LATEST EXAM COMPLETE ACTUAL EXAM
REAL QUESTIONS AND CORRECT
ANSWERS (CORRECT VERIFIED
SOLUTIONS) NEWEST UPDATED VERSION
|GUARANTEED PASS.
True or False: There is no difference between a threat and a vulnerability. -
✔✔✔ANSWER-False. Threats and vulnerabilities are related but distinct. Threats
to national security exploit vulnerabilities.
E.O. 12968 - ✔✔✔ANSWER-The Executive Order (E.O.) that establishes a
uniform Personnel Security Program
,DoD 5200.2-R - ✔✔✔ANSWER-Implements and maintains the DoD personnel
security policies and procedures
USD(I) Memorandum, August 30, 2006 - ✔✔✔ANSWER-Defines the
Adjudicative Guidelines
Scope - ✔✔✔ANSWER-This refers to when adjudicators must ensure that an
investigation meets the minimum timeframe and element requirements before
reviewing the investigation.
Administrative Judge - ✔✔✔ANSWER-During due process, military and civilian
personnel may request an in-person appearance before this individual.
Termination Briefing - ✔✔✔ANSWER-Given employment is terminated,
clearance eligibility is withdrawn, or if individual will be absent from duty 60 days
or more. Also given to those inadvertently exposed to classified information.
Foreign Travel Briefing - ✔✔✔ANSWER-Given to cleared personnel who plan to
travel in or through foreign countries, or attend meetings attended by
representatives of other countries.
Refresher Briefing - ✔✔✔ANSWER-Presented annually to personnel who have
access to classified information or assignment to sensitive duties.
Aims of Special Access Programs (SAPs) - ✔✔✔ANSWER-1. Protect
technological breakthroughs
,2. Cover exploitation of adversary vulnerabilities
3. Protect sensitive operational plans
4. Reduce intelligence on U.S. capabilities
Protection Level - ✔✔✔ANSWER-Communicates how SAP is acknowledged and
protected
Acknowledged SAP - ✔✔✔ANSWER-Existence-openly recognized
Purpose-identified
Program details-classified
Funding-generally unclassified
Unacknowledged - ✔✔✔ANSWER-Existence-protected
Purpose-protected
Program details-classified
Funding-classified, unacknowledged, not directly linked to program
Indicators of insider threats - ✔✔✔ANSWER-1. Failure to report overseas travel
or contact with foreign nationals
2. Seeking to gain higher clearance or expand access outside job scope
3. Engaging in classified conversations without NTK
4. Working inconsistent hours
5. Exploitable behavior traits
6. Repeated security violations
, 7. Unexplainable affluence/living above one's means
8. Illegal downloads of information/files
Elements that should be considered in identifying Critical Program
Information - ✔✔✔ANSWER-Elements which if compromised could:
1. cause significant degradation in mission effectiveness,
2. shorten expected combat-effective life of system
3. reduce technological advantage
4. significantly alter program direction; or
5. enable adversary to defeat, counter, copy, or reverse engineer
technology/capability.
Elements that security professional should consider when assessing and managing
risks to DoD assets (risk management process) - ✔✔✔ANSWER-1. Assess assets
2. Assess threats
3. Assess Vulnerabilities
4. Assess risks
5. Determine countermeasure options
6. Make RM decision
The three categories of Special Access Programs - ✔✔✔ANSWER-acquisition,
intelligence, and operations & support
Types of threats to classified information - ✔✔✔ANSWER-Insider Threat, Foreign
Intelligence Entities (FIE), criminal activities, cyber threats, business competitors