Arthur Casto
Test por , creado hace más de 1 año

Security

648
2
0
Arthur Casto
Creado por Arthur Casto hace casi 6 años
Cerrar

SFPC 3

Pregunta 1 de 196

1

Jackson Perkins is being considered for promotion to a higher risk position in the federal agency for which he currently works. His suitability investigation reflected two speeding tickets in the past five years on the compound where he currently works but no other traffic violations or criminal activity. Which suitability factor is most applicable to the facts in this scenario?

Selecciona una de las siguientes respuestas posibles:

  • Factor 1: Misconduct or Negligence in Employment

  • Factor 2: Criminal or Dishonest Conduct

  • Factor 3: Material, Intentional False Statement or Deception or Fraud in Employment

Explicación

Pregunta 2 de 196

1

Which system captures position information to include position risk and sensitivity?

Selecciona una de las siguientes respuestas posibles:

  • Position Designation Automated Tool (PDT)

  • Electronic Questionnaire for Investigations Processing (eQIP) system

  • Defense Civilian Personnel Data System (DCPDS)

Explicación

Pregunta 3 de 196

1

Who primarily conducts suitability adjudications?

Selecciona una de las siguientes respuestas posibles:

  • Office of Personnel Management (OPM)

  • Defense Civilian Personnel Advisory Service (DCPAS)

  • Adjudicator from the employing agency, component or DoD CAF

Explicación

Pregunta 4 de 196

1

Which type of investigation is used to reinvestigate employees in non-sensitive, high risk public trust positions?

Selecciona una de las siguientes respuestas posibles:

  • T1R

  • T2R

  • T4R

Explicación

Pregunta 5 de 196

1

Which type of adjudication is required to determine if an individual should be allowed to hold a position of public trust?

Selecciona una de las siguientes respuestas posibles:

  • Public Trust adjudication

  • HSPD-12 adjudication

  • Suitability adjudication

Explicación

Pregunta 6 de 196

1

When does OPM or the agency or component notify the subject of his or her appeal rights?

Selecciona una de las siguientes respuestas posibles:

  • In the final decision

  • In the answer to the notice of a proposed action

  • In the notice of proposed action

Explicación

Pregunta 7 de 196

1

Larry Lengal is applying for a federal position. Mr Lengal’s investigation revealed that he joined a group called Freedom Youth when he was in college. The group participated in anti-US demonstrations by the White House. Which suitability factor is most applicable to the facts in this scenario?

Selecciona una de las siguientes respuestas posibles:

  • Factor 2: Criminal or Dishonest Conduct

  • Factor 7: Knowing and Willful Engagement in Acts/Activities designed to overthrow the US Government by Force

  • Factor 8: Statutory or Regulatory Bar to Employment

Explicación

Pregunta 8 de 196

1

Who is responsible for issuing government-wide debarments?

Selecciona una de las siguientes respuestas posibles:

  • FBI

  • OPM

  • DoD

Explicación

Pregunta 9 de 196

1

What is the course of action if suitability issues are revealed during prescreening?

Selecciona una de las siguientes respuestas posibles:

  • The applicant will be debarred

  • The file is referred to the suitability adjudicator

  • An unfavorable suitability determination will be made

Explicación

Pregunta 10 de 196

1

Why is it important that components and agencies report their adjudicative decisions to OPM?

Selecciona una de las siguientes respuestas posibles:

  • To comply with Federal Law

  • To ensure the information is available to other agencies to ensure efficiency of the civil service

Explicación

Pregunta 11 de 196

1

In which of the following cases would a suitability adjudication NOT be automatically required?

Selecciona una de las siguientes respuestas posibles:

  • Janice is being promoted to a new position within the federal government which has a higher level of risk than her previous position.

  • Jeff is applying for a federal position with the Department of Agriculture and has not previously held a federal job.

  • Carla is returning to the federal workforce after she left her federal service position 1 year ago to have her first child.

Explicación

Pregunta 12 de 196

1

To which of the following groups do fitness requirement apply?

Selecciona una de las siguientes respuestas posibles:

  • Contractor employees, employees serving in Federal competitive service position or Federal expected service positons that may convert to competitive service positions

  • Contractor employees, and employees serving in Federal excepted service positions that cannot be noncompetitively converted to competitive service positions.

  • Applicants, appointees, and employees serving in Federal competitive services positions or Federal excepted service positions that may convert to competitive service positions.

Explicación

Pregunta 13 de 196

1

Which of the following is used to assess a position levels of risk and sensitivity?

Selecciona una de las siguientes respuestas posibles:

  • Position Designation Automated Tool (PDT)

  • Electronic Questionnaires for Investigations processing (eQIP) system

  • Personnel Investigations Processing System (PIPS)

  • Central Verification System (CVS)

Explicación

Pregunta 14 de 196

1

What is a common problem found in personnel security investigation requests?

Selecciona una de las siguientes respuestas posibles:

  • Subject provided discrepant information

  • Subject is not a federal employee

  • Subject has worked for several agencies

  • Subject has lived at one location for over 10 years

Explicación

Pregunta 15 de 196

1

The appeals process is centralized for all agencies, so the steps are the same no matter who the employing agency is.

Selecciona uno de los siguientes:

  • VERDADERO
  • FALSO

Explicación

Pregunta 16 de 196

1

Review the following case details and determine whether a favorable adjudicative determination should be made.

The investigation into Stacy Brewer reveals that although she has never been implicated in a crime herself, her live-in boyfriend has multiple, drug-related convictions, and several of Ms. Brewer’s friends are in and out of jail on theft and drug charges. She did not disclose that she lived with her boyfriend on her SF-86. When asked about it, she said she intentionally did not list him on her SF-86 as she was afraid her clearance would be denied.

Should Ms. Brewer be granted eligibility?

Selecciona una de las siguientes respuestas posibles:

  • Yes

  • No

Explicación

Pregunta 17 de 196

1

The careful evaluation of favorable and unfavorable information from a subject’s past and present must take the __________ into consideration.

Selecciona una de las siguientes respuestas posibles:

  • Review items

  • Continuous evaluation process

  • Investigative process

  • Whole-person

Explicación

Pregunta 18 de 196

1

Straightforward cases may be reviewed automatically by an electronic adjudication system.

Selecciona uno de los siguientes:

  • VERDADERO
  • FALSO

Explicación

Pregunta 19 de 196

1

To develop and resolve issues flagged in a standard investigation prior to completion of the personnel security investigation, which of the following is used?

Selecciona una de las siguientes respuestas posibles:

  • T3R

  • PR

  • NAC

  • EFI Model

Explicación

Pregunta 20 de 196

1

A more comprehensive personnel security investigation may replace a less comprehensive one.

Selecciona uno de los siguientes:

  • VERDADERO
  • FALSO

Explicación

Pregunta 21 de 196

1

The subject interview is a standard investigative element of which two PSIs?

