SPēD SFPC - Study Guide Questions With
Verified Answers.
Tier 1 investigations are conducted for positions designated as - answer✔- Low-risk,
nonsensitive, and for physical and logical access; HSPD-12 credentialing
- Has a basic scope of five years
- Investigative form is SF-85
- Replaces NACI
Tier 2 investigations are conducted for positions designated as - answer✔- Nonsensitive,
moderate risk public trust.
- Has a basic scope of five years
- Investigative form is SF-85P.
- Replaces the Moderate-Risk Background Investigation, or MBI.
Tier 3 investigations are conducted for positions designated as - answer✔- Noncritical-sensitive,
and/or requiring Confidential, Secret or DOE " L " access eligibility and military accessions.
- Has a basic scope of five years
- The investigative form is SF-86
, ©BRAINBARTER 2024/2025
- Replaces NACLC and ANACI
Tier 4 investigations are conducted for positions designated as - answer✔- Nonsensitive, high-
risk public trust.
- Has a basic scope of five to seven years
- The investigative form is SF-85P
- Replaces Background Information (BI)
Tier 5 investigations are conducted for positions designated as - answer✔- Critical-sensitive or
special-sensitive and/or requiring DOE "Q" access or access to Top Secret or Sensitive
Compartmented Information, or SCI.
- Has a basic scope of five to seven years
- The investigative form is SF-86
- Replaces Single Scope Background Investigation (SSBI)
The Statement of Reasons (SOR) contains - answer✔- A comprehensive and detailed written
explanation of the basis for the unfavorable determination.
- An explanation of the subject's rights and a detailed statement explaining the intent (Letter of
Intent (LOI)) to deny or revoke a security clearance eligibility by the DoD Consolidated
Adjudications Facility (DoD CAF).
The Executive Orders: E.O. 12968 establishes - answer✔A uniform federal Personnel Security
Program for employees who are considered for initial or continued access to classified
information
Automated Access Control Systems (AACS) fall into three general types - answer✔- Coded
device (keypad/PIN code)
, ©BRAINBARTER 2024/2025
- Credential devices (smart card/CAC)
- Biometric devices (hand geometry, fingerprint, facial recognition, iris pattern, voice
verification, and retinal scanning)
Secret classification definition - answer✔Information that could be expected to cause serious
damage to the national security if unauthorized disclosure occurs.
Confidential classification definition - answer✔Information that reasonably could be expected to
cause damage to the national security if unauthorized disclosure occurs
Top Secret classification definition - answer✔Information that reasonably could be expected to
cause exceptionally grave damage to the national security if unauthorized disclosure occurs.
Compilation - answer✔Items of information that are individually unclassified or classified at a
lower level, may be classified, or classified at a higher level, only if the compiled information
reveals an additional association or relationship.
Mandatory Declassification Review (MDR) - answer✔Any individual or organization may
request a declassification review of information classified pursuant E.O. 13526
Automatic Declassification - answer✔Historical value information which is automatically
declassified if not reviewed by December 31 of the year in which they become 25 years old,
unless exempt or delayed
Systematic Declassification - answer✔Complementary program to automatic declassification.
Information exempted from automatic declassification is continuously reviewed for possible
declassification
An "insider" is defined as - answer✔Any person with authorized access to DoD resources by
virtue of employment, volunteer activities, or contractual relationship with DoD. This can
include employees, former employees, consultants, and anyone with access
An "insider threat" is defined as - answer✔The threat that an insider will use his or her
authorized access, wittingly or unwittingly, to do harm to the security of the United States. This
threat can include damage through espionage, terrorism, unauthorized disclosure of national
security information, or through the loss or degradation of department resources or capabilities.
Reports to be submitted to the FBI - answer✔Actual, probable or possible espionage, sabotage,
terrorism, or subversive activities at any of their locations.