Arthur Casto
Test por , creado hace más de 1 año

Security

10395
3
0
Arthur Casto
Creado por Arthur Casto hace casi 6 años
Cerrar

SFPC 4

Pregunta 1 de 200

1

ISCM strategy at this level is focused on ensuring that all system-level security controls are implemented correctly, operate as intended, produce the desired outcome with respect to meeting the security requirements for the system, and continue to be effective over time.

Selecciona una de las siguientes respuestas posibles:

  • Tier 1

  • Tier 2

  • Tier 3

Explicación

Pregunta 2 de 200

1

Which of the following are security-focused configuration management (SecCM) roles in risk management?

Selecciona una o más de las siguientes respuestas posibles:

  • Ensuring that adjustments to the system configuration do not adversely affect the security of the information system

  • Establishing configuration baselines and tracking, controlling, and managing aspects of business development

  • Ensuring that adjustments to the system configuration do not adversely affect the organizations operations

  • Establishing a firm schedule for security patch updates every six months

Explicación

Pregunta 3 de 200

1

This security Configuration Management (CM) control includes physical and logical access controls and prevents the installation of software and firmware unless verified with an approved certificate.

Selecciona una de las siguientes respuestas posibles:

  • Configuration Change Control

  • Access Restrictions for Change

  • Configuration Settings

  • Least Functionality

  • Software Usage Restrictions

  • User-Installed Software

Explicación

Pregunta 4 de 200

1

This security Configuration Management (CM) control ensures that software use complies with contract agreements and copyright laws, tracks usage, and is not used for unauthorized distribution, display, performance, or reproduction.

Selecciona una de las siguientes respuestas posibles:

  • Configuration Change Control

  • Access Restrictions for Change

  • Configuration Settings

  • Least Functionality

  • Software Usage Restrictions

  • User-Installed Software

Explicación

Pregunta 5 de 200

1

This security Configuration Management (CM) control involves the systematic proposal, justification, implementation, testing, review, and disposition of changes to the systems, including system upgrades and modifications.

Selecciona una de las siguientes respuestas posibles:

  • Configuration Change Control

  • Access Restrictions for Change

  • Configurations Settings

  • Least Functionality

  • Software Usage Restrictions

  • User-Installed Software

Explicación

Pregunta 6 de 200

1

This security Configuration Management (CM) control applies to the parameters that can be changed in hardware, software, or firmware components that affect the security posture and/or funtionality of the system, including registry settings, account/directory permission setting, and settings for functions, ports and protocols.

Selecciona una de las siguientes respuestas posibles:

  • Configuration Change Control

  • Access Restrictions for Change

  • Configuration Settings

  • Least Functionality

  • Software Usage Restrictions

  • User-Installed Software

Explicación

Pregunta 7 de 200

1

Which of the following describes the role of the National Industrial Security Program (NISP) in continuous monitoring?

Selecciona una de las siguientes respuestas posibles:

  • The NISP ensures that requirements for continuous monitoring are undertaken by the government before any classified work may begin

  • The NISP ensures the partnership between the federal government and private industry places the burden of risk on the subcontractors.

  • The NISP ensures that restrictions on continuous monitoring activities are in place before any classified work may begin.

  • The NISP ensures that monitoring requirements, restrictions, and safeguards that industry must follow are in place before any classified work may begin.

Explicación

Pregunta 8 de 200

1

Which of the following describes the relationship between configuration management controls and continuous monitoring?

Selecciona una de las siguientes respuestas posibles:

  • The configuration management process ensures that patches are applied on systems once a year as a continuous monitoring activity.

  • Implementing information system changes almost always results in some adjustment to the system configuration that requires continuous monitoring of security controls.

  • The configuration management process ensures that a schedule for continuous monitoring is in place for anticipated future interconnected systems.

Explicación

Pregunta 9 de 200

1

Which of the following is a role of risk management in continuous monitoring?

Selecciona una de las siguientes respuestas posibles:

  • Risk management in continuous monitoring ensures that information security solutions are broad-based, consensus-driven, and address the ongoing needs of and risks to the government and industry.

  • Cybersecurity requirements are managed through the risk management framework while continuous monitoring activities address password changes and Help Desk tasks.

  • Risk management facilitates an organization-wide vision for security but does not impact continuous monitoring daily and weekly activities.

Explicación

Pregunta 10 de 200

1

Select ALL the correct responses. Which of the following describe continuous monitoring capabilities for detecting threats and mitigating vulnerabilities?

Selecciona una o más de las siguientes respuestas posibles:

  • Conducting frequent audits

  • Not relying on firewalls to protect against all attacks

  • Disseminating a fillable form to information system owners to log suspicious activity

  • Reporting intrusion attempts

Explicación

Pregunta 11 de 200

1

Which of the following describes how the Information System Continuous Monitoring (ISCM) strategy supports the Tier 2 MISSION/BUSINESS PROCESSES approach to risk management?

Selecciona una de las siguientes respuestas posibles:

  • Tier 2 ISCM strategies focus on ensuring that all system-level security controls
    are implemented correctly, operate as intended, produce the desired outcome with respect to meeting the security requirements for the system, and continue to be effective over time.

  • Tier 2 ISCM strategies focus on the controls that address the establishment and management of the organization’s information security program, including establishing the minimum frequency with which each security control or metric is to be assessed or monitored.

  • Tier 2 ISCM strategies focus on high-level information security governance policy as it relates to risk to the organization as a whole, to its core missions, and to its business functions.

Explicación

Pregunta 12 de 200

1

Which of the following is an example of how counterintelligence and cybersecurity personnel support continuous monitoring?

Selecciona una de las siguientes respuestas posibles:

  • Counterintelligence and cybersecurity personnel test automated tools and make recommendations to industry and DoD organizations.

  • Through aggregation and analysis of Suspicious Network Activity via cyber intrusion, viruses, malware, backdoor attacks, acquisition of user names and passwords, and similar targeting, the DSS CI Directorate produces and disseminates reports on trends in cyberattacks and espionage.

Explicación

Pregunta 13 de 200

1

Which of the following describes how audit logs support continuous monitoring?

Selecciona una de las siguientes respuestas posibles:

  • Security auditing is a fundamental activity in continuous monitoring in order to schedule automatic security maintenance.

  • Security auditing is a fundamental activity in continuous monitoring in order to ensure access restriction controls are in place on an information system.

  • Security auditing is a fundamental activity in continuous monitoring in order to determine what activities occurred and which user or process was responsible for them on an information system.

Explicación

Pregunta 14 de 200

1

Which of the following identifies how the Risk Management Framework (RMF) supports risk management?

Selecciona una de las siguientes respuestas posibles:

  • The RMF process provides a flexible approach with decision-making at Tier 3.

  • The RMF process ensures that business process decisions can override user information system concerns.

  • The RMF process emphasizes continuous monitoring and timely correction of deficiencies.

Explicación

Pregunta 15 de 200

1

Select ALL the correct responses. Which of the following are key information provided in a security audit trail analysis?

Selecciona una o más de las siguientes respuestas posibles:

  • Budgeting and cost controls not operating as intended

  • Unsuccessful accesses to security-relevant objects and directories

  • Successful and unsuccessful logons/logoffs

  • Denial of access for excessive logon attempts

Explicación

Pregunta 16 de 200

1

Which of the following fundamental concepts does continuous monitoring support that means DoD information technology is managed to minimize shared risk by ensuring the security posture of one system is not undermined by vulnerabilities of interconnected systems?

Selecciona una de las siguientes respuestas posibles:

  • Keep up-to-date inventories

  • Interoperability and operational reciprocity

  • Force users to use encryption

Explicación

Pregunta 17 de 200

1

Which of the following ensures that a process is in place for authorized users to report all cybersecurity-related events and potential threats and vulnerabilities and initiates protective or corrective measures when a cybersecurity incident or vulnerability is discovered?

Selecciona una de las siguientes respuestas posibles:

  • Program Manager/System Manager

  • Information System Owner

  • Information System Security Officer

  • User Representative

Explicación

Pregunta 18 de 200

1

Which of the following are the initial steps for finding the Security Event Log on a computer running Windows 7?

Selecciona una de las siguientes respuestas posibles:

  • Select Control Panel from the Windows Start menu and then select the Security Event Log

  • Select Control Panel from the Windows Start menu and then select Windows Log

  • Select Control Panel from the Windows Start menu and then select the Administrative Tools link

  • Select Control Panel from the Windows Start menu and then select the System and Security link

Explicación

Pregunta 19 de 200

1

During which of the following Risk Management Framework steps does continuous monitoring take place?

