SPeD SFPC SECURITY FUNDAMENTALS PROFESSIONAL
CERTIFICATION 2023 ACTUAL EXAM 200 QUESTIONS AND
CORRECT DETAILED ANSWERS
Name the goals of integrating CI and threat awareness into a security program? -
ANSWER: 1.Maintain a strategic advantage in operations, programs, and classified
research and development.
2. Assist in force protection.
3. Provide security awareness tools for establishing security countermeasures.
4. Ensure integrity of DoD and U.S. industry program secrets, technologies, and
operations.
5. Protect our warfighters.
Provides the legal requirement to use lawful means to ensure U.S. receives the best
intelligence available, name the source. - ANSWER: E.O. 12333
The manual that includes CI-related requirements for industry is? - ANSWER: DoD
5220.22-M NISPOM
Regulation mandating the reporting of suspicious activities or potential espionage
indicators - ANSWER: DoDD 5240.06, Counterintelligence Awareness and Reporting
(CIAR)
Regulation mandating the establishment of an insider threat program - ANSWER:
DoDD 5205.16, Insider Threat Program
Protect anything that, if compromised, would: name all 5 of them. - ANSWER:
1.Significantly damage national security
2. Alter the program's direction.
3. Compromise the program or system capabilities.
4. Shorten the expected system life.
5. Require research and development to counter the impact of loss.
What is first line of defense against espionage? - ANSWER: your personnel
All imminent threats—whether DoD facility or personnel or contractor facility—must
be reported immediately and directly to the appropriate law enforcement agency,
which, in most cases within the United States is? - ANSWER: FBI
In addition to collecting and processing intelligence about our enemies, the
Intelligence Community is also faced with the problem of identifying, understanding,
prioritizing, and counteracting the foreign intelligence threats that are encountered
by the United States. This activity is known as - ANSWER: counterintelligence.
, Every cleared defense contractor (CDC) has a _________________ who is
responsible for the overall security of the facility and for ensuring that security
regulations and policies are followed. - ANSWER: facility security officer (FSO)
What 3 statements describe why reporting certain information is important? Name
all 3. - ANSWER: 1. Reporting suspicious contacts can lead to the capture of
individuals seeking to harm national security.
2. Reporting adverse information about employees of cleared contractor facilities
can help to safeguard classified information.
3. Failing to report an employee's failure to follow safeguarding procedures can lead
to the disclosure of classified information, which may result in the loss of life of our
service members.
Several regulatory and legal documents form the basis for the requirements to
report.The baseline security requirements (including the requirement to report) that
ensure protection of classified information by contractors is called what? - ANSWER:
NISPOM (correct response)
Established the partnership between the U.S. government and private industry that
is known as the National Industrial Security Program is what order. - ANSWER: E.O.
12829
The contractual agreement in which contractors agree to maintain minimum security
controls to protect classified information - ANSWER: DD Form 441, DD Form 441 is
the contractual agreement in which contractors agree to maintain minimum security
controls to protect classified information in accordance with the NISPOM.
Different types of information require reporting to different government entities.,
Where do you report PSMO-I - ANSWER: Changes to personnel information (correct
response)
Changes in facility information should be reported to the - ANSWER: DSS IS REP
According to NISPOM paragraph 1-302g, you must report a change in - ANSWER:
company ownership. You must also report changes in the name or address of the
company or facility, changes to Key Management Personnel (KMPs), termination of
company operations for any reason, and changes in Foreign Ownership, Control, or
Influence (FOCI).
An _________________ is anyone with authorized access to the information or
things an organization values most, and who uses that access - either wittingly or
unwittingly - to inflict harm to the organization or national security. When an insider
becomes a threat, it can have far-reaching consequences on organizations,
companies, and national security. - ANSWER: insider threat
CERTIFICATION 2023 ACTUAL EXAM 200 QUESTIONS AND
CORRECT DETAILED ANSWERS
Name the goals of integrating CI and threat awareness into a security program? -
ANSWER: 1.Maintain a strategic advantage in operations, programs, and classified
research and development.
2. Assist in force protection.
3. Provide security awareness tools for establishing security countermeasures.
4. Ensure integrity of DoD and U.S. industry program secrets, technologies, and
operations.
5. Protect our warfighters.
Provides the legal requirement to use lawful means to ensure U.S. receives the best
intelligence available, name the source. - ANSWER: E.O. 12333
The manual that includes CI-related requirements for industry is? - ANSWER: DoD
5220.22-M NISPOM
Regulation mandating the reporting of suspicious activities or potential espionage
indicators - ANSWER: DoDD 5240.06, Counterintelligence Awareness and Reporting
(CIAR)
Regulation mandating the establishment of an insider threat program - ANSWER:
DoDD 5205.16, Insider Threat Program
Protect anything that, if compromised, would: name all 5 of them. - ANSWER:
1.Significantly damage national security
2. Alter the program's direction.
3. Compromise the program or system capabilities.
4. Shorten the expected system life.
5. Require research and development to counter the impact of loss.
What is first line of defense against espionage? - ANSWER: your personnel
All imminent threats—whether DoD facility or personnel or contractor facility—must
be reported immediately and directly to the appropriate law enforcement agency,
which, in most cases within the United States is? - ANSWER: FBI
In addition to collecting and processing intelligence about our enemies, the
Intelligence Community is also faced with the problem of identifying, understanding,
prioritizing, and counteracting the foreign intelligence threats that are encountered
by the United States. This activity is known as - ANSWER: counterintelligence.
, Every cleared defense contractor (CDC) has a _________________ who is
responsible for the overall security of the facility and for ensuring that security
regulations and policies are followed. - ANSWER: facility security officer (FSO)
What 3 statements describe why reporting certain information is important? Name
all 3. - ANSWER: 1. Reporting suspicious contacts can lead to the capture of
individuals seeking to harm national security.
2. Reporting adverse information about employees of cleared contractor facilities
can help to safeguard classified information.
3. Failing to report an employee's failure to follow safeguarding procedures can lead
to the disclosure of classified information, which may result in the loss of life of our
service members.
Several regulatory and legal documents form the basis for the requirements to
report.The baseline security requirements (including the requirement to report) that
ensure protection of classified information by contractors is called what? - ANSWER:
NISPOM (correct response)
Established the partnership between the U.S. government and private industry that
is known as the National Industrial Security Program is what order. - ANSWER: E.O.
12829
The contractual agreement in which contractors agree to maintain minimum security
controls to protect classified information - ANSWER: DD Form 441, DD Form 441 is
the contractual agreement in which contractors agree to maintain minimum security
controls to protect classified information in accordance with the NISPOM.
Different types of information require reporting to different government entities.,
Where do you report PSMO-I - ANSWER: Changes to personnel information (correct
response)
Changes in facility information should be reported to the - ANSWER: DSS IS REP
According to NISPOM paragraph 1-302g, you must report a change in - ANSWER:
company ownership. You must also report changes in the name or address of the
company or facility, changes to Key Management Personnel (KMPs), termination of
company operations for any reason, and changes in Foreign Ownership, Control, or
Influence (FOCI).
An _________________ is anyone with authorized access to the information or
things an organization values most, and who uses that access - either wittingly or
unwittingly - to inflict harm to the organization or national security. When an insider
becomes a threat, it can have far-reaching consequences on organizations,
companies, and national security. - ANSWER: insider threat