Question Distractors References Linked Competency

Size: px
Start display at page:

Download "Question Distractors References Linked Competency"

Transcription

1 SAPPC Example Questions Please note: Cyber items are indicated with a ** at the end of the practice test questions. 1. The ability for your Information Technology (IT) personnel to rapidly broadcast any changes to the various security controls is advantageous to your organization because of the wide variety of systems it uses. What type of control provide them the ability to do this?** a. Common Control b. Hybrid Control c. Machine Specific Control d. System Specific Control NIST SP r4 (April 2013) ////17 Info Sec & Cyber 2. Security controls can be categorized as,, or. ** a. Common; hybrid; machine-specific b. Common; machine-specific; blended c. Common; system-specific; blended d. Common; system-specific; hybrid NIST SP r4 (April 2013) ////14 Info Sec & Cyber 3. After you complete and submit a security controls proposal, your organizational leadership notes one of the selected controls exceeds the available budget and cannot be purchased. They would like you to review other similar, cheaper security controls, also known as a security control.** a. Compensating b. Countering c. Neutralizing d. Replacement CNSSI No (March 27, 2014) //// Info Sec & Cyber SAPPC CPT Page 1

2 4. According to the Authorized Classification and Control Markings Register, the marking title -Gamma may be used with what other US markings? a. Top Secret, Secret, Confidential, Restricted b. Top Secret, Secret, Confidential c. Top Secret, Secret d. Top Secret , Volume 2, March 19, 2013, page Info Sec 5. Which statement below most accurately compares goals of cybersecurity to the goals of information security?** a. The goal of cybersecurity is to prevent damage to, protect, and restore computers, electronic communications systems, etc., including the information therein to ensure the information s availability, integrity, authentication, confidentiality and nonrepudiation; whereas, the goal of information security is to protect classified information and controlled unclassified information. b. The goal of cybersecurity is to prevent damage to, protect, and restore computers, electronic communications systems, etc., including the information therein to ensure the information s availability, integrity, authentication, confidentiality and non-repudiation; whereas, the goal of information security is to protect unclassified information such as proprietary information and trade secrets. c. The goal of cybersecurity is to protect controlled unclassified information residing in information systems; whereas, the goal of information security is to protect classified information and controlled unclassified information. d. The goal of cybersecurity is to protect classified information residing in information systems; whereas, the goal of information security is specifically to protect controlled unclassified information V3; DoD Instruction March 14, 2014; National Security Presidential Directive 54 / Homeland Security Presidential Directive 23 Info Sec & Cyber SAPPC CPT Page 2

3 6. Which of the following is TRUE regarding debriefing in cases of unauthorized access? a. Debriefing is unnecessary if the unauthorized access was by a person with the appropriate security clearance. b. If the person involved is neither a member of a U.S. Government organization nor an employee of a U.S. Government contractor, the decision is much more situational. The key question is whether the debriefing shall have a positive effect on the person s ability or willingness to protect the information. c. In any case where the person to be debriefed may be the subject of criminal prosecution or disciplinary action, the individual must be debriefed. d. Debriefing is only required in cases where a damage assessment reveals that weapons systems or capabilities have been thoroughly compromised. DoD , Volume 3, February 24,2012, Incorporating Change 2, March 19,2013 Info Sec 7. What is the security professionals role in pursuing and meeting cybersecurity goals? (Select the best response).** a. Security professionals are in all of these roles. b. The security professional s role includes supporting the personnel security program which validates personnel who perform both classified and unclassified duties on information systems. c. The security professional s role includes providing oversight and expert guidance related to the physical security of information systems and equipment. d. The security professional s role includes oversight of and expert guidance related to protection of classified and controlled unclassified information. This includes supporting measures to ensure such information s availability, integrity, authentication, and confidentiality when that information resides in an information system. DoD Instruction Cybersecurity; DoD Manual Volume 3 Info Sec & Cyber SAPPC CPT Page 3

4 8. How would an Original Classification Authority (OCA) conduct a damage assessment? a. The damage assessment would be conducted following a classification review, and will consist of an extensive examination of the details regarding the compromise in order to determine the effects on DoD programs, operations, systems, materials and intelligence. b. The damage assessment would be conducted prior to the classification review in order to examine the details regarding the compromise to determine the effects on the DoD programs, operations, systems, materials and intelligence. c. The damage assessment would be conducted immediately upon the discovery of compromise to reduce risk, minimize damage, and hinder further compromise. d. The damage assessment. DoDM V3 Info Sec 9. Classified information has been leaked and published on public media. Which of the following is NOT involved in conducting a damage assessment? a. The Original Classification Authority b. Subject Matter Experts c. Security Officials d. Assistant Secretary of Defense for Public Affairs DoDM V3 Info Sec SAPPC CPT Page 4

5 10.You just reviewed several classified documents related to the new initiative you are supporting. Kevin, a new employee, tells you that he is trying to get up to speed on relevant projects that he might be working on and asks that you provide him the documents. What do you do? a. Provide him copies of the documents so that you can keep your own copies. Make sure that he knows not to leave them out and to secure them at the end of the day. b. Check with your supervisor to ensure that Kevin s clearance have passed and that he is allowed access to documents classified at this level. c. Verify Kevin s need to know and his roles with his supervisor before allowing him access to the information. d. Give Kevin your copies since there should not be extra copies of the materials in the office , Volume 1, February 24, 2012, page 76,80 Info Sec SAPPC CPT Page 5

6 11. Who has overall responsibility for addressing incidents involving compromise of classified information resident on computers or in Information Technology (IT) systems?** a. Inquiries into and resolution of incidents involving compromising of classified information resident on computers or IT systems requires coordination with and assistance from the local cybersecurity officials, but the overall responsibility relies on the activity security manager. b. Inquiries into and resolution of incidents involving compromising of classified information resident on computers or in IT systems requires coordination with and assistance from the local cybersecurity officials Overall responsibility relies on the activity cybersecurity officials. c. Inquiries into and resolution of incidents involving compromising of classified information resident on computers or in IT systems requires coordination with and assistance from the local cybersecurity officials Overall responsibility relies on the system administrator. d. Inquiries into and resolution of incidents involving compromising of classified information resident on computers or in IT systems are the responsibility of the activity security manager and should never require coordination with or assistance from the local cybersecurity officials. DoDI , March 14, 2014 DoD M , V3 Info Sec & Cyber 12. Indicate in which of the following examples the security professional used the appropriate procedures for handling a potential compromise. a. The security officer reported a security incident when he realized that the security container s combination had been changed when required. b. The security officer conducted an in-depth investigation of the security infraction involving the inadvertent loss of classified materials. c. The security officer conducted an inquiry to determine whether or not unauthorized individuals got access to the missing classified materials. d. The security officer filed a copy of the reported security incident and worked with training to develop an awareness program about the incident , Volume 3, March 19, 2013, page 86 Info Sec SAPPC CPT Page 6

7 13. Indicate which of the following examples best describes when or why inquiries versus investigations are conducted. a. An in-depth investigation is always conducted when a security violation is reported. b. All security incidents involving classified information require a security inquiry, a security investigation, or both. c. When a security infraction is not believed to have resulted in a loss, an inquiry is not conducted. d. A security investigation is conducted at the lowest echelon possible in the DoD Component , Volume 3, March 19, 2013, page Info Sec SAPPC CPT Page 7

8 14. Which of the following statements is correct? a. The Freedom of Information Act (FOIA) (5 U.S.C. 552, as amended), generally provides any person with the statutory right, enforceable in court, to obtain access to Government information in executive branch agency records. This right to access is limited when such information is protected from disclosure by one of FOIA s nine (9) statutory exemptions. It is essential that the public be informed concerning the activities of its Government, but the interests of the United States and its citizens require that certain information concerning the national defense and foreign relations be protected against unauthorized disclosure. b. The Freedom of Information Act, (FOIA) (5 U.S.C. 552, as amended), generally provides any U.S. Citizen with the statutory right, enforceable in court, to obtain access to Government information in any U.S. Government records. This right to access is limited when such information is protected from disclosure by one of FOIA s nine statutory exemptions. It is essential that the public be informed concerning the activities of its Government, so an individual may be granted a Limited Access Authorization to obtain access to classified information related to a FOIA request. c. The Freedom of Information Act (FOIA) (5 U.S.C. 552, as amended), generally provides any U.S. Citizen with the statutory right, enforceable in court, to obtain access to Government information in executive branch agency records. This right to access is unlimited. When classified information is included in a FOIA request the request must be processed by a U.S. District Court which releases the information only to the individual requester who is required to sign a nondisclosure agreement. d. The Freedom of Information Act (FOIA) (5 U.S.C. 552, as amended), generally provides any person with the statutory right, enforceable in court, to obtain access to Government information in executive branch agency records. It is essential that the public be informed concerning the activities of its Government, but the interests of the United States and its citizens require that certain information concerning the national defense and foreign relations be protected against unauthorized disclosure. Executive Order Classified National Security Information specifically exempts classified information from the provisions of the FOIA , Volume 1, February 24, 2012, page 46 Info Sec SAPPC CPT Page 8

