SFPC STUDY Flashcards

1
Q

SOX1-HUM

A
  • Declassification designation. Up to 75 years in protection of a human intel source
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

50X2-WMD

A
  • Declassification designation. Up to 75 years in protection of WMD.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

PIE-FAO

A
  • Protection, information, equipment, facilities, activities, and operations.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Criticality Determination - Is 2 things:

A

1) an asset’s importance to national security, and

2) the effect of its partial or complete loss.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Point Security.

A
  • Protecting a specific asset or resource
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Secure Room -

A

An unreinforced area designated (and authorized) for the open storage of classified
information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Vault -

A

A reinforced area designated (and authorized) for the open storage of classified information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

SCIF -

A

An intelligence community area used for SCI storage.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Terrorist Threat Levels -

A

What is provided to senior leaders in order to assist in determining the
appropriate FPCON level.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Force Protection Conditions (FPCON5) -

A

The DoD-approved system that standardizes the Department’s

sentifcation and recommended preventive actions and responses to terrorist threats to US. assets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

force Protection -

A

The actions taken to prevent or mitigate hostile actions against DoD personnel,
Including family members, resources, facilities, and critical information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Principle incident-

A

events required to be reported to DoD counterintelligence (CI) organizations
espionage, sabotage, terrorism, cyber

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Indicators of insider threats

A
  1. Failure to report overseas travel or contact with foreign nationals
  2. Seeking to gain higher clearance or expand access outside the job scope
  3. Engaging in classified conversations without a need to know
  4. Working hours inconsistent with job assignment or insistence on working in private
  5. Exploltable behavior traits
  6. Repeated security violations
  7. Attempting to enter areas not granted access to
  8. Unexplainable affluence/living above one’s means
  9. Anomalies (adversary taking actions which indicate they are knowledgeable to information)
    10, Illegal downloads of information/files
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Elements that should be considered in identifying Critical Program Information - Elements which if compromised could:

A
  1. cause significant degradation in mission effectiveness,
  2. shorten the expected combat-effective life of the system
  3. reduce technological advantage
  4. significantly alter program direction; or
  5. enable an adversary to defeat, counter, copy, or reverse engineer the technology or capability.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Asset, threat, vulnerability, risk, countermeasures -

A

Elements that a security professional should

consider when assessing and managing risks to DoD assets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

The three categories of Special Access Programs -

A

acquisition, inteligence, and operations and support

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Three different types of threats to classified information

A
  • Insider Threat, Foreign Inteligence Entities (FIE) and Cybersecurity Threat
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

The concept of an insider threat.

A

An emplove who may represent a threat to national security These Threats encompass potential espionage, Violent acts against the government or the nation and unauthorized disclosure of classified information, including the vast amounts of classified data available On interconnected United states Government computer networks and systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

The purpose of the Foreign Visitor Program -

A

To track and approve access by a foreien entity to information that is classified; and to approve access by a foreign entity to information that is unclassified, related to a U.S. Government contract, or plant visits covered by ITAR

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

special Acces Program -

A
A program established for a specific class of classified information that imposes
Safeguarding and access requirements that exceed those normally required for information at the same classification level.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Enhanced security requirements for protecting Special Access Program (SAP) information - Within Personnel Security:

A

Access Rosters;
• Billet Structures (if required);
• Indoctrination Agreement;
• Clearance based on an appropriate investigation completed within the last 5 years:
• Individual must materially contribute to the program in addition to having the need to know:
• All individuals with access to SAP are subject to a random counterintelligence scope polygraph examination;
• Polygraph examination, if approved by the Deputy Secretary of Defense, may be used as a mandatory access determination;
• Tier review process;
• Personnel must have a Secret or Top-Secret clearance;
• SF-86 must be current within one year;
• Limited Access;
• Waivers required for foreign cohabitants, spouses, and immediate family members.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Within Industrial Security:

A

The SecDef or DepSecDef can approve a carve-out provision to relieve Defense Security Service of industrial security oversight responsibilities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Within Physical Security:

A
  • Access Control;
  • Maintain a SAP Facility;
  • Access Roster;
  • All SAPs must have an unclassified nickname/ Codeword (optional).
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Within Information Security:

A
  • The use of HVSACO:

* Transmission requirements (order of precedence).