Selecciona una de las siguientes respuestas posibles:

  • Tier 5 and T5R

  • Tier 3 and Tier 5

  • Tier 3 and T3R

  • T3R and T5R

Explicación

Pregunta 22 de 196

1

Prior and current investigative records (for example, from DoD, OPM, and IC databases) are always checked for Tier 3 and Tier 5 initial reinvestigations.

Selecciona uno de los siguientes:

  • VERDADERO
  • FALSO

Explicación

Pregunta 23 de 196

1

The Supreme Court found in Cole v. Young that the regulations of the personnel security program (PSP) apply to all Federal government employees.

Selecciona uno de los siguientes:

  • VERDADERO
  • FALSO

Explicación

Pregunta 24 de 196

1

A contractor employee requiring initial secret eligibility and access needs a Tier 3 investigation.

Selecciona uno de los siguientes:

  • VERDADERO
  • FALSO

Explicación

Pregunta 25 de 196

1

Information from private individuals and the news media occasionally provides information to be about an individual holding security eligibility that is reviewed under continuous evaluation.

Selecciona uno de los siguientes:

  • VERDADERO
  • FALSO

Explicación

Pregunta 26 de 196

1

What is the relationship between vulnerabilities and threats?

Selecciona una de las siguientes respuestas posibles:

  • Both are based in honesty

  • There is no relationship between them

  • Vulnerabilities exploit threats

  • Threats exploit vulnerabilities

Explicación

Pregunta 27 de 196

1

Review the following case details and determine whether a favorable adjudicative determination should be made.

The agency IT department discovered that Jerome Wilson accessed a network folder to which he was not authorized to use. Subsequent investigation showed that his supervisor had asked him to store sensitive files in the folder and had told Mr. Wilson his use was approved. When Mr. Wilson learned that his use was in fact unauthorized, he reported the situation to his supervisor and the security office and stated that he would not access the folder again.

Should Mr. Wilson be granted eligibility?

Selecciona una de las siguientes respuestas posibles:

  • Yes

  • No

Explicación

Pregunta 28 de 196

1

________ is the program name for the Intelligence Community Security Clearance Repository.

Selecciona una de las siguientes respuestas posibles:

  • Central Verification System (CVS)

  • Scattered Castles

  • Security/Suitability Investigations Index (SII)

  • Joint Personnel Adjudication System (JPAS)

Explicación

Pregunta 29 de 196

1

An individual may be disqualified if available information reflects a recent or recurring pattern of questionable judgment, irresponsibility, or emotionally unstable behavior.

Selecciona uno de los siguientes:

  • VERDADERO
  • FALSO

Explicación

Pregunta 30 de 196

1

Failure to comply with prescribed treatment is a mitigating condition under the psychological conditions adjudicative guideline.

Selecciona uno de los siguientes:

  • VERDADERO
  • FALSO

Explicación

Pregunta 31 de 196

1

Which of the following lays out standards and procedures for SCI access?

Selecciona una de las siguientes respuestas posibles:

  • ICD 704

  • E.O. 13567

  • Title 5, Code of Federal Regulation, Part 732

  • Intelligence Reform and Terrorism Prevention Act

Explicación

Pregunta 32 de 196

1

The deliberate falsification of facts on a personnel security questionnaire is a disqualifying condition under which of these adjudicative guidelines?

Selecciona una de las siguientes respuestas posibles:

  • Use of Information Technology Systems

  • Handling Protected Information

  • Outside Activities

  • Personal Conduct

Explicación

Pregunta 33 de 196

1

The personnel security program is concerned only with the threat posed by foreign intelligence service.

Selecciona uno de los siguientes:

  • VERDADERO
  • FALSO

Explicación

Pregunta 34 de 196

1

The federal government is exempt from the Privacy Act of 1974 and as such, can collect personal information without notifying the subject of why said information is being collected.

Selecciona uno de los siguientes:

  • VERDADERO
  • FALSO

Explicación

Pregunta 35 de 196

1

An individual seeking secret clearance eligibility failed to report as required the possession of a foreign passport, and has used the foreign passport to enter and exit the United States, the individual may be granted eligibility.

Selecciona uno de los siguientes:

  • VERDADERO
  • FALSO

Explicación

Pregunta 36 de 196

1

The highest OPM-defined civilian position sensitivity level is _________.

Selecciona una de las siguientes respuestas posibles:

  • Top Secret

  • Critical-Sensitive

  • Special-Sensitive

  • Confidential

Explicación

Pregunta 37 de 196

1

Which of the following was previously a stand-alone investigation but now is a foundational component of other investigations?

Selecciona una de las siguientes respuestas posibles:

  • NACLC

  • ANACI

  • SSBI

  • NAC

  • NACI

Explicación

Pregunta 38 de 196

1

When evaluating an individual’s foreign contacts and interests, what should the adjudicator consider about the associated country?

Selecciona una de las siguientes respuestas posibles:

  • Does the country have a trade agreement with the US?

  • Is the country associated with a risk of terrorism?

  • Foreign business or financial interests may not benefit the US

  • Is the country an economic competitor with the US?

  • Is the country a member of NATO?

Explicación

Pregunta 39 de 196

1

Tier 5 is the minimum investigation to support initial assignment to non-critical sensitive.

Selecciona uno de los siguientes:

  • VERDADERO
  • FALSO

Explicación

Pregunta 40 de 196

1

The deliberate falsification of fact on a personnel security questionnaire is a disqualifying condition under which of these national security adjudicative guidelines?

Selecciona una de las siguientes respuestas posibles:

  • Handling Protected Information

  • Outside Activities

  • Use of Information Technology

  • Personal Conduct

Explicación

Pregunta 41 de 196

1

Review the following case details and determine whether a favorable adjudicative termination should be made.
Melissa Stewart listed mental health treatment on her SF-86. A qualified and approved mental health care provider advised that her condition is in remission and has a low probability of recurrence.
Should Ms. Stewart be granted eligibility?

Selecciona una de las siguientes respuestas posibles:

  • Yes

  • No

Explicación

Pregunta 42 de 196

1

A mitigating condition does which of the following?

Selecciona una de las siguientes respuestas posibles:

  • Overcomes a disqualifying condition in every case and permits a favorable determination

  • Lessens the severity or seriousness of a disqualifying condition

  • The adjudicator may consider it to decide a ‘borderline’ case

  • Has almost no effect on the final determination

Explicación

Pregunta 43 de 196

1

An individual with a history of excessive alcohol consumption has applied for clearance eligibility. The behavior occurred long ago, and in the years since, the individual has acknowledged and overcome the problem, and successfully completed treatment, Therefore, the individual may be granted eligibility.

Selecciona uno de los siguientes:

  • VERDADERO
  • FALSO

Explicación

Pregunta 44 de 196

1

_____________ establishes a uniform Federal PSP for all employees who hold sensitive positions or who must access classified information.

Selecciona una de las siguientes respuestas posibles:

  • White House Memorandum of Dec 29, 2005

  • Executive Order 12968

  • DoDI 5200.02/DoDM 5200.02

Explicación

Pregunta 45 de 196

1

The Tier 3 investigation replaced the ANACI, which was the former investigation used to grant initial secret of confidential eligibility for civilians.

