Arthur Casto
Test por , creado hace más de 1 año

Security

20582
5
0
Arthur Casto
Creado por Arthur Casto hace casi 6 años
Cerrar

SFPC 5

Pregunta 1 de 172

1

Which of the following statements are true?

Selecciona una o más de las siguientes respuestas posibles:

  • Physical security systems provide the means to counter threats only during wartime.

  • Physical security measures are a combination of active or passive systems, devices, and security personnel used to protect a security interest from possible threats.

  • DoD 5200.8-R addresses the physical security of personnel, installations, operations, and assets of DoD Components.

Explicación

Pregunta 2 de 172

1

Which of the following statements are true? (Select all that apply.)

Selecciona una o más de las siguientes respuestas posibles:

  • The Commander is responsible for the development of the AT plan.

  • The ATO is responsible for the writing of the AT plan.

  • The ATO is responsible for leveraging the capabilities of the organization’s AT Working Group to assist with creating the AT plan.

Explicación

Pregunta 3 de 172

1

Which paragraph of the AT plan lists the specific task for each subordinate unit?

Selecciona una de las siguientes respuestas posibles:

  • Execution

  • Situation

  • Mission

  • Annexes

Explicación

Pregunta 4 de 172

1

Which AT plan exercise(s) uses scenario driven events to test specific portions of the AT plan?

Selecciona una de las siguientes respuestas posibles:

  • Table-top

  • Drill

  • Full-scale

  • All of the above

Explicación

Pregunta 5 de 172

1

Which of the following are reasons why AT plan exercises are important?

Selecciona una de las siguientes respuestas posibles:

  • They increase anti-terrorism awareness

  • They provide a way to assess and identify vulnerabilities and resources

  • They confirm training adequacy

  • All of the above

Explicación

Pregunta 6 de 172

1

Whose primary responsibility is working with Industrial Security Representatives (IS Reps) and contractor personnel to authorize and maintain classified Information Systems?

Selecciona una de las siguientes respuestas posibles:

  • Counterintelligence Special Agent (CISA)

  • Information System Security Professional/Security Control Assessor (ISSP/SCA)

  • Information System Security Manager (ISSM)

  • Facility Security Officer (FSO)

Explicación

Pregunta 7 de 172

1

True or false? An employee’s need for a Personnel Security Clearance (PCL) is determined by the program manager, but the clearance level is determined by the Government Contracting Activity (GCA).

Selecciona uno de los siguientes:

  • VERDADERO
  • FALSO

Explicación

Pregunta 8 de 172

1

When an employee no longer needs access to classified information, who is responsible for removing access and debriefing the employee?

Selecciona una de las siguientes respuestas posibles:

  • Industrial Security Representative (IS Rep)

  • Information System Security Manager (ISSM)

  • Facility Security Officer (FSO)

  • Information System Security Professional/Security Control Assessor (ISSP/SCA)

Explicación

Pregunta 9 de 172

1

Which of the following organizations conducts periodic Security Vulnerability Assessments (SVAs) of contractor facilities as the CSO to the Department of Defense?

Selecciona una de las siguientes respuestas posibles:

  • Defense Security Service (DSS)

  • Federal Bureau of Investigations (FBI)

  • Department of Homeland Security (DHS)

  • Federal Acquisition Service (FAS)

Explicación

Pregunta 10 de 172

1

When cleared contractors visit a cleared facility or government installation, whose security requirements take precedence?

Selecciona una de las siguientes respuestas posibles:

  • The security requirements of the contractor’s home facility

  • The security requirements of the host activity/facility

Explicación

Pregunta 11 de 172

1

After a need is identified, the Government Contracting Activity (GCA) ___________________.

Selecciona una de las siguientes respuestas posibles:

  • awards the contract

  • defines the initial requirements for the product/service

  • publishes a Request for Proposal (RFP)

  • evaluates the contractors’ proposals

Explicación

Pregunta 12 de 172

1

Who administers and oversees the contractor security program?

Selecciona una de las siguientes respuestas posibles:

  • Facility Security Officer (FSO)

  • Information System Security Manager (ISSM)

  • Information System Security Professional/Security Control Assessor (ISSP/SCA)

  • Counterintelligence Special Agent (CISA)

Explicación

Pregunta 13 de 172

1

True or false? The Contracting Officer’s Representative (COR) is authorized to make changes to the contract, even if those changes affect price or quality.

Selecciona uno de los siguientes:

  • VERDADERO
  • FALSO

Explicación

Pregunta 14 de 172

1

Which contracting document provides a record of the contractor’s commitment to comply with the National Industrial Security Program Operating Manual (NISPOM)?

Selecciona una de las siguientes respuestas posibles:

  • DD Form 254, Department of Defense Contract Security Classification Specification

  • Statement of Work (SOW)

  • DD Form 441, Department of Defense Security Agreement

Explicación

Pregunta 15 de 172

1

The ______________ has been designated as the Cognizant Security Office (CSO) for the DoD and over 30 other non-DoD agencies.

Selecciona una de las siguientes respuestas posibles:

  • Department of Energy (DOE)

  • Defense Security Service (DSS)

  • Office of the Director of National Intelligence (ODNI)

  • Department of Homeland Security (DHS)

Explicación

Pregunta 16 de 172

1

Department of Homeland Security (DHS)

Selecciona una de las siguientes respuestas posibles:

  • works for a company with a Facility Clearance (FCL)

  • might work on a classified contract

  • requires access to classified information

Explicación

Pregunta 17 de 172

1

True or false? A contractor facility may access and store classified material as soon as the Facility Clearance (FCL) is granted.

Selecciona uno de los siguientes:

  • VERDADERO
  • FALSO

Explicación

Pregunta 18 de 172

1

Which of the following topics is NOT included in the National Industrial Security Program Operating Manual (NISPOM)?

Selecciona una de las siguientes respuestas posibles:

  • General policies and procedures

  • Facility Clearances (FCLs)

  • Acquisitions guidelines

  • Reporting requirements

Explicación

Pregunta 19 de 172

1

Select ALL the correct responses. Which of the following roles are filled by contractor employees?

Selecciona una o más de las siguientes respuestas posibles:

  • Information System Security Manager (ISSM)

  • Insider Threat Program Senior Official (ITPSO)

  • Information System Security Professional/Security Control Assessor (ISSP/SCA)

  • Facility Security Officer (FSO)

Explicación

Pregunta 20 de 172

1

Select ALL the correct responses. The National Industrial Security Program (NISP) is:

Selecciona una o más de las siguientes respuestas posibles:

  • a voluntary program for cleared contractor facilities

  • designed to safeguard classified information entrusted to industry

  • a government-industry partnership

  • established by Executive Order 12829

Explicación

Pregunta 21 de 172

1

Select ALL the correct responses. The Cognizant Security Office (CSO) does which of the following?