25
Q

responsibilities of the Government SAP Security Officer/Contractor Program Security Officer (GSSO/CPSO) - From Revision 1 Department of Defense Overprint to the National industrial Security Program Operating Manual Supplement - 1 April 2004:

A

• Possess a personnel clearance and Program access at least equal to the highest level of Program classified information involved.
• Provide security administration and management for his/her organization.
Ensure personnel processed for access to a SAP meet the prerequisite personnel clearance and or investigative requirements specified.
• Ensure adequate secure storage and work spaces.
• Ensure strict adherence to the provisions of the NISPOM, its supplement, and the Overprint.
• When required, establish and oversee a classified material control program for each SAP.
• When required, conduct an annual inventory of accountable classified material.
• When required, establish a SAPF.
• Establish and oversee a visitor control program
• Monitor reproduction and/or duplication and destruction capability of SAP information
• Ensure adherence to special communications capabilities within the SAPF.
• Provide for initial Program indoctrination of employees after their access is approved; rebrief and debrief personnel as required.
• Establish and oversee specialized procedures for the transmission of SAP material to and from Program elements
• When required, ensure contractual specific security requirements such as TEMPEST Automated Information System (AIS), and Operations Security (OPSEC) are accomplished.
• Establish security training and briefings specifically tailored to the unique requirements of the SAP.

26
Q

The four Cognizant Security Agencies (CSAs)

A

Department of Defense (DoD), Director of National Intelligence (DNI), Department of Energy (DoE), and the Nuclear Regulatory Commission (NRC).

27
Q

Cognizant Security Agencies (CA)s’ role in the National Industrial Security Program (NISP). -

A

Establish an industrial security program to safeguard classified information under its jurisdiction.

28
Q

Critical Program Information in DoD-

A
  1. U.S. capability elements that contribute to the warfighter’s advantage throughout the life cycle, which if compromised or subject to unauthorized disclosure, decrease the advantage.
  2. Elements or components of a Research, Development, and Acquisition (RDA) program that, if compromised, could cause significant degradation in mission effectiveness; shorten the expected combat-effective life of the system; reduce technological advantage; significantly alter program
    direction; or enable an adversary to defeat, counter, copy, or reverse engineer the technology or capability. Includes information about applications, capabilities, processes and end-items. Includes
    elements or components critical to a military system or network mission effectiveness. Includes technology that would reduce the U.S. technological advantage if it came under foreign control.
29
Q

Primary authorities governing foreign disclosure of classified military information -

A
  1. Arms Export Control Act
  2. National Security Decision Memorandum 119
  3. National Disclosure Policy-1
  4. International Traffic in Arms Regulation (ITAR)
  5. E.O.s 12829, 13526
  6. Bilateral Security Agreements
  7. DoD 5220.22-M. “NISPOM.”
30
Q

The purpose of the DD Form 254 -

A

Convey security requirements, classification guidance and provide
handling procedures for classified material received and/or generated on a classified contract.

31
Q

Factors for determining whether U.S. companies are under Foreign Ownership, Control or Influence (FOCI) -

A
  1. Record of economic and government espionage against the U.S. targets
  2. Record of enforcement/engagement in unauthorized technology transfer
  3. Type and sensitivity of the information that shall be accessed
  4. The source, nature and extent of FOCI
  5. Record of compliance with pertinent U.S. laws, regulations and contracts
  6. Nature of bilateral & multilateral security & information exchange
    agreements
  7. Ownership or control, in whole or part, by a foreign government
32
Q

The purpose and the function of the Militarily Critical Technologies List (MCTL).