Selecciona uno de los siguientes:

  • VERDADERO
  • FALSO

Explicación

Pregunta 46 de 196

1

Which of the following is a function of the DoD CAF?

Selecciona una de las siguientes respuestas posibles:

  • Making final appointments to civilian sensitive positions after completion of the PSIs.

  • Making final determinations on appeals of denied or revoked security clearances.

  • Determining a subject’s eligibility for military service.

  • Denying or revoking security clearance eligibility for access to classified information and/or assignment to a sensitive position.

Explicación

Pregunta 47 de 196

1

Which of the following statements is true regarding criminal conduct?

Selecciona una de las siguientes respuestas posibles:

  • Only felony convictions are disqualifying

  • Criminal conduct may be mitigated if there is evidence of rehabilitation

  • All criminal convictions are viewed equally during an adjudication

Explicación

Pregunta 48 de 196

1

The DoD DOES NOT need a Personnel Security Program because all people are equally trustworthy.

Selecciona uno de los siguientes:

  • VERDADERO
  • FALSO

Explicación

Pregunta 49 de 196

1

The subject of an investigation may request a copy of their PSI from which of the following?

Selecciona una de las siguientes respuestas posibles:

  • The investigative agency

  • The activity security office

  • The DoD CAF

  • The supervisor

Explicación

Pregunta 50 de 196

1

_________________ is the investigative agency authorized to conduct investigations for the DoD PSP.

Selecciona una de las siguientes respuestas posibles:

  • Federal Bureau of Investigations

  • Central Intelligence Agency

  • Defense Intelligence Agency

  • National Background Investigations Bureau

Explicación

Pregunta 51 de 196

1

Which of the following would be required for all levels of DoD Interim clearances?

Selecciona una de las siguientes respuestas posibles:

  • Favorable review of FBI fingerprint records

  • Favorable review of local records

  • Favorable review of a completed form SF-86

  • All of the above

Explicación

Pregunta 52 de 196

1

All DoD personnel have an obligation to report information that reflects an actual or potential danger to national security.

Selecciona uno de los siguientes:

  • VERDADERO
  • FALSO

Explicación

Pregunta 53 de 196

1

Which civilian position sensitivity level has the potential for inestimable damage to the nation security or for inestimable adverse impact to the efficiency of the DoD or the Military Services?

Selecciona una de las siguientes respuestas posibles:

  • Non-Sensitive

  • Critical-Sensitive

  • Noncritical-Sensitive

  • Special-Sensitive

Explicación

Pregunta 54 de 196

1

The step in due process for military and civilian personnel are different.

Selecciona uno de los siguientes:

  • VERDADERO
  • FALSO

Explicación

Pregunta 55 de 196

1

Review the following case details and determine whteher a favorable adjudicative determination should be made.
Stan Nelson revealed on his SF-86 that he pled guilty to statutory rape when he was 18, for having consensual sexual relations with his 16-year-old girlfriend. Mr. Nelson served a 90-day sentence and successfully completed his probation and required community service; his girlfriend subsequently express remorse that he was charged with a crim. In the 12 years since, Mr. Nelson has not had additional arrests or incidents concerning sexual or criminal behavior.
Should Mr. Nelson be granted eligibility?

Selecciona una de las siguientes respuestas posibles:

  • Yes

  • No

Explicación

Pregunta 56 de 196

1

Discovery of adverse information after issuance of security clearance eligibility _________.

Selecciona una de las siguientes respuestas posibles:

  • Will be considered at the next periodic reinvestigation

  • Automatically triggers a new investigation

  • May result in access suspension

Explicación

Pregunta 57 de 196

1

What is the purpose of the National Background Investigations Bureau (NBIB) Case Closing Transmittal cover sheer?

Selecciona una de las siguientes respuestas posibles:

  • Report an unfavorable adjudicative determination to the subject

  • Recommend an adjudicative determination to the DoD CAF

  • Document complete, incomplete, and pending checks from the investigation

Explicación

Pregunta 58 de 196

1

The briefing given to personnel who have recently been approved for access to classified information or assigned to a position of trust is the:

Selecciona una de las siguientes respuestas posibles:

  • Initial Briefing

  • Refresher Briefing

  • Termination Briefing

  • Foreign Travel Briefing

Explicación

Pregunta 59 de 196

1

A subject interview is a standard investigative element for Tier 3 and Tier 5 investigations.

Selecciona uno de los siguientes:

  • VERDADERO
  • FALSO

Explicación

Pregunta 60 de 196

1

________________ are weaknesses, characteristics or circumstances that can be exploited by an adversary to gain access to or information from an asset.

Selecciona una de las siguientes respuestas posibles:

  • Vulnerabilities

  • Risks

  • Threats

Explicación

Pregunta 61 de 196

1

Although the specific content of a Physical Security Plan may vary between components, installations, units, or activities, the format remains the same.

Selecciona uno de los siguientes:

  • VERDADERO
  • FALSO

Explicación

Pregunta 62 de 196

1

Rivers, cliffs, and dense growth are examples of which type of barrier?

Selecciona una de las siguientes respuestas posibles:

  • Active barrier

  • Natural barrier

  • Passive barrier

Explicación

Pregunta 63 de 196

1

Physical security planning is deciding which security measures will be used to prevent unauthorized access to DoD assets and to safeguard those assets against threats.

Selecciona uno de los siguientes:

  • VERDADERO
  • FALSO

Explicación

Pregunta 64 de 196

1

__________________ are conducted by peers or by senior agency personnel in the chain-of-command.

Selecciona una de las siguientes respuestas posibles:

  • Compliance inspections

  • Self-inspections

  • Surveys

  • Staff assist visits

Explicación

Pregunta 65 de 196

1

In a tactical environment, Physical Security Plans should be based on METT-TC, which stands for mission, _______________, terrain and weather, troops, time available, and civilian considerations.

Selecciona una de las siguientes respuestas posibles:

  • Exercises

  • Equipment

  • Enemy

Explicación

Pregunta 66 de 196

1

Providing information on the capabilities and intentions of our adversaries is the responsibility of the ____________.

Selecciona una de las siguientes respuestas posibles:

  • Physical Security Officer

  • Commander or Director

  • Antiterrorism Officer

  • Operational Security Officer

  • Counterintelligence Support

Explicación

Pregunta 67 de 196

1

Force Protection Conditions (FPCONs) are graduated categories of measures or actions commanders take to protect personnel and assets from attack.

Selecciona uno de los siguientes:

  • VERDADERO
  • FALSO

Explicación

Pregunta 68 de 196

1

________________ establish duties, roles and responsibilities at individual assignments, checkpoints, gates and guard posts.

Selecciona una de las siguientes respuestas posibles:

  • Physical Security Plans (PSP)

  • Memorandums of Understanding (MOU)

  • Post Orders

Explicación

Pregunta 69 de 196

1

_________________, the inspector should review any local security directives, the Physical Security Plan, its Standard Operating Procedures, and any previous inspection reports, exceptions, and waivers.