Selecciona una o más de las siguientes respuestas posibles:

  • Establishes industrial security programs

  • Provides security guidance

  • Provides policy clarifications

  • Administers the National Industrial Security Program (NISP)

Explicación

Pregunta 22 de 172

1

Select ALL the correct responses. Which of the following are Counterintelligence Special Agent (CISA) responsibilities?

Selecciona una o más de las siguientes respuestas posibles:

  • Provide advice, assistance, and guidance regarding counterintelligence best practices

  • Authorize and maintain Information Systems

  • Assist with foreign travel briefings and debriefings

Explicación

Pregunta 23 de 172

1

To issue a Facility Clearance (FCL), the Facility Clearance Branch (FCB) reviews which of the following?

Selecciona una de las siguientes respuestas posibles:

  • Information System Security Plans

  • Facility sponsorship

  • Employee foreign travel records

Explicación

Pregunta 24 de 172

1

Who performs classified Information System assessments?

Selecciona una de las siguientes respuestas posibles:

  • Insider Threat Program Senior Official (ITPSO)

  • Information System Security Professional/Security Control Assessor (ISSP/SCA)

  • Counterintelligence Special Agent (CISA)

  • Facility Security Officer (FSO)

Explicación

Pregunta 25 de 172

1

Select ALL the correct responses. DD Form 254, Department of Defense Contract Security Classification Specification, contains which of the following?

Selecciona una o más de las siguientes respuestas posibles:

  • Travel requirements

  • Specific clearance and access requirements

  • Authorization to generate classified information

  • Classified storage requirements

Explicación

Pregunta 26 de 172

1

What is OPSEC?

Selecciona una de las siguientes respuestas posibles:

  • A process, not a set of rules

  • A method for denying an adversary access to our critical information

  • Part of everyone’s job – including yours

  • All of the above

Explicación

Pregunta 27 de 172

1

How many steps are there in the OPSEC process?

Selecciona una de las siguientes respuestas posibles:

  • Two

  • Five

  • Six

  • Too many

Explicación

Pregunta 28 de 172

1

What step in the OPSEC process is Analyzing Threats?

Selecciona una de las siguientes respuestas posibles:

  • Step Three

  • Step Five

  • Step Six

  • Step Two

Explicación

Pregunta 29 de 172

1

____________ are like pieces of a puzzle an adversary uses to reveal a picture of our operations.

Selecciona una de las siguientes respuestas posibles:

  • Threats

  • Indicators

  • Questions

  • Critical information

Explicación

Pregunta 30 de 172

1

What is the last step in the OPSEC process?

Selecciona una de las siguientes respuestas posibles:

  • Identify threats

  • Identify OPSEC countermeasures

  • Identify vulnerabilities

  • Identify critical information

Explicación

Pregunta 31 de 172

1

Simonne left a safe containing classified material open while she went out for lunch. There is no evidence that anyone had access to the material while she was out, but nobody can confirm that the materials were safe from disclosure. What type of violation has occurred?

Selecciona una de las siguientes respuestas posibles:

  • Suspected compromise of classified information

  • Loss of classified information

  • Compromise of classified information

Explicación

Pregunta 32 de 172

1

Security violations are reported to which entity?

Selecciona una de las siguientes respuestas posibles:

  • the DoD System of Record

  • PSMO-I

  • DSS IS Rep

  • FBI

Explicación

Pregunta 33 de 172

1

Changes in a facility's storage capability are reported how?

Selecciona una de las siguientes respuestas posibles:

  • By phone to the FBI

  • To PSMO-I via the DoD System of Record

  • In writing to your DSS IS Rep at the DSS field office

  • To your DSS IS Rep via e-FCL

Explicación

Pregunta 34 de 172

1

Cleared employees who refuse to execute Standard Form 312 are reported how?

Selecciona una de las siguientes respuestas posibles:

  • In writing to your IS Rep at the DSS field office

  • To PSMO-I via the DoD System of Record

  • By phone to the FBI

  • To your IS Rep via e-FCL

Explicación

Pregunta 35 de 172

1

Loss, compromise, and suspected compromise of classified information are reported how?

Selecciona una de las siguientes respuestas posibles:

  • In writing to your DSS IS Rep at the DSS field office

  • By phone to the FBI

  • To PSMO-I via the DoD System of Record

  • To your IS Rep via e-FCL

Explicación

Pregunta 36 de 172

1

Any individual or group that represents a foreign government is considered a security threat.

Selecciona uno de los siguientes:

  • VERDADERO
  • FALSO

Explicación

Pregunta 37 de 172

1

Reports on changes in KMP are required only when there is a change in the president, CEO, or FSO.

Selecciona uno de los siguientes:

  • VERDADERO
  • FALSO

Explicación

Pregunta 38 de 172

1

Of the scenarios listed below, which ones must be reported to your IS Rep as change conditions affecting the facility's clearance?

a. The company has merged with another company and is under new ownership.
b. The company has hired 12 new employees to support a new major contract.
c. The company is moving to a new location to meet the needs of its growing staff.
d. The company just lost its largest contract and has filed for bankruptcy.

Selecciona una de las siguientes respuestas posibles:

  • a, b, c, and d

  • a, b, and c

  • a, c, and d

  • a and d

Explicación

Pregunta 39 de 172

1

Evidence of tampering with your facility's classified storage container is an example of what type of security threat?

Selecciona una de las siguientes respuestas posibles:

  • Espionage

  • Sabotage

  • Subversive activity

  • Terrorism

Explicación

Pregunta 40 de 172

1

Which of the following is reported to PSMO-I?

Selecciona una de las siguientes respuestas posibles:

  • Suspicious contacts

  • Unauthorized receipt of classified material

  • Security equipment vulnerabilities

  • Changes in cleared employee status

Explicación

Pregunta 41 de 172

1

After returning from a recent professional conference, Franklin received a request for classified information from an uncleared person that he met at the conference. What kind of report should be submitted?

Selecciona una de las siguientes respuestas posibles:

  • Suspicious contact

  • Individual culpability

  • Adverse information

  • Unauthorized receipt of classified material

Explicación

Pregunta 42 de 172

1

The two primary methods of submitting reports to your DSS IS Rep at the DSS Field Office are _________ and __________.

