answers 100% Pass)
/. Tier 1 investigations are conducted for positions designated as - Answer-- Low-risk,
nonsensitive, and for physical and logical access; HSPD-12 credentialing
- Has a basic scope of five years
- Investigative form is SF-85
- Replaces NACI
/.Tier 2 investigations are conducted for positions designated as - Answer--
Nonsensitive, moderate risk public trust.
- Has a basic scope of five years
- Investigative form is SF-85P.
- Replaces the Moderate-Risk Background Investigation, or MBI.
/.Tier 3 investigations are conducted for positions designated as - Answer-- Noncritical-
sensitive, and/or requiring Confidential, Secret or DOE " L " access eligibility and
military accessions.
- Has a basic scope of five years
- The investigative form is SF-86
- Replaces NACLC and ANACI
/.Tier 4 investigations are conducted for positions designated as - Answer--
Nonsensitive, high-risk public trust.
- Has a basic scope of five to seven years
- The investigative form is SF-85P
- Replaces Background Information (BI)
/.Tier 5 investigations are conducted for positions designated as - Answer-- Critical-
sensitive or special-sensitive and/or requiring DOE "Q" access or access to Top Secret
or Sensitive Compartmented Information, or SCI.
,- Has a basic scope of five to seven years
- The investigative form is SF-86
- Replaces Single Scope Background Investigation (SSBI)
/.The Statement of Reasons (SOR) contains - Answer-- A comprehensive and detailed
written explanation of the basis for the unfavorable determination.
- An explanation of the subject's rights and a detailed statement explaining the intent
(Letter of Intent (LOI)) to deny or revoke a security clearance eligibility by the DoD
Consolidated Adjudications Facility (DoD CAF).
/.The Executive Orders: E.O. 12968 establishes - Answer-A uniform federal Personnel
Security Program for employees who are considered for initial or continued access to
classified information
/.Automated Access Control Systems (AACS) fall into three general types - Answer--
Coded device (keypad/PIN code)
- Credential devices (smart card/CAC)
- Biometric devices (hand geometry, fingerprint, facial recognition, iris pattern, voice
verification, and retinal scanning)
/.Secret classification definition - Answer-Information that could be expected to cause
serious damage to the national security if unauthorized disclosure occurs.
/.Confidential classification definition - Answer-Information that reasonably could be
expected to cause damage to the national security if unauthorized disclosure occurs
/.Top Secret classification definition - Answer-Information that reasonably could be
expected to cause exceptionally grave damage to the national security if unauthorized
disclosure occurs.
/.Compilation - Answer-Items of information that are individually unclassified or
classified at a lower level, may be classified, or classified at a higher level, only if the
compiled information reveals an additional association or relationship.
/.Mandatory Declassification Review (MDR) - Answer-Any individual or organization
may request a declassification review of information classified pursuant E.O. 13526
/.Automatic Declassification - Answer-Historical value information which is automatically
declassified if not reviewed by December 31 of the year in which they become 25 years
old, unless exempt or delayed
, /.Systematic Declassification - Answer-Complementary program to automatic
declassification. Information exempted from automatic declassification is continuously
reviewed for possible declassification
/.An "insider" is defined as - Answer-Any person with authorized access to DoD
resources by virtue of employment, volunteer activities, or contractual relationship with
DoD. This can include employees, former employees, consultants, and anyone with
access
/.An "insider threat" is defined as - Answer-The threat that an insider will use his or her
authorized access, wittingly or unwittingly, to do harm to the security of the United
States. This threat can include damage through espionage, terrorism, unauthorized
disclosure of national security information, or through the loss or degradation of
department resources or capabilities.
/.Reports to be submitted to the FBI - Answer-Actual, probable or possible espionage,
sabotage, terrorism, or subversive activities at any of their locations.
/.Individual reporting obligations and requirements - Answer-- Personal Foreign Travel
(even Canada) must be reported
- Personal Foreign Contacts
- Outside Activities (Speeches, Books, Manuscripts)
- Reportable only if it is going to involve information about activities or involvement with
the Intelligence Community.
/.Reportable behavioral indicators - Answer-• Significant changes in personality,
behavior, or work habits (being disgruntled to the point of wanting to retaliate, repeated
or unrequired work outside of normal duty hours, making threats to the safety of people
or property)
• Substance abuse or addictive behaviors (e.g., alcohol and drug abuse/gambling)
• Considerable financial change (e.g., unexplained affluence or excessive debt)
• Disgruntled to the point of wanting to retaliate
• Disregard for security procedures and protocols
• Seeking access to classified or proprietary information and systems/technology
without a "need-to-know"
• Access to facilities and/or proprietary information outside of normal work hours