SPēD SAPPC GENERAL EXAM QUESTIONS
AND ANSWERS
Principle incident/events required to be reported to DoD counterintelligence
(CI) organizations - ANSWER espionage, sabotage, terrorism, cyber
Indicators of insider threats - ANSWER 1. Failure to report overseas travel or
contact with foreign nationals
2. Seeking to obtain higher clearance or expand access outside the job scope
3. Engaging in classified conversations without a need to know
4. Working hours inconsistent with job assignments or insistence on working in
private
5. Exploitable behavior traits
6. Repeated security violations
7. Attempting to enter areas not granted access to
8. Unexplainable affluence/living above one's means
9. Anomalies-adversary taking actions which indicate they are knowledgeable
to information
, 10. Illegal downloads of information/files
Elements to be considered in the identification of Critical Program Information
- ANSWER Elements the compromise of which could:
1. significantly degrade mission effectiveness
2. shorten the expected combat-effective life of the system
3. decrease technological advantage
4. significantly change program direction or
5. provide an adversary with an ability to defeat, counter, copy, or reverse-
engineer the technology or capability
Asset, threat, vulnerability, risk, countermeasures - ANSWER Factors the DoD
Security professional considers in evaluating and mitigating risk to DoD Assets
SAP categories (three) - ANSWER acquisition, intelligence, and operations and
support
Threats to classified information come in three varieties, which are: - ANSWER
Insider Threat, Foreign Intelligence Entities (FIE) and Cybersecurity Threat
Insider threat means- ANSWER An employee who could pose a threat to
national security. These threats include potential espionage, violent acts against
the Government or the nation, and unauthorized disclosure of classified
information, including the vast amounts of classified data available on
interconnected United States Government computer networks and systems.
Foreign Visitor Program Purpose - ANSWER To provide a process to track
and approve access by a foreign entity to information that is classified; and
AND ANSWERS
Principle incident/events required to be reported to DoD counterintelligence
(CI) organizations - ANSWER espionage, sabotage, terrorism, cyber
Indicators of insider threats - ANSWER 1. Failure to report overseas travel or
contact with foreign nationals
2. Seeking to obtain higher clearance or expand access outside the job scope
3. Engaging in classified conversations without a need to know
4. Working hours inconsistent with job assignments or insistence on working in
private
5. Exploitable behavior traits
6. Repeated security violations
7. Attempting to enter areas not granted access to
8. Unexplainable affluence/living above one's means
9. Anomalies-adversary taking actions which indicate they are knowledgeable
to information
, 10. Illegal downloads of information/files
Elements to be considered in the identification of Critical Program Information
- ANSWER Elements the compromise of which could:
1. significantly degrade mission effectiveness
2. shorten the expected combat-effective life of the system
3. decrease technological advantage
4. significantly change program direction or
5. provide an adversary with an ability to defeat, counter, copy, or reverse-
engineer the technology or capability
Asset, threat, vulnerability, risk, countermeasures - ANSWER Factors the DoD
Security professional considers in evaluating and mitigating risk to DoD Assets
SAP categories (three) - ANSWER acquisition, intelligence, and operations and
support
Threats to classified information come in three varieties, which are: - ANSWER
Insider Threat, Foreign Intelligence Entities (FIE) and Cybersecurity Threat
Insider threat means- ANSWER An employee who could pose a threat to
national security. These threats include potential espionage, violent acts against
the Government or the nation, and unauthorized disclosure of classified
information, including the vast amounts of classified data available on
interconnected United States Government computer networks and systems.
Foreign Visitor Program Purpose - ANSWER To provide a process to track
and approve access by a foreign entity to information that is classified; and