PROTECTING ASSETS IN THE
NISP TEST QUESTIONS AND
ANSWERS
The main objective of security is _________________________. Choose all
that apply. - ANSWER a. Correcting flaws b. Following those guidelines
c. Creating guidelines
Which of these documents contains the security criteria for Industry Partners?
ANSWER: Operating Manual for the National Industrial Security Program
(NISPOM)
Which of these is the NISPOM's goal? Choose all that apply. ANSWER a.
Regulates contractors' access to classified information
c. Preserves particular categories of classified data
The risk management process consists of the following steps: Choose all that
apply. - ANSWER a. Determine assets and the consequences of loss or
compromise b. Determine threats c. Determine vulnerabilities and evaluate risk
d. Create and implement countermeasures
To increase CI awareness for data, programs, and persons most likely to be
targeted or vulnerable to foreign/competitor collection operations, an effective
CI program uses a _________-based strategy. ANSWER RISK
_____________ is the possibility, risk, or likelihood that an insider may use
their access to compromise American national security. ANSWER: Insider
Danger
Which of these describes the kinds of dangers that the industry faces? Choose
all that apply. - ANSWER a. Competition from businesses b. Foreign
intelligence threats c. Insider threats d. Illicit activities e. Terrorist groups
NISP TEST QUESTIONS AND
ANSWERS
The main objective of security is _________________________. Choose all
that apply. - ANSWER a. Correcting flaws b. Following those guidelines
c. Creating guidelines
Which of these documents contains the security criteria for Industry Partners?
ANSWER: Operating Manual for the National Industrial Security Program
(NISPOM)
Which of these is the NISPOM's goal? Choose all that apply. ANSWER a.
Regulates contractors' access to classified information
c. Preserves particular categories of classified data
The risk management process consists of the following steps: Choose all that
apply. - ANSWER a. Determine assets and the consequences of loss or
compromise b. Determine threats c. Determine vulnerabilities and evaluate risk
d. Create and implement countermeasures
To increase CI awareness for data, programs, and persons most likely to be
targeted or vulnerable to foreign/competitor collection operations, an effective
CI program uses a _________-based strategy. ANSWER RISK
_____________ is the possibility, risk, or likelihood that an insider may use
their access to compromise American national security. ANSWER: Insider
Danger
Which of these describes the kinds of dangers that the industry faces? Choose
all that apply. - ANSWER a. Competition from businesses b. Foreign
intelligence threats c. Insider threats d. Illicit activities e. Terrorist groups