Download SFPC TEST ACTUAL EXAM-with 100% verified solutions-2024.docx and more Exams Advanced Education in PDF only on Docsity! SFPC TEST ACTUAL EXAM-with 100% verified solutions-2024 What specifies classification levels, special requirements, and declassification instructions for classified programs, projects, and plans? Security Classification Guide Which of the following is a true statement regarding the special handling requirements of Foreign Government Information (FGI)? A)When the classification marking on a document containing FGI is not in English, or when the foreign government marking requires a different degree of protection than the same U.S. classification designation, a U.S. marking that results in a degree of protection equivalent to that required by the foreign government shall be applied. B) A U.S. document containing FGI cannot be declassified or downgraded below the highest level of FGI contained in the document without the permission of the foreign government or international organization that originated the information. C) Those holding security clearances issued by the U.S. government cannot access U.S. documents containing FGI without written consent from the originating foreign government. D) The receiving DoD Components must maintain records for 1 year of the receipt, internal distribution, destruction, annual inventory, access, reproduction, and transmittal of foreign government Top Secret information. B) A U.S. document containing FGI cannot be declassified or downgraded below the highest level of FGI contained in the document without the permission of the foreign government or international organization that originated the information. Two security professionals - Paul and Ashley - are discussing the destruction of classified information. Paul says the destruction of classified documents and material shall be accomplished by means that eliminate risk of reconstruction of the classified information they contain. Ashley says the material that has been identified for destruction shall continue to be protected, as appropriate, for its classification until it is actually destroyed. Who is correct? Paul and Ashley are both correct. A paragraph of a document which includes an "(N)" as part of the portion marking indicates what specific type of classified information is contained in the paragraph? Critical Nuclear Weapons Design Information (CNWDI) What are the investigative and briefing requirements for access to NATO information? Favorably adjudicated background investigation (T3 (10-year scope) T5 within 5 years prior to assignment), and completed a NATO Briefing. According to E.O. 13556, which is considered a type of controlled unclassified information? -Communications Security (COMSEC) Information -Declassified Information -Law Enforcement Sensitive (LES) Information -North Atlantic Treaty Organization (NATO) Information Law Enforcement Sensitive Information What is the purpose of marking classified materials? To alert holders to the presence of classified information, how to properly protect it, and for how long. What is included in the markings of classified information? Document holder as the sole authority to make transfer and dissemination determinations. What is the purpose of the Controlled Access Program Coordination (CAPCO) register? To identify the official classification and control markings, and their authorized abbreviations and portion markings. Executive Order 13467, "Reforming Processes Related to Suitability for Government Employment, Fitness for Contractor Employees, and Eligibility for Access to Classified National Security Information" Review of Tier 5 on an individual disclosed that the subject had been a member of an anarchist organization dedicated to disestablishing existing Federal laws and overthrowing the U.S. government by any means necessary, including violence. Although the subject terminated his membership with the organization upon learning he would be investigated for a clearance for his new position, he still maintains social contact with several members of the anarchist organization. Based on this information, which of the adjudicative guidelines is most appropriate for an adjudicator to apply to the case? Allegiance to the United States Which of the following is an element of the Personnel Security Program? -Risk Assessment and Analysis -Implementation -Classification -Continuous Vetting Continuous Vetting (Formerly Continuous Evaluation) Limited access to classified information for specific programs may be approved for non-US citizens only if the following condition is met. The prior ten years of the subject's life can be appropriately investigated. What is the investigative requirement for access to Single Integrated Operational Plan - Extremely Sensitive Information (SIOP-ESI)? Individual has a valid favorably adjudicated Tier 5 or Single Scope Background (SSBI) Investigation. What is the criteria for personnel to be qualified for assignment to nuclear weapons personnel reliability assurance positions? Individual is a U.S. Citizen Individual has a security clearance eligibility in accordance with the position Individual must be continuously evaluated What is the investigation requirement for initial assignment to a Presidential Support Activity (i.e. Yankee White) Category 2 position? Favorably completed Tier 5/Single Scope Background Investigation (SSBI) within 36 months preceding selection. What is the name of the adjudication process that refers to a person's identifiable character traits and conduct sufficient to decide whether employment or continued employment would or would not protect the integrity or promote the efficiency of Federal service? Suitability Adjudication All unclassified DoD information in the possession or control of non-DoD entities on non-DoD information systems, to the extent provided by the applicable grant, shall minimally be safeguarded under what standards? Organizational wireless connections holding such information must be encrypted, and those accessing such information must use encrypted wireless connections where available when traveling. Copies of personnel security investigative reports must be destroyed by DoD recipient organizations, within how many days following completion of the necessary personnel security determination? 