INDUSTRIAL Quiz

Description

SFPC SFPC Quiz on INDUSTRIAL Quiz, created by Casey Neville on 05/05/2022.
Casey Neville
Quiz by Casey Neville, updated more than 1 year ago
Casey Neville
Created by Casey Neville almost 2 years ago
887
2

Resource summary

Question 1

Question
Contractor CEO: My company, BuildGen Contracting, just won its first classified government contract. What are our NISP responsibilities? What are contractor responsibilities according to the NISP?
Answer
  • Establish NISP requirements for the protection of classified information
  • Provide advice, assistance, and oversight
  • Implement NISP requirements for the protection of classified information

Question 2

Question
Identify whether the following statements describe CSAs or CSOs. These organizations establish industrial security programs and oversee security requirements.
Answer
  • CSA
  • CSO

Question 3

Question
Identify whether the following statements describe CSAs or CSOs. These organizations administer the NISP and provide security guidance, oversight, and policy clarifications.
Answer
  • CSA
  • CSO

Question 4

Question
Which of these are DSS responsibilities or functions? Select all that apply.
Answer
  • Provide security guidance and oversight
  • Provide policy clarifications
  • Conduct Security Vulnerability Assessments (SVAs)
  • Provide installation-specific procedures for work performed on a government installation
  • Provide contract-specific security classification guidance

Question 5

Question
Identify whether the following roles are filled by government or industry employees. Facility Security Officer (FSO)
Answer
  • Government
  • Industry

Question 6

Question
Identify whether the following roles are filled by government or industry employees. Information System Security Professional/Security Control Assessor (ISSP/SCA)
Answer
  • Government
  • Industry

Question 7

Question
Identify whether the following roles are filled by government or industry employees. Information System Security Manager (ISSM)
Answer
  • Government
  • Industry

Question 8

Question
Identify whether the following roles are filled by government or industry employees. Industrial Security Representative (IS Rep)
Answer
  • Government
  • Industry

Question 9

Question
Identify whether the following roles are filled by government or industry employees. Counterintelligence Special Agent (CISA)
Answer
  • Government
  • Industry

Question 10

Question
Identify whether the following roles are filled by government or industry employees. Insider Threat Program Senior Official (ITPSO)
Answer
  • Government
  • Industry

Question 11

Question
This DSS employee serves as the contractor’s primary point of contact for security.
Answer
  • Information System Security Professional/Security Control Assessor (ISSP/SCA)
  • Facility Security Officer (FSO)
  • Insider Threat Program Senior Official (ITPSO)
  • Information System Security Manager (ISSM)
  • Industrial Security Representative (IS Rep)

Question 12

Question
This DSS employee oversees authorized contractor Information System use.
Answer
  • Information System Security Professional/Security Control Assessor (ISSP/SCA)
  • Facility Security Officer (FSO)
  • Insider Threat Program Senior Official (ITPSO)
  • Information System Security Manager (ISSM)
  • Industrial Security Representative (IS Rep)

Question 13

Question
This contractor employee administers and oversees the contractor security program.
Answer
  • Information System Security Professional/Security Control Assessor (ISSP/SCA)
  • Facility Security Officer (FSO)
  • Insider Threat Program Senior Official (ITPSO)
  • Information System Security Manager (ISSM)
  • Industrial Security Representative (IS Rep)

Question 14

Question
This contractor employee manages Information Systems and ensures Information System security requirements are met.
Answer
  • Information System Security Professional/Security Control Assessor (ISSP/SCA)
  • Facility Security Officer (FSO)
  • Insider Threat Program Senior Official (ITPSO)
  • Information System Security Manager (ISSM)
  • Industrial Security Representative (IS Rep)

Question 15

Question
This contractor employee establishes and maintains the insider threat program.
Answer
  • Information System Security Professional/Security Control Assessor (ISSP/SCA)
  • Facility Security Officer (FSO)
  • Insider Threat Program Senior Official (ITPSO)
  • Information System Security Manager (ISSM)
  • Industrial Security Representative (IS Rep)

Question 16

Question
What is the first step of the contracting process?
Answer
  • The GCA defines the acquisition strategy for the contract.
  • The GCA publishes a Request for Proposal (RFP).
  • The government identifies a need for a product or service.
  • The GCA defines the initial requirements for the product/service.