Selecciona una de las siguientes respuestas posibles:

  • When preparing the inspection report

  • In preparation for an inspection

  • During the inspection

Explicación

Pregunta 70 de 196

1

____________________ use Defense Terrorism Warning Reports to convey _________________.

Selecciona una de las siguientes respuestas posibles:

  • The DIA and COCOMs / DoD Terrorist Threat Levels

  • COCOMs and Installation Commanders / Force Protection Conditions

  • The DHS and COCOMs / DoD Terrorist Threat Levels

Explicación

Pregunta 71 de 196

1

A ______________ defines emergency delegations of authority and orders of succession to ensure DoD Component Mission Essential Functions (MEFs) continue under all circumstances.

Selecciona una de las siguientes respuestas posibles:

  • Physical Security Plan (PSP)

  • Continuity of Operations Plan (COOP)

  • Memorandum of Agreement (MOA)

Explicación

Pregunta 72 de 196

1

Threat levels assist senior leaders to determine the appropriate ________ level.

Selecciona una de las siguientes respuestas posibles:

  • Classification designation

  • FPCON

  • SOP

  • GSA security specification

Explicación

Pregunta 73 de 196

1

Two antiterrorism tools the DoD uses to safeguard DoD assets are __________________ and _______________.

Selecciona una de las siguientes respuestas posibles:

  • Force Protection Conditions (FPCONs) and Terrorist Threat Levels

  • Threat Working Group and Post Orders

  • Countermeasures and Standard Operating Procedures

Explicación

Pregunta 74 de 196

1

__________________ issue Force Protection Conditions (FPCONs).

Selecciona una de las siguientes respuestas posibles:

  • COCOMs and Installation Commanders/Facility Directors

  • The DHS and COCOMs

  • The DIA and COCOMs

Explicación

Pregunta 75 de 196

1

It’s better for an inspector not to announce the inspection in order to create a surprise effect and see how everything really operates.

Selecciona uno de los siguientes:

  • VERDADERO
  • FALSO

Explicación

Pregunta 76 de 196

1

Which system detects a change in the environment and transmits an alarm?

Selecciona una de las siguientes respuestas posibles:

  • CCTV

  • Access Controls System

  • IDS

Explicación

Pregunta 77 de 196

1

___________________ are often overlooked in physical security planning and implementation.

Selecciona una de las siguientes respuestas posibles:

  • Lights

  • Barriers

  • Man-passable openings

Explicación

Pregunta 78 de 196

1

Lighting deters unauthorized entry by providing a psychological deterrence to intruders.

Selecciona uno de los siguientes:

  • VERDADERO
  • FALSO

Explicación

Pregunta 79 de 196

1

______________________ are formal agreements that provide security assistance between DoD activities and from local law enforcement agencies as well as mutual aid from local fire and medical services.

Selecciona una de las siguientes respuestas posibles:

  • Standard Operating Procedures (SOP)

  • Physical Security Plans (PSP)

  • Memorandums of Understanding and Agreement (MOU/MOA)

Explicación

Pregunta 80 de 196

1

When assessing an asset, you must determine the nature and the value of that asset and the degree of impact if the asset is damaged or lost.

Selecciona uno de los siguientes:

  • VERDADERO
  • FALSO

Explicación

Pregunta 81 de 196

1

FPCON _________ applies in the immediate area where a terrorist attack has occurred or when intelligence has been received that terrorist action against a specific target is imminent.

Selecciona una de las siguientes respuestas posibles:

  • Normal

  • Alpha

  • Bravo

  • Charlie

  • Delta

Explicación

Pregunta 82 de 196

1

There is a one for one correlation between Terrorist Threat Levels and force Protection Conditions.

Selecciona uno de los siguientes:

  • VERDADERO
  • FALSO

Explicación

Pregunta 83 de 196

1

The _____________________ develops and refines terrorism threat assessments and coordinates and disseminates threat warnings, reports, and summaries.

Selecciona una de las siguientes respuestas posibles:

  • Defense Critical Infrastructure Protection (DCIP) Working Group

  • Antiterrorism Working Group (ATWG)

  • Threat Working Group (TWG)

Explicación

Pregunta 84 de 196

1

Examples of oversight tools include day-to-day observations, surveys, staff assist visits, ______________, and the operational environment.

Selecciona una de las siguientes respuestas posibles:

  • Policy manuals

  • Inspections

  • Executive Orders

Explicación

Pregunta 85 de 196

1

_____________________ are based on information about terrorist groups such as their operational capability, intentions, activity, and the operational environment.

Selecciona una de las siguientes respuestas posibles:

  • Continuity of Operations Plans (COOPs)

  • Counterterrorism measures

  • DoD Terrorist Threat Levels

  • Force Protection Conditions (FPCONs)

Explicación

Pregunta 86 de 196

1

Although the DoD issues DoD-wide guidance for physical security planning and implementation, you should always consult ______________ for specific guidance.

Selecciona una de las siguientes respuestas posibles:

  • Your component’s policies

  • Congressional legislation

  • Executive Orders

Explicación

Pregunta 87 de 196

1

As a physical security specialist, you may assume different physical security roles or serve on different working groups, such as the ATWG, TWG, and DCIP.

Selecciona uno de los siguientes:

  • VERDADERO
  • FALSO

Explicación

Pregunta 88 de 196

1

_______________ can result from day-to-day observations or more formal oversight.

Selecciona una de las siguientes respuestas posibles:

  • Inspection reports

  • Incident reports

  • Surveys

Explicación

Pregunta 89 de 196

1

Antiterrorism physical security measures incorporate detection, deterrence, denial and ____________.

Selecciona una de las siguientes respuestas posibles:

  • Documentation

  • Evaluation

  • Determination

  • Notification

Explicación

Pregunta 90 de 196

1

The only factor that should be considered when selecting an Intrusion Detection System is the criticality of the asset.

Selecciona uno de los siguientes:

  • VERDADERO
  • FALSO

Explicación

Pregunta 91 de 196

1

What type of access control system uses verification of an acceptable form of identification such as the Common Access Card, or CAC?

Selecciona una de las siguientes respuestas posibles:

  • Manual

  • Combination

  • Biometric

  • Physical

  • Mechanical

  • Automated

Explicación

Pregunta 92 de 196

1

Controlled lighting is used when it is necessary to limit the brightness of the light.

Selecciona uno de los siguientes:

  • VERDADERO
  • FALSO

Explicación

Pregunta 93 de 196

1

What kind of light should be selected in order to enable the security guards to observe intruders at a considerable distance beyond the perimeter?

Selecciona una de las siguientes respuestas posibles:

  • Glare projection

  • Emergency projection

  • Downside illumination

  • Standby illumination

Explicación

Pregunta 94 de 196

1

Response forces ___________________________________ .

Selecciona una de las siguientes respuestas posibles:

  • respond to alarms and incidents

  • dispatch response forces and mobile patrols

  • guard a high-priority resource

  • can cover large areas in a timely manner

Explicación

Pregunta 95 de 196

1

The purpose of an intrusion detection system is to deter, detect, and _____________ intrusion.

