Social Sciences > EXAM > SAPPC Certification Study Guide Graded A+ (All)

SAPPC Certification Study Guide Graded A+

Document Content and Description Below

Sharing and reporting information is essential to detecting potential insider threats. True or False? - ANSWER True Two security professionals - Paul and Ashley - are discussing security program ar... eas. Paul says that Information Security practitioners train and/or advise Original Classification Authorities in the application of the process for making classification determinations. Ashley says that Physical Security practitioners work with a facility's Antiterrorism Officer to deploy defensive measures designed to reduce the facility's vulnerability from terrorist attacks. - ANSWER Paul and Ashley are both correct Two security professionals - Paul and Ashley - are discussing security program areas. Paul says that Information Security practitioners work with a facility's Antiterrorism Officer to deploy defensive measures designed to reduce the facility's vulnerability from terrorist attacks. Ashley says that Personnel Security practitioners train and/or advise Original Classification Authorities in the application of the process for making classification determinations. - ANSWER Paul and Ashley are both incorrect SPeD is an abbreviation for? - ANSWER Security Professional Education Development SPed is a certification program of what agency? - ANSWER Department of Defense Security Fundamentals Professional Certification (SFPC) definition? - ANSWER The individual understands foundational security concepts, principles, and practices. (Core Certification for SPed). Security Asset Protection Professional Certification (SAPPC) definition? - ANSWER The Individual applies foundational security concepts, principles, and practices. (Core Certification for SPed). Security Program Integration Professional Certification (SPIPC) definition? - ANSWER The individual understands and applies risk assessment and security program management based on security concepts, principles, and practices. (Core Certification for SPed). Security Enterprise Professional Certification (SEPC) definition? - ANSWER The individual understands and applies concepts, principles, and practices for managing enterprise-wide security. What are the three principle incident/events required to be reported to DoD Counterintelligence (CI) organizations? - ANSWER Espionage, Sabotage, Terrorism & Cyber Policy PMO is an abbreviation for? - ANSWER Program Management Office Provides the legal requirements to use lawful means to ensure U. S. receives the best intelligence available? - ANSWER E.O. 12333 The manual that includes CI-related requirements for Industry? - ANSWER DoD 5220.22-M (NISPOM) Regulation mandating CI-specific training, briefing, and reporting? - ANSWER DoDI5240.6: CI Awareness, Briefing, and Reporting Programs Regulation providing procedures to follow when classified information is compromised? - ANSWER DoD 5200.1-R: information Security Program What are three principle incidents/events required to report to DoD counterintelligence (CI) organizations? - ANSWER Espionage, Sabotage, Terrorism & Cyber Policy List three different types of threats to classified information? - ANSWER Insider Threat, Foreign Intelligence Entities (FIE), Cybersecurity Threat List three indicators of insider threats? - ANSWER Failure to report overseas travel or contact with foreign nationals. Seeking to gain higher clearance or expand access outside the job scope. Engaging in classified conversations without a need to know. Working hours inconsistent with job assignment or insistence on working in private. Exploitable behavior traits. Repeated security violations. Attempting to enter areas not granted access to. List three elements that should be considered in identifying Critical Program Information? - ANSWER - Cause significant degradation in mission effectiveness - Shorten the expected combat-effective life of the system - Reduce technological advantage - Significantly alter program direction - Enable an adversary to defeat, counter, copy, or reverse-engineer the technology or capability. Briefly describe the concept of insider threat? - ANSWER An employee who may represent a threat to national security. These threats encompass potential espionage, violent acts against the Government or the nation, and unauthorized disclosure of classified information, including the vast amounts of classified data available on interconnected United States Government computer networks and systems. List three elements that a security professional should consider when assessing and managing risks to DoD assets? - ANSWER Asset Threat Vulnerability Risk Countermeasures Describe the purpose of the Foreign Visitor Program? - ANSWER To track and approve access by a foreign entity to information that is classified; and to approve access by a foreign entity to information that is unclassified, related to a U.S. Government contract, or plant visits covered by ITAR. Briefly define a Special Access Program (SAP)? - ANSWER A program established for a specific class of classified information that imposes safeguarding and access requirements that exceed those normally required for information at the same classification level. List three enhanced security requirements for protecting Special Access Program (SAP) Information within Personnel Security? - ANSWER Access Rosters Billet Structures (if required) Indoctrination Agreement Clearance based on an appropriate investigation completed within the last 5 years Individual must materially contribute to the program in addition to having the need to know All individuals with access to SAP are subject to a random counterintelligence-scope polygraph Identify the four Cognizant Security Agencies (CSA)? - ANSWER Department of Defense (DoD) Director of National Intelligence (DNI) Department of Energy (DoE) Nuclear Regulatory Commission (NRC). Describe the CSA's role in the National Industrial Security Program (NISP)? - ANSWER To establish an industrial security program to safeguard classified information under its jurisdiction. List three factors for determining whether U.S. companies are under Foreign Ownership, Control, or Influence (FOCI)? - ANSWER Record of economic and government espionage against the U.S. targets Record of enforcement/engagement in unauthorized technology transfer Type and sensitivity of the information that shall be accessed The source, nature and extent of FOCI Record of compliance with pertinent U.S. laws, regulations and contracts Define the purpose and function of the Militarily Critical Technologies List (MCTL)? - ANSWER Serves as a technical reference for the development and implementation of DoD technology, security policies on international transfers of defense-related goods, services, and technologies as administered by the Director, Defense Technology Security Administration (DTSA). Formulation of export control proposals and export license review. List three primary authorities governing foreign disclosure of classified military information? - ANSWER Arms Export Control Act National Security Decision Memorandum 119 National Disclosure Policy-1 International Traffic in Arms Regulation (ITAR) E.O.s 12829, 13526 Bilateral Security Agreements DoD 5220.22-M, "NISPOM," Briefly describe the purpose of the DD Form 254? - ANSWER Convey security requirements and classification guidance, and provide handling procedures for classified material received and/or generated on a classified contract. List the three main policies that govern the DoD Information Security Program? - ANSWER E.O. 13526 Information Security Oversight Office (ISOO) 32 CFR Parts 2001 & 2003 Classified National Security Information; Final Rule" DoD Manual 5200.01, Volumes 1-4 What must an "authorized person" have before being granted access to classified information? - ANSWER Favorable determination of eligibility for access Need to know the information Signed SF 312 Nondisclosure Agreement List three classification duration options for originally classified information? - ANSWER less than 10 years at 10 years up to 25 years 50X1-HUM (with no date or event) 50X2-WMD (with no date or event 25X (with a date or event) List three authorized sources of security classification guidance that could be used in the derivative classification process? - ANSWER Security Classification Guide [Show More]

