100% de satisfacción garantizada Inmediatamente disponible después del pago Tanto en línea como en PDF No estas atado a nada 4,6 TrustPilot
logo-home
Examen

SAPPC Certification Study Guide 2023/2024 Questions and Answers with complete solution

Puntuación
-
Vendido
-
Páginas
18
Grado
A+
Subido en
26-07-2023
Escrito en
2022/2023

Sharing and reporting information is essential to detecting potential insider threats. True or False? Ans True Two security professionals - Paul and Ashley - are discussing security program areas. Paul says that Information Security practitioners train and/or advise Original Classification Authorities in the application of the process for making classification determinations. Ashley says that Physical Security practitioners work with a facility's Antiterrorism Officer to deploy defensive measures designed to reduce the facility's vulnerability from terrorist attacks. Ans Paul and Ashley are both correct Two security professionals - Paul and Ashley - are discussing security program areas. Paul says that Information Security practitioners work with a facility's Antiterrorism Officer to deploy defensive measures designed to reduce the facility's vulnerability from terrorist attacks. Ashley says that Personnel Security practitioners train and/or advise Original Classification Authorities in the application of the process for making classification determinations. Ans Paul and Ashley are both incorrect SPeD is an abbreviation for? Ans Security Professional Education Development SPed is a certification program of what agency? Ans Department of Defense Security Fundamentals Professional Certification (SFPC) definition? Ans The individual understands foundational security concepts, principles, and practices. (Core Certification for SPed). Security Asset Protection Professional Certification (SAPPC) definition? Ans The Individual applies foundational security concepts, principles, and practices. (Core Certification for SPed). Security Program Integration Professional Certification (SPIPC) definition? Ans The individual understands and applies risk assessment and security program management based on security concepts, principles, and practices. (Core Certification for SPed). Security Enterprise Professional Certification (SEPC) definition? Ans The individual understands and applies concepts, principles, and practices for managing enterprise-wide security. What are the three principle incident/events required to be reported to DoD Counterintelligence (CI) organizations? Ans Espionage, Sabotage, Terrorism & Cyber Policy PMO is an abbreviation for? Ans Program Management Office Provides the legal requirements to use lawful means to ensure U. S. receives the best intelligence available? Ans E.O. 12333 The manual that includes CI-related requirements for Industry? Ans DoD 5220.22-M (NISPOM) Regulation mandating CI-specific training, briefing, and reporting? Ans DoDI5240.6: CI Awareness, Briefing, and Reporting Programs Regulation providing procedures to follow when classified information is compromised? Ans DoD 5200.1-R: information Security Program What are three principle incidents/events required to report to DoD counterintelligence (CI) organizations? Ans Espionage, Sabotage, Terrorism & Cyber Policy List three different types of threats to classified information? Ans Insider Threat, Foreign Intelligence Entities (FIE), Cybersecurity Threat List three indicators of insider threats? Ans Failure to report overseas travel or contact with foreign nationals. Seeking to gain higher clearance or expand access outside the job scope. Engaging in classified conversations without a need to know. Working hours inconsistent with job assignment or insistence on working in private. Exploitable behavior traits. Repeated security violations. Attempting to enter areas not granted access to. List three elements that should be considered in identifying Critical Program Information? Ans - Cause significant degradation in mission effectiveness - Shorten the expected combat-effective life of the system - Reduce technological advantage - Significantly alter program direction - Enable an adversary to defeat, counter, copy, or reverse-engineer the technology or capability. Briefly describe the concept of insider threat? Ans An employee who may represent a threat to national security. These threats encompass potential espionage, violent acts against the Government or the nation, and unauthorized disclosure of classified information, including the vast amounts of classified data available on interconnected United States Government computer networks and systems. List three elements that a security professional should consider when assessing and managing risks to DoD assets? Ans Asset Threat Vulnerability Risk Countermeasures Describe the purpose of the Foreign Visitor Program? Ans To track and approve access by a foreign entity to information that is classified; and to approve access by a foreign entity to information that is unclassified, related to a U.S. Government contract, or plant visits covered by ITAR. Briefly define a Special Access Program (SAP)? Ans A program established for a specific class of classified information that imposes safeguarding and access requirements that exceed those normally required for information at the same classification level. List three enhanced security requirements for protecting Special Access Program (SAP) Information within Personnel Security? Ans Access Rosters Billet Structures (if required) Indoctrination Agreement Clearance based on an appropriate investigation completed within the last 5 years Individual must materially contribute to the program in addition to having the need to know All individuals with access to SAP are subject to a random counterintelligence-scope polygraph Identify the four Cognizant Security Agencies (CSA)? Ans Department of Defense (DoD) Director of National Intelligence (DNI) Department of Energy (DoE) Nuclear Regulatory Commission (NRC). Describe the CSA's role in the National Industrial Security Program (NISP)? Ans To establish an industrial security program to safeguard classified information under its jurisdiction. List three factors for determining whether U.S. companies are under Foreign Ownership, Control, or Influence (FOCI)? Ans Record of economic and government espionage against the U.S. targets Record of enforcement/engagement in unauthorized technology transfer Type and sensitivity of the information that shall be accessed The source, nature and extent of FOCI Record of compliance with pertinent U.S. laws, regulations and contracts Define the purpose and function of the Militarily Critical Technologies List (MCTL)? Ans Serves as a technical reference for the development and implementation of DoD technology, security policies on international transfers of defense-related goods, services, and technologies as administered by the Director, Defense Technology Security Administration (DTSA). Formulation of export control proposals and export license review. List three primary authorities governing foreign disclosure of classified military information? Ans Arms Export Control Act National Security Decision Memorandum 119 National Disclosure Policy-1 International Traffic in Arms Regulation (ITAR) E.O.s 12829, 13526 Bilateral Security Agreements DoD 5220.22-M, "NISPOM," Briefly describe the purpose of the DD Form 254? Ans Convey security requirements and classification guidance, and provide handling procedures for classified material received and/or generated on a classified contract. List the three main policies that govern the DoD Information Security Program? Ans E.O. 13526 Information Security Oversight Office (ISOO) 32 CFR Parts 2001 & 2003 Classified National Security Information; Final Rule" DoD Manual 5200.01, Volumes 1-4 What must an "authorized person" have before being granted access to classified information? Ans Favorable determination of eligibility for access Need to know the information Signed SF 312 Nondisclosure Agreement List three classification duration options for originally classified information? Ans less than 10 years at 10 years up to 25 years 50X1-HUM (with no date or event) 50X2-WMD (with no date or event 25X (with a date or event) List three authorized sources of security classification guidance that could be used in the derivative classification process? Ans Security Classification Guide Properly Marked Source Document Contract Security Classification Specification (DD Form 254) Define derivative classification? Ans Incorporating, paraphrasing, restating, or generating in new form information that is already classified and marking the newly developed material consistent with the markings that apply to the source information. Define the difference between a security infraction and a security violation? Ans An infraction cannot reasonably be expected to and does not result in the loss, compromise, or suspected compromise of classified information; whereas a violation does result in or could be expected to result in the loss or compromise of classified information. Define unauthorized disclosure? Ans Communication or physical transfer of classified or controlled unclassified information to an unauthorized recipient. List three types of initial personnel security investigations and to whom they apply? Ans ANACI: Civilian NACI: Civilian and Contractor NACLC: Military and Contractor SSBI: Military, Civilian, Contractor Describe the purpose of due process in Personnel Security Program (PSP)? Ans Ensures fairness by providing the subject the opportunity to appeal an unfavorable adjudicative determination. List the key procedures for initiating Personnel Security Investigations(PSIs)? Ans Validate the need for an investigation Initiate e-QIP Review Personnel Security Questionnaire (PSQ) for completeness Submit electronically to OPM List three DoD position sensitivity types and their investigative requirements? Ans Critical Sensitive: SSBI, SSBI-PR, PPR Non-Critical Sensitive: ANACI, NACLC Nonsensitive: NACI Describe the difference between revocation and denial in Personnel Security Program? Ans Revocation: A current security eligibility determination is rescinded. Denial: An initial request for security eligibility is not granted. Describe the purpose of a Statement of Reason (SOR)? Ans The purpose of the SOR is to provide a comprehensive and detailed written explanation of why a preliminary unfavorable adjudicative determination was made. List five adjudicative guidelines? Ans 1. Allegiance to the United States 2. Foreign Influence 3. Foreign Preference 4. Sexual Behavior 5. Personal Conduct 6. Financial Considerations 7. Alcohol Consumption 8. Drug Involvement 9. Psychological Conditions 10. Criminal Conduct 11. Handling Protected Information 12. Outside Activities 13. Use of Information Technology List three different types of approved classified material storage areas? Ans GSA-approved storage containers Vaults (including modular vaults) Open storage area (secure rooms, to include SCIFs and bulk storage areas) List three construction requirements for vault doors? Ans Constructed of metal Hung on non-removable hinge pins or with interlocking leaves. Equipped with a GSA-approved combination lock. Emergency egress hardware (deadbolt or metal bar extending across width of door). What is the purpose of intrusion detection systems? Ans Detect unauthorized penetration into a secured area.