A
  1. Serves as a technical reference for the development and implementation of DoD technology, security policies on international transfers of defense-related goods, services, and technologies as administered by the Director, Defense Technology Security Administration (DTSA).
  2. Formulation of export control proposals and export license review
33
Q

Security Infraction -

A

This event cannot reasonably be expected to and does not result in the loss. compromise, or suspected compromise of classified information

34
Q

DOD Manual 5200.01, Volumes 1-4 -

A

The manual that governs the DoD Information Security Program

35
Q

E.O. 13526 -

A

The executive order that governs the DoD Information Security Program

36
Q

32 CFR Parts 2001 & 2003, “Classified National Security Information; Final Rule” -

A

The Information Security Oversight Office (IS00) document that governs the DoD Information Security Program

37
Q

Security Violation

A

An event that results in or could be expected to result in the loss or compromise of
classified information

38
Q

Unauthorized Disclosure

A
  • Communication or physical transfer of classified or controlled unclassified
    information to an unauthorized recipient
39
Q

The purpose of intrusion detection systems

A

To detect unauthorized penetration into a secured area

40
Q

The purpose of perimeter barriers -

A

To define the physical limits of an installation, activity, or area,
restrict, channel, impede access, or shield activities within the installation from immediate and direct observation

41
Q

The purpose of an Antiterrorism Program -

A

Protect DoD personnel, their families, installations, facilities, information, and other material resources from terrorist acts

42
Q

Force Protection Condition levels -

A

Normal, Alpha, Bravo, Charlie, Delta

43
Q

The concept of security in-depth -

A

Layered and complementary security controls sufficient to deter, detect, and document unauthorized entry and movement within an installation or facility.

44
Q

What SAPs aim to achieve -

A
  1. Protect technological breakthroughs
  2. Cover exploitation of adversary vulnerabilities
  3. Protect sensitive operational plans
  4. Reduce intelligence on U.S. capabilities
45
Q

Protection Level

A

This communicates how the SAP is acknowledged and protected

46
Q

Acknowledged -

A

This protection level describes a SAP whose existence may be openly recognized. Its
purpose may be identified. However, the details of the program (including its technologies, materials, and techniques) are classified as dictated by their vulnerability to exploitation and the risk of compromise. The funding is generally unclassified.

47
Q

Unacknowledged -

A

This protection level describes a SAP whose existence and purpose are protected.
The details, technologies, materials, and techniques are classified as dictated by their vulnerability to exploitation and the risk of compromise. The program funding is often classified, unacknowledged, or not directly linked to the program.

48
Q

SAP Lifecycle

A
  1. Establishment (is extra protection warranted?)
  2. Management and Administration (continued need? processed followed?)
  3. Apportionment (proper measures in place? approval received)
  4. Disestablishment (program no longer needed?)
49
Q

Component-level SAP Central Offices -

A

Exist for each military component, the Joint Chiefs of Staff, Defense Advanced Research Projects Agency (DARPA), and Missile Defense Agency (MDA)

50
Q

Special Access Program Oversight Committee (SAPOC) -

A

The final SAP approving body chaired by the Deputy Secretary of Defense

51
Q

Senior Review Group (SRG)

A
  • This group ensures there are no duplicative efforts across SAPs
52
Q

DoD Special Access Central Office (SAPCO)

A
  • DoD SAP legislative liaison that notifies Congress of SAP approval
53
Q

Authorization, Appropriations, and Intelligence Congressional -

A

Congressional committees granted SAP access

54
Q

OSD-level SAP Central Offices

A
  • Exercise oversight authority for the specific SAP category under their purview.
55
Q

PIE-FAO -

A

Protection, information, equipment, facilities, activities, and operations

56
Q

Antiterrorism Officer

A
  • This person is responsible for the installation’s antiterrorism program
57
Q

CI Support

A
  • Responsible for providing valuable information on the capabilities, intentions, and threats of adversaries
58
Q

OPSEC Officer -

A

This person analyzes threats to assets and their vulnerabilities