All Areas I Flashcards

1
Q

Indicators of insider threats

A
  1. Failure to report overseas travel or contact with foreign nationals
  2. Seeking to gain higher clearance or expand access outside the job scope
  3. Engaging in classified conversations without a need to know
  4. Working hours inconsistent with job assignm
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Elements that
should be considered in
identifying Critical Program
Information

A

Elements which if compromised could:

  1. cause significant degradation in mission effectiveness,
  2. shorten the expected combat-effective life of the system
  3. reduce technological advantage
  4. significantly alter program direction; or
  5. enable an adversa
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

asset, threat, vulnerability, risk, countermeasures

A

Elements that a
security professional should
consider when assessing and
managing risks to DoD assets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

The three categories of

Special Access Programs

A

acquisition, intelligence, and operations and support

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Three different types
of threats to classified
information

A

Insider Threat, Foreign Intelligence Entities (FIE) and Cybersecurity Threat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

The concept of an insider threat

A

An employee who may represent a threat to
national security. These threats encompass potential espionage, violent acts against the Government or the nation, and unauthorized disclosure of classified information, including the vast amounts of classified da

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

The purpose of the

Foreign Visitor Program

A

To track and approve access by a foreign entity to information that is classified; and to approve access by a foreign entity to information that is unclassified, related to a U.S. Government contract, or plant visits covered by ITAR.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Special Access

Program

A
A program established for a specific class of
classified information that imposes safeguarding and access requirements that exceed those normally required for information at the same classification level.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Enhanced security requirements for protecting Special Access Program (SAP) information

A

Within Personnel Security:
� Access Rosters;
� Billet Structures (if required);
� Indoctrination Agreement;
� Clearance based on an appropriate investigation completed within the last 5
years;
� Individual must materially contribute to the program in addi

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Responsibilities of the Government SAP Security Officer/Contractor Program
Security Officer (GSSO/
CPSO)

A

From Revision 1 Department of Defense Overprint to the National
Industrial Security Program Operating Manual Supplement - 1 April
2004:
� Possess a personnel clearance and Program access at least equal to
the highest level of Program classified information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q
The four Cognizant
Security Agencies (CSAs)
A

Department of Defense

DoD), Director of National Intelligence (DNI), Department of Energy (DoE), and the Nuclear Regulatory Commission (NRC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Cognizant Security Agencies (CSA)s’ role in the National Industrial Security Program (NISP).

A

Establish an industrial security program to safeguard classified information under its
jurisdiction.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Critical Program Information

in DoD

A
  1. U.S. capability elements that contribute to the warfighter’s advantage throughout the
    life cycle, which if compromised or subject
    to unauthorized disclosure, decrease the advantage.
  2. Elements or components of a Research, Development, and Acquisition
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Primary authorities governing foreign disclosure of classified military information

A
  1. Arms Export Control Act
  2. National Security Decision Memorandum 119
  3. National Disclosure Policy-1
  4. International Traffic in Arms Regulation (ITAR)
  5. E.O.s 12829, 13526
  6. Bilateral Security Agreements
  7. DoD 5220.22-M, “NISPOM,
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

The purpose of the DD Form 254

A

Convey security requirements, classification guidance and provide handling procedures for classified material received and/or generated on a classified contract.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Factors for determining
whether U.S. companies are under Foreign Ownership, Control or Influence
(FOCI)

A
1. Record of economic and government
espionage against the U.S. targets
2. Record of enforcement/engagement
in unauthorized technology transfer
3. Type and sensitivity of the information that shall be accessed
4. The source, nature and extent of FOCI
5. R
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

The purpose and the function of the Militarily Critical Technologies List (MCTL).

A
  1. Serves as a technical reference for the development and implementation of DoD technology, security policies on international transfers of
    defense-related goods, services, and technologies as administered by the Director, Defense Technology Security
    Adm
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Security Infraction

A

This event cannot reasonably be expected to and does not result in the loss, compromise, or suspected compromise of classified information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

DoD Manual 5200.01, Volumes 1-4

A

The manual that governs the DoD Information Security Program

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

E.O. 13526

A

The executive order that governs the DoD Information Security Program

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

32 CFR Parts 2001 & 2003,
“Classified National Security
Information; Final Rule

A

The Information Security Oversight Office (ISOO) document that governs the DoD Information Security Program

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Security Violation

A

An event that results in or could be expected to result in the loss or compromise of
classified information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Unauthorized Disclosure

A

Communication or physical

transfer of classified or controlled unclassified information to an unauthorized recipien

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

SSBI

A
Initial investigation for military, contractors, and civilians:
� Special-Sensitive positions
� Critical-Sensitive positions1
� LAA
� Top Secret clearance eligibility
� IT-I duties
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

ANACI

A

Initial investigation for civilians:
� Noncritical-Sensitive positions2
� Confidential and Secret clearance eligibility
� IT-II duties

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

NACLC

A

Initial National Agency Check with Law and Credit for military and contractors:
� Secret or Confidential clearance eligibility
� All military accessions and appointments
� IT-II duties
� IT-III duties (military only)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

NACI

A

National Agency Check with Inquiries for civilians and contractors:
� Non-Sensitive positions
� Low Risk
� HSPD-12 Credentialing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

NAC

A

The fingerprint check portion of a PSI

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

The purpose of due process in

Personnel Security Program (PSP)

A

Ensures fairness by providing the
subject the opportunity to appeal an
unfavorable adjudicative determination

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

The key procedures for initiating

Personnel Security Investigations (PSIs)

A
  1. Validate the need for an investigation
  2. Initiate e-QIP
  3. Review Personnel Security Questionnaire (PSQ) for completeness
  4. Submit electronically to OPM
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

DoD position sensitivity types

and their investigative requirements.

