudicative guidelines. question-T/F: Non U.S. citizens are restricted from gaining access to classified. - answer-False. While non-U.S. citizens are restricted from receiving security clearances, they can gain limited access to classified information through a Limited Access Authorization (LAA). Only goes up to Secret level (NOT TOP SECRET). question-T/F: Non-US citizens are restricted from receiving security clearances. - answer-True. question-T/F: An individual must have a need for regular access to classified or sensitive information to establish a need for a security clearance. - answer-True. question-T/F: Ease of movement within a facility is an acceptable justification for obtaining a security clearance. - answer-False. Seeking ease of movement is not an acceptable justification for obtaining a security clearance. question-DoD position sensitivity types - answer-1. Critical/Special Sensitive--> TS

  1. Non-Critical Sensitive--> Confidential and Secret
  2. Non-Sensitive--> not national security positions question-T/F: Civilians in non-sensitive positions may receive security clearances. - answer- False. Only individuals in sensitive positions receive security clearances. question-Investigative requirement for a Critical/Special-Sensitive position - answer-Single scope background investigation (SSBI aka T5), SSBI-PR (T5R), or PPR question-Investigative requirement for a Non-Critical Sensitive position - answer-ANACI or NACLC (T3) question-Revocation - answer-When current security clearance eligibility determination is rescinded

question-Denial - answer-Initial request for security clearance eligibility is not granted question-What is the purpose of the Statement of Reasons (SOR)? - answer-Provide comprehensive and detailed written explanation of why preliminary unfavorable adjudicative determination was made. Can be appealed! question-The 13 Adjudicative Guidelines - answer-1. Allegiance to United States

  1. Foreign Influence
  2. Foreign Preference
  3. Sexual Behavior
  4. Personal Conduct
  5. Financial Considerations
  6. Alcohol Consumption
  7. Drug Involvement
  8. Psychological Conditions
  9. Criminal Conduct
  10. Handling Protected Information
  11. Outside Activities
  12. Use of Information Technology Systems question-Categories of approved classified material storage locations - answer-Storage Containers
  13. Security containers (e.g., field safes, cabinets)
  14. Vaults (including modular vaults)
  15. Open storage area (secure area/secure room) Storage Facilities
  16. SCIF (SCI information)
  17. AA&E storage facility (arms, ammunition, and explosives)