Selecciona una de las siguientes respuestas posibles:

  • Step 1, categorize the system

  • Step 4, assess the controls

  • Step 5, authorize the information system

  • Step 6, monitor the security controls

Explicación

Pregunta 20 de 200

1

Which of the following describes the role of counterintelligence and cybersecurity in identifying threats to DoD information systems?

Selecciona una de las siguientes respuestas posibles:

  • Counterintelligence and cybersecurity personnel ensure the contractor’s Information System Security Manager checks for unusual activity on a classified system at least once during the contract period of performance.

  • Counterintelligence and cybersecurity personnel share and report unauthorized accesses attempts, denial of service attacks, exfiltrated data, and other threats/vulnerabilities.

  • Counterintelligence and cybersecurity personnel ensure the contractor’s Information System Security Officer checks for unusual activity on a classified system at least once during the contract period of performance.

Explicación

Pregunta 21 de 200

1

Given the information system continuous monitoring (ISCM) process, in which step is security-related information required for metrics, assessments, and reporting collected and, where possible, the collection, analysis, and reporting of data is automated?

Selecciona una de las siguientes respuestas posibles:

  • Step 1: Define an ISCM strategy

  • Step 2: Establish an ISCM program

  • Step 3: Implement an ISCM program

  • Step 4: Analyze data and report findings

  • Step 5: Respond to findings

  • Step 6: Review and update the monitoring program

Explicación

Pregunta 22 de 200

1

Which of the following configuration management controls supporting continuous monitoring activities focuses on configuring the IS to provide only essential capabilities to limit risk and to prevent unauthorized connection of devices, unauthorized transfer of information, or unauthorized tunneling?

Selecciona una de las siguientes respuestas posibles:

  • Baseline Configuration

  • Least Functionality

  • Software Usage Restrictions

  • Information System Component Inventory

Explicación

Pregunta 23 de 200

1

Select ALL the correct responses. Which of the following are requirements for audits as outlined in the National Industrial Security Program Operating Manual (NISPOM)?

Selecciona una o más de las siguientes respuestas posibles:

  • Audit trail contents must be protected against unauthorized access, modification, or deletion.

  • Audit trail analysis and reporting of security events must be performed annually.

  • Audit trail contents should be made accessible to the information system user upon written request.

  • Audit trail analysis and reporting of security events must be performed at least weekly.

Explicación

Pregunta 24 de 200

1

Which of the following describes the how the patch management process integrates with security-focused configuration management (SecCM)?

Selecciona una de las siguientes respuestas posibles:

  • The patch management process integrates with SecCM once a year when system maintenance is performed.

  • The patch management process integrates with SecCM on a regular basis when restrictions must be lifted so that all system users can download software updates.

  • The patch management process integrates with SecCM when performing a Security Impact Analysis to determine whether unanticipated effects from a patch resulted in a change to existing security controls.

Explicación

Pregunta 25 de 200

1

The patch management process integrates with SecCM when performing a Security Impact Analysis to determine whether unanticipated effects from a patch resulted in a change to existing security controls.

Selecciona una de las siguientes respuestas posibles:

  • Phase 1: Planning

  • Phase 2: Identifying and Implementing Configurations

  • Phase 3: Controlling Configuration Changes

  • Phase 4: Monitoring

Explicación

Pregunta 26 de 200

1

Select ALL the correct responses. Which of the following are sources of information system change that security-focused configuration management (SecCM) addresses to mitigate risk?

Selecciona una o más de las siguientes respuestas posibles:

  • New, enhanced, corrected, or updated hardware and software capabilities

  • Changing business functions

  • Help Desk tickets

  • Patches for correcting software flaws and other errors to existing components

  • New security threats

Explicación

Pregunta 27 de 200

1

Which of the following requires that individual’s actions on an information system be auditable?

Selecciona una de las siguientes respuestas posibles:

  • National Industrial Security Program Operating Manual (NISPOM), Chapter 1.

  • National Industrial Security Program Operating Manual (NISPOM), Chapter 3.

  • National Industrial Security Program Operating Manual (NISPOM), Chapter 5.

  • National Industrial Security Program Operating Manual (NISPOM), Chapter 8.

Explicación

Pregunta 28 de 200

1

At what tier of the Risk Management Framework does continuous monitoring take place?

Selecciona una de las siguientes respuestas posibles:

  • Tier 1 - the Organization level

  • Tier 2 - the Mission/Business Process level

  • Tier 3 - the Information System level

Explicación

Pregunta 29 de 200

1

Select ALL the correct responses. Which of the following describe how audit logs support continuous monitoring?

Selecciona una o más de las siguientes respuestas posibles:

  • Audit logs are essential in continuous monitoring because they record system activity, application processes, and user activity.

  • Audit logs are essential in continuous monitoring because they will automatically defragment an information system to increase its speed and response time to user input.

  • Audit logs are essential in continuous monitoring because they can be used to detect security violations, performance problems, and flaws in applications.

Explicación

Pregunta 30 de 200

1

Which of the following configuration management controls supporting continuous monitoring activities focuses on physical and logical access controls, workflow automation, media libraries, abstract layers, and change windows and supports auditing of the enforcement actions?

Selecciona una de las siguientes respuestas posibles:

  • Least Functionality

  • User-Installed Software

  • Baseline Configuration

  • Access Restrictions for Change

Explicación

Pregunta 31 de 200

1

Which of the following describes how the Information System Continuous Monitoring (ISCM) strategy supports the Tier 1 ORGANIZATION approach to risk management?

Selecciona una de las siguientes respuestas posibles:

  • Tier 1 ISCM strategies focus on assessing and monitoring hybrid and common controls implemented at the system level.

  • Tier 1 ISCM strategies focus on how the organization plans to assess, respond to, and monitor risk as well as the oversight required to ensure that the risk management strategy is effective.

  • Tier 1 ISCM strategies focus on how ensuring that all system-level security controls (technical, operational, and management controls) are implemented correctly and operate as intended.

Explicación

Pregunta 32 de 200

1

Select ALL the correct responses. Which of the following are requirements for audits as outlined in the National Industrial Security Program Operating Manual (NISPOM)?

Selecciona una o más de las siguientes respuestas posibles:

  • Audit trail contents must be protected against unauthorized access, modification, or deletion.

  • Audit trail contents should be made accessible to the information system user upon written request.

  • Audit records must address individual accountability with unique identification and periodic testing of the security posture by the ISSO or ISSM.

Explicación

Pregunta 33 de 200

1

Which of the following identifies how the Risk Management Framework (RMF) supports risk management?

Selecciona una de las siguientes respuestas posibles:

  • The RMF process provides a flexible approach to decision-making at Tier 3.

  • The RMF process ensures traceability and transparency across all levels of the organization.

  • The RMF process ensures that business process decisions can override user information system concerns.

Explicación

Pregunta 34 de 200

1

Which of the following is a risk management role in continuous monitoring (CM)?

Selecciona una de las siguientes respuestas posibles:

  • Determining whether a contractor should be allowed to monitor and assess their classified network activity.

  • Determining whether a contractor audit trail is a necessary indicator cyber defense

  • Addressing risks from an information system and platform information technology system perspective to ensure a process for analyzing threats and vulnerabilities is in place, defining the impact, and identifying countermeasures.

Explicación

Pregunta 35 de 200

1

Which of the following Event Viewer Logs provides an audit of a user’s log-on events and are classified as successful or failed attempts?

Selecciona una de las siguientes respuestas posibles:

  • Security event log

  • Setup event log

  • System event log

  • Forwarded event log

Explicación

Pregunta 36 de 200

1

Which of the following describes the how the patch management process integrates with security-focused configuration management (SecCM)?

Selecciona una de las siguientes respuestas posibles:

  • The patch management process integrates with SecCM on a regular basis when restrictions must be lifted so that all system users can download software updates.

  • The patch management process integrates with SecCM once a year when system maintenance is performed.

  • The patch management process integrates with SecCM when updating the baseline configuration to the current patch level and then testing and approving patches as part of the configuration change control process.

Explicación

Pregunta 37 de 200

1

Which of the following describes the relationship between configuration management controls and continuous monitoring?

Selecciona una de las siguientes respuestas posibles:

  • A well-defined configuration management process that integrates continuous monitoring ensures a firm schedule for security patch updates once a year.

  • A well-defined configuration management process that integrates continuous monitoring ensures the system baseline will not change.

  • A well-defined configuration management process that integrates continuous monitoring ensures that the required adjustments to the system configuration do not adversely affect the security of the information system.