9 15. A new piece of equipment that will protect personnel from improvised explosive devices (IEDs) while riding in vehicles has been provided to your organization. The fact that this equipment exists is classified CONFIDENTIAL. Certain aspects of the internal design of this equipment are classified SECRET. Mechanics from your organization who have SECRET personnel clearances will install and repair the new equipment in all vehicles used by your organization. Which of the following is the most appropriate application of need-to-know? a. The mechanics need to know the fact that the equipment exists and design information that is relevant to how the equipment is installed. b. The mechanics only need to know the fact that the new equipment exists and they must not have access to design information. c. The mechanics need to know all design and technical information about the equipment. d. Mechanics from your organization may not be used to install the new equipment because they do not have a need-toknow designation. E.O DoD R Info Sec SAPPC CPT Page 9

10 16. When a spillage of classified information onto an unclassified information system has occurred, who should be included on a team formed to conduct a formal inquiry?** a. The team should include the Information Assurance Manager/Information System Security Manager/ Information equivalent, Activity Security Manager, information owner, responsible Incident Response Center (IRC), and others as appropriate. b. The formal inquiry should be conducted exclusively by the responsible IRC. c. The team should include the Information System Security Manager, Activity Security Manager, and cleared employees who were involved in the incident. d. The information owner determines who should be included on the team. CNSS Instruction 1001 Info Sec & Cyber 17. Which of the following best describes the roles of the International Program office and the Foreign Disclosure Officer (FDO)? a. An International Programs office manages and implements International Security Assistance programs, Cooperative Development programs, and Technology Security policy. A FDO categorizes and is the approval authority for the release of military information to foreign government representatives. b. A FDO is always an official within an International Programs office. c. An International Programs office is the approval authority for the release of military information to foreign government representatives and a FDO manages International Security Assistance programs. d. An International Program office is typically within a deployed military unit and a FDO is typically located within headquarters of a Major Command. International Programs Security Handbook found at mil/documents/ips/ HandbookCover_ pdf Understanding Foreign Disclosure found at Security_awareness Understanding_foreign_ disclosure/ Info Sec SAPPC CPT Page 10

11 18. Senior and executive-level subject matter experts within your organization have identified specific information related to vulnerabilities of your installation which they say must remain classified beyond the declassify on date. Disclosure of this information would lead to mission failure, causing serious damage to national security. As the security professional for the organization, what steps should you take? a. Challenge the classification guidance, with the support of the Original Classification Authority. b. Inform your superiors that the information must be declassified as indicated on the declassify on line and there is nothing they can legally do to prevent this. c. Change the declassify on line on all documents containing this information to Original Agency Determination Required (OADR). d. Advise the subject matter experts that they must develop different methods of operation that are not dependent upon protection of this particular information. CDSE Course: Derivative Classification Info Sec 19. In the process of derivative classification individuals should only use authorized sources of classification guidance. Which of the following is NOT an authorized source of classification guidance: a. Advice from a subject-matter expert based on prior experience. b. Security Classification Guides (SCG) c. Properly marked source documents d. Department of Defense (DD) Form 254 (for Contractors) CDSE Derivative Classification Training Job aid Info Sec SAPPC CPT Page 11

12 20. What is the difference between classification markings of national security information and control markings specified by the Controlled Access Program Coordination Office (CAPCO)? a. Classified national security information is marked Confidential (C), Secret (S), or Top Secret (TS) to identify the level of damage to national security which would be caused by unauthorized disclosure of the information; while control markings specified by CAPCO consist of nine categories of markings including the overall classification level plus guidance on dissemination controls, sensitive compartmented information (SCI) control systems, other controls and declassification. b. Classification markings include Confidential (C), Secret (S), and Top Secret (TS) to identify the level of damage to national security which would be caused by unauthorized disclosure of the information; while control markings specified by CAPCO specify protection required for controlled unclassified information (CUI). c. Classification markings use only upper case letters; while CAPCO control markings use a combination of upper and lower case letters. d. Classified national security information is marked Confidential (C), Secret (S), or Top Secret (TS) to identify the level of damage to national security which would be caused by unauthorized disclosure of the information; while control markings specified by CAPCO apply only to foreign government information. CDSE course Derivative Classification DoD Manual NUMBER , Volume 1 October 19, 2012 Intell commun authorized class vol. 5 addition updated March 2012 (capco DC office) Info Sec SAPPC CPT Page 12

13 21. A Senior Executive in your organization who is designated as an Original Classification Authority has asked you for guidance regarding what level of classification should be applied to a particular item of information about a new piece of military equipment. The equipment would be ineffective if an adversary had knowledge of this item of information. The Senior Executive states that this would cause serious damage to national security possibly including loss of life of U.S. military service members. What level of classification should be applied to this information? a. Secret b. Top Secret c. Confidential d. Controlled Unclassified Information Executive Order Info Sec SAPPC CPT Page 13

14 22. Secret information may NOT be stored by which of the following methods? a. In an open storage area without supplemental controls, provided the senior agency official determines in writing that security-in-depth exists. b. In the same manner as prescribed for Top Secret information c. In a General Services Administration (GSA)-approved security container or vault built to FED-STD 832 specifications, without supplementary controls. d. In an open storage area meeting the requirements of the Appendix to Enclosure 3 of DoD Manual , provided the senior agency official determines in writing that security-in-depth exists, and an IDS with the personnel responding to the alarm arriving within 30 minutes of the alarm annunciation. DoD Manual Volume 3 Info Sec 23. When providing classification assistance and when reviewing proposed Internet postings, how should a security professional regard unclassified information that is related to a classified system or operation?** a. The security manager should consider the potential for creation of classified compilations. b. The security manager should recognize and respect a clear delineation between the classified and unclassified information and never impose restrictions on dissemination of unclassified information. c. When compilation of unclassified items of information has the potential to reveal classified information, those items should be classified and protected at the level of the classified information. d. A security manager should focus on classified information as identified in a classification guide and avoid being distracted by unclassified information related to the system or operation. Enclosure 5 of DoD M Vol 3 Info Sec & Cyber SAPPC CPT Page 14

15 24. Which of the following statements accurately compares and contrasts a preliminary inquiry related to unauthorized disclosure of classified information to/from a counterintelligence (CI) inquiry? a. A preliminary inquiry focuses on addressing key questions such as when, where and how did an incident occur, who was involved and was classified information inappropriately disclosed; while the goal of the CI inquiry is to establish or refute a reasonable belief that a particular person is acting for or on behalf of, or an event is related to, a foreign power engaged in spying or committing espionage, sabotage, treason, sedition, subversion, assassinations, or international terrorist activities. b. A preliminary inquiry is the first step in conducting a CI inquiry. c. A preliminary inquiry is to establish or refute a reasonable belief that a particular person is acting for or on behalf of a foreign power engaged in spying or committing espionage, sabotage, treason, sedition, subversion, assassinations, or international terrorist activities; while the goal of a CI inquiry is to determine if the information involved in the incident was classified. d. Any cleared employee or supervisor may conduct a preliminary inquiry; however, only a certified security specialist or CI agent is authorized to conduct a CI inquiry. DoD Directive July 22, 2005 DoD Directive October 14,2014 Info Sec 25. Continuous evaluation assesses an individual s continuous reliability and trustworthiness by all of the following requirements, EXCEPT: a. Conducting performance assessments of cleared personnel. b. Reporting all change conditions about cleared personnel. c. Conducting periodic reinvestigations. d. Discovering incidents that may impact continued clearances R, February 23, 1996 Pers Sec SAPPC CPT Page 15

16 26. Which of the following adjudication processes refers to a person s identifiable character traits and conduct sufficient to decide whether employment or continued employment would or would not protect the integrity or promote the efficiency of the Federal service? a. HSPD 12 credentialing b. National security adjudication c. Suitability adjudication d. Continuous evaluation R, February 23, 1996 Pers Sec 27. Under what circumstances can a non-u.s. citizen be granted Limited Access Authorization (LAA), allowing him or her to have access to U.S. Secret classified information while employed by a cleared DoD contractor? a. If the government contracting activity (GCA) concurs, a LAA may be granted in those rare circumstances where the non- U.S. citizen possesses unique or unusual skill or expertise that is urgently needed to support a specific U.S. Government contract involving access to specified classified information and a cleared or clearable U.S. citizen is not readily available. b. Non-U.S. citizen contractor employees may never be granted authorization to have access to U.S. classified information. c. A LAA may only be granted when the contractor is supporting a U.S. contractor working in the individual s country of origin. d. Non-U.S. citizens may be granted access to U.S. classified information in exactly the same way that cleared U.S. citizens are granted access as long as they have a need to know the classified information. NISPOM and DOD5200. Pers Sec SAPPC CPT Page 16

17 28. Which phrase most accurately completes this statement? Discretionary judgements used to determine eligibility for national security positions. a. Are an inherently governmental function and shall be performed by appropriately trained and favorably adjudicated Federal Government personnel and appropriate automated procedures. b. May be performed by appropriately trained and favorably adjudicated Federal Government personnel or employees of contractors in the National Industrial Security Program. c. Are made only by local commanders or management officials d. Are made only by use of automated procedures. DoD Instruction (para 3 c) Pers Sec 29. Which of the following statements is NOT correct? a. An individual who has received mental health counseling is not eligible to have access to national security information. b. Mental health counseling may be a positive factor that, by itself, shall not jeopardize the rendering of eligibility determinations or temporary eligibility for access to national security information. c. Mental health counseling, where relevant to adjudication for a national security position, may justify further inquiry to assess risk factors that may be relevant to the DoD Personnel Security Program. d. No negative inference may be raised solely on the basis of mental health counseling. DoD Instruction (para 3 d) Pers Sec 30. Which factors may be considered in an adjudication in the DoD Personnel Security Program? a. Personnel security criteria and adjudicative standards described in Executive Order 12968, Access to Classified Information, August 2, 1995, as amended. b. The applicant, who is a U.S citizen, was born in Iran. c. The applicant s sex (gender) and sexual orientation. d. Time in grade as a Federal government employee. DoD Instruction (para 3 e) Pers Sec SAPPC CPT Page 17

