Education > EXAM > SPēD SAPPC: General Security questions with complete solutions (All)

SPēD SAPPC: General Security questions with complete solutions

Document Content and Description Below

Special Access Program (SAP) Correct Answer: A program established for a specific class of classified information that imposes safeguarding and access requirements that exceed those normally required... for information at the same classification level Enhanced security requirements for protecting Special Access Program (SAP) information Correct Answer: 1. Within Personnel Security: • Access Rosters; • Billet Structures (if required); • Indoctrination Agreement; • Clearance based on an appropriate investigation completed within the last 5 years; • Individual must materially contribute to the program in addition to having the need to know; • All individuals with access to SAP are subject to a random counterintelligence scope polygraph examination; • Polygraph examination, if approved by the DepSecDef, may be used as a mandatory access determination; • Tier review process; • Personnel must have a Secret or Top Secret clearance; • SF-86 must be current within one year; • Limited Access; • Waivers required for foreign cohabitants, spouses, and immediate family members. 2. Within Industrial Security: The SecDef or DepSecDef can approve a carve-out provision to relieve Defense Security Service of industrial security oversight responsibilities. 3. Within Physical Security: • Access Control; • Maintain a SAP Facility; • Access Roster; • All SAPs must have an unclassified nickname/ Codeword (optional). 4. Within Information Security: • The use of HVSACO; • Transmission requirements (order of precedence). Principle incident/events required to be reported to DoD counterintelligence (CI) organizations Correct Answer: espionage, sabotage, terrorism, cyber Indicators of insider threats Correct Answer: 1. Failure to report overseas travel or contact with foreign nationals 2. Seeking to gain higher clearance or expand access outside the job scope 3. Engaging in classified conversations without a need to know 4. Working hours inconsistent with job assignment or insistence on working in private 5. Exploitable behavior traits 6. Repeated security violations 7. Attempting to enter areas not granted access to 8. Unexplained affluence/living abov [Show More]

Last updated: 1 year ago

Preview 1 out of 8 pages

Add to cart

Instant download

We Accept:

We Accept
document-preview

Buy this document to get the full access instantly

Instant Download Access after purchase

Add to cart

Instant download

We Accept:

We Accept

Reviews( 0 )

$7.00

Add to cart

We Accept:

We Accept

Instant download

Can't find what you want? Try our AI powered Search

OR

REQUEST DOCUMENT
86
0

Document information


Connected school, study & course


About the document


Uploaded On

Nov 21, 2022

Number of pages

8

Written in

Seller


seller-icon
Tiara

Member since 1 year

18 Documents Sold


Additional information

This document has been written for:

Uploaded

Nov 21, 2022

Downloads

 0

Views

 86

Document Keyword Tags

Recommended For You

Get more on EXAM »
What is Browsegrades

In Browsegrades, a student can earn by offering help to other student. Students can help other students with materials by upploading their notes and earn money.

We are here to help

We're available through e-mail, Twitter, Facebook, and live chat.
 FAQ
 Questions? Leave a message!

Follow us on
 Twitter

Copyright © Browsegrades · High quality services·