Selecciona una de las siguientes respuestas posibles:

  • in writing; through e-FCL

  • in writing; through the DoD System of Record

  • through the DoD System of Record; through e-FCL

  • by phone; through e-FCL

Explicación

Pregunta 43 de 172

1

Working late one evening on a priority project, Helen left several classified documents visible on her desk while she stepped away from her desk for a moment. When she returned, she found a member of the cleaning crew straightening the classified documents on her desk. What type of violation has occurred?

Selecciona una de las siguientes respuestas posibles:

  • Loss of classified information

  • Suspected compromise of classified information

  • Compromise of classified information

Explicación

Pregunta 44 de 172

1

Of the following types of personnel-related information, which is NOT reported to PSMO-I?

Selecciona una de las siguientes respuestas posibles:

  • Suspicious contacts

  • Adverse information

  • Refusal to execute Standard Form (SF) 312

  • Citizenship by naturalization

Explicación

Pregunta 45 de 172

1

Failure to report unauthorized disclosure of classified information does not affect the service members’ safety.

Selecciona uno de los siguientes:

  • VERDADERO
  • FALSO

Explicación

Pregunta 46 de 172

1

According to the NISPOM, espionage, sabotage, terrorism, or subversive activities should be reported as a(n) ___________________.

Selecciona una de las siguientes respuestas posibles:

  • National security threat

  • Individual culpability

  • Security violation

Explicación

Pregunta 47 de 172

1

Contractors must report to the DSS IS Rep only those violations that result in the loss, compromise, or suspected compromise of classified information.

Selecciona uno de los siguientes:

  • VERDADERO
  • FALSO

Explicación

Pregunta 48 de 172

1

NISPOM paragraph 1-300 states that contractors must report certain events to the government.

Selecciona uno de los siguientes:

  • VERDADERO
  • FALSO

Explicación

Pregunta 49 de 172

1

According to NISPOM paragraph 1-300, which of the following is the contractor required to report to the government?

Selecciona una de las siguientes respuestas posibles:

  • Events that require the facility to be open outside of regular business hours

  • Events that affect the proper safeguarding of classified information

  • Any change in the number of GSA security containers being used at the contractor facility to protect classified information

  • An increase or decrease in the number of classified documents stored at the contractor facility

Explicación

Pregunta 50 de 172

1

Assessing a vulnerability in conjunction with the threat, and then determining the impact this would have on an operation if the vulnerability is exploited determines the level of risk.

Selecciona uno de los siguientes:

  • VERDADERO
  • FALSO

Explicación

Pregunta 51 de 172

1

OPSEC is a systematic, proven process to identify, control and protect classified information about a mission, operation or activity, and, thus, denying/mitigating adversary's ability to compromise/interrupt that mission, operation or activity.

Selecciona uno de los siguientes:

  • VERDADERO
  • FALSO

Explicación

Pregunta 52 de 172

1

Patterns, stereotypes, and predictable actions are all types of which of the following?

Selecciona una de las siguientes respuestas posibles:

  • Risks

  • Indicators

  • Vulnerabilities

  • Threats

Explicación

Pregunta 53 de 172

1

An adversary's capability is defined as his ability to do which of the following?

Selecciona una de las siguientes respuestas posibles:

  • Acquire critical information

  • None of these choices

  • Acquire and exploit critical information

  • Exploit critical information

Explicación

Pregunta 54 de 172

1

What are the elements of threat?

Selecciona una de las siguientes respuestas posibles:

  • All of these choices

  • Intent and Capability

  • Friendly and Adversarial perspectives

  • Vulnerabilities and Indicators

Explicación

Pregunta 55 de 172

1

Which step in the OPSEC process is a decision making step because it helps the decision maker prioritize and decide whether or not to apply a countermeasure?

Selecciona una de las siguientes respuestas posibles:

  • Identify critical information

  • Apply countermeasures

  • Assess Risk

  • Analyze vulnerabilities

Explicación

Pregunta 56 de 172

1

The development of a countermeasure focuses directly on the

Selecciona una de las siguientes respuestas posibles:

  • level of risk to the organization.

  • adversary it is guarding against.

  • importance of the critical information item.

  • vulnerability it is designed to protect.

Explicación

Pregunta 57 de 172

1

Why do we need to have threat information?

Selecciona una de las siguientes respuestas posibles:

  • We need to identify an adversary's intent.

  • We need to identify an adversary's capability.

  • Knowledge of the threat supports all other steps in the OPSEC process.

  • All of these choices

Explicación

Pregunta 58 de 172

1

What is the preferred method of assessing the risk to your organization?

Selecciona una de las siguientes respuestas posibles:

  • Use of expert testimony

  • All of the choices

  • Intuitive reasoning

  • The committee approach

Explicación

Pregunta 59 de 172

1

Which organizations are tasked with establishing OPSEC programs under the law signed by President Reagan?

Selecciona una de las siguientes respuestas posibles:

  • The Interagency OPSEC Support Staff

  • All executive departments and agencies

  • All executive departments and agencies with national security missions

  • All government departments and agencies

Explicación

Pregunta 60 de 172

1

What factor takes into account the impact that a compromise would have on your operation?

Selecciona una de las siguientes respuestas posibles:

  • Threat

  • Risk

  • Countermeasure

  • Vulnerability

Explicación

Pregunta 61 de 172

1

Why should organizations use and practice OPSEC?

Selecciona una de las siguientes respuestas posibles:

  • To protect their critical information

  • To maintain the element of surprise

  • To protect the integrity of their mission

  • All of these choices

Explicación

Pregunta 62 de 172

1

OPSEC focuses on what type of critical information?

Selecciona una de las siguientes respuestas posibles:

  • Sensitive but unclassified information

  • All of these choices

  • All levels of classified information

  • Highly classified information

Explicación

Pregunta 63 de 172

1

Lack of proper training, use of non-secure communications, and poor system design are all examples of

Selecciona una de las siguientes respuestas posibles:

  • risks.

  • vulnerabilities.

  • indicators.

  • threats.

Explicación

Pregunta 64 de 172

1

When dealing with countermeasure development, what is the bottom line?

Selecciona una de las siguientes respuestas posibles:

  • Always develop countermeasures on a first-come, first-served basis

  • Always apply a unique countermeasure to each vulnerability

  • Always think of a countermeasure as a smarter way to do a task

  • Always weigh the cost of the countermeasure against its benefit

Explicación

Pregunta 65 de 172

1

Identifying what an adversary already knows about your operation helps you to

Selecciona una de las siguientes respuestas posibles:

  • determine the collection methods the adversary is using against you.