Explicación

Pregunta 38 de 200

1

Which of the following describes continuous monitoring capabilities for detecting threats and mitigating vulnerabilities?

Selecciona una de las siguientes respuestas posibles:

  • Investigation of the reasoning behind access restrictions at all levels of the organization.

  • Investigation into events of unauthorized downloads or uploads of sensitive data; unexplained storage of encrypted data; and unauthorized use of removable media or other transfer devices.

  • Investigation into physical security breaches at the facility.

Explicación

Pregunta 39 de 200

1

Which of the following describes continuous monitoring supports interoperability, operational resilience, and operational reciprocity?

Selecciona una de las siguientes respuestas posibles:

  • Continuous monitoring capabilities can detect transmission of information to foreign IP addresses but cannot determine whether classification markings have been removed.

  • Continuous monitoring capabilities enable security professionals to make quick adjustments to access restriction controls.

  • Continuous monitoring capabilities and tools ensure cybersecurity products operate in a net-centric manner to enhance the exchange of data and shared security policies.

Explicación

Pregunta 40 de 200

1

Which of the following would not be considered a possible indicator of recruitment?

Selecciona una de las siguientes respuestas posibles:

  • Offer of financial assistance by a foreign national or stranger

  • Unreported or frequent foreign travel

  • Termination notice to go work for a competing company

  • Contact with an individual who is suspected of being associated with foreign intelligence

Explicación

Pregunta 41 de 200

1

An unwitting insider is best described as:

Selecciona una de las siguientes respuestas posibles:

  • a person who works overtime

  • a person with access to information who unknowingly reveals more than they should to persons without a need to know

  • a person with access to multiple Special Access Programs

  • a person who discusses their job with co-workers within the Sensitive Compartmented Information Facility (SCIF)

Explicación

Pregunta 42 de 200

1

An insider threat could pose a threat to:

Selecciona una de las siguientes respuestas posibles:

  • National security

  • Your job

  • Your company’s proprietary and research information

  • All of the above

Explicación

Pregunta 43 de 200

1

Failure to report suspicious behaviors or possible insider threat indicators could result in punitive or disciplinary actions.

Selecciona uno de los siguientes:

  • VERDADERO
  • FALSO

Explicación

Pregunta 44 de 200

1

Exploitable weaknesses considered by a Foreign Intelligence Service when considering a source for recruitment may include:

Selecciona una de las siguientes respuestas posibles:

  • Drugs or alcohol

  • Gambling

  • Adultery

  • Financial problems

  • All of the above

Explicación

Pregunta 45 de 200

1

Known or suspected espionage should always be reported to the FBI.

Selecciona uno de los siguientes:

  • VERDADERO
  • FALSO

Explicación

Pregunta 46 de 200

1

Removing classification markings from a document is not necessarily considered a possible insider threat indicator and should not be reported to the security office unless there are other suspicious behaviors displayed.

Selecciona uno de los siguientes:

  • VERDADERO
  • FALSO

Explicación

Pregunta 47 de 200

1

If a coworker seeks additional information outside the scope of his or her responsibility, this is always a sign that the individual is an insider threat.

Selecciona uno de los siguientes:

  • VERDADERO
  • FALSO

Explicación

Pregunta 48 de 200

1

Elicitation is an effective means of information collection by an insider. When done well, elicitation can seem like simple small talk.

Selecciona uno de los siguientes:

  • VERDADERO
  • FALSO

Explicación

Pregunta 49 de 200

1

A coworker, who may be of Middle Eastern descent and often speaks in Farsi from his work telephone, is considered suspicious behavior and should always be reported to the security officer.

Selecciona uno de los siguientes:

  • VERDADERO
  • FALSO

Explicación

Pregunta 50 de 200

1

Collection methods of operation frequently used by Foreign Intelligence Entities to collect information from DoD on the critical technology being produced within the cleared defense contractor facilities we support include:

Selecciona una de las siguientes respuestas posibles:

  • Unsolicited requests for information

  • Solicitation and marketing of services

  • Cyber Attacks

  • International conventions, seminars, and exhibits

  • All of the above

Explicación

Pregunta 51 de 200

1

Select ALL the correct responses. Which of the following are examples of a “Security Anomaly” and should be reported?

Selecciona una o más de las siguientes respuestas posibles:

  • Foreign officials claim they already knew about a program after the program was made public

  • Foreign officials reveal details they should not have known

  • An adversary conducts activities with precision that indicates prior knowledge

  • Media reports on current operations in the Middle East

Explicación

Pregunta 52 de 200

1

To be an “Insider Threat” a person MUST knowingly cause malicious damage to their organization.

Selecciona uno de los siguientes:

  • VERDADERO
  • FALSO

Explicación

Pregunta 53 de 200

1

Personnel who fail to report CI Activities of concern as outlined in Enclosure 4 of DoD Directive 5240.06 are subject to appropriate disciplinary action under regulations.

Selecciona uno de los siguientes:

  • VERDADERO
  • FALSO

Explicación

Pregunta 54 de 200

1

The following actions can potentially reduce or compromise your network security and place in jeopardy the lives of our men and women:

Selecciona una de las siguientes respuestas posibles:

  • Hacking

  • Inputting falsified corrupted data

  • Phishing

  • Introducing malicious code such as a virus, logic, or Trojan horse

  • All of the above

Explicación

Pregunta 55 de 200

1

Cyber Vulnerabilities to DoD Systems may include:

Selecciona una de las siguientes respuestas posibles:

  • Illegal downloads

  • Viruses

  • Weak passwords

  • Disgruntled or Co-opted employee

  • All of the above

Explicación

Pregunta 56 de 200

1

Select ALL the correct responses. To minimize the ability of an Insider Threat to go undetected, you and your coworkers must:

Selecciona una o más de las siguientes respuestas posibles:

  • Report all security infractions, violations, or suspicious activity to your supervisor and the Office of Security

  • Never log onto your computer network outside of normal working hours

  • Follow all security rules and regulations

  • Never gossip about any of your coworkers

  • Show up to work on time every day

Explicación

Pregunta 57 de 200

1

DoD personnel who suspect a coworker of possible espionage should:

Selecciona una de las siguientes respuestas posibles:

  • Call the FBI Hot Line

  • Report directly to your CI or Security Office

  • Start recording their conversations to gather evidence

  • Discuss situation with others to get second opinion

Explicación

Pregunta 58 de 200

1

An adversary uses technical countermeasures to block a previously undisclosed or classified U.S. intercept technology. This is an example of:

Selecciona una de las siguientes respuestas posibles:

  • An unidentified press release

  • A lucky guess

  • A paid source

  • A Security Anomaly

Explicación

Pregunta 59 de 200

1

Offers or Invitations for cultural exchanges, individual-to-individual exchanges, or ambassador programs are indicators of this collection method:

Selecciona una de las siguientes respuestas posibles:

  • Solicitation and Marketing of Services

  • International conventions, seminars, and exhibits

  • Elicitation

  • Visits to Department of Defense (DoD) or contractor facilities

Explicación

Pregunta 60 de 200

1

This is used to collect documentation regarding FOCI, KMP Lists, SF-328 and other facility documents to the DSS.

Selecciona una de las siguientes respuestas posibles:

  • Industrial Security Facilities Database (ISFD)

  • Electronic Facility Clearance (e-FCL) System

  • Joint Personnel Adjudication System (JPAS)

  • Electronic Questionnaires for Investigations Processing (e-QIP)

Explicación

Pregunta 61 de 200

1

This is used by DSS to document Industrial security actions regarding contractor facilities.

Selecciona una de las siguientes respuestas posibles:

  • Industrial Security Facilities Database (ISFD)

  • Electronic Facility Clearance (e-FCL) System

  • Joint Personnel Adjudicatoin System (JPAS)

  • Electronic Questionnaires for Investigations Processing (e-QIP)

Explicación

Pregunta 62 de 200

1

Facility M has a facility security clearance at the Confidential level. It has not performed work on an active classified contract in 12 months but expects to begin performance of work on a classified contract next month. What action needs to be taken regarding its facility security clearance?

Selecciona una de las siguientes respuestas posibles:

  • It should be downgraded

  • It should be revoked

  • It should be terminated

  • No action is necessary

Explicación

Pregunta 63 de 200

1

In the case of a multiple facility organization, which facility should complete the SF-328?

Selecciona una de las siguientes respuestas posibles:

  • The branch facility

  • Both the home office facility and the branch facility

  • The home office facility

Explicación

Pregunta 64 de 200

1

Facility U has a facility security clearance at the Secret level. It has not performed work on an active classified contract in 12 months and does not expect to perform work on a classified contract in the near future. What action needs to be taken regarding its facility security clearance?