18 31. Identify if temporary eligibility for access to classified information (collateral) can be granted prior to completion of the investigative and adjudicative process. a. Based on exceptional circumstances where official functions must be performed prior to completion of the investigative and adjudicative process, temporary eligibility for access to classified information may be granted while the investigation is underway. b. Temporary eligibility for access to classified information may not be granted under any circumstances. c. Temporary eligibility for access to classified information is always granted prior to completion of the investigative and adjudicative process. d. Temporary eligibility for access to classified information is granted whenever issues are present which may lead to denial of access because these issues may prolong the investigative and adjudicative process. DoD Instruction (para 3 i) Pers Sec 32. When taking electronic fingerprints of the applicant for a personnel security investigation, what should you avoid doing? a. Using a hand lotion or moisturizing substance. b. Checking that the electronic fingerprint machine is properly calibrated. c. Correctly entering all required data. d. Making rolling prints from nail to nail. How to Take Successful Electronic Fingerprints video from CDSE website Pers Sec SAPPC CPT Page 18

19 33. When completing a Questionnaire for National Security Positions, Standard Form 86 (SF 86), detailed information requested may be difficult for an applicant to provide. Which of the following will result in timely and accurate processing of the SF 86? a. Gaps in employment and / or residence should be explained in the remarks section. b. Include dashes and parenthesis when entering telephone numbers. c. If information is not available or not applicable, leave the field blank. d. List current spouse only and never provide information about a former spouse. Job aid from CDSE website How to Complete Standard Form 86 (SF86) Questionnaire for National Security Positions Pers Sec SAPPC CPT Page 19

20 34. Joint Clearance and Access Verification System (JCAVS) indicates that an employee is eligible to have access to TOP SECRET (TS) information based on the investigation and favorable adjudication that was completed one year ago while she was employed by the U.S. Army. She now works for your organization in a position where she will routinely need access to SECRET information to do her job. She does not need access to TS for her current position. What level of access should be entered in JCAVS based on her position in your organization? a. SECRET, because this is the highest level of access that she is expected to need to do her current job. b. TOP SECRET, because she still has TS eligibility and this will allow her to be considered for other positions that may become available within your organization. c. Access must not be granted in her new position until a new personnel security investigation is completed. d. JACAVS records should continue to show the TS access granted during her former period of employment and local security records should reflect that her access has been temporarily downgraded based on her current duties. DoD Instruction March 2014 Pers Sec SAPPC CPT Page 20

21 35. Identify if a non-u.s. citizen can be granted access to classified information in support of a DoD program. a. A non-u.s. citizen who possesses expertise that cannot be filled by a cleared or clearable U.S. citizen may hold a sensitive position or be granted a limited access authorization to classified information in support of a specific DoD program, project, or contract following a favorable security determination by an authorized adjudication facility. b. A non-u.s. citizen is entitled access to classified information following a favorable security determination just as a U.S. citizen would be to allow fair competition in the DoD workforce. c. A non-u.s. citizen may not be granted access to classified information in support of a DoD program under any circumstances. d. A non-u.s. citizen can hold a sensitive position or be granted a limited access authorization to classified information in support of a DoD program only if there is a cleared U.S. citizen with expertise who can backfill the position if the non-u.s. citizen returns to his country of origin. DoD Instruction (para 3 j) Pers Sec 36. Under what circumstances may a person be appointed or assigned to a national security position when an unfavorable personnel security determination has been rendered? a. No person shall be appointed or assigned to a national security position when an unfavorable personnel security determination has been rendered. b. When the person is appointed to the position by the President, Secretary of Defense, or their designee. c. When the person has unique knowledge or skills that are needed to perform tasks required for success of a mission and no other qualified person is available to perform those tasks. d. When the person has formally requested to appeal the unfavorable personnel security determination. DoD Instruction (para 3 h) Pers Sec SAPPC CPT Page 21

22 37. Under what circumstance may a person be deemed to be eligible for a national security position? a. Eligibility for national security positions shall be granted only to persons who are U.S. citizens for whom the investigative and adjudicative process has been favorably adjudicated. b. Merely by reason of Federal service or contracting, licensee, certificate holder, or grantee status. c. Merely as a matter of right or privilege. d. Merely by reason of the person holding a particular title, rank, position, or affiliation. DoD Instruction (para 3 g) Pers Sec 38. Eligibility determinations and employee clearance records can be found in which of the following? a. Industrial Security Facility Database (ISFD) b. Defense Information System for Security (DISS) c. Electronic Questionnaires for Investigations Processing (e-qip) system d. Joint Worldwide Intelligence Communications System (JWICS) DoDM , April 3, 2017 Pers Sec 39. What controls are required for keys and combinations protecting arms, ammunition and explosives (AA&E)? a. Keys and combinations to AA&E storage areas shall be retained separately from other keys and combinations. b. Keys and combinations to AA&E storage areas shall be retained with other keys and combinations used on the installation. c. Locks with keys are never authorized to secure AA&E storage areas. d. Keys and combinations to AA&E storage areas must be controlled at a level equivalent to Top Secret material. A Physical Security Technology Newsletter, Issue 29 (DoD Lock Program) DoDM Phys Sec SAPPC CPT Page 22

23 40. Which of the following statements does NOT accurately reflect DoD and national policy on locks? a. Locks which are used to protect classified information may also be used to protect conventional arms, ammunition and explosives (AA&E). b. Combination locks that meet requirements of DoDM , Volumes 1-4, DoD Information Security Program or DoD M, National Industrial Security Program Operating Manual may be used to protect classified information. c. Security containers used to store and protect classified information must be approved by GSA (General Services Administration). d. The Director of National Intelligence (DNI) is responsible for setting security standards for sensitive compartmented information facilities (SCIF). DoDM , Volumes 1-4, DoD Information Security Program DoD M, National Industrial Security Program Operating Manual A Physical Security Technology Newsletter, Issue 29 (DoD Lock Program) DoDM Phys Sec 41. Which of the following best defines critical information as used in Operations Security (OPSEC)? a. An adversary with intentions and capability to obtain your organization s critical information and use that information to cause harm to your organization or to prevent your organization from mission success. b. Information (usually unclassified) about your organization or operations that could be used by an adversary to cause harm to your organization or prevent your organization from mission success. c. A weakness that may lead to loss or compromise of critical information. d. Information about your program that is classified. JP , January 24, 2012, III-3-III-6 Phys Sec SAPPC CPT Page 23

24 42. Which of the following accurately describes the difference between Point and Area security? a. Point security countermeasures protect areas requiring a lower level of security; Area security countermeasures protect areas requiring a high level of security. b. Point security countermeasures protect people, information, and activities and operations; Area security countermeasures protect equipment and facilities. c. Point security countermeasures protect small areas or specific assets; Area security countermeasures protect large areas or multiple assets. d. Point security countermeasures include active measures such as manned visitor entries and electronically operated gates at entry checkpoints; Area security countermeasures include passive measures such as intrusion detection systems (IDS) and lighting R, May 27, 2009 Phys Sec SAPPC CPT Page 24

25 43. Two Security Professionals, Chris and Jo, are discussing the use of identification systems to control access to facilities. Chris says that once DoD Civilian Personnel, DoD Civilian Contractors and DoD Military Personnel possessing a DoDissued common access card (CAC) are vetted through DoD Personnel Security Standards they are considered identity proofed. a. Chris is correct b. Jo is correct c. Both Chris and Jo are correct d. Both Chris and Jo are incorrect DTM , December 8, 2009 Phys Sec Jo says DoD-issued card holders are identity proofed at card issuance sites based on federally authorized identity documents. Who is correct? SAPPC CPT Page 25

26 Scenario 1 (Items 44 and 45 are based on this scenario). Jo, an architectural engineer, has developed a blueprint for a new four-story government building with a Special Access Program Facility (SAPF) on the first floor. The blueprint Jo sent over for review is for the first floor of the building. The blueprint includes the following qualities: Floor-to-ceiling windows on the first floor for the lobby that are covered with material to protect from forced entry; blinds on those windows can be closed from the inside, The ceilings in the SAPF are made of plaster, Front open swinging doors are covered with material to protect the SAPF from forced entry with a deadbolt; vault that includes a General Services Administration (GSA)-approved combination lock, An alarm control unit, A parking lot containing handicap-accessible ramps and sidewalks. 44. Please determine if the following statement is True or False. Since the windows are covered with material to protect from forced entry, the blinds are not necessary. a. True b. False DoDM V3, February 21, 2012 Phys Sec 45. Please determine whether the following statement complies with policy, does not comply with policy, or there is not enough information to make a determination. Since access to the SAPF is from inside the building, the doors are constructed of heavy glass. a. This is according to policy b. Does not comply with policy c. There is not enough information DoDM V3, February 21, 2012 Phys Sec SAPPC CPT Page 26