  • prioritize the distribution of resources for applying countermeasures.

  • look at your operation from both the friendly and adversary perspectives.

  • assess the level of risk to your operation.

Explicación

Pregunta 66 de 172

1

In order to determine our critical information, we need to consider both the friendly and adversary points of view.

Selecciona uno de los siguientes:

  • VERDADERO
  • FALSO

Explicación

Pregunta 67 de 172

1

Which of the following statements concerning activity tip-offs is correct?

Selecciona una de las siguientes respuestas posibles:

  • They are indicators that tell adversaries where to focus their collection efforts

  • They are vulnerabilities that tell adversaries where to focus their collection efforts

  • They are indicators that are not part of a unit's normal conduct

  • They are vulnerabilities that are not part of a unit's normal conduct

Explicación

Pregunta 68 de 172

1

The level of risk is indirectly proportional to all three factors of risk.

Selecciona uno de los siguientes:

  • VERDADERO
  • FALSO

Explicación

Pregunta 69 de 172

1

The more we know about an adversary's intent and capability, the better we can judge how and why he may collect the information that he needs.

Selecciona uno de los siguientes:

  • VERDADERO
  • FALSO

Explicación

Pregunta 70 de 172

1

Identifying a unit based upon how they deploy their equipment is an example of

Selecciona una de las siguientes respuestas posibles:

  • a pattern example of an indicator.

  • a predictable action example of a risk.

  • a stereotype example of a vulnerability.

  • pattern example of a threat.

Explicación

Pregunta 71 de 172

1

Which of the following is NOT a step in the OPSEC process?

Selecciona una de las siguientes respuestas posibles:

  • Lock all classified material

  • Identify critical information

  • Analyze the threat

  • Apply countermeasures

Explicación

Pregunta 72 de 172

1

Which step in the OPSEC process requires you to look at your operation through the eyes of the adversary?

Selecciona una de las siguientes respuestas posibles:

  • Analyze vulnerabilities

  • Apply countermeasures

  • Identify critical information

  • All of the choices

Explicación

Pregunta 73 de 172

1

Which of the following statements BEST describes the risk status if any one element of risk shrinks to zero?

Selecciona una de las siguientes respuestas posibles:

  • There is no risk.

  • The level of risk remains constant.

  • The level of risk increases.

  • The level of risk decreases.

Explicación

Pregunta 74 de 172

1

Specific facts about friendly intentions, capabilities, and operations vitally needed by adversaries to plan and act effectively is called

Selecciona una de las siguientes respuestas posibles:

  • critical information.

  • vulnerabilities.

  • indicators.

  • risk

Explicación

Pregunta 75 de 172

1

Which of the following countermeasures may be necessary if routine activities provide an adversary with tip-offs to critical information?

Selecciona una de las siguientes respuestas posibles:

  • Awareness training

  • Speed of execution

  • Cover and deception

  • Changes in procedure

Explicación

Pregunta 76 de 172

1

An advantage of incorporating the use of OPSEC surveys is that it

Selecciona una de las siguientes respuestas posibles:

  • provides for early detection of OPSEC problems.

  • reduces indicators and avoids giving an adversary activity tip-offs.

  • makes OPSEC principles second nature to your employees

  • allows for any changes in OPSEC factors over time.

Explicación

Pregunta 77 de 172

1

Which of the following countermeasures should be used sparingly because of its expense and maintenance difficulty?

Selecciona una de las siguientes respuestas posibles:

  • Changes in procedure

  • Cover and deception

  • Speed of execution

  • Awareness training

Explicación

Pregunta 78 de 172

1

Your knowledge of which factors impact your capability to analyze your vulnerabilities?

Selecciona una de las siguientes respuestas posibles:

  • Your mission

  • Your operations

  • The interaction with other OPSEC steps

  • All of these choices

Explicación

Pregunta 79 de 172

1

Which of the following BEST identifies the goal of OPSEC?

Selecciona una de las siguientes respuestas posibles:

  • To provide you with a holistic picture of your operation

  • To protect your operation by properly controlling classified information

  • To establish a systematic process to assess the requirements for mission success

  • To control information about your capabilities and intentions

Explicación

Pregunta 80 de 172

1

What document signed by President Reagan directed the establishment of OPSEC programs, and in what year did this document become law?

Selecciona una de las siguientes respuestas posibles:

  • NSDD 289; in 1988

  • NSDD 289; in 1989

  • NSDD 298; in 1988

  • NSDD 298; in 1989

Explicación

Pregunta 81 de 172

1

Observable and detectable items that can be pieced together through analysis to reveal sensitive information about your operation are called

Selecciona una de las siguientes respuestas posibles:

  • indicators.

  • critical information items.

  • threats.

  • vulnerabilities.

Explicación

Pregunta 82 de 172

1

Which of the following countermeasures is considered among the most effective for all organizations?

Selecciona una de las siguientes respuestas posibles:

  • Cover and deception

  • Changes in procedure

  • Awareness training

  • Speed of execution

Explicación

Pregunta 83 de 172

1

It's often the little things we do every day that can develop into vulnerabilities and cause damage to our operation.

Selecciona uno de los siguientes:

  • VERDADERO
  • FALSO

Explicación

Pregunta 84 de 172

1

An advantage of incorporating OPSEC principles in the planning stage of any operation is that it

Selecciona una de las siguientes respuestas posibles:

  • makes OPSEC principles second nature to your employees.

  • provides for early detection of OPSEC problems.

  • reduces indicators and avoids giving an adversary activity tip-offs.

  • allows for any changes in OPSEC factors over time.

Explicación

Pregunta 85 de 172

1

An advantage of using good OPSEC principles during contingencies is that it

Selecciona una de las siguientes respuestas posibles:

  • makes OPSEC principles second nature to your employees.

  • reduces indicators and avoids giving an adversary activity tip-offs.

  • allows for any changes in OPSEC factors over time.

  • provides for early detection of OPSEC problems.

Explicación

Pregunta 86 de 172

1

Because each adversary may have different intentions and capabilities, you may need to enact different scenarios for different adversaries.

Selecciona uno de los siguientes:

  • VERDADERO
  • FALSO

Explicación

Pregunta 87 de 172

1

Which of the following, when looked at by itself or in conjunction with something else, can point to a vulnerability that an adversary can exploit?

Selecciona una de las siguientes respuestas posibles:

  • Critical information item

  • Risk

  • Indicator

  • Threat

Explicación

Pregunta 88 de 172

1

What is defined as a weakness that can be exploited by an adversary?