Question 17

Question
Who has authority to enter into, administer, and terminate contracts?
Answer
  • Contracting Officer (CO)
  • Contracting Officer’s Representative (COR)

Question 18

Question
Who serves as Subject Matter Expert (SME) for individual contracts?
Answer
  • Contracting Officer (CO)
  • Contracting Officer’s Representative (COR)

Question 19

Question
Who provides contractual oversight and has responsibility for multiple programs?
Answer
  • Contracting Officer (CO)
  • Contracting Officer’s Representative (COR)

Question 20

Question
Who closely monitors contractor performance on individual contracts?
Answer
  • Contracting Officer
  • Contracting Officer’s Representative (COR)

Question 21

Question
Identify which document contains the information described. Security requirements and classification guidance:
Answer
  • Statement of Work (SOW)
  • DD Form 254: DoD Contract Security Classification Specification (DD 254)
  • DD Form 441: DoD Security Agreement (DD 441)

Question 22

Question
Identify which document contains the information described. Contract details such as project scope, deadlines, and steps:
Answer
  • Statement of Work (SOW)
  • DD Form 254: DoD Contract Security Classification Specification (DD 254)
  • DD Form 441: DoD Security Agreement (DD 441)

Question 23

Question
Identify which document contains the information described. A security agreement between a contractor and the DoD in order to prevent the unauthorized disclosure of classified information:
Answer
  • Statement of Work (SOW)
  • DD Form 254: DoD Contract Security Classification Specification (DD 254)
  • DD Form 441: DoD Security Agreement (DD 441)

Question 24

Question
Once the company’s FCL is in place, contractors may begin to access classified materials.
Answer
  • True
  • False

Question 25

Question
Key Management Personnel must be cleared before the FCL will be granted.
Answer
  • True
  • False

Question 26

Question
An employee’s approved national security eligibility determination, or PCL, is the same as his/her access.
Answer
  • True
  • False

Question 27

Question
What is the first step of the PCL process?
Answer
  • Employee completes SF-86
  • Program Manager determines need for access
  • PMSO-I validates the request
  • Investigative agency conducts investigation
  • DoD CAF grants and records PCL
  • FSO initiates PCL process

Question 28

Question
What is the second step of the PCL process?
Answer
  • Employee completes SF-86
  • Program Manager determines need for access
  • PMSO-I validates the request
  • Investigative agency conducts investigation
  • DoD CAF grants and records PCL
  • FSO initiates PCL process

Question 29

Question
What is the third step of the PCL process?
Answer
  • Employee completes SF-86
  • Program Manager determines need for access
  • PMSO-I validates the request
  • Investigative agency conducts investigation
  • DoD CAF grants and records PCL
  • FSO initiates PCL process

Question 30

Question
What is the fourth step of the PCL process?
Answer
  • Employee completes SF-86
  • Program Manager determines need for access
  • PMSO-I validates the request
  • Investigative agency conducts investigation
  • DoD CAF grants and records PCL
  • FSO initiates PCL process

Question 31

Question
What is the fifth step of the PCL process?
Answer
  • Employee completes SF-86
  • Program Manager determines need for access
  • PMSO-I validates the request
  • Investigative agency conducts investigation
  • DoD CAF grants and records PCL
  • FSO initiates PCL process

Question 32

Question
What is the sixth step of the PCL process?
Answer
  • Employee completes SF-86
  • Program Manager determines need for access
  • PMSO-I validates the request
  • Investigative agency conducts investigation
  • DoD CAF grants and records PCL
  • FSO initiates PCL process

Question 33

Question
Which of the following organizations conducts periodic Security Vulnerability Assessments (SVAs) of contractor facilities as the CSO to the Department of Defense?
Answer
  • Federal Bureau of Investigations (FBI)
  • Federal Acquisition Service (FAS)
  • Defense Security Service (DSS)
  • Department of Homeland Security (DHS)

Question 34

Question
Select ALL the correct responses. What does the Facility Security Officer (FSO) need to do when an employee no longer needs access to classified information?
Answer
  • Remove the employee's eligibility in the DoD System of Record
  • Debrief the employee
  • Remove the employee's access in the DoD System of Record
  • Remove the employee's name from access rosters and/or any active Visit Authorization Letters (VALs)

Question 35

Question
Select ALL the correct responses. Which of the following are Information System Security Professional/Security Control Assessor (ISSP/SCA) responsibilities?
Answer
  • Receive changed conditions and suspicious contact reports
  • Oversee day-to-day personnel security program operation
  • Respond to security violations involving authorized classified Information Systems
  • Perform classified Information System assessments

Question 36

Question
Select ALL the correct responses. Which of the following are Facility Security Officer (FSO) responsibilities?
Answer
  • Conduct Security Vulnerability Assessments (SVAs)
  • Ensure the security program is compliant with the National Industrial Security Program Operating Manual (NISPOM)
  • Administer and oversee the contractor's security program