27 46. What is the role of the government contracting activity (GCA), or cleared prime, when a contractor that does not have a Facility Clearance (FCL) wants to bid on a Request for Proposal (RFP) that requires access to classified information? a. The GCA must issue a formal letter rejecting the contractor s bid due to the fact that the contractor does not have the requisite FCL b. The contractor must submit a sponsorship letter to GCA, which will then decide whether to allow the contractor to bid on the contract. c. The GCA or cleared prime contractor must sponsor the contractor for a facility security clearance by submitting a sponsorship letter to DSS, which will then allow the contractor to bid on the contract. d. The GCA must ensure that the owners and upper management of the contractor s facility first take the Industrial Security Facilities Database (ISFD) user course before the contractor can be permitted to bid on the contract. DOD R, December 4, M, February 28, 2006 Indus Sec 47. The Defense Acquisition System is governed according to which of the following policies? a. Supervision; control; care; and management b. Confidentiality; integrity; availability; authentication; and nonrepudiation c. Flexibility; responsiveness; innovation; discipline; and streamlined and effective management d. Maturity; discretion; and trustworthiness DoDD ori Nov 2007 Ch4.3 Policy Indus Sec SAPPC CPT Page 27

28 48. All of the following are vulnerabilities that motivate the need to include security as a requirement for contracts involving sensitive information, EXCEPT: a. Failure to report security incidents. b. Lack of adherence to marking, handling, storage, transmission, and destruction requirements. c. Desire of foreign actors to commit economic espionage and steal classified information under the contract. d. Failure to properly train employees working on the contract M February 28, 2006, page #7-1-1 Indus Sec 49. Which of the following documents the agreement between the U.S. government and a cleared contractor in which the contactor agrees to maintain a security program in compliance with the National Industrial Security Program Operating Manual (NISPOM) and the government agrees to security guidance and program oversight? a. DD Form 254 b. Security Classification Guide (SCG) c. DD Form 441 d. Request for Proposal (RFP) M, February 28, 2006 DOD R, December 4, 1985 Indus Sec SAPPC CPT Page 28

29 50. According to clause of the Defense Federal Acquisition Regulation Supplement (DFARS), which of the following must be included in solicitations and contracts for the purpose of protecting controlled unclassified information (CUI)? a. A derivative marking identifying the contract as one which will require access to CUI. b. A paragraph or clause prohibiting the contracting activity from using CUI in the performance of future contracts. c. A statement emphasizing that such information remains unclassified and therefore is required to be declassified under any Freedom of Information Act (FOIA) request. d. A non-disclosure of information clause that prohibits release of unclassified information to the public without approval of the contracting activity. Contract clauses ACQ OSD.mil Indus Sec 51. When a Cognizant Security Agency (CSA)- designated database is not available, what must a visit authorization letter include? a. The visitor s social security number b. The individual s nationality c. The individual s name, date and place of birth and citizenship d. A professional reference for the individual DOD R, December 4, R, February 23, 1996, Indus Sec 52. Which of the following personnel is not required to have a personnel security clearance cleared to the level of the facility clearance? a. The senior management official b. The Facility Security Officer c. The Contracting Officer d. The Insider Threat Program Senior Official DOD R, December 4, 1985 Indus Sec SAPPC CPT Page 29

30 53. During fiscal year 2015, foreign collectors continued to work to erode U.S. economic and military advantages through the theft of cleared industry s investment in expensive research and development efforts. These collectors applied the complete spectrum of collection methods in order to identify and exploit vulnerabilities in cleared industry s security measures. Top methods of operation reported to Defense Security Service by cleared contractors in 2015 were: a. Academic solicitation, foreign persons seeking employment, attempted illegal acquisition of technology, requests for information, and suspicious computer network activity. b. Seduction, sexual solicitation and blackmail. c. Solicitation based on ethnic background or national origin. d. Surveillance using technical means such as cameras with long-range lens, powerful microphones, hidden cameras and microphones, etc. DSS 2016 edition Technology Collection Trends Indus Sec 54. Security professionals can play a role in the counterintelligence community landscape by helping to do which of the following? a. Eliminate the targeting of DoD assets by Foreign Intelligence Entities (FIEs). b. Increase budgetary allocation for specific agencies. c. Enhance the commercial advantage of U.S. security-related technology. d. Deter foreign intelligence collection by increasing, risk, cost, and delay. DoDD March 17, 2015 Gen Sec SAPPC CPT Page 30

31 55. Which of the following is NOT a responsibility of the compliance inspector within the DoD Security Program? a. Prepare and provide an inspection report. b. Educate the activity about policy and policy changes. c. Conduct Staff Assistance Visits (SAVs). d. Evaluate individual DoD Component activities and the DoD Component as a whole with respect to the implementation of the information security program established in accordance with the Manual requirements M, February 28, 2006 Gen Sec 56. What is an Operations Security (OPSEC) indicator? a. An OPSEC indicator is any detectable activity and/or information that, when looked at by itself or in conjunction with something else, allows an adversary to obtain critical or sensitive information. b. An OPSEC indicator is any detectable activity and / or information that, when looked at by itself or in conjunction with something else, allows an adversary to obtain unauthorized access to classified information. c. An OPSEC indicator is evidence that an installation or organization has a sound and effective OPSEC program. d. An OPSEC indicator is any information that allows an OPSEC officer to identify the intentions and capabilities of an adversary. OPSEC Professional s Association training material found at: net/departmentofdefense/ opsec-vulnerabilities-andindicators IOSS training material, DoD M OPSEC Manual SAPPC CPT Page 31

32 57. What is the purpose of the Foreign Visitor Program? a. To provide adjudication for granting non-u.s. citizens access eligibility to classified information, provided access remains limited to only the approved program or project. b. To track and approve access by a foreign entity to information that is classified; and to approve access by a foreign entity to information that is unclassified, related to a U.S. Government contract, or plant visits covered by International Traffic in Arms Regulations (ITAR). c. To ensure that cleared facilities (FCL) have the appropriate physical security measures in place to prevent unauthorized access during facility visits by foreign delegations. d. To identify and mitigate unauthorized network intrusion by foreign intelligence entities (FIEs) and terrorist groups May 4, 2012 Gen Sec 58. As part of Operations Security (OPSEC), a program coordinator should use which of the following tools to assess assets as part of the risk management process for critical information? a. Critical Information List b. Threat vulnerability matrix c. Risk Rating Table d. Security Classification Guide , December 28, 2010 Gen Sec 59. What tool can a security professional use to identify the types of DoD assets requiring protection as part of a physical security program? a. People, Information, Equipment Facilities, Activities Operations (PIE-FAO) acronym b. Threat-assessment rating scale c. Risk assessment formula d. Security-in-depth model R, May 27, 2009 UFC February 9, 2012 Gen Sec SAPPC CPT Page 32

33 60. Which of the following accurately describes the relationship between threats and vulnerabilities as it relates to the protection of DoD Assets? a. If an Asset has a Vulnerability that is mitigated by countermeasures, a Threat is more likely to be able to compromise the Asset. b. The likelihood that the Asset will be compromised is determined by the ability of the Vulnerability to exploit the Threat. c. Threats are weaknesses that a Vulnerability can exploit to compromise an Asset. d. Vulnerabilities are weaknesses that a Threat can exploit to compromise an Asset R, May 27, 2009 Gen Sec 61. In order to conduct a thorough Operations Security (OPSEC) threat analysis, all of the following questions must be answered EXCEPT: a. Who is the adversary, and what is their intent and capability? b. What are the adversary s goals? c. Who is the adversary targeting and how? d. What tactics does the adversary use? e. What does the adversary already know about the unit s mission; what critical information has already been exposed and is known by the adversary? JP , January 24, M, November 3, 2008 Gen Sec 62. Procedural controls which are baseline requirements for DoD information systems include which of the following?** a. Information System (IS) user agreements b. Wireless access c. Removable media d. Printers are required to be capable of producing hardcopy of all classified information DoD Instruction , Risk Management Framework (RMF) for DoD Information Technology (IT), March 12, 2014 Committee on National Security Systems Instruction 1253, Security Categorization and Control Selection for National Security Systems, March 15, 2012, as amended Gen Sec SAPPC CPT Page 33

34 63. Organizational leadership recently stated their desire to include Security Awareness training into their employees annual training plans. You propose the idea of a single training for all employees and additional practical exercises for specific identified personnel. What security control would include the practical exercise portion of the training?** a. Practical Application Training b. Role-based Security Training c. Scenario-based Security Training d. Situation-based Security Training NIST SP r4 (April 2013) ////F-38 Gen Sec & Cyber 64. Which of the following is NOT a security discipline that supports risk management by providing programs to deter, detect, and delay threats to DoD assets? a. Public security b. Operational security c. International security d. Industrial security DoD R, May 27, 2009 Gen Sec 65. Two Security Professionals, Chris and Jo, are discussing mission assurance roles and responsibilities. Chris says the Director, Defense Intelligence Mission Assurance Office (DIMAO) conducts assessments to validate the completeness, readiness, and effectiveness of mission assurance programs, plans, and capabilities. a. Chris is correct b. Jo is correct c. Both Chris and Jo are correct d. Both Chris and Jo are incorrect DoDI , March 2, 2015 Gen Sec & Cyber Jo says the DIMAO leads the office of primary responsibility (OPR) for the development and coordination of mission assurance policies and guidance for the Defense Intelligence Enterprise (DIE) and interagency, departmental, and intelligence community (IC) counterparts. Who is correct?** SAPPC CPT Page 34

