Certification (SFPC) Exam 2025–2026 Accurate
Real Exam Questions and Verified Correct
Answers JUST RELEASED
The stealing of sensitive, proprietary information related to U.S. aerospace and defense
technologies with the intent to provide such information to a foreign adversary is an
example of which type of threat to DoD assets?
a. Criminal activity
b. Economic espionage
c. Treason
d. Terrorism - answer>>>B
When a Terrorism Threat Level is escalated from LOW to MODERATE, a DoD Component
Head should employ which of the following countermeasures?
a. Cease all flying except for specifically authorized operational sorties.
b. Direct the execution of advance site reviews to facilitate the antiterrorism planning
process.
c. Encourage dependent family members to complete Level I Antiterrorism Awareness
Training before any travel outside the continental United States (OCONUS).
d. Conduct an immediate Terrorism Vulnerability Assessment for off-installation housing,
schools, daycare centers, transportation. - answer>>>C
Requests for authorizing disclosure of classified information during visits must include all
the following information, EXCEPT:
a. The explanation of the government purpose to perform when disclosing classified
information.
b. The subject of the meeting, scope of classified topics and classification level
,c. Expected time and location of the meeting.
d. The main content of the invitation to send to the participants. - answer>>>C
Two security professionals - Paul and Ashley
- are discussing the security procedures for visits and meetings. Paul says visits must
serve a specific U.S. Government purpose. Ashley says DoD Components should, as a
minimum, establish procedures that include verification of the identity, personnel
security clearance, access (if appropriate), and need-to-know for all visitors. Who is
correct?
a. Paul is correct
b. Ashley is correct
c. Paul and Ashley are both correct
d. Paul and Ashley are both incorrect - answer>>>A
Executive Order 12829, signed in January 1993, mandated that which of the following
entities be responsible for implementing and monitoring the National industrial Security
Program (NISP)?
a. Director of the Information Security Oversight Office (ISOO)
b. Secretary of Defense
c. National Security Council (NSC)
d. Director, Defense Security Services (DSS) - answer>>>A
What is the role of the government contracting activity (GCA), or cleared prime
contractor, when a contractor that does not have a Facility Clearance (FCL) wants to bid
on a Request
for Proposal (RFP) that requires access to classified information? a. The GCA must issue a
formal letter rejecting the contractor's bid since the contractor does not have the
requisite FCL.
b. The contractor must submit a sponsorship request to DSS, who will decide whether to
allow the contractor to bid on the contract.
,c. The GCA must sponsor the contractor for a facility security clearance by submitting a
sponsorship request to DSS, which initiates the facility clearance process.
d. The GCA must ensure that the all owners and senior management of the uncleared
contractor are U.S. citizens and are eligible to be processed for a personnel security
clearance. - answer>>>C
What is the purpose of the Federal Acquisition Regulations (FAR)?
a. To codify and publish uniform policies and procedures for acquisition by all executive
agencies.
b. To manage DoD funds and prioritize the development of vital research and technology.
c. To provide small businesses and minority owned companies an opportunity to
compete in the government acquisition process.
d. To promote uniform standards and best practices of technology acquisition across U.S.
industry. - answer>>>A
What is the role of the security professional during the "Award Contract" step of the
contracting process?
a. To ensure the appropriate classification level for the bid, and to define unique security
requirements associated with the product.
b. To interface with the Cognizant Security Organization (CSO) to ensure oversight is
performed and review results of and previous assessments on behalf of component.
c. To ensure that the contractor follows proper safeguarding and disposition guidance.
d. To review and define the specific security requirements with the contracting officer -
specifically, block 13 of DD Form 254. - answer>>>D
What is the purpose of DD Form 254?
a. To convey security classification guidance and to advise contractors on the handling
procedures for classified material.
b. To document the formal agreement between the US government and a cleared
contractor in which the contactor agrees to maintain a security program in compliance
, with the NISPOM and the government agrees to security guidance and program
oversight.
c. To validate details regarding the foreign ownership, control or influence affecting that
cleared contractor facility.
d. It replaces the actual contract document for any contract requiring access to classified
information. - answer>>>A
As part of Operations Security (OPSEC), a program coordinator should use which of the
following tools to assess assets as part of the risk management process for critical
information?
a. Critical Information List
b. Threat vulnerability matrix
c. Risk Rating Table
d. Security Classification Guide - answer>>>A
What is the role of the Special Access Program Oversight Committee (SAPOC) during the
maintenance phase
of the Special Access Program (SAP) lifecycle?
a. To ensure that the SAP has adequate Internal Review and Audit Compliance (IRAC)
support, including accessed auditors at supporting offices, to meet program audit needs.
b. To review existing programs annually to determine whether to revalidate them as
SAPs.
c. To provide oversight of SAP program and budget accomplishments.
d. To provide oversight of SAP audits and inspections. - answer>>>B
Which of the following describes a Special Access Program (SAP) that is established to
protect sensitive research, development, testing and evaluation, modification, and
procurement activities?
a. Research and Technology SAP