Selecciona una de las siguientes respuestas posibles:

  • It should be revoked

  • It should be downgraded

  • It should be administratively terminated

  • No action is necessary

Explicación

Pregunta 65 de 200

1

As long as a contractor has a bona fide classified procurement need, it can make the request for its own facility security clearance.

Selecciona uno de los siguientes:

  • VERDADERO
  • FALSO

Explicación

Pregunta 66 de 200

1

A business comprised of two separate and distinct companies that have formed a relationship where one company establishes or takes control of a smaller company is a _____.

Selecciona una de las siguientes respuestas posibles:

  • Limited liability company

  • Multiple facility organization

  • Parent-Subsidiary

  • Partnership

Explicación

Pregunta 67 de 200

1

Who evaluates information related to a prospective contractor facility?

Selecciona una de las siguientes respuestas posibles:

  • Government Contracting Activity

  • Industrial Security Representative

  • PSMO-I

Explicación

Pregunta 68 de 200

1

In addition to completing an SF-86, an individual being investigated for a personnel security clearance must also submit which form?

Selecciona una de las siguientes respuestas posibles:

  • SF-312

  • Exclusion resolution

  • Fingerprint card

  • SF-328

Explicación

Pregunta 69 de 200

1

A DD Form 441-1 is required to be executed for _____.

Selecciona una de las siguientes respuestas posibles:

  • A division or branch within a multiple facility organization

  • A partnership

  • A limited liability corporation

  • A cleared parent company

Explicación

Pregunta 70 de 200

1

Whose CAGE code should be provided in the sponsorship letter?

Selecciona una de las siguientes respuestas posibles:

  • The government contracting activity sponsoring the facility security clearance request

  • There is no need to provide a CAGE code for any party in the sponsorship letter

  • The cleared prime contractor sponsoring the facility security clearance request and the uncleared contractor being sponsored, if it has one

Explicación

Pregunta 71 de 200

1

A business that has one or more owners, usually known as members, which may be individuals or corporations, is a _____.

Selecciona una de las siguientes respuestas posibles:

  • Sole proprietorship

  • Corporation

  • Limited liability company

Explicación

Pregunta 72 de 200

1

If the sponsor is a cleared prime contractor, a copy of which document should be enclosed with the sponsorship letter?

Selecciona una de las siguientes respuestas posibles:

  • KMP List

  • DD Form 441

  • DD Form 254

Explicación

Pregunta 73 de 200

1

In a parent-subsidiary relationship where both the parent and the subsidiary require a facility security clearance, but only the subsidiary is required to store classified information, who must execute DD Form 441?

Selecciona una de las siguientes respuestas posibles:

  • Only the subsidiary must execute DD Form 441.

  • Only the parent must execute DD Form 441.

  • Both the parent and the subsidiary must execute their own DD Form 441.

Explicación

Pregunta 74 de 200

1

Which of the following is a secure website designed to facilitate the processing of standard investigative forms used when conducting background investigations?

Selecciona una de las siguientes respuestas posibles:

  • JPAS

  • ISFD

  • e-QIP

  • e-FCL

Explicación

Pregunta 75 de 200

1

Failure to submit paperwork for security clearance investigations for key management personnel in a timely manner may result in the discontinuance of the facility security clearance request process.

Selecciona uno de los siguientes:

  • VERDADERO
  • FALSO

Explicación

Pregunta 76 de 200

1

Why would an interim facility security clearance be granted instead of a final facility security clearance?

Selecciona una de las siguientes respuestas posibles:

  • Because final eligibility determinations for all key management personnel have not yet been completed

  • Because all required documentation has not yet been completed

  • Because all FOCI factors have not yet been favorably adjudicated

Explicación

Pregunta 77 de 200

1

When an uncleared parent with a cleared subsidiary does not require access to classified information, which of the following actions is required?

Selecciona una de las siguientes respuestas posibles:

  • The parent must obtain a facility security clearance at a level equal to the level at which the subsidiary is cleared.

  • The parent will be formally excluded from all access to classified information.

  • No action is required.

Explicación

Pregunta 78 de 200

1

The Facility Security Officer of a cleared contractor facility has recently retired. The new FSO is currently cleared but has no security experience. Does this need to be reported to the facility’s Industrial Security Representative as a change condition?

Selecciona una de las siguientes respuestas posibles:

  • No, because the new FSO is already cleared, a report is not required

  • No, this does not need to be reported

  • Yes, this is a reportable change

Explicación

Pregunta 79 de 200

1

Does being processed for a facility security clearance have a direct cost to the contractor?

Selecciona una de las siguientes respuestas posibles:

  • No, the sponsoring activity is responsible for all costs associated with the facility security clearance process.

  • No, there is no direct cost to the contractor for being processed for a facility security clearance

  • Yes, the contractor must pay the government for services rendered during the facility security clearance request process.

Explicación

Pregunta 80 de 200

1

A post office box is an acceptable address to include on the sponsorship letter for the uncleared contractor facility.

Selecciona uno de los siguientes:

  • VERDADERO
  • FALSO

Explicación

Pregunta 81 de 200

1

A contractor with a cleared facility recently sold some of its shares of stock, but the sale did not result in a change in majority ownership stakes. Does this need to be reported to the facility’s Industrial Security Representative as a change condition?

Selecciona una de las siguientes respuestas posibles:

  • No, the sale of stocks is never a reportable change

  • No, this does not need to be reported

  • Yes, this is a reportable change

Explicación

Pregunta 82 de 200

1

The evaluation of which of these identifies key management personnel?

Selecciona una de las siguientes respuestas posibles:

  • Sponsorship Letter

  • Business structure

  • SF-328

  • DD Form 441

Explicación

Pregunta 83 de 200

1

To be eligible for consideration for a facility security clearance, a contractor must be physically located within the U.S. or its territories.

Selecciona uno de los siguientes:

  • VERDADERO
  • FALSO

Explicación

Pregunta 84 de 200

1

Can a final facility security clearance be issued if all the key management personnel involved with the facility security clearance request process have not yet received final eligibility determinations for access to classified information?

Selecciona una de las siguientes respuestas posibles:

  • No. All the involved key management personnel must have final personnel security clearance determinations in order for the facility to be issued a final facility security clearance.

  • Yes. A final facility security clearance may be issued as long as all the involved key management personnel have interim personnel security clearance determinations.

  • Yes. Personnel security clearance determinations for key management personnel are not required in order to be issued a facility security clearance.

Explicación

Pregunta 85 de 200

1

_____ may terminate the DD Form 441 by written notice 30 days in advance of the requested termination.

Selecciona una de las siguientes respuestas posibles:

  • The contractor

  • The government

  • Either the government or the contractor

Explicación

Pregunta 86 de 200

1

Once a contractor has met all the eligibility requirements, which of the following are key evaluation areas examined when determining whether to issue a facility security clearance?

Selecciona una de las siguientes respuestas posibles:

  • Sponsorship, bona fide classified procurement need, business structure

  • Legal entity organized under U.S. laws, company has reputation for integrity, FOCI factors sufficiently managed

  • Sponsorship, DD Form 441, key management personnel

Explicación

Pregunta 87 de 200

1

Who works with a contractor facility to ensure that their security program meets NISP requirements?

Selecciona una de las siguientes respuestas posibles:

  • Contract Officer

  • FCB Security Specialist

  • Industrial Security Representative

Explicación

Pregunta 88 de 200

1

Within a multiple facility organization, only the home office facility is required to have a CAGE code.

Selecciona uno de los siguientes:

  • VERDADERO
  • FALSO

Explicación

Pregunta 89 de 200

1

Which of the following statements is true?

Selecciona una de las siguientes respuestas posibles:

  • Invalidation of a facility security clearance does not prevent a contractor from receiving new contracts.

  • Invalidation of a facility security clearance is a final terminating action revoking all privileges associated with an active clearance.

  • Invalidation of a facility security clearance is an interim measure allowing a contractor to correct negative security circumstances.

Explicación

Pregunta 90 de 200

1

Of the following assessments, which are used to help complete the threat assessment summary? (Select all that apply)

Selecciona una o más de las siguientes respuestas posibles:

  • History assessment

  • Operations assessment

  • Intent assessment

  • Collection capabilities assessment

Explicación

Pregunta 91 de 200

1

Poor tradecraft practices are an example of a/an ______ vulnerability.