90 Days What level(s) of access may be granted with Limited Access Authorization for non- U.S. citizens? LAAs shall only be granted access at the Secret and Confidential Levels Which of the following is not considered when making a security clearance eligibility determination? Education Level Alcohol Consumption Financial Considerations Psychological Conditions Education Level A position that does not require eligibility for access to classified information, but having the potential to cause significant or serious damage to national security may be designated as what position sensitivity? noncritical sensitive What information must be included in a Statement of Reasons (SOR)? Why an unfavorable national security eligibility determination is being proposed. When a Terrorism Threat Level is escalated from LOW to MODERATE, a DoD Component Head should employ which of the following countermeasures? - Cease all flying except for specifically authorized operational sorties. - Direct the execution of advance site reviews to facilitate the antiterrorism planning process. - Encourage dependent family members to complete Level I Antiterrorism Awareness Training before any travel outside the continental United States (OCONUS). - Conduct an immediate Terrorism Vulnerability Assessment for off-installation housing, schools, daycare centers, transportation. Encourage dependent family members to complete Level I Antiterrorism Awareness Training before any travel outside the continental United States (OCONUS). What information must a request to authorize disclosure of classified information during a visit include? Explanation of the government purpose to perform when disclosing classified information. The subject of the meeting, scope of classified topics, and classification level. The main content of the invitation to send to the participants. Two security professionals - Paul and Ashley - are discussing the security procedures for visits and meetings. Paul says visits must serve a specific U.S. Government purpose. Ashley says DoD Components should, as a minimum, establish procedures that include verification of the identity, personnel security clearance, access (if appropriate), and need-to-know for all visitors. Who is correct? Paul is correct. Executive Order 12829, signed in January 1993, mandated that which entity be responsible for implementing and monitoring the National Industrial Security Program (NISP)? The National Security Council shall provide overall policy direction for the NISP, but the Director of the Information Security Oversight Office (ISOO) (in consultation with the National Security Advisor) is responsible for implementation and monitoring. What is the role of the government contracting activity (GCA), or cleared prime contractor, when a contractor that does not have a Facility Clearance (FCL) wants to bid on a Request for Proposal (RFP) that requires access to classified information? The GCA must sponsor the contractor for a facility security clearance by submitting a sponsorship request to DSS, which initiates the facility clearance process. What is the purpose of the Federal Acquisition Regulations (FAR)? To codify and publish uniform policies and procedures for acquisition by all executive agencies. What is the briefing given when an individual's employment is terminated, clearance eligibility is withdrawn, or if the individual will be absent from duty for more than 60 days. Termination Briefing Which executive order governs the DoD Information Security Program? E.O. 13526 What is the ISOO document that governs the DoD Information Security Program? 32 CFR Parts 2001 & 2003, "Classified National Security Information; Final Rule" An event that results in or could be expected to result in the loss or compromise of classified information. Security Violation Unauthorized disclosure of this information could reasonably be expected to cause serious damage to national security. Secret Unauthorized disclosure of this information could reasonably be expected to cause exceptionally grave damage to our national security. Top Secret Unauthorized disclosure of this information could reasonably be expected to cause damage to our national security. Confidential Unclassified information or classified information (at a lower level) that when the information is combined or associated reveals additional factors that qualifies for classified information. Compilation This document contains classification levels, special requirements, and duration instructions for programs, projects, plans, etc. Security Classification Guide What organization maintains a register of certified security digital facsimiles? DISA, Joint Interoperability Test Command (JITC) What is the term for the protection resulting from the measures designed to deny unauthorized persons information of value that might be derived from the possession and study of telecommunications to ensure the authenticity of such communications? COMSEC This level of classified information can be sent via USPS express only when it is the most effective means considering security, time, cost, and accountability. Secret What methods may be used to send hard copy Confidential information? Defense Courier Service (DCS) First Class Mail Registered Mail Certified Mail This level of classified information may NEVER be sent via USPS Top Secret What method of transportation for classified information should only be utilized as a last resort? Hand Carry What is required when someone is hand carrying classified information? Written