Mostrar más Leer menos
Institución
Sappc
Grado
Sappc










Ups! No podemos cargar tu documento ahora. Inténtalo de nuevo o contacta con soporte.

Escuela, estudio y materia

Institución
Sappc
Grado
Sappc

Información del documento

Subido en
26 de julio de 2023
Número de páginas
18
Escrito en
2022/2023
Tipo
Examen
Contiene
Preguntas y respuestas

Temas

$16.49
Accede al documento completo:

100% de satisfacción garantizada
Inmediatamente disponible después del pago
Tanto en línea como en PDF
No estas atado a nada

Conoce al vendedor

Seller avatar
Los indicadores de reputación están sujetos a la cantidad de artículos vendidos por una tarifa y las reseñas que ha recibido por esos documentos. Hay tres niveles: Bronce, Plata y Oro. Cuanto mayor reputación, más podrás confiar en la calidad del trabajo del vendedor.
ATIQUIZ Chamberlain College Nursing
Seguir Necesitas iniciar sesión para seguir a otros usuarios o asignaturas
Vendido
842
Miembro desde
3 año
Número de seguidores
698
Documentos
1626
Última venta
1 semana hace
NURSING BANK

ACE YOUR EXAMS

3.7

92 reseñas

5
42
4
15
3
14
2
7
1
14

Recientemente visto por ti

Por qué los estudiantes eligen Stuvia

Creado por compañeros estudiantes, verificado por reseñas

Calidad en la que puedes confiar: escrito por estudiantes que aprobaron y evaluado por otros que han usado estos resúmenes.

¿No estás satisfecho? Elige otro documento

¡No te preocupes! Puedes elegir directamente otro documento que se ajuste mejor a lo que buscas.

Paga como quieras, empieza a estudiar al instante

Sin suscripción, sin compromisos. Paga como estés acostumbrado con tarjeta de crédito y descarga tu documento PDF inmediatamente.

Student with book image

“Comprado, descargado y aprobado. Así de fácil puede ser.”

Alisha Student

Preguntas frecuentes