Selecciona una de las siguientes respuestas posibles:

  • Forbid

  • Prevent

  • Document

  • Thwart

Explicación

Pregunta 96 de 196

1

A security system with a camera that captures an image, converts it to a video signal, and transmits it to a monitoring station defines _______________________ .

Selecciona una de las siguientes respuestas posibles:

  • screening equipment

  • visual monitoring and deterrence

  • access control systems

  • closed circuit television (CCTV)

Explicación

Pregunta 97 de 196

1

The central point for collecting the alarm status from the Premise Control Units (PCU s) handling the alarms under the control of an IDS is the _______________________________ .

Selecciona una de las siguientes respuestas posibles:

  • Transmission line hub

  • Security technology and equipment installation

  • monitoring station

Explicación

Pregunta 98 de 196

1

Biometric and non-biometric access control systems are examples of the __________________________ type of access control system.

Selecciona una de las siguientes respuestas posibles:

  • Combination

  • Automated

  • Manual

  • Mechanical

  • Physical

Explicación

Pregunta 99 de 196

1

What Security-in-Depth principle is illustrated by a vault with special controls to limit access to only some of the personnel that work within a secure facility?

Selecciona una de las siguientes respuestas posibles:

  • control

  • area security

  • enclaving

  • separation

Explicación

Pregunta 100 de 196

1

What type of Intrusion Detection System (IDS) monitoring provides local centralized monitoring?

Selecciona una de las siguientes respuestas posibles:

  • Proprietary monitoring

  • Central station monitoring

  • Local monitoring

  • None of the above

Explicación

Pregunta 101 de 196

1

A visitor with a record in the Joint Personnel Adjudication System (JPAS) reflecting the appropriate level of access eligibility but who does not have a verified need-to-know for information protected within the controlled area would require ___________________________.

Selecciona una de las siguientes respuestas posibles:

  • a visitor badge

  • an "escort required" visitor badge only

  • an "escort required" visitor badge and escort

  • a CAC and escort

Explicación

Pregunta 102 de 196

1

A closed circuit television (CCTV) is an especially valuable security asset because it can be used effectively without establishing procedures and providing training in its use.

Selecciona uno de los siguientes:

  • VERDADERO
  • FALSO

Explicación

Pregunta 103 de 196

1

When is a security force response required?

Selecciona una de las siguientes respuestas posibles:

  • When an Intrusion Detection System (IDS) sensor is triggered.

  • When an Intrusion Detection System (IDS) is not reporting an alarm.

  • When an Intrusion Detection System (IDS) protects a highly critical asset.

  • When an Intrusion Detection System (IDS) alarm notification is received.

Explicación

Pregunta 104 de 196

1

Conveyor belt style x-ray machines are classified as what type of screening equipment?

Selecciona una de las siguientes respuestas posibles:

  • Pedestrian

  • Fixed

  • Intrusive

  • Portable

Explicación

Pregunta 105 de 196

1

What are the types of screening equipment most frequently used by the Department of Defense (DoD)?

Selecciona una de las siguientes respuestas posibles:

  • Fixed and portable

  • Portable and closed circuit television (CCTV)

  • Detection and reporting

Explicación

Pregunta 106 de 196

1

What Intrusion Detection System (IDS) operational phase is activated when the Premise Control Unit (PCU) receives signals from sensors in a protected area and incorporates these signals into a communications scheme?

Selecciona una de las siguientes respuestas posibles:

  • Response/Assessment

  • Detection

  • Dispatch

  • Reporting

Explicación

Pregunta 107 de 196

1

What is the preferred method of Intrusion Detection System (IDS) monitoring?

Selecciona una de las siguientes respuestas posibles:

  • Central station monitoring

  • Proprietary monitoring

  • Remote monitoring

  • Local monitoring

Explicación

Pregunta 108 de 196

1

What type of access control system is a card swipe, with or without a personal identification number, or PIN?

Selecciona una de las siguientes respuestas posibles:

  • Combination

  • Physical

  • Manual

  • Automated

  • Biometric

Explicación

Pregunta 109 de 196

1

What type of lighting is used when additional lighting is necessary and may be activated by alarm or motion detector?

Selecciona una de las siguientes respuestas posibles:

  • Standby lighting

  • Surface lighting

  • Emergency lighting

  • Continuous lighting

Explicación

Pregunta 110 de 196

1

What are signs, barriers, and fences used for in perimeter protection systems?

Selecciona una o más de las siguientes respuestas posibles:

  • Deterring unlawful or unauthorized entry

  • Establishing legal boundaries

  • Preventing all types of penetration

  • Integrating protection assets

  • Preventing observation from outside

Explicación

Pregunta 111 de 196

1

Active barrier systems define perimeters and ensure only authorized personnel are permitted access.

Selecciona uno de los siguientes:

  • VERDADERO
  • FALSO

Explicación

Pregunta 112 de 196

1

When are static observation posts used?

Selecciona una de las siguientes respuestas posibles:

  • When continuous surveillance is required.

  • To cover large areas in a timely manner.

  • To monitor alarms and respond to emergencies.

  • To monitor entry to a facility or secure area.

Explicación

Pregunta 113 de 196

1

The use of _____________________ provides security personnel the ability to visually monitor multiple areas simultaneously.

Selecciona una de las siguientes respuestas posibles:

  • access control

  • closed circuit television (CCTV)

  • a visual deterrent system

  • screening equipment

Explicación

Pregunta 114 de 196

1

What does an Intrusion Detection System (IDS) detect?

Selecciona una de las siguientes respuestas posibles:

  • Only unauthorized intrusions

  • A change in the state of an indoor detection device by a change in outdoor environmental devices

  • A change in state of detection devices that may require further investigation

  • Prevention of an unauthorized intrusion

Explicación

Pregunta 115 de 196

1

While both Class V and Class VI GSA-approved containers offer protection against covert and surreptitious entry, only Class V containers offer protection against forced entry.

Selecciona uno de los siguientes:

  • VERDADERO
  • FALSO

Explicación

Pregunta 116 de 196

1

What is the purpose of the warning label on GSA-approved containers manufactured beginning April 2007?

Selecciona una de las siguientes respuestas posibles:

  • Warns against storing classified information with sensitive materials such as money and weapons

  • Warns against storing unclassified information in the container

  • Warns against unapproved modification of the container

Explicación

Pregunta 117 de 196

1

In AA&E storage facilities, why must drainage structures be secured if they cross the fence line and meet certain size requirements?

Selecciona una de las siguientes respuestas posibles:

  • To prevent rats from infesting the facility

  • To prevent anyone from crawling into the area

  • To prevent water from backing up into the facility

Explicación

Pregunta 118 de 196

1

Unauthorized entrance into restricted areas is subject to prosecution.

Selecciona uno de los siguientes:

  • VERDADERO
  • FALSO

Explicación

Pregunta 119 de 196

1

Which is NOT approved for the open storage of classified information?