Selecciona una de las siguientes respuestas posibles:

  • Information

  • Operational

  • Equipment

  • Facility

Explicación

Pregunta 92 de 200

1

Analyzing an asset in an unprotected state first and then analyzing the asset considering the current countermeasures is called ______ analysis.

Selecciona una de las siguientes respuestas posibles:

  • Vulnerability

  • Risk

  • Threat

  • Regressive

Explicación

Pregunta 93 de 200

1

When measuring an impact and assigning a value to an undesirable event, which one of the following SME interview questions will help guide you?

Selecciona una de las siguientes respuestas posibles:

  • What undesirable events regarding a particular asset concern the asset owner?

  • Could significant damage to national security or loss/injury to human life occur as a result of this event?

  • What critical/valuable equipment is located at this site? Why is it critical or valuable?

  • Where are the assets located?

Explicación

Pregunta 94 de 200

1

________________ is the least expensive countermeasure to implement?

Selecciona una de las siguientes respuestas posibles:

  • Manpower

  • Equipment

  • Written Procedure

Explicación

Pregunta 95 de 200

1

The ability of each existing countermeasure to prevent or minimize a specific type of attack defines what vulnerability criteria?

Selecciona una de las siguientes respuestas posibles:

  • Quantity

  • Undesirable event

  • Effectiveness

  • Quality

Explicación

Pregunta 96 de 200

1

One step in regressive analysis is reevaluating an asset’s vulnerabilities.

Selecciona uno de los siguientes:

  • VERDADERO
  • FALSO

Explicación

Pregunta 97 de 200

1

The fifth and final step in the risk management process is to determine countermeasure options. Which of the following is the goal of this step?

Selecciona una de las siguientes respuestas posibles:

  • To identify potential countermeasures for reducing an asset’s vulnerabilities and overall risk to the asset

  • To identify the value of assets and the degree of impact if they are damaged or lost

  • To identify vulnerabilities

Explicación

Pregunta 98 de 200

1

The criteria used to determine the level of vulnerability include which of the following? (Select all that apply)

Selecciona una o más de las siguientes respuestas posibles:

  • Last testing of the vulnerability

  • Effectiveness of countermeasures

  • Quantity

  • Quality

Explicación

Pregunta 99 de 200

1

After you’ve completed all other steps, what final chart would you use to summarize and record your information in order to get the total cost for all countermeasures?

Selecciona una de las siguientes respuestas posibles:

  • Intent Assessment Chart

  • Collection Capability Assessment Chart

  • Threat Assessment Summary Chart

  • Countermeasure Analysis Chart

Explicación

Pregunta 100 de 200

1

When performing a countermeasures cost benefit analysis, which two of the following are good questions to ask?

Selecciona una o más de las siguientes respuestas posibles:

  • To what degree does the option delay, deter, detect, defend, or destroy?

  • Is the option available from several contractors?

  • How does the asset value compare to proposed cost of protection?

  • What are the methods an adversary might use to destroy an asset?

Explicación

Pregunta 101 de 200

1

Criminal, terrorist, insider, and natural disasters are examples of categories of ______.

Selecciona una de las siguientes respuestas posibles:

  • Threats

  • Vulnerabilities

  • Countermeasures

  • Assets

Explicación

Pregunta 102 de 200

1

Persons , facilities, materials, information, and activities are categories of ______.

Selecciona una de las siguientes respuestas posibles:

  • countermeasures

  • assets

  • vulnerabilities

  • threats

Explicación

Pregunta 103 de 200

1

The smaller the risk area shared by assets, threats, and vulnerabilities, the higher the risk level.

Selecciona uno de los siguientes:

  • VERDADERO
  • FALSO

Explicación

Pregunta 104 de 200

1

One way to describe asset value is:

Selecciona una de las siguientes respuestas posibles:

  • What is the potential for an event to take place?

  • What is the capability of a specific threat?

  • What is the impact of an undesirable event?

  • What is the level of weakness at the site?

Explicación

Pregunta 105 de 200

1

Risk management is defined as the process of selecting and implementing ______ to achieve an acceptable level of risk at an acceptable cost.

Selecciona una de las siguientes respuestas posibles:

  • countermeasures

  • procedures

  • assets

  • policies

Explicación

Pregunta 106 de 200

1

When determining an adversary’s history, the fact that the adversary might attempt an attack at a foreseeable future event is irrelevant.

Selecciona uno de los siguientes:

  • VERDADERO
  • FALSO

Explicación

Pregunta 107 de 200

1

The time to implement and oversee the countermeasure, the time to prepare for its implementation, and any time required for follow-up and evaluation have no impact when determining the cost of a countermeasure.

Selecciona uno de los siguientes:

  • VERDADERO
  • FALSO

Explicación

Pregunta 108 de 200

1

Which of the following statements defines an adversary?

Selecciona una de las siguientes respuestas posibles:

  • Intended plans that may pose a threat to an asset.

  • The identification of an asset’s threats.

  • Any individual, group, organization, or government that conducts activities, or has the intention and capability to conduct activities detrimental to assets.

  • Any indication, circumstance, or event with the potential to cause the loss of, or damage to an asset.

Explicación

Pregunta 109 de 200

1

What is the risk rating of an asset with an impact of 10, a threat rating of .12 and a vulnerability rating of .40?

Selecciona una de las siguientes respuestas posibles:

  • 32

  • 48

  • 1

  • 5

Explicación

Pregunta 110 de 200

1

When determining an adversary’s capability, which of the following collection methods includes resources such as newspapers, internet, magazines, and conventions, FOIA requests, seminars, and exhibits?

Selecciona una de las siguientes respuestas posibles:

  • IMINT

  • HUMINT

  • SIGINT

  • OSINT

Explicación

Pregunta 111 de 200

1

You should use the intent, capability, and history charts to create the Threat Assessment Summary Chart.

Selecciona uno de los siguientes:

  • VERDADERO
  • FALSO

Explicación

Pregunta 112 de 200

1

You are the one who decides what constitutes an acceptable level of risk for an organization’s assets.

Selecciona uno de los siguientes:

  • VERDADERO
  • FALSO

Explicación

Pregunta 113 de 200

1

The formula R=I [T x V] is used for calculating a risk rating. What risk factors do R, I, T, and V represent?

Selecciona una de las siguientes respuestas posibles:

  • return, impact, threat, vulnerability

  • risk, impact, threat, vulnerability

  • return, importance, threat, vulnerability

  • risk, importance, threat, vulnerability

Explicación

Pregunta 114 de 200

1

There are six steps in the analytical risk management process. True or false?

Selecciona uno de los siguientes:

  • VERDADERO
  • FALSO

Explicación

Pregunta 115 de 200

1

When determining the cost associated with a loss, only monetary loss is considered in the risk management process. True or false?

Selecciona uno de los siguientes:

  • VERDADERO
  • FALSO

Explicación

Pregunta 116 de 200

1

An asset can be defined as anything that ______. (Select all that apply)

Selecciona una o más de las siguientes respuestas posibles:

  • Has a weakness

  • Is of value

  • Requires protection

Explicación

Pregunta 117 de 200

1

The five general areas open to potential asset vulnerabilities include: human, operational, information, facility, and equipment. True or false?

Selecciona uno de los siguientes:

  • VERDADERO
  • FALSO

Explicación

Pregunta 118 de 200

1

Which of the following is NOT a good interview question for determining an adversary’s history?

Selecciona una de las siguientes respuestas posibles:

  • Has the adversary attacked or exploited assets and personnel before?

  • Does the adversary have the weapons or tools for exploiting or attacking an asset?

  • Has the adversary been suspected of attacking or exploiting assets?

  • Might some foreseeable event cause the adversary to attempt an attack in the future?

Explicación

Pregunta 119 de 200

1

Different perspectives to any terrorist event include which of the following?
(Select all that apply.)

Selecciona una o más de las siguientes respuestas posibles:

  • The terrorist perspective that feels killing innocent people is morally justified to achieve objectives.

  • The victim perspective that sees terrorist acts as criminal and immoral.

  • The military perspective that feels that all terrorist events are evil and warrant retaliatory action.

  • The general public perspective that either supports or opposes the terrorist causes.

Explicación

Pregunta 120 de 200

1

A state-supported terrorist group operates:

Selecciona una de las siguientes respuestas posibles:

  • As a recognized religion or radical offshoot

  • Independently, but receives some support from governments

  • Primarily by the support of a state or country

  • Autonomously, receiving no support from any governments

Explicación

Pregunta 121 de 200

1

Which of the following is considered a common characteristic of terrorist groups?