Security Asset Protection Professional Certification (SAPPC) Competency Preparatory Tools (CPT)

Security Asset Protection Professional Certification (SAPPC) Competency Preparatory Tools (CPT) SAPPC Knowledge Checkup Please note: Cyber items are indicated with a ** at the end of the practice test questions. Question Answer Linked 1. What is the security professionals role in pursuing and meeting

More information

Question Distractors References Linked Competency

Question Distractors References Linked Competency SFPC Example Questions Please note: Cyber items are indicated with a ** at the end of the practice test questions. 1. Which of the following is a true statement regarding the special handling requirements

More information

DODEA ADMINISTRATIVE INSTRUCTION , VOLUME 1 DODEA PERSONNEL SECURITY AND SUITABILITY PROGRAM

DODEA ADMINISTRATIVE INSTRUCTION , VOLUME 1 DODEA PERSONNEL SECURITY AND SUITABILITY PROGRAM DODEA ADMINISTRATIVE INSTRUCTION 5210.03, VOLUME 1 DODEA PERSONNEL SECURITY AND SUITABILITY PROGRAM Originating Component: Security Management Division Effective: March 23, 2018 Releasability: Cleared

More information

August Initial Security Briefing Job Aid

August Initial Security Briefing Job Aid August 2015 Initial Security Briefing Job Aid A NOTE FOR SECURITY PERSONNEL: This initial briefing contains the basic security information personnel need to know when they first report for duty. This briefing

More information

General Security. Question Answer Policy Resource

General Security. Question Answer Policy Resource General Security Briefly define a Special Access Program. A program established for a specific class of classified information that imposes safeguarding and access requirements that exceed those normally

More information

Department of Defense DIRECTIVE

Department of Defense DIRECTIVE Department of Defense DIRECTIVE NUMBER 5205.16 September 30, 2014 Incorporating Change 2, August 28, 2017 USD(I) SUBJECT: The DoD Insider Threat Program References: See Enclosure 1 1. PURPOSE. In accordance

More information

Department of Defense DIRECTIVE

Department of Defense DIRECTIVE Department of Defense DIRECTIVE NUMBER 5200.2 April 9, 1999 ASD(C3I) SUBJECT: DoD Personnel Security Program References: (a) DoD Directive 5200.2, subject as above, May 6, 1992 (hereby canceled) (b) Executive

More information

Department of Defense DIRECTIVE

Department of Defense DIRECTIVE Department of Defense DIRECTIVE NUMBER 5200.39 September 10, 1997 SUBJECT: Security, Intelligence, and Counterintelligence Support to Acquisition Program Protection ASD(C3I) References: (a) DoD Directive

More information

Introduction to Industrial Security, v3

Introduction to Industrial Security, v3 Introduction to Industrial Security, v3 September 2017 Center for Development of Security Excellence Lesson 1: Course Introduction Introduction Introduction Subcontractor CEO: I m really excited -- my

More information

Personnel Clearances in the NISP

Personnel Clearances in the NISP Personnel Clearances in the NISP Student Guide August 2016 Center for Development of Security Excellence Lesson 1: Course Introduction Course Introduction Course Information Welcome to the Personnel Clearances

More information

Protection of Classified National Intelligence, Including Sensitive Compartmented Information

Protection of Classified National Intelligence, Including Sensitive Compartmented Information Protection of Classified National Intelligence, Including Sensitive Compartmented Information 703 A. AUTHORITY 1. The National Security Act of 1947, as amended; Executive Order (EO) 12333, as amended;

More information

Department of Defense INSTRUCTION

Department of Defense INSTRUCTION Department of Defense INSTRUCTION NUMBER 5200.02 March 21, 2014 USD(I) SUBJECT: DoD Personnel Security Program (PSP) References: See Enclosure 1 1. PURPOSE. This Instruction: a. Reissues DoD Directive

More information

DEPARTMENT OF DEFENSE (DoD) INITIAL TRAINING GUIDE

DEPARTMENT OF DEFENSE (DoD) INITIAL TRAINING GUIDE DEPARTMENT OF DEFENSE (DoD) INITIAL TRAINING GUIDE Lockheed Martin Security TABLE OF CONTENTS Congratulations 2 Introduction 3 Reporting Requirements 4 Procedures and Duties 5 Safeguarding 6 Reproduction

More information

Department of Defense DIRECTIVE

Department of Defense DIRECTIVE Department of Defense DIRECTIVE NUMBER 5240.02 March 17, 2015 USD(I) SUBJECT: Counterintelligence (CI) References: See Enclosure 1 1. PURPOSE. This directive: a. Reissues DoD Directive (DoDD) O-5240.02

More information

Department of Defense MANUAL

Department of Defense MANUAL Department of Defense MANUAL NUMBER O-5205.13 April 26, 2012 DoD CIO SUBJECT: Defense Industrial Base (DIB) Cyber Security and Information Assurance (CS/IA) Program Security Classification Manual (SCM)

More information

Security Classification Guidance v3

Security Classification Guidance v3 Security Classification Guidance v3 September 2017 Center for Development of Security Excellence Lesson 1: Course Introduction Course Overview Welcome to the Security Classification Guidance Course. The

More information

Question Distractors References Linked Competency

Question Distractors References Linked Competency ISOC Example Questions 1. Which statement regarding a corporation s common business structure and Facility Security Clearances (FCLs) is TRUE? Select all that apply. a. If a director does not require access

More information

DEPARTMENT OF THE NAVY COUNTERINTELLIGENCE

DEPARTMENT OF THE NAVY COUNTERINTELLIGENCE SECNAV INSTRUCTION 3850.2E DEPARTMENT OF THE NAVY OFFICE OF THE SECRETARY 1 000 NAVY PENTAGON WASHINGTON DC 20350 1000 SECNAVINST 3850.2E DUSN (P) January 3, 2017 From: Subj: Secretary of the Navy DEPARTMENT

More information

Industrial Security Program

Industrial Security Program Army Regulation 380 49 Security Industrial Security Program Headquarters Department of the Army Washington, DC 20 March 2013 UNCLASSIFIED SUMMARY of CHANGE AR 380 49 Industrial Security Program This major

More information

Department of Defense DIRECTIVE. SUBJECT: Unauthorized Disclosure of Classified Information to the Public

Department of Defense DIRECTIVE. SUBJECT: Unauthorized Disclosure of Classified Information to the Public Department of Defense DIRECTIVE NUMBER 5210.50 July 22, 2005 USD(I) SUBJECT: Unauthorized Disclosure of Classified Information to the Public References: (a) DoD Directive 5210.50, subject as above, February

More information

Department of Defense MANUAL

Department of Defense MANUAL Department of Defense MANUAL NUMBER 5205.02-M November 3, 2008 USD(I) SUBJECT: DoD Operations Security (OPSEC) Program Manual References: See Enclosure 1 1. PURPOSE. In accordance with the authority in

More information

GAO INDUSTRIAL SECURITY. DOD Cannot Provide Adequate Assurances That Its Oversight Ensures the Protection of Classified Information

GAO INDUSTRIAL SECURITY. DOD Cannot Provide Adequate Assurances That Its Oversight Ensures the Protection of Classified Information GAO United States General Accounting Office Report to the Committee on Armed Services, U.S. Senate March 2004 INDUSTRIAL SECURITY DOD Cannot Provide Adequate Assurances That Its Oversight Ensures the Protection

More information

Department of Defense INSTRUCTION

Department of Defense INSTRUCTION Department of Defense INSTRUCTION SUBJECT: Counterintelligence (CI) Analysis and Production References: See Enclosure 1 NUMBER 5240.18 November 17, 2009 Incorporating Change 2, Effective April 25, 2018

More information

Department of Defense MANUAL

Department of Defense MANUAL Department of Defense MANUAL NUMBER 5205.07, Volume 2 November 24, 2015 Incorporating Change 1, Effective February 12, 2018 USD(I) SUBJECT: Special Access Program (SAP) Security Manual: Personnel Security

More information

Department of Defense DIRECTIVE

Department of Defense DIRECTIVE Department of Defense DIRECTIVE SUBJECT: Defense Security Service (DSS) References: See Enclosure 1 NUMBER 5105.42 August 3, 2010 Incorporating Change 1, March 31, 2011 DA&M 1. PURPOSE. Pursuant to the

More information

EXECUTIVE ORDER 12333: UNITED STATES INTELLIGENCE ACTIVITIES

EXECUTIVE ORDER 12333: UNITED STATES INTELLIGENCE ACTIVITIES EXECUTIVE ORDER 12333: UNITED STATES INTELLIGENCE ACTIVITIES (Federal Register Vol. 40, No. 235 (December 8, 1981), amended by EO 13284 (2003), EO 13355 (2004), and EO 13470 (2008)) PREAMBLE Timely, accurate,

More information

Department of Defense INSTRUCTION. SUBJECT: DoD Information Security Program and Protection of Sensitive Compartmented Information

Department of Defense INSTRUCTION. SUBJECT: DoD Information Security Program and Protection of Sensitive Compartmented Information Department of Defense INSTRUCTION NUMBER 5200.01 October 9, 2008 SUBJECT: DoD Information Security Program and Protection of Sensitive Compartmented Information References: See Enclosure 1 USD(I) 1. PURPOSE.

