SPēD SFPC - Study Guide Questions With Verified Answers.
10 views 0 purchase
Course
Sfpc
Institution
Sfpc
SPēD SFPC - Study Guide Questions With
Verified Answers.
Tier 1 investigations are conducted for positions designated as - answer- Low-risk,
nonsensitive, and for physical and logical access; HSPD-12 credentialing
- Has a basic scope of five years
- Investigative form is SF-85
- Replaces NAC...
SPēD SFPC - Study Guide Questions With
Verified Answers.
Tier 1 investigations are conducted for positions designated as - answer✔- Low-risk,
nonsensitive, and for physical and logical access; HSPD-12 credentialing
- Has a basic scope of five years
- Investigative form is SF-85
- Replaces NACI
Tier 2 investigations are conducted for positions designated as - answer✔- Nonsensitive,
moderate risk public trust.
- Has a basic scope of five years
- Investigative form is SF-85P.
- Replaces the Moderate-Risk Background Investigation, or MBI.
Tier 3 investigations are conducted for positions designated as - answer✔- Noncritical-sensitive,
and/or requiring Confidential, Secret or DOE " L " access eligibility and military accessions.
Tier 4 investigations are conducted for positions designated as - answer✔- Nonsensitive, high-
risk public trust.
- Has a basic scope of five to seven years
- The investigative form is SF-85P
- Replaces Background Information (BI)
Tier 5 investigations are conducted for positions designated as - answer✔- Critical-sensitive or
special-sensitive and/or requiring DOE "Q" access or access to Top Secret or Sensitive
Compartmented Information, or SCI.
- Has a basic scope of five to seven years
- The investigative form is SF-86
- Replaces Single Scope Background Investigation (SSBI)
The Statement of Reasons (SOR) contains - answer✔- A comprehensive and detailed written
explanation of the basis for the unfavorable determination.
- An explanation of the subject's rights and a detailed statement explaining the intent (Letter of
Intent (LOI)) to deny or revoke a security clearance eligibility by the DoD Consolidated
Adjudications Facility (DoD CAF).
The Executive Orders: E.O. 12968 establishes - answer✔A uniform federal Personnel Security
Program for employees who are considered for initial or continued access to classified
information
Automated Access Control Systems (AACS) fall into three general types - answer✔- Coded
device (keypad/PIN code)
Secret classification definition - answer✔Information that could be expected to cause serious
damage to the national security if unauthorized disclosure occurs.
Confidential classification definition - answer✔Information that reasonably could be expected to
cause damage to the national security if unauthorized disclosure occurs
Top Secret classification definition - answer✔Information that reasonably could be expected to
cause exceptionally grave damage to the national security if unauthorized disclosure occurs.
Compilation - answer✔Items of information that are individually unclassified or classified at a
lower level, may be classified, or classified at a higher level, only if the compiled information
reveals an additional association or relationship.
Mandatory Declassification Review (MDR) - answer✔Any individual or organization may
request a declassification review of information classified pursuant E.O. 13526
Automatic Declassification - answer✔Historical value information which is automatically
declassified if not reviewed by December 31 of the year in which they become 25 years old,
unless exempt or delayed
Systematic Declassification - answer✔Complementary program to automatic declassification.
Information exempted from automatic declassification is continuously reviewed for possible
declassification
An "insider" is defined as - answer✔Any person with authorized access to DoD resources by
virtue of employment, volunteer activities, or contractual relationship with DoD. This can
include employees, former employees, consultants, and anyone with access
An "insider threat" is defined as - answer✔The threat that an insider will use his or her
authorized access, wittingly or unwittingly, to do harm to the security of the United States. This
threat can include damage through espionage, terrorism, unauthorized disclosure of national
security information, or through the loss or degradation of department resources or capabilities.
Reports to be submitted to the FBI - answer✔Actual, probable or possible espionage, sabotage,
terrorism, or subversive activities at any of their locations.
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller Brainbarter. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for $10.49. You're not tied to anything after your purchase.