Selecciona una de las siguientes respuestas posibles:

  • Vulnerability

  • Risk

  • Countermeasure

  • Threat

Explicación

Pregunta 89 de 172

1

Risk is a function of the

Selecciona una de las siguientes respuestas posibles:

  • threat only.

  • threat, vulnerability, and impact.

  • vulnerability and impact.

  • threat and vulnerability.

Explicación

Pregunta 90 de 172

1

An advantage of integrating OPSEC principles in your day-to-day operations is that it

Selecciona una de las siguientes respuestas posibles:

  • allows for any changes in OPSEC factors over time.

  • reduces indicators and avoids giving an adversary activity tip-offs.

  • provides for early detection of OPSEC problems.

  • makes OPSEC principles second nature to your employees.

Explicación

Pregunta 91 de 172

1

OPSEC differs from other programs because it requires you to look at yourself through the eyes of the adversary.

Selecciona uno de los siguientes:

  • VERDADERO
  • FALSO

Explicación

Pregunta 92 de 172

1

Anyone who opposes or acts against your interest is called a(n)

Selecciona una de las siguientes respuestas posibles:

  • liability.

  • threat.

  • adversary.

  • risk.

Explicación

Pregunta 93 de 172

1

In analyzing the threat, we are concerned with adversaries that

Selecciona una de las siguientes respuestas posibles:

  • possess the ability to acquire and exploit our critical information.

  • intend to do us harm.

  • demonstrate the intent and capability to be a threat to our mission.

  • possess the ability to exploit our critical information.

Explicación

Pregunta 94 de 172

1

Stan has recently witnessed some unusual behavior from a co-worker. He’s not sure if he should report it, but he knows it is better not to report an incident or behavior than to make a potentially false report.

Selecciona uno de los siguientes:

  • VERDADERO
  • FALSO

Explicación

Pregunta 95 de 172

1

Jorge is a security official for a DoD organization. Where can he find reporting procedures that pertain to his organization?

Selecciona una de las siguientes respuestas posibles:

  • DoD Directive 5240.06, CI Awareness and Reporting (CIAR)

  • DoD 5220.22-M, the National Industrial Security Program Operating Manual (NISPOM)

  • DSS Counterintelligence Office

Explicación

Pregunta 96 de 172

1

Security officials should seek out and consider threat information only from official, government sources.

Selecciona uno de los siguientes:

  • VERDADERO
  • FALSO

Explicación

Pregunta 97 de 172

1

Which of the following is an objective of the DSS CI Directorate?

Selecciona una de las siguientes respuestas posibles:

  • Provide for the early detection and referral of potential espionage cases

  • Conduct counterintelligence investigations for the U.S.

  • Maintain list of militarily critical technology

Explicación

Pregunta 98 de 172

1

Specific reporting procedures vary widely across agencies and contractor facilities. While imminent threats should be reported directly to the FBI, employees should use their agency’s or facility’s reporting procedures to report other threats through their chain of command.

Selecciona uno de los siguientes:

  • VERDADERO
  • FALSO

Explicación

Pregunta 99 de 172

1

Incorporating counterintelligence and threat awareness into a security program can potentially prevent theft, espionage, and loss of life.

Selecciona uno de los siguientes:

  • VERDADERO
  • FALSO

Explicación

Pregunta 100 de 172

1

Jack is his organization’s Facility Security Officer. He is working with other company officials to identify the organization’s assets. When they identify assets, they should include only classified information.

Selecciona uno de los siguientes:

  • VERDADERO
  • FALSO

Explicación

Pregunta 101 de 172

1

Sam is a Facility Security Officer for a cleared defense contractor. Which of the following should Sam refer to for counterintelligence and threat awareness requirements for contractors?

Selecciona una de las siguientes respuestas posibles:

  • DoD 5200.2-R, Personnel Security Program

  • DoD 5220.22-M, the National Industrial Security Program Operating Manual (NISPOM)

  • DoDM 5200.01, Volume 1, Enclosure 3, DoD Information Security Program

Explicación

Pregunta 102 de 172

1

A cleared U.S. company received a request to sell export-controlled technology to an Eastern European security organization. This is an example of _____________________.

Selecciona una de las siguientes respuestas posibles:

  • a cyber threat

  • an unsolicited request

  • solicitation and marketing of services

  • targeting insiders

Explicación

Pregunta 103 de 172

1

Select ALL the correct responses. Adam is an expert in his organization’s dual use technology. He is invited to speak at a foreign conference. He knows seminars, conventions, and exhibits can be used by adversaries to target knowledgeable resources like him. What are some of the indicators Adam should look out for?

Selecciona una o más de las siguientes respuestas posibles:

  • Foreign attendees’ business cards do not match stated affiliations

  • Excessive or suspicious photography and filming of technology and products

  • Conversations involving classified, sensitive, or export-controlled technologies or products

Explicación

Pregunta 104 de 172

1

Anna is her organization’s Facility Security Officer. When considering assets, she knows that the greatest target of our adversaries is ___________.

Selecciona una de las siguientes respuestas posibles:

  • human assets

  • technology assets

  • equipment assets

Explicación

Pregunta 105 de 172

1

Which step of the analytical risk management process includes considering the impact to military and strategic advantage?

Selecciona una de las siguientes respuestas posibles:

  • Identify vulnerabilities

  • Assess risk

  • Develop and apply countermeasures

  • Identify assets

Explicación

Pregunta 106 de 172

1

Which of the following is a secure online environment offered by the OPM Center for Federal Investigative Services?

Selecciona una de las siguientes respuestas posibles:

  • American Society for Industrial Security International (ASIS)

  • NCMS, the Society of Industrial Security Professionals

  • Industrial Security Awareness Council (ISAC)

  • Extranet for Security Professionals

Explicación

Pregunta 107 de 172

1

The Secretary of Defense is the Executive Agent of the National Industrial Security Program and is responsible for overall implementation of the program.

Selecciona uno de los siguientes:

  • VERDADERO
  • FALSO

Explicación

Pregunta 108 de 172

1

The Cognizant Security Office (CSO) for the DoD is Director of National Intelligence (DNI).

Selecciona uno de los siguientes:

  • VERDADERO
  • FALSO

Explicación

Pregunta 109 de 172

1

Which government entity is responsible for providing National Industrial Security Program (NISP) policy direction?