More information

Department of Defense MANUAL

Department of Defense MANUAL Department of Defense MANUAL SUBJECT: DoD Operations Security (OPSEC) Program Manual References: See Enclosure 1 NUMBER 5205.02-M November 3, 2008 Incorporating Change 1, Effective April 26, 2018 USD(I)

More information

Department of Defense INSTRUCTION

Department of Defense INSTRUCTION Department of Defense INSTRUCTION NUMBER 5240.04 April 1, 2016 Incorporating Change 1, Effective April 26, 2018 USD(I) SUBJECT: Counterintelligence (CI) Investigations References: See Enclosure 1 1. PURPOSE.

More information

THE WHITE HOUSE. Office of the Press Secretary. For Immediate Release January 17, January 17, 2014

THE WHITE HOUSE. Office of the Press Secretary. For Immediate Release January 17, January 17, 2014 THE WHITE HOUSE Office of the Press Secretary For Immediate Release January 17, 2014 January 17, 2014 PRESIDENTIAL POLICY DIRECTIVE/PPD-28 SUBJECT: Signals Intelligence Activities The United States, like

More information

Student Guide Course: Original Classification

Student Guide Course: Original Classification Course: Original Classification Lesson: Course Introduction Course Information Purpose Audience Pass/Fail % Estimated completion time Define original classification and identify the process for determining

More information

Preserving Investigative and Operational Viability in Insider Threat

Preserving Investigative and Operational Viability in Insider Threat Preserving Investigative and Operational Viability in Insider Threat September 2017 Center for Development of Security Excellence Lesson 1: Course Introduction Overview Welcome Your Insider Threat Program

More information

Department of Defense INSTRUCTION

Department of Defense INSTRUCTION Department of Defense INSTRUCTION NUMBER 5200.39 May 28, 2015 Incorporating Change 1, November 17, 2017 USD(I)/USD(AT&L) SUBJECT: Critical Program Information (CPI) Identification and Protection Within

More information

Suggested Contractor File Folder Headings

Suggested Contractor File Folder Headings Suggested Contractor File Folder Headings 1. Facility Clearance 2. Personnel Clearances 3. Recurring Security Education 4. Self-Inspection 5. Security Correspondence 6. Standard Practice Procedures 7.

More information

Department of Defense DIRECTIVE

Department of Defense DIRECTIVE Department of Defense DIRECTIVE NUMBER 5210.50 October 27, 2014 Incorporating Change 1, Effective February 16, 2018 USD(I) SUBJECT: Management of Serious Security Incidents Involving Classified Information

More information

Department of Defense DIRECTIVE

Department of Defense DIRECTIVE Department of Defense DIRECTIVE NUMBER 5205.02E June 20, 2012 Incorporating Change 1, Effective May 11, 2018 USD(I) SUBJECT: DoD Operations Security (OPSEC) Program References: See Enclosure 1 1. PURPOSE.

More information

Department of Defense DIRECTIVE. DoD Executive Agent (EA) for the DoD Cyber Crime Center (DC3)

Department of Defense DIRECTIVE. DoD Executive Agent (EA) for the DoD Cyber Crime Center (DC3) Department of Defense DIRECTIVE NUMBER 5505.13E March 1, 2010 Incorporating Change 1, July 27, 2017 ASD(NII)/DoD CIO SUBJECT: DoD Executive Agent (EA) for the DoD Cyber Crime Center (DC3) References: See

More information

Acquisitions and Contracting Basics in the National Industrial Security Program (NISP)

Acquisitions and Contracting Basics in the National Industrial Security Program (NISP) Acquisitions and Contracting Basics in the National Industrial Security Program (NISP) Lesson 1: Course Introduction Contents Introduction... 2 Opening... 2 Objectives... 2 September 2015 Center for Development

More information

Department of Defense INSTRUCTION. SUBJECT: Security of Unclassified DoD Information on Non-DoD Information Systems

Department of Defense INSTRUCTION. SUBJECT: Security of Unclassified DoD Information on Non-DoD Information Systems Department of Defense INSTRUCTION NUMBER 8582.01 June 6, 2012 Incorporating Change 1, October 27, 2017 SUBJECT: Security of Unclassified DoD Information on Non-DoD Information Systems References: See Enclosure

More information

Department of Defense Suitability and Fitness Guide

Department of Defense Suitability and Fitness Guide Department of Defense Suitability and Fitness Guide Procedures and Guidance for Civilian Employment Suitability and Fitness Determinations within the Department of Defense Last Updated: 28-July-2016 Version

More information

Department of Defense INSTRUCTION

Department of Defense INSTRUCTION Department of Defense INSTRUCTION NUMBER 5240.16 August 27, 2012 USD(I) SUBJECT: Counterintelligence Functional Services (CIFS) References: See Enclosure 1 1. PURPOSE. In accordance with the authority

More information

Overview of Physical Security and Protective Measures

Overview of Physical Security and Protective Measures Overview of Physical Security and Protective Measures NAVFAC Northwest Presented by: Richard Cofer, P.E. Naval Facilities Engineering Command Atlantic Capital Improvements Business Line Engineering Criteria

More information

February 11, 2015 Incorporating Change 4, August 23, 2018

February 11, 2015 Incorporating Change 4, August 23, 2018 UNDER SECRETARY OF DEFENSE 5000 DEFENSE PENTAGON WASHINGTON, D.C. 20301-5000 INTELLIGENCE February 11, 2015 Incorporating Change 4, August 23, 2018 MEMORANDUM FOR SECRETARIES OF THE MILITARY DEPARTMENTS

More information

SUBJECT: Directive-Type Memorandum (DTM) Law Enforcement Reporting of Suspicious Activity

SUBJECT: Directive-Type Memorandum (DTM) Law Enforcement Reporting of Suspicious Activity THE UNDER SECRETARY OF DEFENSE 2000 DEFENSE PENTAGON WASHINGTON, D.C. 20301-2000 POLICY October 1, 2010 MEMORANDUM FOR: SEE DISTRIBUTION SUBJECT: Directive-Type Memorandum (DTM) 10-018 Law Enforcement

More information

Department of Defense INSTRUCTION

Department of Defense INSTRUCTION Department of Defense INSTRUCTION NUMBER 5240.16 August 27, 2012 Incorporating Change 2, July 28, 2017 USD(I) SUBJECT: Counterintelligence Functional Services (CIFS) References: See Enclosure 1 1. PURPOSE.

More information

Department of Defense

Department of Defense Department of Defense DIRECTIVE SUBJECT: Under Secretary of Defense for Intelligence (USD(I)) NUMBER 5143.01 November 23, 2005 References: (a) Title 10, United States Code (b) Title 50, United States Code

More information

Defense Security Service Intelligence Oversight Awareness Training Course Transcript for CI

Defense Security Service Intelligence Oversight Awareness Training Course Transcript for CI Welcome In a 2013 testimony to congress on Foreign Intelligence Surveillance, the former Director of National Intelligence, LT GEN James Clapper (Ret) spoke about limitations to intelligence activities

More information

Department of Defense INSTRUCTION

Department of Defense INSTRUCTION Department of Defense INSTRUCTION NUMBER 5240.04 February 2, 2009 USD(I) SUBJECT: Counterintelligence (CI) Investigations References: See Enclosure 1 1. PURPOSE. This Instruction reissues DoD Instruction

More information

Department of Defense INSTRUCTION

Department of Defense INSTRUCTION Department of Defense INSTRUCTION SUBJECT: Law Enforcement Defense Data Exchange (LE D-DEx) References: See Enclosure 1 NUMBER 5525.16 August 29, 2013 Incorporating Change 1, Effective June 29, 2018 USD(P&R)USD(I)

More information

Student Guide: Controlled Unclassified Information

Student Guide: Controlled Unclassified Information Length Two (2) hours Description This course covers the Department of Defense policies on the disclosure of official information. In addition, the nine exemption categories of the Freedom of Information

More information

Department of Defense INSTRUCTION

Department of Defense INSTRUCTION Department of Defense INSTRUCTION NUMBER 5100.76 February 28, 2014 USD(I) SUBJECT: Safeguarding Sensitive Conventional Arms, Ammunition, and Explosives (AA&E) References: See Enclosure 1 1. PURPOSE. This

More information

Department of Defense INSTRUCTION

Department of Defense INSTRUCTION Department of Defense INSTRUCTION NUMBER 3305.12 October 14, 2016 Incorporating Change 1, Effective February 26, 2018 USD (I) SUBJECT: Intelligence and Counterintelligence (I&CI) Training of Non-U.S. Persons

More information

DEPARTMENT OF THE NAVY INSIDER THREAT PROGRAM. (1) References (2) DON Insider Threat Program Senior Executive Board (DON ITP SEB) (3) Responsibilities