A
  1. Critical Sensitive
  2. Non-Critical Sensitive
  3. Non-Sensitive
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Investigative requirement for a Critical- Sensitive position

A

SSBI, SSBI-PR, or PPR

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

Investigative requirement for a Non-Critical Sensitive position

A

ANACI or NACLC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

Investigative requirement for a Non-Sensitive position

A

NACI

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

The term when current security clearance eligibility determination is rescinded

A

Revocation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

The term when an initial request for security clearance eligibility is not granted

A

Denial

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

SOR

A

Statement of Reasons

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

What is the purpose of the Statement of Reasons (SOR)?

A
The purpose of the SOR is to provide
a comprehensive and detailed written
explanation of why a preliminary
unfavorable adjudicative determination
was made.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

The 13 Adjudicative Guidelines

A
  1. Allegiance to the United States
  2. Foreign Influence
  3. Foreign Preference
  4. Sexual Behavior
  5. Personal Conduct
  6. Financial Considerations
  7. Alcohol Consumption
  8. Drug Involvement
  9. Psychological Conditions
  10. Criminal Conduct
  11. Handling Prote
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

Three different types of approved classified

material storage areas.

A
  1. GSA-approved storage containers
  2. Vaults (including modular vaults)
  3. Open storage area (secure rooms, to include SCIFs and bulk storage areas)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

Construction requirements for vault doors

A
  1. Constructed of metal
  2. Hung on non-removable hinge pins or with
    interlocking leaves.
  3. Equipped with a GSA-approved combination lock.
  4. Emergency egress hardware (deadbolt or metal bar extending across width of door).
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

The purpose of intrusion detection systems

A

To detect unauthorized penetration into a secured area

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

The purpose of perimeter barriers

A

To define the physical limits of an installation, activity, or area, restrict, channel, impede access, or shield activities within the installation from immediate and direct observation

44
Q

The purpose of an Antiterrorism Program

A

Protect DoD personnel, their families, installations, facilities, information, and other material resources from terrorist acts

45
Q

Force Protection Condition levels

A

Normal, Alpha, Bravo, Charlie, Delta

46
Q

The concept of security-in-depth

A

Layered and complementary security controls sufficient to deter, detect, and document unauthorized entry and movement within an installation or facility.

47
Q

e-QIP

A

The system Mr. Smith needs to access when he needs to update his personal information on his Personnel Security Questionnaire for his re-investigation

48
Q

Personnel Security Investigation

A

The first phase of the security clearance process

49
Q

JCAVS

A

A security manager uses this system to communicate with the DoD CAF

50
Q

JAMS

A

This sub-system (used by adjudicators) and JCAVS make up the JPAS system

51
Q

JPAS

A

A DoD system of record for personnel security clearance information

52
Q

Scattered Castles

A

Intelligence Community (IC) Personnel Security Database that verifies personnel security access and visit certifications.

53
Q

Personnel Security Investigation (PSI)

A

The DoD uses this as the standard for the uniform collection of relevant and important background information about an individual.

54
Q

PSIs are used to determine the eligibility of an individual for ___________ to classified information.

A

Access

55
Q

PSIs are used to determine the eligibility of an individual for ___________ or retention to the armed forces.

A

Acceptance

56
Q

PSIs are used to determine the eligibility of an individual for ___________ or retention to sensitive duties.

A

Assignment

57
Q

True or False: The DoD CAF is the only authority who can grant an interim clearance.

A

False

58
Q

DoD CAF responsibilities

A
  1. Making adjudicative decisions
  2. The DoD CAF is a repository for investigative records
  3. Initiating special investigations
  4. The DoD CAF adjudicate by applying the whole person concept
59
Q

Duties that have a great impact on National Security

A

Designation of Sensitive Duties

60
Q

This is used to monitor employees for new information or changes that could affect their status.

A

Continuous Evaluation

61
Q

This is part of the Continuous Evaluation Program (CEP). It is done at certain intervals based on duties or access.

A

Reinvestigation

62
Q

True or False: Special access requirements are designed to provide an additional layer of security to some of our nation’s most valuable assets.

A

True

63
Q

True or False: There is no difference between a threat and a vulnerability.

A

False. Threats and vulnerabilities are related but distinct. Threats to national security exploit vulnerabilities.