Selecciona una de las siguientes respuestas posibles:

  • Cognizant Security Agencies (CSAs)

  • Secretary of Defense (SecDef)

  • National Security Council (NSC)

  • Information Security Oversight Office (ISOO)

Explicación

Pregunta 110 de 172

1

What document does DSS publish and post on its website to change or clarify existing policy requirements in the NISPOM?

Selecciona una de las siguientes respuestas posibles:

  • CDSE Newsletter

  • DSS Access Magazine

  • Technology Collection Trends in the U.S. Defense Industry

  • Industrial Security Letter (ISL)

Explicación

Pregunta 111 de 172

1

Only select Cognizant Security Agencies (CSAs) have hotlines for reporting industrial security issues.

Selecciona uno de los siguientes:

  • VERDADERO
  • FALSO

Explicación

Pregunta 112 de 172

1

XYZ Industries is a cleared facility that is moving its headquarters to a less expensive office space. This need to be reported to the company’s IS Rep?

Selecciona uno de los siguientes:

  • VERDADERO
  • FALSO

Explicación

Pregunta 113 de 172

1

Which of the following includes all the steps necessary for processing a facility clearance and a list of the documents and information that the Facility Security Officer (FSO) must gather to prepare for the Facility Clearance Branch (FCB) telephonic survey?

Selecciona una de las siguientes respuestas posibles:

  • Facility Clearance Checklist

  • Industrial Security Facilities Database (ISFD)

  • DD Form 254 Handbook

  • National Industrial Security Program Operating Manual (NISPOM)

Explicación

Pregunta 114 de 172

1

In the NISPOM, what location does “1-302” represent?

Selecciona una de las siguientes respuestas posibles:

  • Chapter 1, Section 3, Paragraph 2

  • Chapter 1, Section 30, Paragraph 2

  • Chapter 1, Page 302

  • Section 1, Paragraph 30, Page 2

Explicación

Pregunta 115 de 172

1

The domestic delivery services approved for overnight domestic delivery of Secret and Confidential information are listed in the ______________________.

Selecciona una de las siguientes respuestas posibles:

  • DD Form 254, DoD Contract Security Classification Specification

  • Transportation, Delivery, and Relocation Solutions (TDRS), Schedule 48

  • National Industrial Security Program Operating Manual (NISPOM)

Explicación

Pregunta 116 de 172

1

When is an SF 312, Classified Information Nondisclosure Agreement, executed?

Selecciona una de las siguientes respuestas posibles:

  • Within the first six months after eligibility is granted

  • As soon as the completed SF 86 is reviewed by the FSO.

  • Before an employee is granted access to classified information

  • After an employee has access to classified information

Explicación

Pregunta 117 de 172

1

Which of the following would not be reported to the Personnel Security Management Office for Industry (PSMO-I)?

Selecciona una de las siguientes respuestas posibles:

  • Employees desiring not to perform on classified work

  • Adverse information

  • Changes in cleared employee status

  • Change conditions affecting the facility clearance

Explicación

Pregunta 118 de 172

1

What DSS organization provides security education and training to DoD and other U.S. government personnel and contractors?

Selecciona una de las siguientes respuestas posibles:

  • Facility Clearance Branch (FCB)

  • Foreign Ownership, Control, or Influence (FOCI) Operations Division

  • Personnel Security Management Office for Industry (PSMO-I)

  • Center for Development of Security Excellence (CDSE)

Explicación

Pregunta 119 de 172

1

What legally binding document must be executed between the Department of Defense and a contractor to obtain a facility clearance?

Selecciona una de las siguientes respuestas posibles:

  • SF 328, Certificate Pertaining to Foreign Interests

  • DD Form 441, DoD Security Agreement

  • SF 86, Questionnaire for National Security Positions

  • SF 312, Non-Disclosure Form

Explicación

Pregunta 120 de 172

1

One purpose of the National Industrial Security Program (NISP) is to preserve our nation’s economic and technological interests.

Selecciona uno de los siguientes:

  • VERDADERO
  • FALSO

Explicación

Pregunta 121 de 172

1

Which resource guides Facility Security Officers (FSOs) through the self-inspection process and provides techniques to improve the quality of self-inspections?

Selecciona una de las siguientes respuestas posibles:

  • Self-Inspection Handbook for NISP Contractors

  • National Industrial Security Program Operating Manual (NISPOM)

  • Suggested Contract File Folder Headings job aid

Explicación

Pregunta 122 de 172

1

Company ABC was recently issued a facility clearance and has been awarded its first classified contract. Which form should the company receive with the contract that provides specific guidance about what information is classified and at what classification level?

Selecciona una de las siguientes respuestas posibles:

  • SF 328, Certificate Pertaining to Foreign Interests

  • SF 312, Classified Information Nondisclosure Agreement

  • SF 86, Questionnaire for National Security Positions

  • DD Form 254, Department of Defense Contract Security Classification Specification

Explicación

Pregunta 123 de 172

1

As defined in the NISPOM, ______ is the administrative determination that an individual is eligible for access to classified information.

Selecciona una de las siguientes respuestas posibles:

  • access level

  • need-to-know

  • a Personnel Security Clearance (PCL)

  • eligibility level

Explicación

Pregunta 124 de 172

1

What security control measure outlines the specific export-controlled information that has been authorized for release during a foreign visit and delineates how a company will control access?

Selecciona una de las siguientes respuestas posibles:

  • Export Authorization

  • Technology Control Plan (TCP)

  • Security Assurance

  • Disclosure Agreement

Explicación

Pregunta 125 de 172

1

If the visitor organization and host organization both use the DoD System of Record, visit notifications are sent electronically, which speeds the approval process.

Selecciona uno de los siguientes:

  • VERDADERO
  • FALSO

Explicación

Pregunta 126 de 172

1

When the host organization approves a visit request, this approval constitutes _____.

Selecciona una de las siguientes respuestas posibles:

  • authority to establish security controls

  • authority to obtain a Facility Verification Request

  • authority to request additional special access authorizations

  • authority for disclosure

Explicación

Pregunta 127 de 172

1

If there is not a contractual relationship between the visitor’s organization and the host organization, where must the host organization obtain authorization for disclosure of classified information?

Selecciona una de las siguientes respuestas posibles:

  • DSS Industrial Security Representative

  • Industrial Security Facilities Database (ISFD)

  • Government Contracting Activity (GCA)

Explicación

Pregunta 128 de 172

1

What security control measures must the host organization implement for a classified meeting?

Selecciona una de las siguientes respuestas posibles:

  • Physical security controls for the control of, access to, and dissemination of the classified information to be presented

  • Security control measures must provide for security briefings and signed certificates.

  • None. Security control measures are the responsibility of the Cognizant Security Agency.

