SFPC Competency Preparatory Tools verified to pass 2023/2024
SFPC Competency Preparatory ToolsWhat is the purpose of an Antiterrorism Program? - correct answer Protect personnel, their families, installations, facilities, information, and other material resources from terrorist acts. List three indicators of insider threat. - correct answer Working hours inconsistent with job assignment or insistence on working in private. Exploitable behavior traits. Repeated security violations. Attempting to enter areas not granted access to. Unexplained affluence/living above one's means. Anomalies (taking actions which indicate they are knowledgeable of information). Illegal downloads of information/files. List three different types of threats to classified information. - correct answer Insider threat Foreign Intelligence entities Cybersecurity Threat What are three principle incidents/events required to be reported to DoD counterintelligence (CI) organizations? - correct answer Espionage Sabotage Terrorism Cyber Intrusion Identify the five essential components of cybersecurity. - correct answer Confidentiality Integrity Availability Authentication Non-repudiation List three different physical means for approved classified storage. - correct answer General Services Administration (GSA)-approved storage containers. Vaults (including modular vaults). Open storage area (secure rooms, to include sensitive compartmented information facility (SCIFs) and bulk storage areas). Describe the purpose of a Statement of Reason (SOR). - correct answer The purpose of the SOR is to provide a comprehensive and detailed written explanation of why a preliminary unfavorable adjudicative determination was made. Define security control baselines. - correct answer A set of minimum security controls defined for a low, moderate, or high impact information system. List three categories of Special Access Programs. - correct answer Acquisition Intelligence Operations and support List the key procedures for initiating Personnel Security Investigations (PSIs). - correct answer Validate the need for an investigation. Initiate e-QIP. Review Personnel Security Questionnaire (PSQ) for completeness. Submit electronically to Office of Personnel Management (OPM). Briefly describe the purpose of the DD Form 254. - correct answer Convey security requirements, security classification guidance, and provide handling procedures for classified materials received and/or generated on a classified contract. Define derivative Classification. - correct answer Incorporating, paraphrasing, restating or generating in a new form information that is already classified and marking the newly developed material consistent with the markings that apply to the source information. List three duration/length/declassification options for originally classified information. - correct answer Date or event that is: Less than 10 years At 10 years Up to 25 years 50X1-HUM (with no date or event) 50X2-WMD (with no date or event) 25X (with a date or event) What is the relationship between security control baselines and system categorization? - correct answer Security controls are implemented based on the system's categorization. Specifically, once the security category of the information system is determined, organizations begin the security control selection process, selecting the baseline security controls corresponding to the security category of the system. What must an "authorized person" have before being granted access to classified information? - correct answer Favorable determination of eligibility for access. A need to know the information. Signed SF 312 Nondisclosure Agreement. List three construction requirements for vault doors. - correct answer General Services Administration (GSA)-approved Class 5 door. Steel Door with tamper resistant hinge pins. Constructed of metal. Hung on non-removable hinge pins or with interlocking leaves. Equipped with a GSA-approved combination lock. Emergency egress hardware (deadbolt or metal bar extending across width of door). What is the purpose of intrusion detection systems? - correct answer Detect unauthorized penetration into a secured area.
Written for
- Institution
- Sfpc
- Course
- Sfpc
Document information
- Uploaded on
- December 15, 2023
- Number of pages
- 12
- Written in
- 2023/2024
- Type
- Exam (elaborations)
- Contains
- Questions & answers
Subjects
-
sfpc competency preparatory tools
Also available in package deal