DEPARTMENT OF THE NAVY INSIDER THREAT PROGRAM. (1) References (2) DON Insider Threat Program Senior Executive Board (DON ITP SEB) (3) Responsibilities DEPARTMENT OF THE NAVY OFFICE OF THE SECRETARY 1000 NAVY PENTAGON WASHINGTON DC 20350 1 000 SECNAVINST 5510.37 DUSN PPOI AUG - 8 2013 SECNAV INSTRUCTION 5510.37 From: Subj: Ref: Encl: Secretary of the

More information

FSO Role in the NISP. Student Guide. Lesson 1: Course Introduction. Course Information. Course Overview

FSO Role in the NISP. Student Guide. Lesson 1: Course Introduction. Course Information. Course Overview FSO Role in the NISP Lesson 1: Course Introduction Course Information Purpose Audience Pass/Fail % Estimated completion time Provide an overview of the Facility Security Officer s (FSO) primary roles in

More information

Department of Defense INSTRUCTION

Department of Defense INSTRUCTION Department of Defense INSTRUCTION NUMBER 5030.59 March 10, 2015 Incorporating Change 1, Effective May 8, 2018 USD(I) SUBJECT: National Geospatial-Intelligence Agency (NGA) LIMITED DISTRIBUTION Geospatial

More information

Department of Defense DIRECTIVE

Department of Defense DIRECTIVE Department of Defense DIRECTIVE NUMBER 5230.24 March 18, 1987 USD(A) SUBJECT: Distribution Statements on Technical Documents References: (a) DoD Directive 5230.24, subject as above, November 20, 1984 (hereby

More information

INTELLIGENCE COMMUNITY DIRECTIVE NUMBER 501

INTELLIGENCE COMMUNITY DIRECTIVE NUMBER 501 INTELLIGENCE COMMUNITY DIRECTIVE NUMBER 501 DISCOVERY AND DISSEMINATION OR RETRIEVAL OF INFORMATION WITHIN THE INTELLIGENCE COMMUNITY (EFFECTIVE: 21 JANUARY 2009) A. AUTHORITY: The National Security Act

More information

DEPARTMENT OF THE NAVY OFFICE OF THE CHIEF OF NAVAL OPERATIONS 2000 NAVY PENTAGON WASHINGTON DC

DEPARTMENT OF THE NAVY OFFICE OF THE CHIEF OF NAVAL OPERATIONS 2000 NAVY PENTAGON WASHINGTON DC DEPARTMENT OF THE NAVY OFFICE OF THE CHIEF OF NAVAL OPERAS 2000 NAVY PENTAGON WASHINGTON DC 20350-2000 5500.66 5500.66 From: Chief of Naval Operations Subj: SECURITY COORDINA BOARD Ref: (a) SECNAVINST

More information

Department of Defense INSTRUCTION

Department of Defense INSTRUCTION Department of Defense INSTRUCTION NUMBER 5220.22 March 18, 2011 USD(I) SUBJECT: National Industrial Security Program (NISP) References: See Enclosure 1 1. PURPOSE. This Instruction: a. Reissues DoD Directive

More information

Initial Security Briefing

Initial Security Briefing UNIVERSITY OF CALIFORNIA BERKELEY DAVIS IRVINE LOS ANGELES MERCED RIVERSIDE SAN DIEGO SAN FRANCISCO SANTA BARBARA SANTA CRUZ Initial Security Briefing This briefing paper sets forth certain basic Federal

More information

Department of Defense DIRECTIVE

Department of Defense DIRECTIVE Department of Defense DIRECTIVE NUMBER 8521.01E January 13, 2016 Incorporating Change 1, August 15, 2017 USD(AT&L) SUBJECT: DoD Biometrics References: See Enclosure 1 1. PURPOSE. This directive: a. Reissues

More information

Department of Defense DIRECTIVE

Department of Defense DIRECTIVE Department of Defense DIRECTIVE NUMBER 5105.68 December 19, 2008 DA&M SUBJECT: Pentagon Force Protection Agency (PFPA) References: See Enclosure 1 1. PURPOSE. This Directive, under the authority vested

More information

INSIDER THREATS. DOD Should Strengthen Management and Guidance to Protect Classified Information and Systems

INSIDER THREATS. DOD Should Strengthen Management and Guidance to Protect Classified Information and Systems United States Government Accountability Office Report to Congressional Committees June 2015 INSIDER THREATS DOD Should Strengthen Management and Guidance to Protect Classified Information and Systems GAO-15-544

More information

Department of Defense DIRECTIVE. Inspector General of the Department of Defense (IG DoD)

Department of Defense DIRECTIVE. Inspector General of the Department of Defense (IG DoD) Department of Defense DIRECTIVE NUMBER 5106.01 April 20, 2012 DA&M SUBJECT: Inspector General of the Department of Defense (IG DoD) References: See Enclosure 1 1. PURPOSE. This Directive reissues DoD Directive

More information

DEPUTY SECRETARY OF DEFENSE 1010 DEFENSE PENTAGON WASHINGTON, DC

DEPUTY SECRETARY OF DEFENSE 1010 DEFENSE PENTAGON WASHINGTON, DC DEPUTY SECRETARY OF DEFENSE 1010 DEFENSE PENTAGON WASHINGTON, DC 20301-1010 October 8, 2013 MEMORANDUM FOR SECRETARIES OF THE MILITARY DEPARTMENTS CHAIRMAN OF THE JOINT CHIEFS OF STAFF UNDER SECRETARIES

More information

DEPARTMENT OF THE NAVY OFFICE OF THE CHIEF OF NAVAL OPERATIONS 2000 NAVY PENTAGON WASHINGTON, DC

DEPARTMENT OF THE NAVY OFFICE OF THE CHIEF OF NAVAL OPERATIONS 2000 NAVY PENTAGON WASHINGTON, DC DEPARTMENT OF THE NAVY OFFICE OF THE CHIEF OF NAVAL OPERATIONS 2000 NAVY PENTAGON WASHINGTON, DC 20350-2000 OPNAVINST 5510.165A DNS OPNAV INSTRUCTION 5510.165A From: Chief of Naval Operations Subj: NAVY

More information

Encl: (1) References (2) Department of the Navy Security Enterprise Governance (3) Senior Director for Security (4) Definitions (5) Responsibilities

Encl: (1) References (2) Department of the Navy Security Enterprise Governance (3) Senior Director for Security (4) Definitions (5) Responsibilities SECNAV INSTRUCTION 5500.36 From: Secretary of the Navy D E PA R T M E N T O F THE N AV Y OF FICE OF THE SECRETARY 1000 N AVY PENTAGON WASHING TON DC 20350-1000 SECNAVINST 5500.36 DUSN (P) Subj: DEPARTMENT

More information

Department of Defense DIRECTIVE

Department of Defense DIRECTIVE Department of Defense DIRECTIVE NUMBER 5210.88 February 11, 2004 USD(I) SUBJECT: Safeguarding Biological Select Agents and Toxins References: (a) Directive-Type Memorandum, "Safeguarding Biological Select

More information

Department of Defense INSTRUCTION. Protection of Mission Critical Functions to Achieve Trusted Systems and Networks (TSN)

Department of Defense INSTRUCTION. Protection of Mission Critical Functions to Achieve Trusted Systems and Networks (TSN) Department of Defense INSTRUCTION NUMBER 5200.44 November 5, 2012 Incorporating Change 2, July 27, 2017 DoD CIO/USD(AT&L) SUBJECT: Protection of Mission Critical Functions to Achieve Trusted Systems and

More information

TECHNIQUES, AND PROCEDURES, AND OF MILITARY RULES OF ENGAGEMENT, FROM RELEASE UNDER FREEDOM OF

TECHNIQUES, AND PROCEDURES, AND OF MILITARY RULES OF ENGAGEMENT, FROM RELEASE UNDER FREEDOM OF 1 9 10 11 1 1 1 1 1 1 1 19 0 1 SEC.. EXEMPTION OF INFORMATION ON MILITARY TACTICS, TECHNIQUES, AND PROCEDURES, AND OF MILITARY RULES OF ENGAGEMENT, FROM RELEASE UNDER FREEDOM OF INFORMATION ACT. (a) EXEMPTION.

More information

REPORT ON COST ESTIMATES FOR SECURITY CLASSIFICATION ACTIVITIES FOR 2005

REPORT ON COST ESTIMATES FOR SECURITY CLASSIFICATION ACTIVITIES FOR 2005 REPORT ON COST ESTIMATES FOR SECURITY CLASSIFICATION ACTIVITIES FOR 2005 BACKGROUND AND METHODOLOGY As part of its responsibilities to oversee agency actions to ensure compliance with Executive Order 12958,

More information

Department of Defense DIRECTIVE

Department of Defense DIRECTIVE Department of Defense DIRECTIVE NUMBER 5210.48 December 24, 1984 USD(P) SUBJECT: DoD Polygraph Program References: (a) DoD Directive 5210.48, "Polygraph Examinations and Examiners," October 6, 1975 (hereby

More information

Department of Defense INSTRUCTION. DoD Unclassified Controlled Nuclear Information (UCNI)

Department of Defense INSTRUCTION. DoD Unclassified Controlled Nuclear Information (UCNI) Department of Defense INSTRUCTION NUMBER 5210.83 July 12, 2012 Incorporating Change 1, Effective February 22, 2018 USD(I) SUBJECT: DoD Unclassified Controlled Nuclear Information (UCNI) References: See

More information

Introduction to Personnel Security

Introduction to Personnel Security Introduction to Personnel Security August 2017 Center for Development of Security Excellence Lesson 1: Personnel Security Policy Lesson Introduction Overview Welcome to the Personnel Security Policy lesson.