64
Q

The Executive Order (E.O.) that establishes a uniform Personnel Security Program

A

E.O. 12968

65
Q

Implements and maintains the DoD personnel security policies and procedures

A

DoD 5200.2-R

66
Q

Defines the Adjudicative Guidelines

A

USD(I) Memorandum, August 30, 2006

67
Q

This is a system of records of fraud investigations

A

DCII

68
Q

This is a system of records of PSIs conducted by OPM

A

SII

69
Q

This refers to when adjudicators must ensure that an investigation meets the minimum timeframe and element requirements before reviewing the investigation.

A

Scope

70
Q

During due process, military and civilian personnel may request an in-person appearance before this individual.

A

Administrative Judge

71
Q

Administers due process for contractor personnel.

A

DOHA

72
Q

This board makes the final appeal determination for all personnel

A

PSAB/Appeal Board

73
Q

This briefing is given when an individual’s employment is terminated, clearance eligibility is withdrawn, or if the individual will be absent from duty for 60 days or more. It is also given to those who have been inadvertently exposed to classified inform

A

Termination Briefing

74
Q

This briefing that applies to cleared personnel who plan to travel in or through foreign countries, or attend meetings attended by representatives of other countries.

A

Foreign Travel Briefing

75
Q

This briefing is presented annually to personnel who have access to classified information or assignment to sensitive duties.

A

Refresher Briefing

76
Q

What SAPs aim to achieve

A
  1. Protect technological breakthroughs
  2. Cover exploitation of adversary vulnerabilities
  3. Protect sensitive operational plans
  4. Reduce intelligence on U.S. capabilities
77
Q

This communicates how the SAP is acknowledged and protected.

A

Protection Level

78
Q

This protection level describes a SAP whose existence may be openly recognized. Its purpose may be identified. However, the details of the program (including its technologies, materials, and techniques) are classified as dictated by their vulnerability to

A

Acknowledged

79
Q

This protection level describes a SAP whose existence and purpose are protected. The details, technologies, materials, and techniques are classified as dictated by their vulnerability to exploitation and the risk of compromise. The program funding is ofte

A

Unacknowledged

80
Q

SAP Lifecycle

A
  1. Establishment (is extra protection warranted?)
  2. Management and Administration (continued need? processed followed?)
  3. Apportionment (proper measures in place? approval received)
  4. Disestablishment (program no longer needed?)
81
Q

Component-level SAP Central Offices

A

Exist for each military component, the Joint Chiefs of Staff, Defense Advanced Research Projects Agency (DARPA), and Missile Defense Agency (MDA)

82
Q

Special Access Program Oversight Committee (SAPOC)

A

The final SAP approving body chaired by the Deputy Secretary of Defense

83
Q

Senior Review Group (SRG)

A

This group ensures there are no duplicative efforts across SAPs

84
Q

DoD SAP legislative liaison that notifies Congress of SAP approval

A

DoD Special Access Central Office (SAPCO)

85
Q

Congressional committees granted SAP access

A

Authorization, Appropriations, and Intelligence Congressional

86
Q

Exercise oversight authority for the specific SAP category under their purview.

A

OSD-level SAP Central Offices

87
Q

PIE-FAO

A

People, information, equipment, facilities, activities, and operations

88
Q

This person is responsible for the installation’s antiterrorism program

A

Antiterrorism Officer

89
Q

Responsible for providing valuable information on the capabilities, intentions, and threats of adversaries

A

CI Support

90
Q

This person analyzes threats to assets and their vulnerabilities

A

OPSEC Officer

91
Q

This person is charged with management, implementation, and direction of all physical security programs

A

Security Officer

92
Q

Must be integrated into our intelligence gathering process so that they can be part of coordinating emergency responses and criminal incidents on a Federal installation

A

Law Enforcement

93
Q

Security is geared towards protecting an entire area of the installation or facility

A

Area Security

94
Q

Determination based on an asset’s importance to national security and effect of loss

A

Criticality

95
Q

The intention and the capability of an adversary to undertake detrimental actions

A

Threat

96
Q

Security focused on the resource itself

A

Point Security

97
Q

Effective Protective Barriers

A
  1. Steel barriers
  2. Chain link fence
  3. Barbed wire
98
Q

Purpose of protective barriers

A
  1. Establishing boundaries
  2. Protecting the facility
  3. Stopping observation
99
Q

The establishment of a restricted area improves security by ______________ and providing additional layers of security.

A

Controlling access

100
Q

True or False: Site lighting is used to enable guard force personnel to observe activities inside or outside the installation

A

True

101
Q

True or False: Standby lighting is used when regular lighting is not available

A

False

102
Q

Using these assists in security; however, there must always be back-up communication systems in addition to these

A

Two-way radio

103
Q

This device sends a signal through wires when it has been triggered

A

Intrusion Detection Systems

104
Q

This system has a camera that captures a visual image, converts the image to a video signal, and transmits the image to a remote location

A

Closed Circuit Televisions (CCTV)

105
Q

This system allows one to be identified by their eye, handprint, or fingerprint

A

Automated access control systems