Government > QUESTIONS & ANSWERS > SPēD SAPPC: INDUSEC Questions and Answers Already Passed (All)

SPēD SAPPC: INDUSEC Questions and Answers Already Passed

Document Content and Description Below

SPēD SAPPC: INDUSEC Questions and Answers Already Passed Scenario: When designing a new multi-story government Special Access Program Facility (SAPF), the architect provided identical drawings for... two three-story buildings to the security officer. One drawing is for a building on the installation to be occupied only by contracting Company X. The other is for the command headquarters building on the installation. The design reveals floor-to-ceiling windows on the second floor for the main conference rooms and front office staff. The drawings indicate a parking lot adjacent to the building separated by a four-footwide, handicap-accessible sidewalk. The architect placed emergency exits and stairwells at each end of the building with door hardware on the exterior to facilitate access/egress. The floor plans show interior office and conference room doors with GSA-approved locks and connectivity to the building access control badge system. The front door drawings indicate a large safety glass key lock entry door with the unit logo and designation etched in the glass. The single entry door provides access into the building lobby where visit control staff will greet people and in-process visitors. The plans identify lock boxes to be placed inside the lobby for visitors and employees to store their electronic digital devices and other prohibited items. The architect designed an open lobby leading to interior hallways, an elevator and access to the stairways. He placed the access control system central processing unit (CPU) behind the visit control desk. Typically, the CPU is located in the dispatch center. The contracting company will be considered a tenant aboard the installation. Which of the following entities may assume security oversight? A. Defense Security Service (DSS) B. The host command C. Either DSS or the host command D. DSS and the host command may share the oversight responsibilities ✔✔C. Either DSS or the host command True or False. Contractors visiting the facility do not require check-in at the front desk if they have a Common Access Card (CAC) because other control measures will be in place throughout the facility. ✔✔False Overall Responsibility for the security of the installation, law enforcement, traffic regulations, physical security, info security, personnel security, and info systems security ✔✔Installation Commander Administration and day to day operations of the security program at a cleared contractor 1) ensuring compliance with the NISP, 2) Following NISPOM guidelines, 3) Additional FSO activities ✔✔Purpose of the NISP Assigned to a specific contract and is the person who oversees the process, making sure that all of the necessary requirements are being met by the contracting officer ✔✔Contracting Officer Representative (COR) A subject matter expert, who could potentially have a day to day contract with a contractor, knowledge necessary to interact with the contractor concerning the service to be provided to the government ✔✔Contracting Officer Technical Representative (COTR) Employee of cognizant security officer, usually the DSS. The IS Rep is a cleared contractors primary point of contact within the government for security matters. ✔✔Industrial Security Representative The government organization that provides advice, assistance and oversight ✔✔Cognizant Security Offices (CSO) DoD contract security classification specification is designed to provide a contractor with the security requirements and classification guidance needed to perform on a classified contract - specific clearance and access requirements, - authorization to generate classified info, - classified storage at contractor facility ✔✔DD Form 254 DoD has delegated security oversight to DSS as the cognizant security office for most classified contracts. Provides advice and assistance and verifies contractor compliance with NISP requirements. ✔✔Defense Security Service (DSS) From Revision 1 Department of Defense Overprint to the National Industrial Security Program Operating Manual Supplement - 1 April 2004: • Possess a personnel clearance and Program access at least equal to the highest level of Program classified information involved. • Provide security administration and management for his/her organization. • Ensure personnel processed for access to a SAP meet the prerequisite personnel clearance and/or investigative requirements specified. • Ensure adequate secure storage and work spaces. • Ensure strict adherence to the provisions of the NISPOM, its supplement, and the Overprint. • When required, establish and oversee a classified material control program for each SAP. • When required, conduct an annual inventory of accountable classified material. • When required, establish a SAPF. • Establish and oversee a visitor control program. • Monitor reproduction and/or duplication and destruction capability of SAP information • Ensure adherence to special communications capabilities within the SAPF. • Provide for initial Program indoctrination of employees after their access is approved; rebrief and debrief personnel as required. • Establish and oversee specialized procedures for the transmission of SAP material to and from Program elements • When required, ensure contractual specific security requirements such as TEMPEST Automated Information System (AIS), and Operations Security (OPSEC) are accomplished. • Establish security training and briefings specifically tailored to the unique requirements of the SAP. ✔✔Responsibilities of the Government SAP Security Officer/Contractor Program Security Officer (GSSO/CPSO) Department of Defense (DoD), Director of National Intelligence (DNI), Department of Energy (DoE), and the Nuclear Regulatory Commission (NRC). ✔✔The four Cognizant Security Agencies (CSAs) Establish an industrial security program to safeguard classified information under its jurisdiction. ✔✔Cognizant Security Agencies (CSA)s' role in the National Industrial Security Program (NISP) 1. U.S. capability elements that contribute to the warfighter's advantage throughout the life cycle, which if compromised or subject to unauthorized disclosure, decrease the advantage. 2. Elements or components of a Research, Development, and Acquisition (RDA) program that, if compromised, could cause significant degradation in mission effectiveness; shorten the expected combat-effective life of the system; reduce technological advantage; significantly alter program direction; or enable an adversary to defeat, counter, copy, or reverse engineer the technology or capability. Includes information about applications, capabilities, processes and end-items. Includes elements or components critical to a military system or network mission effectiveness. Includes technology that would reduce the U.S. technological advantage if it came under foreign control. ✔✔Critical Program Information in DoD 1. Arms Export Control Act 2. National Security Decision Memorandum 119 3. National Disclosure Policy-1 4. International Traffic in Arms Regulation (ITAR) 5. E.O.s 12829, 13526 6. Bilateral Security Agreements 7. DoD 5220.22-M, "NISPOM," ✔✔Primary authorities governing foreign disclosure of classified military information Convey security requirements, classification guidance and provide handling procedures for classified material received and/or generated on a classified contract. The contractor could use it to determine if classified storage is required, and at what level. ✔✔The purpose of the DD Form 254 1. Record of economic and government espionage against the U.S. targets 2. Record of enforcement/engagement in unauthorized technology transfer 3. Type and sensitivity of the information that shall be accessed 4. The source, nature and extent of FOCI 5. Record of compliance with pertinent U.S. laws, regulations and contracts 6. Nature of bilateral & multilateral security & information exchange agreements 7. Ownership or control, in whole or part, by a foreign government ✔✔Factors for determining whether U.S. companies are under Foreign Ownership, Control or Influence (FOCI) 1. Serves as a technical reference for the development and implementation of DoD technology, security policies on international transfers of defense-related goods, services, and technologies as administered by the Director, Defense Technology Security Administration (DTSA). 2. Formulation of export control proposals and export license review ✔✔The purpose and the function of the Militarily Critical Technologies List (MCTL) Much of U.S. classified information originates within this environment ✔✔Industrial Security compliance is overseen by this organization if a contractor works at his/her own facility ✔✔Defense Security Service A contractor must adhere to the security rules of the __________ commander when working at a government installation ✔✔Installation The program that covers protection of classified information by government contractors ✔✔NISP 1. Ensure compliance with the NISP 2. Follow NISPOM guidelines 3. Provide training for cleared individuals ✔✔FSO responsibilities If you are a government contractor working on a contractor-owned system at a contractor facility, you must follow the security provisions of this reference ✔✔Chapter 8 of the NISPOM True or False: A SAP can retain security cognizance if necessary. ✔✔True A government employee with the authority to enter into, administer, and/or terminate contracts and make related determinations and findings ✔✔Contracting Officer This government employee is a subject matter expert who has regular contact with the contractor ✔✔COTR The document that outlines in detail what will be required to complete a contract ✔✔Statement of Work (SOW) The document that establishes the government's authority to review the contractor's security program to ensure compliance ✔✔DD Form 441 A cleared individual can only have access at the _______ level as the facility clearance ✔✔Same For the purpose of a visit to another cleared facility, a clearance can be verified by looking in ________ ✔✔JPAS The issuance of ________ is the responsibility of the DoD CAF ✔✔Eligibility [Show More]