Selecciona una de las siguientes respuestas posibles:

  • Storage closet

  • Secure room

  • Vault

Explicación

Pregunta 120 de 196

1

Which DoD-mandated practice reduces protection, storage, and inventory costs?

Selecciona una de las siguientes respuestas posibles:

  • Consolidate AA&E storage facilities

  • Categorize and store AA&E by security risk categories

  • Demilitarize/dispose of obsolete and unserviceable AA&E

Explicación

Pregunta 121 de 196

1

You can find construction standards for vaults and secure rooms in DoD facilities by reviewing _________________.

Selecciona una de las siguientes respuestas posibles:

  • the NISPOM

  • ICS 705

  • DoDM 5200.01, Volumes 1-4, Information Security Program

Explicación

Pregunta 122 de 196

1

DoDM 5200.01, Volumes 1-4, Information Security Program
Which of the following statements is true about locks and keys for security containers?

Selecciona una de las siguientes respuestas posibles:

  • Keys may be stored in your desk drawer as long as it locks.

  • Key-operated locks may not be used on storage containers securing classified material.

  • Locks and keys should be afforded the same level of protection as the material or information being secured.

Explicación

Pregunta 123 de 196

1

Certain non-GSA-approved security containers are approved for storage of classified information in the DoD.

Selecciona uno de los siguientes:

  • VERDADERO
  • FALSO

Explicación

Pregunta 124 de 196

1

The design goal for an AA&E storage facility is that is must meet or exceed 10 minutes of resistance to _________________ entry.

Selecciona una de las siguientes respuestas posibles:

  • covert

  • surreptitious

  • forced

Explicación

Pregunta 125 de 196

1

Why should you categorize, store, and protect AA&E by security risk categories?

Selecciona una de las siguientes respuestas posibles:

  • To reduce overall protection costs

  • To save space

  • To identify obsolete AA&E

Explicación

Pregunta 126 de 196

1

Storage containers and facilities protect valuable, sensitive, and classified information by ________________.

Selecciona una de las siguientes respuestas posibles:

  • consolidating no longer needed classified information

  • delaying unauthorized entry

  • preventing all unauthorized entry

Explicación

Pregunta 127 de 196

1

If you need to know the manufacture date of a GSA-approved container, on which label would you find that information?

Selecciona una de las siguientes respuestas posibles:

  • Number label

  • GSA-approved label

  • Warning label

  • Test certification label

  • Container identification label

Explicación

Pregunta 128 de 196

1

Which of these statements is true about storage of Confidential information?

Selecciona una de las siguientes respuestas posibles:

  • Supplemental protection is not normally required when storing Confidential information in an approved storage container.

  • Supplemental protection is always required when storing Confidential information regardless of which storage container is used.

  • Supplemental protection is usually required when storing Confidential information in a secure room.

Explicación

Pregunta 129 de 196

1

Storage containers and facilities are not only important to our national security, but also to the safety of the general public.

Selecciona uno de los siguientes:

  • VERDADERO
  • FALSO

Explicación

Pregunta 130 de 196

1

For AA&E SRC III & IV, if no IDS is present Security Force checks during non-duty hours is required.

Selecciona uno de los siguientes:

  • VERDADERO
  • FALSO

Explicación

Pregunta 131 de 196

1

Storage containers or facilities will always provide enough protection for certain types of information or material on their own.

Selecciona uno de los siguientes:

  • VERDADERO
  • FALSO

Explicación

Pregunta 132 de 196

1

To store classified information, you may only use Class V or Class VI GSA-approved containers as the other classes of containers may no longer be used.

Selecciona uno de los siguientes:

  • VERDADERO
  • FALSO

Explicación

Pregunta 133 de 196

1

What is considered an additional measure for AA&E storage?

Selecciona una de las siguientes respuestas posibles:

  • IDS

  • Communications

  • CCTV

  • Security Forces

Explicación

Pregunta 134 de 196

1

There are certain times when you must change the combination on locks securing classified information. Which of the following is not a time when you must change the combination?

Selecciona una de las siguientes respuestas posibles:

  • When the container is taken out of service

  • When the container or lock has been subject to possible compromise

  • When anyone with knowledge of the combination no longer requires access

  • Prior to going on extended leave

Explicación

Pregunta 135 de 196

1

Which group uses the same set of storage requirements based on security risk categories?

Selecciona una de las siguientes respuestas posibles:

  • Arms and ammunition

  • Arms and explosives

  • Ammunition and explosives

Explicación

Pregunta 136 de 196

1

What items can a Nuclear Storage Facility store?

Selecciona una de las siguientes respuestas posibles:

  • Nothing

  • Weapons

  • Precious metals

  • Money

Explicación

Pregunta 137 de 196

1

Perimeter lighting in AA&E storage facilities is _________________________.

Selecciona una de las siguientes respuestas posibles:

  • Determined by DoD Components

  • A good best practice

  • Required

Explicación

Pregunta 138 de 196

1

Which of these statements is true about storage of Secret information?

Selecciona una de las siguientes respuestas posibles:

  • Supplemental protection is not required when storing Secret information in a vault.

  • Supplemental protection is always required when storing Secret information.

  • Supplemental protection is never required when storing Secret information in a secure room.

Explicación

Pregunta 139 de 196

1

What do the classes of GSA-approved containers represent?

Selecciona una de las siguientes respuestas posibles:

  • Which ones are approved for the storage of classified information

  • The types of sensitive material for which each container is approved

  • Varying degrees of protection against different types of unauthorized entry

Explicación

Pregunta 140 de 196

1

Who uses SCIFs?

Selecciona una de las siguientes respuestas posibles:

  • The intelligence community

  • Only those who have a Top Secret clearance

  • Anyone who stores classified information

Explicación

Pregunta 141 de 196

1

If you needed to find information on physical security standards for SCIFs, which reference would you consult?

Selecciona una de las siguientes respuestas posibles:

  • ICD 705

  • The NISPOM

  • DoDM 5200.01, Volumes 1-4

Explicación

Pregunta 142 de 196

1

For storage of classified you may use which GSA-approved containers?

Selecciona una de las siguientes respuestas posibles:

  • Only containers with black labels

  • Containers with any GSA-approved label

  • Only containers with red labels

Explicación

Pregunta 143 de 196

1

Which of the following is an example of a locking device?

Selecciona una de las siguientes respuestas posibles:

  • Bolt

  • Cylinder

  • Key

Explicación

Pregunta 144 de 196

1

You are considering locking solutions for your facility. When assessing the life safety aspect of the solution, which of the following must be considered?

Selecciona una de las siguientes respuestas posibles:

  • fire alarms on doors

  • keeping intruders out

  • emergency exit from a locked door

Explicación

Pregunta 145 de 196

1

The use of a master key system is not acceptable in ____________.

Selecciona una de las siguientes respuestas posibles:

  • barracks

  • general office areas

  • secure areas

Explicación

Pregunta 146 de 196

1

Which of the following must you do when opening an electromechanical lock such as the X-07, X-08, X-09, and X-10?

Selecciona una de las siguientes respuestas posibles:

  • Count the number of dial rotations in between each number in the combination.