Last updated: 1 year ago

Preview 1 out of 15 pages

Reviews( 0 )

Recommended For You

 Social Sciences> EXAM > FINRA Website SIE Practice Exam Questions with Answers 100% correct (All)

preview
FINRA Website SIE Practice Exam Questions with Answers 100% correct

Under the Securities act of 1933, registration is required for which of the following securities? A. Eurodollar bonds B. Municipal securities C. American Depositary Receipts (ADRs) D. Securities...

By Nancylect , Uploaded: Aug 28, 2022

$8

 Social Sciences> EXAM > WGU C836 pre assessment questions and answers latest updated 2022 (All)

preview
WGU C836 pre assessment questions and answers latest updated 2022

Port scanner ✔✔Which tool can be used to map devices on a network, along with their operating system types and versions? SQL Injection ✔✔Which web attack is a server-side attack? Availability ✔✔A c...

By Eustace , Uploaded: Sep 03, 2022

$5

 Social Sciences> EXAM > SaFe Agile Advanced Scrum Master Exam Questions and Answers Already Passed (All)

preview
SaFe Agile Advanced Scrum Master Exam Questions and Answers Already Passed

What is one characteristic of an effective Agile Team? ✔✔To provide steady, high quality, incremental value How does a Scrum Master lead a team's efforts in relentless improvement? ✔✔By facilitating...

By Annah , Uploaded: Sep 05, 2022

$6

 Social Sciences> EXAM > WGU C224 Module 7 checkpoint review (All)

preview
WGU C224 Module 7 checkpoint review

A research study attempting to understand attitudes in elementary teachers towards the addition of Pre-K and Pre3-K (for three-year-olds) classes is reflective of __scientific method. ✔✔exploratory...

