Data Systems > QUESTIONS & ANSWERS > SPēD SFPC: All Areas Questions and Answers 100% Pass (All)
SPēD SFPC: All Areas Questions and Answers 100% Pass Principle incident/ events required to be reported to DoD counterintelligence (CI) organizations ✔✔espionage, sabotage, terrorism, cyber ... Indicators of insider threats ✔✔1. Failure to report overseas travel or contact with foreign nationals 2. Seeking to gain higher clearance or expand access outside the job scope 3. Engaging in classified conversations without a need to know 4. Working hours inconsistent with job assignment or insistence on working in private 5. Exploitable behavior traits 6. Repeated security violations 7. Attempting to enter areas not granted access to 8. Unexplainable affluence/living above one's means 9. Anomalies (adversary taking actions which indicate they are knowledgeable to information) 10. Illegal downloads of information/files Elements that should be considered in identifying Critical Program Information ✔✔Elements which if compromised could: 1. cause significant degradation in mission effectiveness, 2. shorten the expected combat-effective life of the system 3. reduce technological advantage 4. significantly alter program direction; or 5. enable an adversary to defeat, counter, copy, or reverseengineer the technology or capability. asset, threat, vulnerability, risk, countermeasures ✔✔Elements that a security professional should consider when assessing and managing risks to DoD assets The three categories of Special Access Programs ✔✔acquisition, intelligence, and operations and support Three different types of threats to classified information ✔✔Insider Threat, Foreign Intelligence Entities (FIE) and Cybersecurity Threat The concept of an insider threat ✔✔An employee who may represent a threat to national security. These threats encompass potential espionage, violent acts against the Government or the nation, and unauthorized disclosure of classified information, including the vast amounts of classified data available on interconnected United States Government computer networks and systems. The purpose of the Foreign Visitor Program ✔✔To track and approve access by a foreign entity to information that is classified; and to approve access by a foreign entity to information that is unclassified, related to a U.S. Government contract, or plant visits covered by ITAR. Special Access Program ✔✔A program established for a specific class of classified information that imposes safeguarding and access requirements that exceed those normally required for information at the same classification level. Enhanced security requirements for protecting Special Access Program (SAP) information ✔✔Within Personnel Security: • Access Rosters; • Billet Structures (if required); • Indoctrination Agreement; • Clearance based on an appropriate investigation completed within the last 5 years; • Individual must materially contribute to the program in addition to having the need to know; • All individuals with access to SAP are subject to a random counterintelligence scope polygraph examination; • Polygraph examination, if approved by the DepSecDef, may be used as a mandatory access determination; • Tier review process; • Personnel must have a Secret or Top Secret clearance; • SF-86 must be current within one year; • Limited Access; • Waivers required for foreign cohabitants, spouse [Show More]
Last updated: 2 years ago
Preview 1 out of 38 pages
Buy this document to get the full access instantly
Instant Download Access after purchase
Buy NowInstant download
We Accept:
SPēD SFPC BUNDLED EXAMS QUESTIONS AND ANSWERS WITH VERIFIED SOLUTIONS
By Nutmegs 2 years ago
$22
13
Can't find what you want? Try our AI powered Search
Connected school, study & course
About the document
Uploaded On
Feb 22, 2023
Number of pages
38
Written in
This document has been written for:
Uploaded
Feb 22, 2023
Downloads
0
Views
104
In Scholarfriends, a student can earn by offering help to other student. Students can help other students with materials by upploading their notes and earn money.
We're available through e-mail, Twitter, Facebook, and live chat.
FAQ
Questions? Leave a message!
Copyright © Scholarfriends · High quality services·