Package deal
SPeD PACKAGE DEAL|GRADED A+|GUARANTEED SUCCESS
SPeD PACKAGE DEAL|GRADED A+|GUARANTEED SUCCESS
[Show more]SPeD PACKAGE DEAL|GRADED A+|GUARANTEED SUCCESS
[Show more]Security Infraction 
This event cannot reasonably be expected to and does not result in the loss, compromise, or suspected compromise of classified information 
 
 
 
DoD Manual 5200.01, Volumes 1-4 
The manual that governs the DoD Information Security Program 
 
 
 
 
 
 
00:03 
 
01:30 
E.O. 13526...
Preview 4 out of 33 pages
Add to cartSecurity Infraction 
This event cannot reasonably be expected to and does not result in the loss, compromise, or suspected compromise of classified information 
 
 
 
DoD Manual 5200.01, Volumes 1-4 
The manual that governs the DoD Information Security Program 
 
 
 
 
 
 
00:03 
 
01:30 
E.O. 13526...
Special Access Program (SAP) 
A program established for a specific class of classified information that imposes safeguarding and access requirements that exceed those normally required for information at the same classification level 
 
 
 
Enhanced security requirements for protecting Special Acces...
Preview 4 out of 31 pages
Add to cartSpecial Access Program (SAP) 
A program established for a specific class of classified information that imposes safeguarding and access requirements that exceed those normally required for information at the same classification level 
 
 
 
Enhanced security requirements for protecting Special Acces...
C. Either DSS or the host command 
Scenario: When designing a new multi-story government Special Access Program Facility (SAPF), the architect provided identical drawings for two three-story buildings to the security officer. One drawing is for a building on the installation to be occupied only by c...
Preview 3 out of 18 pages
Add to cartC. Either DSS or the host command 
Scenario: When designing a new multi-story government Special Access Program Facility (SAPF), the architect provided identical drawings for two three-story buildings to the security officer. One drawing is for a building on the installation to be occupied only by c...
B. It must be in an area designated as a Restricted Area 
When designing a new multi-story government Special Access Program Facility (SAPF), the architect provided identical drawings for two three-story buildings to the security officer. One drawing is for a building on the installation to be occup...
Preview 4 out of 33 pages
Add to cartB. It must be in an area designated as a Restricted Area 
When designing a new multi-story government Special Access Program Facility (SAPF), the architect provided identical drawings for two three-story buildings to the security officer. One drawing is for a building on the installation to be occup...
SSBI 
Initial investigation for military, contractors, and civilians: 
· Special-Sensitive positions 
· Critical-Sensitive positions1 
· LAA 
· Top Secret clearance eligibility 
· IT-I duties 
 
 
 
ANACI 
Initial investigation for civilians: 
· Noncritical-Sensitive positions 
· Confidential...
Preview 2 out of 12 pages
Add to cartSSBI 
Initial investigation for military, contractors, and civilians: 
· Special-Sensitive positions 
· Critical-Sensitive positions1 
· LAA 
· Top Secret clearance eligibility 
· IT-I duties 
 
 
 
ANACI 
Initial investigation for civilians: 
· Noncritical-Sensitive positions 
· Confidential...
Indicators of insider threats 
1. Failure to report overseas travel or contact with foreign nationals 
2. Seeking to gain higher clearance or expand access outside job scope 
3. Engaging in classified conversations without NTK 
4. Working inconsistent hours 
5. Exploitable behavior traits 
6. Repeat...
Preview 4 out of 80 pages
Add to cartIndicators of insider threats 
1. Failure to report overseas travel or contact with foreign nationals 
2. Seeking to gain higher clearance or expand access outside job scope 
3. Engaging in classified conversations without NTK 
4. Working inconsistent hours 
5. Exploitable behavior traits 
6. Repeat...
Principle incident/ 
events required to be reported to DoD counterintelligence (CI) organizations 
espionage, sabotage, terrorism, cyber 
 