Selecciona una de las siguientes respuestas posibles:

  • Operating overtly

  • Being rurally based

  • Being highly mobile

  • Considering tactical success as mission success

Explicación

Pregunta 122 de 200

1

Training conducted in a clandestine fashion at the cell level by members of the terrorist group within the targeted country is considered ______________________.

Selecciona una de las siguientes respuestas posibles:

  • External training

  • Revolutionary training

  • Militaristic training

  • Internal training

Explicación

Pregunta 123 de 200

1

Internal training

Selecciona una o más de las siguientes respuestas posibles:

  • Having positive contact with the captor

  • Accepting the situation as not long-term since authorities will come to the rescue

  • Seeing the captor's human qualities

Explicación

Pregunta 124 de 200

1

A dirty bomb ______________________.
(Select all that apply.)

Selecciona una o más de las siguientes respuestas posibles:

  • Upon detonation will produce mass casualties but will not penetrate a building

  • Is used by terrorists to frighten people and make the land around the explosion unusable for a long period of time

  • Combines conventional explosives with radioactive materials

Explicación

Pregunta 125 de 200

1

To minimize the insider threat, practice:

Selecciona una de las siguientes respuestas posibles:

  • Awareness, Prevention, and Deterrence

  • Mitigation, Reaction, and Destruction

  • Detection, Protection, and Action

Explicación

Pregunta 126 de 200

1

Which of the following statement(s) are true?

Selecciona una de las siguientes respuestas posibles:

  • A Vulnerability Assessment should focus only on WMD.

  • It is an annual requirement to receive a Higher Headquarters Vulnerability Assessment.

  • The Commander uses a Vulnerability Assessment to determine the susceptibility of assets to attack from threats.

  • All of the above.

Explicación

Pregunta 127 de 200

1

During a Risk Assessment, which element(s) must be considered to make well-informed decisions?

Selecciona una de las siguientes respuestas posibles:

  • Vulnerability

  • Asset Criticality

  • Threat

  • All of the above

Explicación

Pregunta 128 de 200

1

A typical AT program organization includes the following members:
(Select all that apply.)

Selecciona una o más de las siguientes respuestas posibles:

  • DTRA

  • The ATO and the Installation Commander

  • Antiterrorism Executive Committee

  • The Threat Working Group

Explicación

Pregunta 129 de 200

1

Security functions that must be performed for a physical security system to protect DoD assets include ______________________.

Selecciona una de las siguientes respuestas posibles:

  • Threat delay

  • Threat detection

  • Threat response

  • All of the above

Explicación

Pregunta 130 de 200

1

When placing vehicle barriers, consider __________________

Selecciona una o más de las siguientes respuestas posibles:

  • Location

  • Aesthetics

  • Safety

Explicación

Pregunta 131 de 200

1

Which of the following are examples of temporary barriers?
(Select all that apply.)

Selecciona una o más de las siguientes respuestas posibles:

  • Berms

  • Jersey barriers

  • Ropes

Explicación

Pregunta 132 de 200

1

DoD AT Construction Standards:
(Select all that apply.)

Selecciona una o más de las siguientes respuestas posibles:

  • Specify design criteria for incorporating threat-based AT requirements

  • Provide minimum construction requirements for new construction and major renovations

  • Mandate Services and/or Agencies establish AT guidelines for new construction to counter terrorism threat capabilities

Explicación

Pregunta 133 de 200

1

An AT plan ______________________.
(Select all that apply.)

Selecciona una o más de las siguientes respuestas posibles:

  • Is written from the Service or Agency level down to the Installation level for permanent operations or locations

  • Contains all of the specific measures that need to be taken in order to establish and maintain an AT program

  • Is incorporated in operation orders for temporary operations or exercises

Explicación

Pregunta 134 de 200

1

Which paragraph of the AT plan lists the specific tasks for each subordinate unit?

Selecciona una de las siguientes respuestas posibles:

  • Execution

  • Annexes

  • Situation

  • Mission

Explicación

Pregunta 135 de 200

1

Which paragraph of the AT plan defines the requirements for supporting the AT Plan?

Selecciona una de las siguientes respuestas posibles:

  • Execution

  • Annexes

  • Mission

  • Administration and Logistics

Explicación

Pregunta 136 de 200

1

The ATO is ______________________.
(Select all that apply.)

Selecciona una o más de las siguientes respuestas posibles:

  • Responsible for making decisions regarding requirement funding

  • Responsible for continuously documenting funding requirements

  • The expert within an organization for generating, prioritizing, and appropriately documenting AT requirements

Explicación

Pregunta 137 de 200

1

Which funding category does a resource fall in if it is important to the mission, but has a low vulnerability?

Selecciona una de las siguientes respuestas posibles:

  • Need to fund

  • Should fund

  • Must fund

Explicación

Pregunta 138 de 200

1

Which of the following are reasons a future captor may have for selecting potential victims?

Selecciona una o más de las siguientes respuestas posibles:

  • The amount of money the U.S. Government offers for hostages

  • The victims' nationality

  • The victims' value to their families

  • The victims' financial resources

Explicación

Pregunta 139 de 200

1

Immediately upon capture, the victim must decide to resist the captor, escape the situation, or surrender and cooperate with the captor. Which of the following will influence the victim's decision?

Selecciona una o más de las siguientes respuestas posibles:

  • The victim's self-defense and survival skills

  • The victim's personal wealth

  • The number of captors

  • Whether or not the captors are armed

Explicación

Pregunta 140 de 200

1

A captor will exert control and dominance over a hostage by:

Selecciona una o más de las siguientes respuestas posibles:

  • Confiscating a hostage's personal items, such as a watch or wallet

  • Isolating a hostage from any human contact

  • Providing a hostage with regular meals

  • Taking all of a hostage's life quality aids, such as glasses or hearing aids

Explicación

Pregunta 141 de 200

1

Which of the following are symptoms that a hostage may be experiencing Stockholm syndrome?

Selecciona una o más de las siguientes respuestas posibles:

  • Receiving insufficient nourishment

  • Perceiving the captor as a victim of circumstance versus an aggressor

  • Being belligerent towards the captor

  • Identifying with the captor

Explicación

Pregunta 142 de 200

1

Which of the following may be reasons for a hostage situation ending with little to no harm to the hostage?

Selecciona una o más de las siguientes respuestas posibles:

  • The hostages become combative with the captors.

  • Authorities may achieve a successful negotiation with the captors resulting in the release of the hostage.

  • Hostages remain uncooperative with the captors.

Explicación

Pregunta 143 de 200

1

The anger and frustration hostage survivors experience may sometimes be directed toward the:

Selecciona una o más de las siguientes respuestas posibles:

  • DoD

  • Rescuers

  • Themselves

  • U.S. Government

Explicación

Pregunta 144 de 200

1

Training related to the Code of Conduct is conducted at different levels based on:

Selecciona una o más de las siguientes respuestas posibles:

  • The amount of sensitive information the Service member has.

  • A potential captor's assessment of the Service member's usefulness.

  • The Service member's tenure in the military.

  • The Service member's susceptibility to capture.

Explicación

Pregunta 145 de 200

1

Specific guidance for captured U.S. military personnel applies to situations in which they:

Selecciona una de las siguientes respuestas posibles:

  • Have been released

  • Are on assignment

  • Have been captured

  • All of the above

Explicación

Pregunta 146 de 200

1

What techniques should a victim use to try and avoid unnecessary violence during capture?

Selecciona una o más de las siguientes respuestas posibles:

  • Hide materials indicating affiliation with the U.S. Government for leverage.

  • Resist panicking.

  • Anticipate the captor's efforts to create confusion.

  • Catch the captor off guard in hopes of escaping.

Explicación

Pregunta 147 de 200

1

There are several techniques hostages can use to help them survive a hostage situation. They should:

Selecciona una o más de las siguientes respuestas posibles:

  • Vary their voice levels so their captors do not hear them speaking.

  • Maintain a regular exercise routine.

  • Remain realistic about their situation and not make future plans for themselves.

  • Remain constantly alert for any sign of being rescued.

Explicación

Pregunta 148 de 200

1

If a hostage senses or realizes a rescue attempt is imminent, the hostage should:

Selecciona una o más de las siguientes respuestas posibles:

  • Prepare to escape the situation as soon as there is an opportunity to do so.

  • Drop to the floor.

  • Remain still until rescuers provide instructions.

  • Motion to rescuers so that they are easily identified.

Explicación

Pregunta 149 de 200

1

Techniques for helping a hostage survivor return to a daily routine include:

Selecciona una o más de las siguientes respuestas posibles:

  • Limiting contact with the press.