  • Turn the dial and stop it when you see the correct number displayed on the LCD.

Explicación

Pregunta 147 de 196

1

All locks consist of three components, one of which is an operating mechanism. Which of the following is NOT one of the other two components?

Selecciona una de las siguientes respuestas posibles:

  • Locking device

  • Switching device

  • Securing device

Explicación

Pregunta 148 de 196

1

Which of the following should you do before changing a combination?

Selecciona una de las siguientes respuestas posibles:

  • Try the combination three times

  • Call your FSO

  • Lock drawer in open position

Explicación

Pregunta 149 de 196

1

The lock you are using has an LCD rather than a dial with imprinted numbers. You are using _______________________.

Selecciona una de las siguientes respuestas posibles:

  • an electromechanical combination lock

  • a combination padlock

  • a mechanical combination lock

Explicación

Pregunta 150 de 196

1

Under Federal Specification FFL-2937, only the S&G 2740 is approved for use as a mechanical combination lock.

Selecciona uno de los siguientes:

  • VERDADERO
  • FALSO

Explicación

Pregunta 151 de 196

1

Which of the following is not a locking device for a key-operated lock?

Selecciona una de las siguientes respuestas posibles:

  • Bolt

  • Pin

  • Latch

Explicación

Pregunta 152 de 196

1

Which type of cylinder provides a locking solution that minimizes the rekeying burden?

Selecciona una de las siguientes respuestas posibles:

  • Rim cylinder

  • Interchangeable core cylinder

  • Mortise cylinder

Explicación

Pregunta 153 de 196

1

When assessing the life safety aspect of a locking solution for a facility door, which of the following must be considered?

Selecciona una de las siguientes respuestas posibles:

  • The door must be locked to prevent unauthorized entry, but allow those inside to exit through the door without unlocking it.

  • The door must be locked to prevent unauthorized entry and exit.

  • The door must be unlocked so that those inside can exit without having to unlock the door.

Explicación

Pregunta 154 de 196

1

RIsk Management is defined as the process of selecting and implemeting ________________________ to achieve an acceptable level of risk at an acceptable cost.

Selecciona una de las siguientes respuestas posibles:

  • Assets

  • Countermeasures

  • Procedures

  • Threats

Explicación

Pregunta 155 de 196

1

Select the correct order of steps in the Risk Management Process.

Selecciona una de las siguientes respuestas posibles:

  • Identify Assets, Identify Threats, Assess Vulnerabilities, Assess Risks, Determine Countermeasures

  • Identify Threats, Assess Vulnerabilities, Identify Assets, Determine Countermeasures, Assess Risks

  • Assess Vulnerabilities, Identify Assets, Determine Countermeasures, Identify Threats, Assess RIsks

  • Determine Countermeasures, Assess RIsks, Assess Vulnerabilities, Identify Assets, Identify Threats

Explicación

Pregunta 156 de 196

1

A key and lock custodian should change or rotate locks at least _____________.

Selecciona una de las siguientes respuestas posibles:

  • monthly

  • annually

  • quarterly

Explicación

Pregunta 157 de 196

1

Which of the following statements is true?

Selecciona una de las siguientes respuestas posibles:

  • You may not change a combination without a commercial locksmith.

  • You may never allow a commercial locksmith to change your combination.

  • You may allow a commercial locksmith to change your combination under certain circumstances.

Explicación

Pregunta 158 de 196

1

Susan Johnson knows the combination to a security container and Susan lost her clearance today, but she was not terminated from her job. What must happen?

Selecciona una de las siguientes respuestas posibles:

  • The combination on that security container must be changed.

  • Nothing must happen. Susan knows she’s no longer authorized and will not access the storage container.

  • The security container must be replaced.

Explicación

Pregunta 159 de 196

1

Which electromechanical lock uses battery power?

Selecciona una de las siguientes respuestas posibles:

  • S&G 2740B

  • X-10

  • X-08

Explicación

Pregunta 160 de 196

1

Which of the following is the purpose of a lock’s switching device?

Selecciona una de las siguientes respuestas posibles:

  • To allow or deny entry into a container or area

  • To authorize the locking device to open

  • To keep the area or container secured

Explicación

Pregunta 161 de 196

1

You need to decide what type of locking system to use for a storage closet. The closet does not hold classified or sensitive information, but you want to deter entry. Which type of key-operated lock should you use?

Selecciona una de las siguientes respuestas posibles:

  • A padlock

  • A built-in lock

Explicación

Pregunta 162 de 196

1

The two primary types of locks used within DoD are ___________ and key locks.

Selecciona una de las siguientes respuestas posibles:

  • Biometric

  • Encoded

  • Voice activated

  • Combination

Explicación

Pregunta 163 de 196

1

Which statement best describes the relationship between a locking solution’s level of protection and its cost and labor effort?

Selecciona una de las siguientes respuestas posibles:

  • Locking solutions do not have a correlation between level of protection and cost and labor effort; it simply depends on the specific solution.

  • Locking solutions that provide a higher level of protection are more costly, but less labor-intensive.

  • Locking solutions that provide a higher level of protection are more costly and labor-intensive.

Explicación

Pregunta 164 de 196

1

Using birth dates when changing combination numbers is acceptable as long as you don’t use your own.

Selecciona uno de los siguientes:

  • VERDADERO
  • FALSO

Explicación

Pregunta 165 de 196

1

Pin tumblers are most commonly employed on _______ locks?

Selecciona una de las siguientes respuestas posibles:

  • combination

  • tubular

  • cylinder

Explicación

Pregunta 166 de 196

1

What is not a responsibility of the Key Custodian?

Selecciona una de las siguientes respuestas posibles:

  • Audit Keys monthly

  • Change or rotate locks quarterly

  • Audit Locks monthly

  • Keep key control register

Explicación

Pregunta 167 de 196

1

Which of the following is the switching device for a key-operated lock?

Selecciona una de las siguientes respuestas posibles:

  • bolt

  • cylinder

  • key

Explicación

Pregunta 168 de 196

1

Which of the following is a disadvantage to using a master key system?

Selecciona una de las siguientes respuestas posibles:

  • The cost to re-key all of the locks in the system.

  • It is harder to pick the locks.

  • It is harder to copy the locks.

Explicación

Pregunta 169 de 196

1

The S&G 2937 lock is an example of which type of combination lock?

Selecciona una de las siguientes respuestas posibles:

  • mechanical

  • padlock

  • electromechanical built-in

Explicación

Pregunta 170 de 196

1

Many building codes require a facility’s exit doors to contain which of the following devices?

Selecciona una de las siguientes respuestas posibles:

  • An access card

  • Emergency egress hardware

  • A padlock

Explicación

Pregunta 171 de 196

1

You are making a decision about the locking system to be used in a bulk storage area that contains classified information. Which type of key-operated lock should you use?

Selecciona una de las siguientes respuestas posibles:

  • A built-in lock

  • An approved padlock

Explicación

Pregunta 172 de 196

1

You need to review the requirements that electromechanical locks meet. Which of the following specifications should you reference?

