SPēD SFPC: General Questions and
Correct Answers
Principle incident/events required to be reported to DoD counterintelligence (CI) organizations - correct
Answers:espionage, sabotage, terrorism, cyber
Indicators of insider threats - correct Answers:1. Failure to report overseas travel or contact with foreign
nationals
2. Seeking to gain higher clearance or expand access outside the job scope
3. Engaging in classified conversations without a need to know
4. Working hours inconsistent with job assignment or insistence on working in private
5. Exploitable behavior traits
6. Repeated security violations
7. Attempting to enter areas not granted access to
8. Unexplainable affluence/living above one's means
9. Anomalies (adversary taking actions which indicate they are knowledgeable to information)
10. Illegal downloads of information/files
Elements that should be considered in identifying Critical Program Information - correct
Answers:Elements which if compromised could:
, 1. cause significant degradation in mission effectiveness
2. shorten the expected combat-effective life of the system
3. reduce technological advantage
4. significantly alter program direction or
5. enable an adversary to defeat, counter, copy, or reverseengineer the technology or capability
Asset, threat, vulnerability, risk, countermeasures - correct Answers:Elements that a security professional
should consider when assessing and managing risks to DoD assets
The three categories of Special Access Programs - correct Answers:acquisition, intelligence, and
operations and support
Three different types of threats to classified information - correct Answers:Insider Threat, Foreign
Intelligence Entities (FIE) and Cybersecurity Threat
The concept of an insider threat - correct Answers:An employee who may represent a threat to national
security. These threats encompass potential espionage, violent acts against the Government or the
nation, and unauthorized disclosure of classified information, including the vast amounts of classified
data available on interconnected United States Government computer networks and systems.
The purpose of the Foreign Visitor Program - correct Answers:To track and approve access by a foreign
entity to information that is classified; and to approve access by a foreign entity to information that is
unclassified, related to a U.S. Government contract, or plant visits covered by ITAR.
Special Access Program - correct Answers:A program established for a specific class of classified
information that imposes safeguarding and access requirements that exceed those normally required for
information at the same classification level.
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller WiseWoman. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for £13.99. You're not tied to anything after your purchase.