More information

Department of Defense INSTRUCTION

Department of Defense INSTRUCTION Department of Defense INSTRUCTION NUMBER 5240.19 January 31, 2014 Incorporating Change 1, August 17, 2017 USD(I) SUBJECT: Counterintelligence Support to the Defense Critical Infrastructure Program (DCIP)

More information

Department of Defense INSTRUCTION

Department of Defense INSTRUCTION Department of Defense INSTRUCTION NUMBER 8320.02 August 5, 2013 DoD CIO SUBJECT: Sharing Data, Information, and Information Technology (IT) Services in the Department of Defense References: See Enclosure

More information

Defense Security Service Academy OCA Desk Reference Guide

Defense Security Service Academy OCA Desk Reference Guide Defense Security Service Academy OCA Desk Reference Guide May 007 Final Page OCA Decision Aid The safety and security of the United States depend upon the protection of sensitive information. Classification

More information

Department of Defense INSTRUCTION

Department of Defense INSTRUCTION Department of Defense INSTRUCTION NUMBER 5230.24 August 23, 2012 Incorporating Change 2, Effective November 1, 2017 USD(AT&L) SUBJECT: Distribution Statements on Technical Documents References: See Enclosure

More information

SECURITY OF CLASSIFIED MATERIALS W130119XQ STUDENT HANDOUT

SECURITY OF CLASSIFIED MATERIALS W130119XQ STUDENT HANDOUT UNITED STATES MARINE CORPS THE BASIC SCHOOL MARINE CORPS TRAINING COMMAND CAMP BARRETT, VIRGINIA 22134-5019 SECURITY OF CLASSIFIED MATERIALS W130119XQ STUDENT HANDOUT Warrant Officer Basic Course Introduction

More information

DOD DIRECTIVE INTELLIGENCE OVERSIGHT

DOD DIRECTIVE INTELLIGENCE OVERSIGHT DOD DIRECTIVE 5148.13 INTELLIGENCE OVERSIGHT Originating Component: Office of the Deputy Chief Management Officer of the Department of Defense Effective: April 26, 2017 Releasability: Cleared for public

More information

Question Answer References Linked Competency

Question Answer References Linked Competency APC Knowledge Check-Up 1. Describe the purpose of the Program (PSP). The purpose of the Program (PSP) is to ensure that giving access to classified information or allowing individuals to perform sensitive

More information

Department of Defense DIRECTIVE. SUBJECT: Release of Official Information in Litigation and Testimony by DoD Personnel as Witnesses

Department of Defense DIRECTIVE. SUBJECT: Release of Official Information in Litigation and Testimony by DoD Personnel as Witnesses Department of Defense DIRECTIVE NUMBER 5405.2 July 23, 1985 Certified Current as of November 21, 2003 SUBJECT: Release of Official Information in Litigation and Testimony by DoD Personnel as Witnesses

More information

Department of Defense DIRECTIVE

Department of Defense DIRECTIVE Department of Defense DIRECTIVE NUMBER 5240.01 August 27, 2007 Incorporating Change 1 and Certified Current Through August 27, 2014 USD(I) SUBJECT: DoD Intelligence Activities References: (a) DoD Directive

More information

Department of Defense DIRECTIVE

Department of Defense DIRECTIVE Department of Defense DIRECTIVE NUMBER 5105.68 May 3, 2002 Certified Current as of November 21, 2003 SUBJECT: Pentagon Force Protection Agency DA&M References: (a) Title 10, United States Code (b) DoD

More information

Department of Defense MANUAL

Department of Defense MANUAL Department of Defense MANUAL NUMBER 3200.14, Volume 2 January 5, 2015 Incorporating Change 1, November 21, 2017 USD(AT&L) SUBJECT: Principles and Operational Parameters of the DoD Scientific and Technical

More information

2011 Annual Refresher Briefing

2011 Annual Refresher Briefing 2011 Annual Refresher Briefing Protecting Our America~Your National Laboratories University of California, Office of the President 1111 Franklin Street Oakland, CA 94607 CONTENTS Introduction... 1 Objective...1

More information

SUMMARY FOR CONFORMING CHANGE #1 TO DoDM , National Industrial Security Program Operating Manual (NISPOM)

SUMMARY FOR CONFORMING CHANGE #1 TO DoDM , National Industrial Security Program Operating Manual (NISPOM) Cover Page annotated as Incorporating Change 1, noting date of the change Table of Contents has been updated throughout document to reflect current page alignment (Page 2-12) References have been updated

More information

Question Distractors References Linked Competency

Question Distractors References Linked Competency APC Example Questions 1. True or False? DoD personnel should immediately report any clandestine relationship that exists or has existed with a foreign entity to their counterintelligence element, supporting

More information

Department of Defense INSTRUCTION

Department of Defense INSTRUCTION Department of Defense INSTRUCTION NUMBER 5240.6 July 16, 1996 SUBJECT: Counterintelligence (CI) Awareness and Briefing Program ASD(C3I) References: (a) DoD Directive 5240.6, subject as above, February

More information

CHAIRMAN OF THE JOINT CHIEFS OF STAFF INSTRUCTION

CHAIRMAN OF THE JOINT CHIEFS OF STAFF INSTRUCTION CHAIRMAN OF THE JOINT CHIEFS OF STAFF INSTRUCTION DOM/SJS CJCSI 5714.01D DISTRIBUTION: A, B, C, S POLICY FOR THE RELEASE OF JOINT INFORMATION References: See Enclosure C 1. Purpose. In accordance with

More information

Export-Controlled Technology at Contractor, University, and Federally Funded Research and Development Center Facilities (D )

Export-Controlled Technology at Contractor, University, and Federally Funded Research and Development Center Facilities (D ) March 25, 2004 Export Controls Export-Controlled Technology at Contractor, University, and Federally Funded Research and Development Center Facilities (D-2004-061) Department of Defense Office of the Inspector

More information

Department of Defense INSTRUCTION. Access to and Dissemination of Restricted Data and Formerly Restricted Data

Department of Defense INSTRUCTION. Access to and Dissemination of Restricted Data and Formerly Restricted Data Department of Defense INSTRUCTION NUMBER 5210.02 June 3, 2011 Incorporating Change 1, October 25, 2017 USD(I) SUBJECT: Access to and Dissemination of Restricted Data and Formerly Restricted Data References:

More information

The DD254 & You (SBIR)

The DD254 & You (SBIR) The DD254 & You Small Business Innovative Research (SBIR) Joyce K. Foca P-8A MMA Security Manager (301) 757-2961 joyce.foca@navy.mil Remember To do great important tasks, Three things are necessary.. 1.

More information

September 02, 2009 Incorporating Change 3, December 1, 2011

September 02, 2009 Incorporating Change 3, December 1, 2011 UNDER SECRETARY OF DEFENSE 5000 DEFENSE PENTAGON WASHINGTON, D.C. 20301-5000 INTELLIGENCE September 02, 2009 Incorporating Change 3, December 1, 2011 MEMORANDUM FOR SECRETARIES OF THE MILITARY DEPARTMENTS

More information

DoD M OPERATING MANUAL. February

DoD M OPERATING MANUAL. February DoD 5220.22-M OPERATING MANUAL February 2006 http://www.ncms-isp.org/nispom_200602_with_isls.pdf NISPOM Hyper-Link and Color-Code Guide All hyper-links that take you to a specific reference have a corresponding

More information

Department of Defense MANUAL

Department of Defense MANUAL Department of Defense MANUAL NUMBER 5200.45 April 2, 2013 Incorporating Change 1, Effective April 6, 2018 USD(I) SUBJECT: Instructions for Developing Security Classification Guides References: See Enclosure

More information

Department of Defense DIRECTIVE

Department of Defense DIRECTIVE Department of Defense DIRECTIVE NUMBER 5105.72 April 26, 2016 DCMO SUBJECT: Defense Technology Security Administration (DTSA) References: See Enclosure 1 1. PURPOSE. This directive reissues DoD Directive

More information

Department of Health and Human Services (HHS) National Security Information Manual, February 1, 2005

Department of Health and Human Services (HHS) National Security Information Manual, February 1, 2005 Description of document: Requested date: Released date: Posted date: Source of document: Department of Health and Human Services (HHS) National Security Information Manual, February 1, 2005 07-June-2011

More information

DoD R, December 1982

DoD R, December 1982 1 2 FOREWORD TABLE OF CONTENTS Page FOREWORD 2 TABLE OF CONTENTS 3 REFERENCES 6 DEFINITIONS 7 CHAPTER 1 - PROCEDURE 1. GENERAL PROVISIONS 13 C1.1. APPLICABILITY AND SCOPE 13 C1.2. SCOPE 13 C1.3. INTERPRETATION

More information

Department of Defense INSTRUCTION

Department of Defense INSTRUCTION Department of Defense INSTRUCTION NUMBER 5230.27 November 18, 2016 Incorporating Change 1, September 15, 2017 USD(AT&L) SUBJECT: Presentation of DoD-Related Scientific and Technical Papers at Meetings

More information