Selecciona una de las siguientes respuestas posibles:

  • Federal Specification FF-L-2740B

  • Federal Specification FF-P-110

  • Federal Specification FF-L-2937

Explicación

Pregunta 173 de 196

1

Which of the following is authorized by the DoD for securing conventional arms, ammunition, and explosives (AA&E)?

Selecciona una de las siguientes respuestas posibles:

  • X-10 lock

  • Combination padlock

  • S&G 833C

Explicación

Pregunta 174 de 196

1

You need to secure classified information. Which of these locks could you use?

Selecciona una de las siguientes respuestas posibles:

  • X-10 electromechanical lock

  • S&G 2740B

  • S&G 8077 padlock

  • All of these locks

Explicación

Pregunta 175 de 196

1

In the Risk Management Process, Assets can be assigned to each of the following categories:

Selecciona una o más de las siguientes respuestas posibles:

  • Information

  • Activities and Operations

  • Security

  • People

Explicación

Pregunta 176 de 196

1

Which of the following are undesirable events that can adversely affect an asset?

Selecciona una o más de las siguientes respuestas posibles:

  • Access controls

  • Loss of classified documents

  • Terrorist bombing

  • Unauthorized access to sensitive computer files

Explicación

Pregunta 177 de 196

1

In the Risk Management Process, a _____________ rating indicates that a compromise to assets would have serious consequences resulting in loss of classified or highly sensitive data that could impair operations affecting nation interest for a limited period of time

Selecciona una de las siguientes respuestas posibles:

  • Medium

  • Low

  • High

  • Critical

Explicación

Pregunta 178 de 196

1

Which of the following are examples of threats?

Selecciona una de las siguientes respuestas posibles:

  • Terrorists

  • Insiders

  • Natural Disasters

  • All of the above

Explicación

Pregunta 179 de 196

1

A threat may include which of the following?

Selecciona una o más de las siguientes respuestas posibles:

  • The intention and capability of an adversary to undertake detrimental action against an asset owners interest.

  • Potential vulnerabilities related to specific assets and their undesirable actions.

  • Any indication, or event with the potential to cause loss or damage to an asset.

Explicación

Pregunta 180 de 196

1

Which of the following are general areas of potential vulnerabilities?

Selecciona una o más de las siguientes respuestas posibles:

  • Operational

  • Facility

  • Security

  • Human

  • Information

Explicación

Pregunta 181 de 196

1

Compute this Risk Assessment formula: Risk = Impact x (Threat x Vulnerability)
Impact = 75
Threat = 0.6
Vulnerability = 0.5

Selecciona una de las siguientes respuestas posibles:

  • 225

  • 75.1

  • 22.5

  • 738

Explicación

Pregunta 182 de 196

1

Which of the following are categories of countermeasures in the Risk Management Process?

Selecciona una o más de las siguientes respuestas posibles:

  • Security

  • Manpower

  • Procedures

  • Equipment

Explicación

Pregunta 183 de 196

1

Risk Management is the process of selecting and implementing security countermeasures to achieve an acceptable level of risk at any cost.

Selecciona uno de los siguientes:

  • VERDADERO
  • FALSO

Explicación

Pregunta 184 de 196

1

Capability refers to an adversary's ability to act as a potential threat.

Selecciona uno de los siguientes:

  • VERDADERO
  • FALSO

Explicación

Pregunta 185 de 196

1

What common vulnerability areas might an adversary exploit?

Selecciona una de las siguientes respuestas posibles:

  • Assets at risk of visual observation

  • Information leaks

  • Physically stored equipment

  • All of the above

Explicación

Pregunta 186 de 196

1

Wireless computer networks are an example of a vulnerability in which category?

Selecciona una de las siguientes respuestas posibles:

  • Human

  • Operational

  • Informational

  • Facility

  • Equipment

Explicación

Pregunta 187 de 196

1

Which property control systems are an example of a vulnerability in which category?

Selecciona una de las siguientes respuestas posibles:

  • Human

  • Operational

  • Informational

  • Facility

  • Equipment

Explicación

Pregunta 188 de 196

1

Which of the following are important roles of the NISP in Continuous Monitoring?

Selecciona una o más de las siguientes respuestas posibles:

  • to establish organizational business practices

  • to ensure that cleared industry safeguards classified information and information systems

  • to protect critical assets

  • to thwart foreign adversaries and insider threats to information systems

Explicación

Pregunta 189 de 196

1

This guidance requires that individuals' actions on a classified contractor information system be auditable.

Selecciona una de las siguientes respuestas posibles:

  • National Industrial Security Program Operating Manual (NISPOM)

  • National Institute of Standards and Technology Special Publication (NIST SP)

  • DoD Policy and Guidance

Explicación

Pregunta 190 de 196

1

These policies and guidance establishes the requirement for a continuous and integrated capability to monitor and audit for threats and vulnerabilities from internal and external sources.

Selecciona una de las siguientes respuestas posibles:

  • National Industrial Security Program Operating Manual (NISPOM)

  • National Institute of Standards and Technology Special Publication (NIST SP)

  • DoD Policy and Guidance

Explicación

Pregunta 191 de 196

1

This publication provides detailed guidance on the development and implementation of an Information Security Continuous Monitoring (ISCM) program and security-focused configuration management.

Selecciona una de las siguientes respuestas posibles:

  • National Industrial Security Program Operating Manual (NISPOM)

  • National Institute of Standards and Technology Special Publication (NIST SP)

  • DoD Policy and Guidance

Explicación

Pregunta 192 de 196

1

Which of the following identify how the RMF supports risk management?

Selecciona una o más de las siguientes respuestas posibles:

  • The RMF process ensures that business process decisions can override user information system concerns.

  • The RMF process provides a flexible approach with decision-making at tier 3.

  • The RMF process ensures traceability and transparency across all levels of the organization,

  • The RMF process emphasizes continuous monitoring and timely correction of deficiencies,

Explicación

Pregunta 193 de 196

1

An Information Systems Owner (ISO) categorizes systems at this RMF level:

Selecciona una de las siguientes respuestas posibles:

  • Tier 1

  • Tier 2

  • Tier 3

Explicación

Pregunta 194 de 196

1

The Program Manager/System Manager (PM/SM) enforces RMF authorizations decisions at this level:

Selecciona una de las siguientes respuestas posibles:

  • Tier 1

  • Tier 2

  • Tier 3

Explicación

Pregunta 195 de 196

1

ISCM strategy at this level is focused on the controls that address the establishment and management of the organization's information security program, including establishing the minimum frequency with which each security control or metric is to be assessed or monitored.

Selecciona una de las siguientes respuestas posibles:

  • Tier 1

  • Tier 2

  • Tier 3

Explicación

Pregunta 196 de 196

1

ISCM strategy at this level is focused on high-level information security governance policy as it relates to risk to the organization as a whole, to its core missions, and to its business functions.

Selecciona una de las siguientes respuestas posibles:

  • Tier 1

  • Tier 2

  • Tier 3

Explicación