Question 37

Question
After a need is identified, the Government Contracting Activity (GCA) ___________________.
Answer
  • awards the contract
  • evaluates the contractors' proposals
  • defines the initial requirements for the product/service
  • publishes a Request for Proposal (RFP)

Question 38

Question
True or false? Each Cognizant Security Agency (CSA) has one or more Cognizant Security Offices (CSOs) that administer the National Industrial Security Program (NISP) on their behalf.
Answer
  • True
  • False

Question 39

Question
Select ALL the correct responses. Which of the following are Contracting Officer's Representative (COR) responsibilities?
Answer
  • Initiates sponsorship for a Facility Clearance (FCL) if necessary
  • Closely monitors contractor performance
  • Enters into, administers, and terminates contracts
  • Communicates security requirements to the contractor

Question 40

Question
Select ALL the correct responses. The National Industrial Security Program (NISP) is:
Answer
  • a voluntary program for cleared contractor facilities
  • established by Executive Order 12829
  • designed to safeguard classified information entrusted to industry
  • a government-industry partnership

Question 41

Question
What form must employees complete in order to initiate the Personnel Security Clearance (PCL) process?
Answer
  • DD Form 441, DoD Security Agreement
  • DD 254, DoD Contract Security Classification Specification
  • SF 312, Non-Disclosure Agreement
  • SF 86, Questionnaire for National Security Positions

Question 42

Question
True or false? The Facility Clearance (FCL) is contingent upon all Key Management Personnel (KMP) being granted a Personnel Security Clearance (PCL).
Answer
  • True
  • False

Question 43

Question
True or false? Once an individual is granted a Personnel Security Clearance (PCL), he or she may access all classified information entrusted to the facility.
Answer
  • True
  • False

Question 44

Question
Select ALL the correct responses. During classified visits, visitors may supply clearance information via ______________.
Answer
  • a Visit Authorization Letter (VAL)
  • the DoD System of Record
  • an invitation acceptance form

Question 45

Question
Select ALL the correct responses. Who helps to conduct Security Vulnerability Assessments (SVAs)?
Answer
  • Counterintelligence Special Agent (CISA)
  • Information System Security Professional/Security Control Assessor (ISSP/SCA)
  • Insider Threat Program Senior Official (ITPSO)
  • Industrial Security Representative (IS Rep)

Question 46

Question
Select ALL the correct responses. By signing DD Form 441, Department of Defense Security Agreement, the contractor agrees to _______________.
Answer
  • Acknowledge government authority to review the company's security program
  • Determine whether a sub-contractor has appropriate Facility Clearance (FCL)
  • Implement and maintain a security program that complies with the National Industrial Security Program Operating Manual (NISPOM)
  • Adhere to end-product objectives

Question 47

Question
True or false? A contractor facility may access and store classified material as soon as the Facility Clearance (FCL) is granted.
Answer
  • True
  • False

Question 48

Question
Which contracting document contains information such as project background, scope, deadlines, and steps for project completion?
Answer
  • DD Form 254, Department of Defense Contract Security Classification Specification
  • Statement of Work (SOW)
  • DD Form 441, Department of Defense Security Agreement

Question 49

Question
Select ALL the correct responses. Which of the following are Information System Security Manager (ISSM) responsibilities?
Answer
  • Receive company changed conditions and suspicious contact reports
  • Conduct Information System awareness and training
  • Establish Information System programs and procedures
  • Develop facility procedures for handling media with classified information

Question 50

Question
Select ALL the correct responses. Which of the following roles are filled by government employees?
Answer
  • Information System Security Professional/Security Control Assessor (ISSP/SCA)
  • Industrial Security Representative (IS Rep)
  • Information System Security Manager (ISSM)
  • Facility Security Officer (FSO)
Show full summary Hide full summary

Similar

CYBER Quiz
Casey Neville
SFPC (Possible Test Questions)
Casey Neville
PHYSEC Quiz
Casey Neville
Did the Industrial Revolution create a better world?
Mairead Stone
Why Great Britian Started the Industrial Revolution
Miranda.13
PERSEC Quiz
Casey Neville
DIBUJO TECNICO
Bryan FELIPE Urb
Dibujo de ingeniería
Felipe Granada
Advanced Industrial Psychology PSY 560 Midterm review
Luna Park
Socio-Cultural Influences on the Development of Rational Recreation
Wesley Spearman
Introduction & Physiology of Industrial and Environmental Microbiology
Matthew Coulson