  • None. Security control measures are the responsibility of the Government Contracting Activity.

Explicación

Pregunta 129 de 172

1

An individual’s access level is directly related to the employer organization’s Facility Clearance level and the level of access needed for the individual to do his or her job.

Selecciona uno de los siguientes:

  • VERDADERO
  • FALSO

Explicación

Pregunta 130 de 172

1

When is it appropriate for the visitor’s organization to submit a visit authorization letter (VAL)?

Selecciona una de las siguientes respuestas posibles:

  • When the visit is a contract-related classified visit

  • When the request needs to be submitted and approved quickly

  • When one or both organizations do not utilize the web-based DoD System of Record

  • When either the visitor’s or host organization does not utilize the Industrial Security Facilities Database

Explicación

Pregunta 131 de 172

1

Where are actions, such as Personnel Security Clearance terminations, upgrades, downgrades, and reinstatements, on contractor employees entered?

Selecciona una de las siguientes respuestas posibles:

  • Industrial Security Facilities Database (ISFD)

  • International Visits Program (IVP)

  • DoD System of Record

Explicación

Pregunta 132 de 172

1

Which of the following is a good security practice in areas where classified information may be subject to unauthorized disclosure?

Selecciona una de las siguientes respuestas posibles:

  • Inform the DSS IS Representative that all visitors to the area must wear a badge

  • Inform the project manager of the heightened risk and ensure the visitor has an escort

  • Provide visitors with a badge and an escort who has been informed of the access limitations or restrictions on the visitor's movements.

Explicación

Pregunta 133 de 172

1

Select ALL of the correct responses. Which of the following are security briefing topics for visitors?

Selecciona una o más de las siguientes respuestas posibles:

  • How to verify need-to-know in the DoD System of Record before a classified discussion

  • Physical security procedures and access areas

  • Use of Portable Electronic Devices

  • Policy and procedures for transmitting and/or transporting classified material

Explicación

Pregunta 134 de 172

1

_____ describes the level of information to which a person is authorized access based on a background investigation.

Selecciona una de las siguientes respuestas posibles:

  • Need-to-know

  • Access level

  • Eligibility

  • Personnel Security Clearance

Explicación

Pregunta 135 de 172

1

Who must submit the RFV when a foreign national needs to visit a U.S. contractor facility to discuss classified information?

Selecciona una de las siguientes respuestas posibles:

  • Sponsoring foreign government

  • Both the foreign contracting company and the sponsoring foreign government

  • U.S. contractor

  • Foreign contracting company

Explicación

Pregunta 136 de 172

1

What system may be used to verify a company’s Facility Clearance status?

Selecciona una de las siguientes respuestas posibles:

  • Joint Personnel Adjudication System (JPAS)

  • Industrial Security Facilities Database (ISFD)

  • DoD System of Records

Explicación

Pregunta 137 de 172

1

Who sponsors classified meetings in the NISP?

Selecciona una de las siguientes respuestas posibles:

  • Universities and industry associations

  • DSS Headquarters, Industrial Security Integration and Application (IP) Programs

  • Cognizant Security Agency (CSA)

  • U.S. contractor

  • Government Contracting Activity (GCA)

Explicación

Pregunta 138 de 172

1

What is a final security control in the NISP when the purpose of a visit has been accomplished?

Selecciona una de las siguientes respuestas posibles:

  • Recovery of all classified information

  • To ensure any classified material that may be of use in a follow-on contract is transported securely to the visitor’s organization

  • To ensure that all classified material has been properly stored and inventoried

Explicación

Pregunta 139 de 172

1

Government employees temporarily stationed at a contractor facility ______ control of their work products to the contractor.

Selecciona una de las siguientes respuestas posibles:

  • must reach an agreement for

  • must relinquish

  • do not have to relinquish

Explicación

Pregunta 140 de 172

1

Who sends the NATO Request for Visit (RFV) approval to the NATO site?

Selecciona una de las siguientes respuestas posibles:

  • Visitor’s Facility Security Officer (FSO)

  • DSS Headquarters Industrial Security Integration and Application (IP) Programs

  • Cognizant Security Agency (CSA)

  • Government Contracting Activity (GCA)

Explicación

Pregunta 141 de 172

1

When does a host need to coordinate with the visitor’s organization regarding the Classified Information Nondisclosure Agreement (SF-312)?

Selecciona una de las siguientes respuestas posibles:

  • When the visit is a first-time visit and the DoD System of Records does not indicate that the visitor has signed an SF-312

  • The visitor must always sign it at every visit to any classified facility

  • When the visitor presents a visit authorization letter (VAL)

  • When it is the visitor’s first visit to the cleared facility

Explicación

Pregunta 142 de 172

1

International visit requirements apply when information to be disclosed is classified or unclassified but related to classified contracts or otherwise subject to export controls under the International Traffic in Arms Regulations (ITAR) or Export Administration Regulations (EAR).

Selecciona uno de los siguientes:

  • VERDADERO
  • FALSO

Explicación

Pregunta 143 de 172

1

NATO briefings require a signed certificate.

Selecciona uno de los siguientes:

  • VERDADERO
  • FALSO

Explicación

Pregunta 144 de 172

1

Which of the following is used in the PCL process to determine a candidate’s eligibility?

Selecciona una de las siguientes respuestas posibles:

  • Adjudicative Guidelines

  • E.O. 12968

  • E.O. 13467

  • NIPSOM

Explicación

Pregunta 145 de 172

1

Who makes the interim eligibility determination?

Selecciona una de las siguientes respuestas posibles:

  • OPM/ISP

  • DSS Field Office

  • DOHA

  • PSMO-I

Explicación

Pregunta 146 de 172

1

To whom does the FSO submit the applicant’s completed SF-86 and both signed release forms?

Selecciona una de las siguientes respuestas posibles:

  • OPM

  • DOHA

  • PSMO-I

Explicación

Pregunta 147 de 172

1

How is the FSO notified that a cleared employee may be due for a periodic reinvestigation?

Selecciona una de las siguientes respuestas posibles:

  • The facility’s IS Rep notifies the FSO

  • The FSO is not notified but must look for eligible employees in the DoD system of record

  • PSMO-I notifies the FSO

Explicación

Pregunta 148 de 172

1

The only requirement for employees to access classified information is to have a favorable eligibility determination.

Selecciona uno de los siguientes:

  • VERDADERO
  • FALSO

Explicación

Pregunta 149 de 172

1

A contractor facility has been awarded classified contracts that require access to information classified at the Confidential and Secret levels. What is the level of FCL required by the contractor?