Last updated: 2 years ago

Preview 1 out of 10 pages

Buy Now

Instant download

We Accept:

We Accept
document-preview

Buy this document to get the full access instantly

Instant Download Access after purchase

Buy Now

Instant download

We Accept:

We Accept

Also available in bundle (1)

SAPPC BUNDLED EXAMS QUESTIONS AND ANSWERS WITH VERIFED SOLUTIONS

SAPPC BUNDLED EXAMS QUESTIONS AND ANSWERS WITH VERIFED SOLUTIONS

By Nutmegs 2 years ago

$20

8  

Reviews( 0 )

$10.00

Buy Now

We Accept:

We Accept

Instant download

Can't find what you want? Try our AI powered Search

89
0

Document information


Connected school, study & course


About the document


Uploaded On

Feb 22, 2023

Number of pages

10

Written in

Seller


seller-icon
Nutmegs

Member since 4 years

620 Documents Sold

Reviews Received
77
14
8
2
21
Additional information

This document has been written for:

Uploaded

Feb 22, 2023

Downloads

 0

Views

 89

Document Keyword Tags


$10.00
What is Scholarfriends

In Scholarfriends, a student can earn by offering help to other student. Students can help other students with materials by upploading their notes and earn money.

We are here to help

We're available through e-mail, Twitter, Facebook, and live chat.
 FAQ
 Questions? Leave a message!

Follow us on
 Twitter

Copyright © Scholarfriends · High quality services·