  • Refraining from making public statements about the captor.

  • Speaking openly about the rescue with reporters.

  • Being accessible to the press to discuss being held hostage and rescued.

Explicación

Pregunta 150 de 200

1

Symptoms exhibited when suffering from the Stockholm Syndrome include:

Selecciona una o más de las siguientes respuestas posibles:

  • Refusing to assist the captor

  • Losing touch with reality

  • Hindering rescue efforts

  • Suffering from long-term emotional instability

Explicación

Pregunta 151 de 200

1

Which of the following statements illustrate the correct application of the DoD Code of Conduct?

Selecciona una o más de las siguientes respuestas posibles:

  • During capture, Service members should resist their potential captors in an effort to break free.

  • As a hostage, Service members should not, under any circumstances, support or encourage their captors.

  • Service members on assignment in an area prone to terrorist activity shall follow the appropriate counter-terrorism measures.

  • As a hostage, Service members should accept release regardless of the consequences of such action.

Explicación

Pregunta 152 de 200

1

If a terrorist group is labeled state-directed:

Selecciona una o más de las siguientes respuestas posibles:

  • The group is primarily supported by a country or state

  • The group is usually an insurgent movement

  • Activities are conducted at the direction of the state

  • The group may be an element of the state's security organization

Explicación

Pregunta 153 de 200

1

Terrorist groups labeled by their political affiliation:

Selecciona una o más de las siguientes respuestas posibles:

  • Are considered to be political extremists

  • Have suicidal members

  • Have a charismatic leader who preaches a form of exclusivity

  • Consist of young members, generally between 19 and 35 years old

Explicación

Pregunta 154 de 200

1

Which of the following are considered common characteristics of terrorist groups?

Selecciona una o más de las siguientes respuestas posibles:

  • Highly mobile

  • Operate covertly

  • Urban based

  • Militarily stronger than their opposition

Explicación

Pregunta 155 de 200

1

Which of the following statements are true?

Selecciona una o más de las siguientes respuestas posibles:

  • To achieve a chaotic atmosphere, a terrorist group will disrupt lines of communication.

  • Terrorist groups will encourage foreign investments to boost and strengthen their country’s economy.

  • Attacks against a state government’s security forces are used to erode public confidence.

  • Major acts or a successful terrorist campaign can attract additional support for the group’s cause.

Explicación

Pregunta 156 de 200

1

Which of the following terrorist group goals is generally accomplished through skyjacking and hostage taking?

Selecciona una de las siguientes respuestas posibles:

  • Satisfying vengeance

  • Turning the tide in a Guerrilla War

  • Causing an overreaction

  • Release of incarcerated comrades

Explicación

Pregunta 157 de 200

1

An intelligence cell of a terrorist group:

Selecciona una o más de las siguientes respuestas posibles:

  • Collects target-specific information

  • Is comprised of people who conduct kidnappings

  • Recruits new members

  • Provides OPSEC

Explicación

Pregunta 158 de 200

1

When an operative travels abroad to a training camp, then returns home to put their training into practice, this is considered:

Selecciona una de las siguientes respuestas posibles:

  • Internal training

  • External training

  • Survival training

  • Communications training

Explicación

Pregunta 159 de 200

1

Which of the following are considered common goals of terrorist groups?

Selecciona una o más de las siguientes respuestas posibles:

  • Obtaining money and equipment

  • Release of imprisoned comrades

  • Creating a safe environment for their people

  • Influencing government decisions, legislations, or elections

Explicación

Pregunta 160 de 200

1

The number, size, and the overall structure of the terrorist group cells depends on:

Selecciona una o más de las siguientes respuestas posibles:

  • Goals of the terrorist group

  • The security in the group's operating area

  • The abilities of the group's communication network

  • Media publicity of the group

Explicación

Pregunta 161 de 200

1

Training conducted in a clandestine fashion at the cell level by members is referred to as:

Selecciona una de las siguientes respuestas posibles:

  • External training

  • Internal training

  • Revolutionary training

  • Militaristic training

Explicación

Pregunta 162 de 200

1

Which of the following statement(s) pertaining to terrorist operations are true?

Selecciona una o más de las siguientes respuestas posibles:

  • Terrorist operations are relatively easy to execute because they are relatively easy to command, control, and support.

  • To ensure a sound operation, terrorists rehearse the operation in an environment mirroring the target location.

  • Terrorists select multiple targets as potential locations for the actual operation.

  • Terrorist operations are designed to impact only direct victims.

Explicación

Pregunta 163 de 200

1

Terrorists gather information on security measures and observable routines.

Selecciona una de las siguientes respuestas posibles:

  • Phase II: Intelligence Gathering and Surveillance

  • Phase IV: Pre-Attack Surveillance and Planning

  • Phase V: Attack Rehearsal

  • Phase VII: Escape

Explicación

Pregunta 164 de 200

1

Terrorists deploy into the target area.

Selecciona una de las siguientes respuestas posibles:

  • Phase I: Broad Target Selection

  • Phase IV: Pre-Attack Surveillance and Planning

  • Phase V: Attack Rehearsal

  • Phase VI: Actions on the Objectives

Explicación

Pregunta 165 de 200

1

Terrorists determine the weapon or attack method.

Selecciona una de las siguientes respuestas posibles:

  • Phase II: Intelligence Gathering and Surveillance

  • Phase III: Specific Target Selection

  • Phase IV: Pre-Attack Surveillance and Planning

  • Phase VI: Actions on the Objectives

Explicación

Pregunta 166 de 200

1

Terrorists collect information from media and internet research.

Selecciona una de las siguientes respuestas posibles:

  • Phase I: Broad Target Selection

  • Phase III: Specific Target Selection

  • Phase IV: Pre-Attack Surveillance and Planning

  • Phase VI: Actions on the Objectives

Explicación

Pregunta 167 de 200

1

Skyjacking

Selecciona una de las siguientes respuestas posibles:

  • The forceful seizure of an aircraft, its passengers, and cargo.

  • The unlawful seizure and detainment of a person, where the person is usually held for ransom.

  • The most common type of terrorist attack because of the relatively low risk of injury to the terrorist.

  • One of the oldest terrorist tactics, it means murdering someone in a surprise attack, usually with small arms or bombs.

Explicación

Pregunta 168 de 200

1

Assassination

Selecciona una de las siguientes respuestas posibles:

  • The most common type of terrorist attack because of the relatively low risk of injury to the terrorist.

  • The unlawful seizure and detainment of a person, where the person is usually held for ransom.

  • The forceful seizure of an aircraft, its passengers, and cargo.

  • One of the oldest terrorist tactics, it means murdering someone in a surprise attack, usually with small arms or bombs.

Explicación

Pregunta 169 de 200

1

Kidnapping

Selecciona una de las siguientes respuestas posibles:

  • The forceful seizure of an aircraft, its passengers, and cargo.

  • The unlawful seizure and detainment of a person, where the person is usually held for ransom.

  • The most common type of terrorist attack because of the relatively low risk of injury to the terrorist.

  • One of the oldest terrorist tactics, it means murdering someone in a surprise attack, usually with small arms or bombs.

Explicación

Pregunta 170 de 200

1

Bombing

Selecciona una de las siguientes respuestas posibles:

  • The forceful seizure of an aircraft, its passengers, and cargo.

  • The unlawful seizure and detainment of a person, where the person is usually held for ransom.

  • The most common type of terrorist attack because of the relatively low risk of injury to the terrorist.

  • One of the oldest terrorist tactics, it means murdering someone in a surprise attack, usually with small arms or bombs.

Explicación

Pregunta 171 de 200

1

Raid

Selecciona una de las siguientes respuestas posibles:

  • The forceful seizure of a surface vehicle, its passengers, and/or its cargo.

  • A surprise attack by a small armed force on a previously defined target.

  • The seizure of a facility to include taking all persons inside hostage.

  • A sudden attack made from a concealed position on a previously defined target.

Explicación

Pregunta 172 de 200

1

Ambush

Selecciona una de las siguientes respuestas posibles:

  • The forceful seizure of a surface vehicle, its passengers, and/or its cargo.

  • A surprise attack by a small armed force on a previously defined target.

  • The seizure of a facility to include taking all persons inside hostage.

  • A sudden attack made from a concealed position on a previously defined target.

Explicación

Pregunta 173 de 200

1

Hijacking

Selecciona una de las siguientes respuestas posibles:

  • The forceful seizure of a surface vehicle, its passengers, and/or its cargo.