Selecciona una de las siguientes respuestas posibles:

  • Confidential

  • Secret

  • Top Secret

Explicación

Pregunta 150 de 172

1

What is the purpose of an annual clearance justification review?

Selecciona una de las siguientes respuestas posibles:

  • To ensure there are enough cleared employees to meet the needs of a contractor company’s classified contract workload

  • To provide the CEO with justification for hiring more cleared employees

  • To assess whether a cleared employee still requires access to classified information

Explicación

Pregunta 151 de 172

1

One of the conditions required for a pre-existing eligibility determination issued by one federal agency to be accepted by another federal agency is for the determination to be based on an investigation of sufficient scope that is current to within _________.

Selecciona una de las siguientes respuestas posibles:

  • 5 years

  • 7 years

  • 10 years

Explicación

Pregunta 152 de 172

1

The thirteen adjudicative guidelines involve assessing a candidate using criteria that addresses a specific concern that can impact the candidate’s ability to protect national security.

Selecciona uno de los siguientes:

  • VERDADERO
  • FALSO

Explicación

Pregunta 153 de 172

1

If a candidate has a record in the DoD system of record (JPAS/DISS) and a pre-existing eligibility determination, the FSO assesses whether that determination may be accepted in lieu of initiating a new investigation to determine eligibility.

Selecciona uno de los siguientes:

  • VERDADERO
  • FALSO

Explicación

Pregunta 154 de 172

1

The __________________ develops and implements a facility’s security program.

Selecciona una de las siguientes respuestas posibles:

  • Cognizant Security Officer (CSO)

  • Facility Security Officer (FSO)

  • Personnel Security Officer (PSO)

Explicación

Pregunta 155 de 172

1

A company cleared at the Secret level hires a new employee. The new employee has a current Top Secret eligibility, which was granted by her previous employer. What is the highest level of classified access she may have for work performed for her new employer?

Selecciona una de las siguientes respuestas posibles:

  • Secret

  • Top Secret

  • Confidential

Explicación

Pregunta 156 de 172

1

Which investigation type is required for an initial Secret clearance?

Selecciona una de las siguientes respuestas posibles:

  • Tier 3R

  • Tier 5R

  • Tier 5

  • Tier 3

Explicación

Pregunta 157 de 172

1

The FSO submits the applicant’s completed SF-86 using which of the following?

Selecciona una de las siguientes respuestas posibles:

  • JCAVS/DISS

  • JPASS/DISS Portal

  • eQIP

Explicación

Pregunta 158 de 172

1

How is the applicant’s FSO notified if the applicant receive an unfavorable eligibility determination?

Selecciona una de las siguientes respuestas posibles:

  • DoD System of Record

  • DOHA communication

  • eQIP notification

Explicación

Pregunta 159 de 172

1

Which of the following provides policy about PCLs and defines access criteria?

Selecciona una de las siguientes respuestas posibles:

  • E.O. 13467

  • E.O. 12968

  • USD(I) Memo 25 Dec 2005

  • NISPOM

Explicación

Pregunta 160 de 172

1

Which investigation is used for a periodic reinvestigation of an individual possessing a Secret or Confidential clearance eligibility?

Selecciona una de las siguientes respuestas posibles:

  • Tier 5R

  • Tier 5

  • Tier 3

  • Tier 3R

Explicación

Pregunta 161 de 172

1

Facility employees may be processed for personnel security clearances concurrently with the processing of, or after the award of, a facility’s FCL.

Selecciona uno de los siguientes:

  • VERDADERO
  • FALSO

Explicación

Pregunta 162 de 172

1

During which stage of the personnel security clearance process are the thirteen guidelines used?

Selecciona una de las siguientes respuestas posibles:

  • Adjudication stage

  • Interim review stage

  • Personnel security clearance investigation stage

  • Initiate personnel security clearance process stage

Explicación

Pregunta 163 de 172

1

Who has primary responsibility for the adjudication of personnel security background investigations?

Selecciona una de las siguientes respuestas posibles:

  • PSMO-I

  • DOHA

  • DoD CAF

Explicación

Pregunta 164 de 172

1

An interim eligibility determination grants the applicant permanent access to classified information by bypassing the remainder of the PCL process.

Selecciona uno de los siguientes:

  • VERDADERO
  • FALSO

Explicación

Pregunta 165 de 172

1

Which investigation type is required for an initial Top Secret Clearance?

Selecciona una de las siguientes respuestas posibles:

  • Tier 3

  • Tier 5R

  • Tier 3R

  • Tier 5

Explicación

Pregunta 166 de 172

1

Which of the following items must the FSO report to the PSMO-I?

Selecciona una de las siguientes respuestas posibles:

  • A cleared employee has received an industry award

  • A cleared employee’s citizenship has changed

  • An uncleared employee’s citizenship has changed

Explicación

Pregunta 167 de 172

1

To whom may eligibility decisions be appealed if the DoD CAF denies eligibility?

Selecciona una de las siguientes respuestas posibles:

  • PSMO-I

  • DSS Field Office

  • DOHA

Explicación

Pregunta 168 de 172

1

Which of the following government entities typically determines personnel security clearance eligibility?

Selecciona una de las siguientes respuestas posibles:

  • DoD CAF

  • DSS Field Office

  • DOHA

Explicación

Pregunta 169 de 172

1

Which type of security training typically informs cleared employees of changes or updates to security regulations?

Selecciona una de las siguientes respuestas posibles:

  • Initial Security Training

  • Special Security Briefing

  • Refresher Security Training

Explicación

Pregunta 170 de 172

1

Which activities are recommended as part of continuous evaluation program at a cleared facility?
a. periodic reinvestigations
b. annual clearance justification reviews
c. reporting required information

Selecciona una de las siguientes respuestas posibles:

  • b and c only

  • a only

  • a and b only

  • a, b, and c

Explicación

Pregunta 171 de 172

1

Which of the following government entities adjudicates unfavorable eligibility determinations that are appealed?

Selecciona una de las siguientes respuestas posibles:

  • PSMO-I

  • DSS Field Office

  • DOHA

Explicación

Pregunta 172 de 172

1

When is an applicant required to submit fingerprints in addition to his/her security application?

Selecciona una de las siguientes respuestas posibles:

  • During a periodic reinvestigation of a cleared individual

  • During the applicants initial PCL investigation

  • Only when the applicant is seeking Top Secret clearance eligibility

  • The applicant is never required to submit a fingerprint card, but it is a best practice.

Explicación