 
 
Indicators of insider threats 
1. Failure to report overseas travel or contact with foreign nationals 
 
2. Seeking to gain higher clearance or expand acces...
Preview 4 out of 65 pages
Add to cartPrinciple incident/ 
events required to be reported to DoD counterintelligence (CI) organizations 
espionage, sabotage, terrorism, cyber 
 
 
 
Indicators of insider threats 
1. Failure to report overseas travel or contact with foreign nationals 
 
2. Seeking to gain higher clearance or expand acces...
Which two lamp types last the longest? 
1. Induction 
 
2. Solid state 
 
 
 
What term is used for measuring output of light (lumens) compared to power input (watts)? 
Lamp efficacy 
 
 
 
 
 
 
01:01 
 
01:30 
What term refers to the need for lamps to be as efficient as possible to save costs and ...
Preview 2 out of 8 pages
Add to cartWhich two lamp types last the longest? 
1. Induction 
 
2. Solid state 
 
 
 
What term is used for measuring output of light (lumens) compared to power input (watts)? 
Lamp efficacy 
 
 
 
 
 
 
01:01 
 
01:30 
What term refers to the need for lamps to be as efficient as possible to save costs and ...
Responsibilities of the Government SAP Security Officer/Contractor Program Security Officer (GSSO/CPSO) 
From Revision 1 Department of Defense Overprint to the National Industrial Security Program Operating Manual Supplement - 1 April 2004: 
• Possess a personnel clearance and Program access at le...
Preview 2 out of 12 pages
Add to cartResponsibilities of the Government SAP Security Officer/Contractor Program Security Officer (GSSO/CPSO) 
From Revision 1 Department of Defense Overprint to the National Industrial Security Program Operating Manual Supplement - 1 April 2004: 
• Possess a personnel clearance and Program access at le...
Describe the purpose of 5200.08-R 
The regulation implements DoD policies 
and provides minimum standards for the 
physical protection of DoD personnel, 
installations, operations, and related 
resources. 
 
 
 
List the nine capabilities a 
security system must provide to 
achieve Security-in-Depth...
Preview 4 out of 39 pages
Add to cartDescribe the purpose of 5200.08-R 
The regulation implements DoD policies 
and provides minimum standards for the 
physical protection of DoD personnel, 
installations, operations, and related 
resources. 
 
 
 
List the nine capabilities a 
security system must provide to 
achieve Security-in-Depth...
What is the purpose of the PPBE process: 
(PPBE) process is one of three processes (Acquisition, Requirements and Funding) that support the Defense Acquisition System. The PPBE process is focused on the Financial Management and resource allocation for current and future DoD acquisition programs. 
 
...
Preview 3 out of 20 pages
Add to cartWhat is the purpose of the PPBE process: 
(PPBE) process is one of three processes (Acquisition, Requirements and Funding) that support the Defense Acquisition System. The PPBE process is focused on the Financial Management and resource allocation for current and future DoD acquisition programs. 
 
...
What are the names of the policies that provide guidance for the DoD Information Security Program? 
... 
 
 
 
What are the purpose, scope, and goals of the DoD Information Security Program? 
Purpose: To promote the proper and effective way to classify, protect, share, apply applicable downgrading a...
Preview 2 out of 9 pages
Add to cartWhat are the names of the policies that provide guidance for the DoD Information Security Program? 
... 
 
 
 
What are the purpose, scope, and goals of the DoD Information Security Program? 
Purpose: To promote the proper and effective way to classify, protect, share, apply applicable downgrading a...
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Stuvia is a marketplace, so you are not buying this document from us, but from seller GUARANTEEDSUCCESS. Stuvia facilitates payment to the seller.
No, you only buy these notes for $41.49. You're not tied to anything after your purchase.
4.6 stars on Google & Trustpilot (+1000 reviews)
79271 documents were sold in the last 30 days
Founded in 2010, the go-to place to buy study notes for 14 years now