  • A surprise attack by a small armed force on a previously defined target.

  • The seizure of a facility to include taking all persons inside hostage.

  • A sudden attack made from a concealed position on a previously defined target.

Explicación

Pregunta 174 de 200

1

Hostage Barricade

Selecciona una de las siguientes respuestas posibles:

  • The forceful seizure of a surface vehicle, its passengers, and/or its cargo.

  • A surprise attack by a small armed force on a previously defined target.

  • The seizure of a facility to include taking all persons inside hostage.

  • A sudden attack made from a concealed position on a previously defined target.

Explicación

Pregunta 175 de 200

1

The deliberate weakening of another entity through subversion, obstruction, disruption, and/or destruction.

Selecciona una de las siguientes respuestas posibles:

  • Environmental Destruction

  • Seizure

  • Sabotage

  • Threats/Hoaxes

Explicación

Pregunta 176 de 200

1

The destruction of oil fields or attacks on oil tankers.

Selecciona una de las siguientes respuestas posibles:

  • Environmental Destruction

  • Seizure

  • Sabotage

  • Threats/Hoaxes

Explicación

Pregunta 177 de 200

1

An active shooter is an individual actively engaged in killing or attempting to kill people in a confined and populated area.

Selecciona uno de los siguientes:

  • VERDADERO
  • FALSO

Explicación

Pregunta 178 de 200

1

During an active shooter situation, you should:

Selecciona una o más de las siguientes respuestas posibles:

  • Hide

  • Scream

  • Evacuate

  • Take Action

Explicación

Pregunta 179 de 200

1

When law enforcement arrives, you should:

Selecciona una o más de las siguientes respuestas posibles:

  • Immediately raise hands and spread fingers

  • Ask for help

  • Remain calm, and follow officers’ instructions

  • Point to where the active shooter is

Explicación

Pregunta 180 de 200

1

Which of the following are sources of insider security problems?

Selecciona una de las siguientes respuestas posibles:

  • Maliciousness

  • Disdain of security practices

  • Carelessness in protecting DoD information

  • Ignorance of security policy and security practices

  • All of the above

Explicación

Pregunta 181 de 200

1

“Insider threat” is that an insider will, by acts of commission or omission, intentionally or unintentionally, use their authorized access to do harm to the security of the U.S.

Selecciona uno de los siguientes:

  • VERDADERO
  • FALSO

Explicación

Pregunta 182 de 200

1

The terrorist’s objectives are controlled and/or condoned by an established state.

Selecciona una de las siguientes respuestas posibles:

  • Sub-Revolutionary

  • Establishment

  • Revolutionary

Explicación

Pregunta 183 de 200

1

The terrorist’s objectives are to overthrow the existing government, particularly in the area of operations.

Selecciona una de las siguientes respuestas posibles:

  • Sub-Revolutionary

  • Establishment

  • Revolutionary

Explicación

Pregunta 184 de 200

1

The terrorist’s objectives are to influence an unwilling government or group into making political, social, or economic changes.

Selecciona una de las siguientes respuestas posibles:

  • Sub-Revolutionary

  • Establishment

  • Revolutionary

Explicación

Pregunta 185 de 200

1

The terrorist threat level that indicates that anti-U.S. terrorists are present with limited operational activity.

Selecciona una de las siguientes respuestas posibles:

  • High

  • Significant

  • Moderate

  • Low

Explicación

Pregunta 186 de 200

1

FPCON BRAVO will apply when:

Selecciona una de las siguientes respuestas posibles:

  • A general global threat of possible terrorist activity exists

  • An increased threat of terrorist activity exists

  • A terrorist attack has occurred

  • Intelligence indicates some form of terrorist activity is likely

Explicación

Pregunta 187 de 200

1

RAM is the random use of various protective measures in order to:

Selecciona una o más de las siguientes respuestas posibles:

  • Rehearse procedures

  • Frustrate terrorist planning

  • Replace FPCON

  • Heighten unit awareness

Explicación

Pregunta 188 de 200

1

Perspectives to any terrorist event are:

Selecciona una o más de las siguientes respuestas posibles:

  • The terrorist perspective that feels killing innocent people is morally justified to achieve objectives

  • The victim perspective that sees terrorist acts as criminal and immoral

  • The general public perspective that either supports or is against the terrorist causes

  • The military perspective that feels that all terrorist events are evil and warrant retaliatory action

Explicación

Pregunta 189 de 200

1

Which of the following methodology factors did the DoD take into account?

Selecciona una o más de las siguientes respuestas posibles:

  • Terrorist Targets

  • Terrorist History

  • Terrorist Capabilities

  • Terrorist Intentions

Explicación

Pregunta 190 de 200

1

A terrorist threat level is:

Selecciona una o más de las siguientes respuestas posibles:

  • Identified as High, Significant, Moderate, or Low

  • Identified as NORMAL, ALPHA, BRAVO, CHARLIE, or DELTA

  • The random use of various security measures normally employed at higher force protection conditions in order to rehearse procedures

  • An intelligence community judgment about the likelihood of terrorist attacks on U.S. interests

Explicación

Pregunta 191 de 200

1

Force Protection Conditions (FPCONs) are:

Selecciona una o más de las siguientes respuestas posibles:

  • An intelligence community judgment about the likelihood of terrorist attacks on U.S. interests

  • Identified as Normal, Alpha, Bravo, Charlie, or Delta

  • A system of protective measures used by DoD installations and organizations to guard against and deter terrorist attacks

Explicación

Pregunta 192 de 200

1

A terrorist threat level is ________________. (Select all that apply)

Selecciona una de las siguientes respuestas posibles:

  • An intelligence community judgment about the likelihood of terrorist attacks on US interests.

  • Identified as NORMAL, ALPHA, BRAVO, CHARLIE, or DELTA.

  • Identified as High, Significant, Moderate, or Low.

Explicación

Pregunta 193 de 200

1

Which of the following are consider common goals of terrorist groups?

Selecciona una de las siguientes respuestas posibles:

  • Releasing imprisoned comrades

  • Influencing government decisions, legislations, or elections

  • Obtaining money and equipment

  • All of the above

Explicación

Pregunta 194 de 200

1

The number, size, and overall structure of terrorist group cells depend upon ________________________.

Selecciona una o más de las siguientes respuestas posibles:

  • The goals of the terrorist group

  • The security in the group’s operating area

  • The number of members in the terrorist group

  • The abilities of the group’s communication network

Explicación

Pregunta 195 de 200

1

Which of the following statements are true regarding terrorist operations? (Select all that apply.)

Selecciona una o más de las siguientes respuestas posibles:

  • Terrorist operations are difficult to execute due to the large group of individuals to train and command.

  • Terrorists select multiple targets as potential locations for the actual operation.

  • Terrorist operations are always designed on the defensive.

  • Terrorist rehearse the operation in an environment mirroring the target location or in the target location itself.

Explicación

Pregunta 196 de 200

1

Why might a potential captor take a victim hostage? (Select all that apply.)

Selecciona una o más de las siguientes respuestas posibles:

  • For the publicity the situation would generate

  • Because the victim drives and expensive car

  • Because the victim is in the wrong place at the wrong time

  • Because the victim may be a source of trouble otherwise

Explicación

Pregunta 197 de 200

1

If a hostage senses or realizes a rescue attempt is imminent, the hostage should:

Selecciona una de las siguientes respuestas posibles:

  • Motion to rescuers so they are easily identified

  • Prepare to escape the situation as soon as there is an opportunity to do so

  • Drop to the floor and remain still until rescuers provide instructions

  • All of the above

Explicación

Pregunta 198 de 200

1

Chemical agents are:

Selecciona una o más de las siguientes respuestas posibles:

  • Nerve agents, such as sarin, that interfere with the functioning of the nervous system

  • Likely to be used in large quantities by terrorist

  • Substances that are created by plants and animals that are poisonous to humans

  • Identifiable with the sudden onset of symptoms

Explicación

Pregunta 199 de 200

1

Which of the following statements are true? (Select all that apply.)

Selecciona una o más de las siguientes respuestas posibles:

  • There is no antidotal treatment for nerve agent poisoning.

  • A sudden onset of symptoms is a characteristic of chemical agents.

  • Terrorists will likely use small quantities of chemical agents in a highly populated area where the potential for exposure is the greatest.

Explicación

Pregunta 200 de 200

1

Which of the following are potential indicators of an insider threat?

Selecciona una de las siguientes respuestas posibles:

  • Copying Files

  • Unusual work hours

  • Taking short trips

  • Unexplained affluence

  • All of the above

Explicación