By Annah , Uploaded: Sep 24, 2022

$3

 Social Sciences> EXAM > ServiceNow Certified System Administrator Practice Questions and Answers Latest 2022 (All)

preview
ServiceNow Certified System Administrator Practice Questions and Answers Latest 2022

Base table for storing SLA records (NOT SLA definitions) is? Options are : task_sla contract_sla sla sla_definition ✔✔task_sla What are possible import sources? (Select a

By Annah , Uploaded: Aug 31, 2022

$14

 Social Sciences> EXAM > SCIN 138 WEEK 6 EXAM LATEST QUESTIONS AND ANSWERS (All)

preview
SCIN 138 WEEK 6 EXAM LATEST QUESTIONS AND ANSWERS

SCIN 138 WEEK 6 EXAM LATEST QUESTIONS AND ANSWERS Part 1 of 3 - 44.0/ 48.0 Points Question 1 of 25 4.0/ 4.0 Points Which of the following is an anthropogenic cause of groundwater pollution?...

By klaus , Uploaded: Jan 01, 2021

$8

 Social Sciences> EXAM > Firefighter 2 Final Exam Prep (Latest 2022/2023) 100% Correct (All)

preview
Firefighter 2 Final Exam Prep (Latest 2022/2023) 100% Correct

Firefighter 2 Final Exam Prep (Latest 2022/2023) 100% Correct

By kofee , Uploaded: Jul 12, 2022

$12

 Social Sciences> EXAM > Fire Fighter 1 State Exam (All)

preview
Fire Fighter 1 State Exam

Fire Fighter 1 State Exam

By kofee , Uploaded: Jul 12, 2022

$14

 Social Sciences> EXAM > Firefighter 1 Final Test (All)

preview
Firefighter 1 Final Test

Firefighter 1 Final Test

By kofee , Uploaded: Jul 12, 2022

$12

 Social Sciences> EXAM > CALIFORNIA NOTARY PUBLIC PRACTICE EXAM QUESTIONS 2022 COMPLETE SOLUTION (All)

preview
CALIFORNIA NOTARY PUBLIC PRACTICE EXAM QUESTIONS 2022 COMPLETE SOLUTION

Every person who makes a false sworn statement to a Notary Public, with knowledge that the statement is false, to induce the Notary Public to perform an improper notarial act on an instrument or docu...

By Annah , Uploaded: Sep 09, 2022

$14

$9.00

Add to cart

Instant download

Can't find what you want? Try our AI powered Search

OR

GET ASSIGNMENT HELP
230
0

Document information


Connected school, study & course



About the document


Uploaded On

Nov 23, 2022

Number of pages

15

Written in

Seller


seller-icon
MARKALLAN

Member since 1 year

55 Documents Sold


Additional information

This document has been written for:

Uploaded

Nov 23, 2022

Downloads

 0

Views

 230

Document Keyword Tags

THE BEST STUDY GUIDES

Avoid resits and achieve higher grades with the best study guides, textbook notes, and class notes written by your fellow students

custom preview

Avoid examination resits

Your fellow students know the appropriate material to use to deliver high quality content. With this great service and assistance from fellow students, you can become well prepared and avoid having to resits exams.

custom preview

Get the best grades

Your fellow student knows the best materials to research on and use. This guarantee you the best grades in your examination. Your fellow students use high quality materials, textbooks and notes to ensure high quality

custom preview

Earn from your notes

Get paid by selling your notes and study materials to other students. Earn alot of cash and help other students in study by providing them with appropriate and high quality study materials.

WHAT STUDENTS SAY ABOUT US


What is Browsegrades

In Browsegrades, a student can earn by offering help to other student. Students can help other students with materials by upploading their notes and earn money.

We are here to help

We're available through e-mail, Twitter, Facebook, and live chat.
 FAQ
 Questions? Leave a message!

Follow us on
 Twitter
Useful links
  • Courses
  • Categories
  • We accept

    payment cards


    Copyright © Browsegrades · High quality services·