Authorization Authorization may be contained in a letter, a courier card, or other written document. What is a DD Form 2501? How long may it be issued for? Courier Authorization Card. Issued for no more than 2 years at a time. What is the proper destruction method for typewriter ribbon? Burned or Shredded What is the proper destruction method for floppy disks? Burned Overwritten Demagnetized Compromise of what type of information can significantly alter program direction, shorten combat effective life of a system, or require additional research, development, test, and evaluation resources to counter impact of loss? Critical Information How is the level of classification of the Program Protection Plan determined? Determined based on the level of classification of its content. What is the term for the initial determination that information requires protection against unauthorized disclosure in the interest of U.S. National Security? Original Classification What takes precedence when there is a conflict between marking guidance in the source document and the Security Classification Guide (SCG)? Security Classification Guide What refers to an individual's responsibility to properly mark newly developed material consistent with the classification marking specified in authorized sources? Derivative Classification What is the DoD Cybersecurity Policy? (Select All that Apply) A. Risk Management B. Operational Resilience C. Integration and Interoperability D. Cyberspace Defense E. Performance F. Identity Assurance G. Mission Partners Two security professionals - Paul and Ashley - are discussing security program areas. Paul says that Information Security practitioners work with a facility's Antiterrorism Officer to deploy defensive measures designed to reduce the facility's vulnerability from terrorist attacks. Ashley says that Personnel Security practitioners train and/or advise Original Classification Authorities in the application of the process for making classification determinations. Who is correct? A. Paul is correct B. Ashley is correct C. Paul and Ashley are both correct D. Paul and Ashley are both incorrect D. Paul and Ashley are both incorrect Which of the following is a true statement regarding the special handling requirements of Foreign Government Information (FGI)? a. When the classification marking on a document containing FGI is not in English, or when the foreign government marking requires a different degree of protection than the same U.S. classification designation, a U.S. marking that results in a degree of protection equivalent to that required by the foreign government shall be applied. b. A U.S. document containing FGI cannot be declassified or downgraded below the highest level of FGI contained in the document without the permission of the foreign government or international organization that originated the information. c. Those holding security clearances issued by the U.S. government cannot access U.S. documents containing FGI without written consent from the originating foreign government. d. The receiving DoD Components must maintain records for 1 year of the receipt, internal distribution, destruction, annual inventory, access, reproduction, and transmittal of foreign government Top Secret information. B Which of the following is a requirement for access to North Atlantic Treaty Organization (NATO) information? a. Personnel has been subject of a Single Scope Background Investigation (SSBI), including a National Agency Check (NAC) on the spouse and all members of the individual's immediate family of 18 years of age or over who are United States citizens other than by birth or who are resident aliens. b. Personnel has been subject of a favorably adjudicated background investigation (BI) (10-year scope), Tier 5, current within five years prior to the assignment, and completed a NATO brief. c. Personnel has been subject of a favorably adjudicated BI (10-year scope), Defense National Agency Check with Inquiries (DNACI)/ National Agency Check with Inquiries (NACI) or NACI Entrance National Agency Check (ENTNAC), current within five years prior to the assignment. d. Personnel requiring access to NATO COSMIC (Top Secret) or SECRET information must at least possess the equivalent interim U.S. security clearance. B According to Executive Order 13556, which of the following is considered a type of controlled unclassified information (CUI)? a. Communications Security (COMSEC) Information b. Declassified Information c. Law Enforcement Sensitive (LES) Information d. North Atlantic Treaty Organization (NATO) Information C. Law Enforcement Sensitive Information What is the purpose of marking classified materials? a. To alert holders to the presence of classified information, how to properly protect it, and for how long. b. To deter foreign adversaries from committing actions aimed at accessing such information. c. To provide guidance for interpretation and analysis of classified information. d. To alert holders to the methods used to collect classified information. A What is included in the markings of classified information? a. Derivative classifier as the authority to make declassification determinations. b. Agencies and authorities that have previously accessed the classified information. c. Document holder as the sole authority to make transfer and dissemination determinations. d. Sources and reasons for the classification. C What is the purpose of the Controlled Access Program Coordination (CAPCO) register? a. To identify the categories, types, and levels of Special Access Programs (SAPs.) b. To define the authorities for classifying, declassifying, and regrading sensitive documents. c. To identify the official classification and control markings, and their authorized abbreviations and portion markings. d. To define the requirements, restrictions, and measures necessary to safeguard classified information from unauthorized disclosure.