100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

SPēD SFPC - Study Guide 2024/2025 (questions and answers 100% Pass)

Rating
-
Sold
-
Pages
21
Grade
A+
Uploaded on
20-04-2025
Written in
2024/2025

SPēD SFPC - Study Guide 2024/2025 (questions and answers 100% Pass) /. Tier 1 investigations are conducted for positions designated as - Answer-- Low-risk, nonsensitive, and for physical and logical access; HSPD-12 credentialing - Has a basic scope of five years - Investigative form is SF-85 - Replaces NACI /.Tier 2 investigations are conducted for positions designated as - Answer-- Nonsensitive, moderate risk public trust. - Has a basic scope of five years - Investigative form is SF-85P. - Replaces the Moderate-Risk Background Investigation, or MBI. /.Tier 3 investigations are conducted for positions designated as - Answer-- Noncritical-sensitive, and/or requiring Confidential, Secret or DOE " L " access eligibility and military accessions. - Has a basic scope of five years - The investigative form is SF-86 - Replaces NACLC and ANACI /.Tier 4 investigations are conducted for positions designated as - Answer-- Nonsensitive, high-risk public trust. - Has a basic scope of five to seven years - The investigative form is SF-85P - Replaces Background Information (BI) /.Tier 5 investigations are conducted for positions designated as - Answer-- Critical-sensitive or special-sensitive and/or requiring DOE "Q" access or access to Top Secret or Sensitive Compartmented Information, or SCI. - Has a basic scope of five to seven years - The investigative form is SF-86 - Replaces Single Scope Background Investigation (SSBI) /.The Statement of Reasons (SOR) contains - Answer-- A comprehensive and detailed written explanation of the basis for the unfavorable determination. - An explanation of the subject's rights and a detailed statement explaining the intent (Letter of Intent (LOI)) to deny or revoke a security clearance eligibility by the DoD Consolidated Adjudications Facility (DoD CAF). /.The Executive Orders: E.O. 12968 establishes - Answer-A uniform federal Personnel Security Program for employees who are considered for initial or continued access to classified information /.Automated Access Control Systems (AACS) fall into three general types - Answer-- Coded device (keypad/PIN code) - Credential devices (smart card/CAC) - Biometric devices (hand geometry, fingerprint, facial recognition, iris pattern, voice verification, and retinal scanning) /.Secret classification definition - Answer-Information that could be expected to cause serious damage to the national security if unauthorized disclosure occurs. /.Confidential classification definition - Answer-Information that reasonably could be expected to cause damage to the national security if unauthorized disclosure occurs /.Top Secret classification definition - Answer-Information that reasonably could be expected to cause exceptionally grave damage to the national security if unauthorized disclosure occurs. /.Compilation - Answer-Items of information that are individually unclassified or classified at a lower level, may be classified, or classified at a higher level, only if the compiled information reveals an additional association or relationship. /.Mandatory Declassification Review (MDR) - Answer-Any individual or organization may request a declassification review of information classified pursuant E.O. 13526 /.Automatic Declassification - Answer-Historical value information which is automatically declassified if not reviewed by December 31 of the year in which they become 25 years old, unless exempt or delayed /.Systematic Declassification - Answer-Complementary program to automatic declassification. Information exempted from automatic declassification is continuously reviewed for possible declassification /.An "insider" is defined as - Answer-Any person with authorized access to DoD resources by virtue of employment, volunteer activities, or contractual relationship with DoD. This can include employees, former employees, consultants, and anyone with access /.An "insider threat" is defined as - Answer-The threat that an insider will use his or her authorized access, wittingly or unwittingly, to do harm to the security of the United States. This threat can include damage through espionage, terrorism, unauthorized disclosure of national security information, or through the loss or degradation of department resources or capabilities. /.Reports to be submitted to the FBI - Answer-Actual, probable or possible espionage, sabotage, terrorism, or subversive activities at any of their locations. /.Individual reporting obligations and requirements - Answer-- Personal Foreign Travel (even Canada) must be reported - Personal Foreign Contacts - Outside Activities (Speeches, Books, Manuscripts) - Reportable only if it is going to involve information about activities or involvement with the Intelligence Community. /.Reportable behavioral indicators - Answer-• Significant changes in personality, behavior, or work habits (being disgruntled to the point of wanting to retaliate, repeated or unrequired work outside of normal duty hours, making threats to the safety of people or property) • Substance abuse or addictive behaviors (e.g., alcohol and drug abuse/gambling) • Considerable financial change (e.g., unexplained affluence or excessive debt) • Disgruntled to the point of wanting to retaliate • Disregard for security procedures and protocols • Seeking access to classified or proprietary information and systems/technology without a "need-to-know" • Access to facilities and/or proprietary information outside

Show more Read less
Institution
SPēD SFPC
Course
SPēD SFPC










Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
SPēD SFPC
Course
SPēD SFPC

Document information

Uploaded on
April 20, 2025
Number of pages
21
Written in
2024/2025
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

SPēD SFPC - Study Guide 2024/2025 (questions and
answers 100% Pass)

/. Tier 1 investigations are conducted for positions designated as - Answer-- Low-risk,
nonsensitive, and for physical and logical access; HSPD-12 credentialing

- Has a basic scope of five years

- Investigative form is SF-85

- Replaces NACI

/.Tier 2 investigations are conducted for positions designated as - Answer--
Nonsensitive, moderate risk public trust.

- Has a basic scope of five years

- Investigative form is SF-85P.

- Replaces the Moderate-Risk Background Investigation, or MBI.

/.Tier 3 investigations are conducted for positions designated as - Answer-- Noncritical-
sensitive, and/or requiring Confidential, Secret or DOE " L " access eligibility and
military accessions.

- Has a basic scope of five years

- The investigative form is SF-86

- Replaces NACLC and ANACI

/.Tier 4 investigations are conducted for positions designated as - Answer--
Nonsensitive, high-risk public trust.

- Has a basic scope of five to seven years

- The investigative form is SF-85P

- Replaces Background Information (BI)

/.Tier 5 investigations are conducted for positions designated as - Answer-- Critical-
sensitive or special-sensitive and/or requiring DOE "Q" access or access to Top Secret
or Sensitive Compartmented Information, or SCI.

,- Has a basic scope of five to seven years

- The investigative form is SF-86

- Replaces Single Scope Background Investigation (SSBI)

/.The Statement of Reasons (SOR) contains - Answer-- A comprehensive and detailed
written explanation of the basis for the unfavorable determination.

- An explanation of the subject's rights and a detailed statement explaining the intent
(Letter of Intent (LOI)) to deny or revoke a security clearance eligibility by the DoD
Consolidated Adjudications Facility (DoD CAF).

/.The Executive Orders: E.O. 12968 establishes - Answer-A uniform federal Personnel
Security Program for employees who are considered for initial or continued access to
classified information

/.Automated Access Control Systems (AACS) fall into three general types - Answer--
Coded device (keypad/PIN code)

- Credential devices (smart card/CAC)

- Biometric devices (hand geometry, fingerprint, facial recognition, iris pattern, voice
verification, and retinal scanning)

/.Secret classification definition - Answer-Information that could be expected to cause
serious damage to the national security if unauthorized disclosure occurs.

/.Confidential classification definition - Answer-Information that reasonably could be
expected to cause damage to the national security if unauthorized disclosure occurs

/.Top Secret classification definition - Answer-Information that reasonably could be
expected to cause exceptionally grave damage to the national security if unauthorized
disclosure occurs.

/.Compilation - Answer-Items of information that are individually unclassified or
classified at a lower level, may be classified, or classified at a higher level, only if the
compiled information reveals an additional association or relationship.

/.Mandatory Declassification Review (MDR) - Answer-Any individual or organization
may request a declassification review of information classified pursuant E.O. 13526

/.Automatic Declassification - Answer-Historical value information which is automatically
declassified if not reviewed by December 31 of the year in which they become 25 years
old, unless exempt or delayed

, /.Systematic Declassification - Answer-Complementary program to automatic
declassification. Information exempted from automatic declassification is continuously
reviewed for possible declassification

/.An "insider" is defined as - Answer-Any person with authorized access to DoD
resources by virtue of employment, volunteer activities, or contractual relationship with
DoD. This can include employees, former employees, consultants, and anyone with
access

/.An "insider threat" is defined as - Answer-The threat that an insider will use his or her
authorized access, wittingly or unwittingly, to do harm to the security of the United
States. This threat can include damage through espionage, terrorism, unauthorized
disclosure of national security information, or through the loss or degradation of
department resources or capabilities.

/.Reports to be submitted to the FBI - Answer-Actual, probable or possible espionage,
sabotage, terrorism, or subversive activities at any of their locations.

/.Individual reporting obligations and requirements - Answer-- Personal Foreign Travel
(even Canada) must be reported

- Personal Foreign Contacts

- Outside Activities (Speeches, Books, Manuscripts)

- Reportable only if it is going to involve information about activities or involvement with
the Intelligence Community.

/.Reportable behavioral indicators - Answer-• Significant changes in personality,
behavior, or work habits (being disgruntled to the point of wanting to retaliate, repeated
or unrequired work outside of normal duty hours, making threats to the safety of people
or property)

• Substance abuse or addictive behaviors (e.g., alcohol and drug abuse/gambling)

• Considerable financial change (e.g., unexplained affluence or excessive debt)

• Disgruntled to the point of wanting to retaliate

• Disregard for security procedures and protocols

• Seeking access to classified or proprietary information and systems/technology
without a "need-to-know"

• Access to facilities and/or proprietary information outside of normal work hours

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
kartelodoc Harvard University
View profile
Follow You need to be logged in order to follow users or courses
Sold
118
Member since
1 year
Number of followers
4
Documents
7860
Last sold
4 days ago

Our store offers a wide selection of materials on various subjects and difficulty levels, created by experienced teachers. We specialize on NURSING,WGU,ACLS USMLE,TNCC,PMHNP,ATI and other major courses, Updated Exam, Study Guides and Test banks. If you don't find any document you are looking for in this store contact us and we will fetch it for you in minutes, we love impressing our clients with our quality work and we are very punctual on deadlines. Please go through the sets description appropriately before any purchase and leave a review after purchasing so as to make sure our customers are 100% satisfied. I WISH YOU SUCCESS IN YOUR EDUCATION JOURNEY

Read more Read less
3.2

22 reviews

5
7
4
1
3
7
2
3
1
4

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their exams and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can immediately select a different document that better matches what you need.

Pay how you prefer, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card or EFT and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions