Frage 1
Frage
Jackson Perkins is being considered for promotion to a higher risk position in the federal agency for which he currently works. His suitability investigation reflected two speeding tickets in the past five years on the compound where he currently works but no other traffic violations or criminal activity. Which suitability factor is most applicable to the facts in this scenario?
Antworten
-
Factor 1: Misconduct or Negligence in Employment
-
Factor 2: Criminal or Dishonest Conduct
-
Factor 3: Material, Intentional False Statement or Deception or Fraud in Employment
Frage 2
Frage
Which system captures position information to include position risk and sensitivity?
Antworten
-
Position Designation Automated Tool (PDT)
-
Electronic Questionnaire for Investigations Processing (eQIP) system
-
Defense Civilian Personnel Data System (DCPDS)
Frage 3
Frage
Who primarily conducts suitability adjudications?
Antworten
-
Office of Personnel Management (OPM)
-
Defense Civilian Personnel Advisory Service (DCPAS)
-
Adjudicator from the employing agency, component or DoD CAF
Frage 4
Frage
Which type of investigation is used to reinvestigate employees in non-sensitive, high risk public trust positions?
Frage 5
Frage
Which type of adjudication is required to determine if an individual should be allowed to hold a position of public trust?
Frage 6
Frage
When does OPM or the agency or component notify the subject of his or her appeal rights?
Frage 7
Frage
Larry Lengal is applying for a federal position. Mr Lengal’s investigation revealed that he joined a group called Freedom Youth when he was in college. The group participated in anti-US demonstrations by the White House. Which suitability factor is most applicable to the facts in this scenario?
Antworten
-
Factor 2: Criminal or Dishonest Conduct
-
Factor 7: Knowing and Willful Engagement in Acts/Activities designed to overthrow the US Government by Force
-
Factor 8: Statutory or Regulatory Bar to Employment
Frage 8
Frage
Who is responsible for issuing government-wide debarments?
Frage 9
Frage
What is the course of action if suitability issues are revealed during prescreening?
Antworten
-
The applicant will be debarred
-
The file is referred to the suitability adjudicator
-
An unfavorable suitability determination will be made
Frage 10
Frage
Why is it important that components and agencies report their adjudicative decisions to OPM?
Frage 11
Frage
In which of the following cases would a suitability adjudication NOT be automatically required?
Antworten
-
Janice is being promoted to a new position within the federal government which has a higher level of risk than her previous position.
-
Jeff is applying for a federal position with the Department of Agriculture and has not previously held a federal job.
-
Carla is returning to the federal workforce after she left her federal service position 1 year ago to have her first child.
Frage 12
Frage
To which of the following groups do fitness requirement apply?
Antworten
-
Contractor employees, employees serving in Federal competitive service position or Federal expected service positons that may convert to competitive service positions
-
Contractor employees, and employees serving in Federal excepted service positions that cannot be noncompetitively converted to competitive service positions.
-
Applicants, appointees, and employees serving in Federal competitive services positions or Federal excepted service positions that may convert to competitive service positions.
Frage 13
Frage
Which of the following is used to assess a position levels of risk and sensitivity?
Antworten
-
Position Designation Automated Tool (PDT)
-
Electronic Questionnaires for Investigations processing (eQIP) system
-
Personnel Investigations Processing System (PIPS)
-
Central Verification System (CVS)
Frage 14
Frage
What is a common problem found in personnel security investigation requests?
Antworten
-
Subject provided discrepant information
-
Subject is not a federal employee
-
Subject has worked for several agencies
-
Subject has lived at one location for over 10 years
Frage 15
Frage
The appeals process is centralized for all agencies, so the steps are the same no matter who the employing agency is.
Frage 16
Frage
Review the following case details and determine whether a favorable adjudicative determination should be made.
The investigation into Stacy Brewer reveals that although she has never been implicated in a crime herself, her live-in boyfriend has multiple, drug-related convictions, and several of Ms. Brewer’s friends are in and out of jail on theft and drug charges. She did not disclose that she lived with her boyfriend on her SF-86. When asked about it, she said she intentionally did not list him on her SF-86 as she was afraid her clearance would be denied.
Should Ms. Brewer be granted eligibility?
Frage 17
Frage
The careful evaluation of favorable and unfavorable information from a subject’s past and present must take the __________ into consideration.
Frage 18
Frage
Straightforward cases may be reviewed automatically by an electronic adjudication system.
Frage 19
Frage
To develop and resolve issues flagged in a standard investigation prior to completion of the personnel security investigation, which of the following is used?
Frage 20
Frage
A more comprehensive personnel security investigation may replace a less comprehensive one.
Frage 21
Frage
The subject interview is a standard investigative element of which two PSIs?
Antworten
-
Tier 5 and T5R
-
Tier 3 and Tier 5
-
Tier 3 and T3R
-
T3R and T5R
Frage 22
Frage
Prior and current investigative records (for example, from DoD, OPM, and IC databases) are always checked for Tier 3 and Tier 5 initial reinvestigations.
Frage 23
Frage
The Supreme Court found in Cole v. Young that the regulations of the personnel security program (PSP) apply to all Federal government employees.
Frage 24
Frage
A contractor employee requiring initial secret eligibility and access needs a Tier 3 investigation.
Frage 25
Frage
Information from private individuals and the news media occasionally provides information to be about an individual holding security eligibility that is reviewed under continuous evaluation.
Frage 26
Frage
What is the relationship between vulnerabilities and threats?
Antworten
-
Both are based in honesty
-
There is no relationship between them
-
Vulnerabilities exploit threats
-
Threats exploit vulnerabilities
Frage 27
Frage
Review the following case details and determine whether a favorable adjudicative determination should be made.
The agency IT department discovered that Jerome Wilson accessed a network folder to which he was not authorized to use. Subsequent investigation showed that his supervisor had asked him to store sensitive files in the folder and had told Mr. Wilson his use was approved. When Mr. Wilson learned that his use was in fact unauthorized, he reported the situation to his supervisor and the security office and stated that he would not access the folder again.
Should Mr. Wilson be granted eligibility?
Frage 28
Frage
________ is the program name for the Intelligence Community Security Clearance Repository.
Antworten
-
Central Verification System (CVS)
-
Scattered Castles
-
Security/Suitability Investigations Index (SII)
-
Joint Personnel Adjudication System (JPAS)
Frage 29
Frage
An individual may be disqualified if available information reflects a recent or recurring pattern of questionable judgment, irresponsibility, or emotionally unstable behavior.
Frage 30
Frage
Failure to comply with prescribed treatment is a mitigating condition under the psychological conditions adjudicative guideline.
Frage 31
Frage
Which of the following lays out standards and procedures for SCI access?
Antworten
-
ICD 704
-
E.O. 13567
-
Title 5, Code of Federal Regulation, Part 732
-
Intelligence Reform and Terrorism Prevention Act
Frage 32
Frage
The deliberate falsification of facts on a personnel security questionnaire is a disqualifying condition under which of these adjudicative guidelines?
Frage 33
Frage
The personnel security program is concerned only with the threat posed by foreign intelligence service.
Frage 34
Frage
The federal government is exempt from the Privacy Act of 1974 and as such, can collect personal information without notifying the subject of why said information is being collected.
Frage 35
Frage
An individual seeking secret clearance eligibility failed to report as required the possession of a foreign passport, and has used the foreign passport to enter and exit the United States, the individual may be granted eligibility.
Frage 36
Frage
The highest OPM-defined civilian position sensitivity level is _________.
Antworten
-
Top Secret
-
Critical-Sensitive
-
Special-Sensitive
-
Confidential
Frage 37
Frage
Which of the following was previously a stand-alone investigation but now is a foundational component of other investigations?
Antworten
-
NACLC
-
ANACI
-
SSBI
-
NAC
-
NACI
Frage 38
Frage
When evaluating an individual’s foreign contacts and interests, what should the adjudicator consider about the associated country?
Antworten
-
Does the country have a trade agreement with the US?
-
Is the country associated with a risk of terrorism?
-
Foreign business or financial interests may not benefit the US
-
Is the country an economic competitor with the US?
-
Is the country a member of NATO?
Frage 39
Frage
Tier 5 is the minimum investigation to support initial assignment to non-critical sensitive.
Frage 40
Frage
The deliberate falsification of fact on a personnel security questionnaire is a disqualifying condition under which of these national security adjudicative guidelines?
Frage 41
Frage
Review the following case details and determine whether a favorable adjudicative termination should be made.
Melissa Stewart listed mental health treatment on her SF-86. A qualified and approved mental health care provider advised that her condition is in remission and has a low probability of recurrence.
Should Ms. Stewart be granted eligibility?
Frage 42
Frage
A mitigating condition does which of the following?
Antworten
-
Overcomes a disqualifying condition in every case and permits a favorable determination
-
Lessens the severity or seriousness of a disqualifying condition
-
The adjudicator may consider it to decide a ‘borderline’ case
-
Has almost no effect on the final determination
Frage 43
Frage
An individual with a history of excessive alcohol consumption has applied for clearance eligibility. The behavior occurred long ago, and in the years since, the individual has acknowledged and overcome the problem, and successfully completed treatment, Therefore, the individual may be granted eligibility.
Frage 44
Frage
_____________ establishes a uniform Federal PSP for all employees who hold sensitive positions or who must access classified information.
Frage 45
Frage
The Tier 3 investigation replaced the ANACI, which was the former investigation used to grant initial secret of confidential eligibility for civilians.
Frage 46
Frage
Which of the following is a function of the DoD CAF?
Antworten
-
Making final appointments to civilian sensitive positions after completion of the PSIs.
-
Making final determinations on appeals of denied or revoked security clearances.
-
Determining a subject’s eligibility for military service.
-
Denying or revoking security clearance eligibility for access to classified information and/or assignment to a sensitive position.
Frage 47
Frage
Which of the following statements is true regarding criminal conduct?
Antworten
-
Only felony convictions are disqualifying
-
Criminal conduct may be mitigated if there is evidence of rehabilitation
-
All criminal convictions are viewed equally during an adjudication
Frage 48
Frage
The DoD DOES NOT need a Personnel Security Program because all people are equally trustworthy.
Frage 49
Frage
The subject of an investigation may request a copy of their PSI from which of the following?
Frage 50
Frage
_________________ is the investigative agency authorized to conduct investigations for the DoD PSP.
Antworten
-
Federal Bureau of Investigations
-
Central Intelligence Agency
-
Defense Intelligence Agency
-
National Background Investigations Bureau
Frage 51
Frage
Which of the following would be required for all levels of DoD Interim clearances?
Antworten
-
Favorable review of FBI fingerprint records
-
Favorable review of local records
-
Favorable review of a completed form SF-86
-
All of the above
Frage 52
Frage
All DoD personnel have an obligation to report information that reflects an actual or potential danger to national security.
Frage 53
Frage
Which civilian position sensitivity level has the potential for inestimable damage to the nation security or for inestimable adverse impact to the efficiency of the DoD or the Military Services?
Antworten
-
Non-Sensitive
-
Critical-Sensitive
-
Noncritical-Sensitive
-
Special-Sensitive
Frage 54
Frage
The step in due process for military and civilian personnel are different.
Frage 55
Frage
Review the following case details and determine whteher a favorable adjudicative determination should be made.
Stan Nelson revealed on his SF-86 that he pled guilty to statutory rape when he was 18, for having consensual sexual relations with his 16-year-old girlfriend. Mr. Nelson served a 90-day sentence and successfully completed his probation and required community service; his girlfriend subsequently express remorse that he was charged with a crim. In the 12 years since, Mr. Nelson has not had additional arrests or incidents concerning sexual or criminal behavior.
Should Mr. Nelson be granted eligibility?
Frage 56
Frage
Discovery of adverse information after issuance of security clearance eligibility _________.
Antworten
-
Will be considered at the next periodic reinvestigation
-
Automatically triggers a new investigation
-
May result in access suspension
Frage 57
Frage
What is the purpose of the National Background Investigations Bureau (NBIB) Case Closing Transmittal cover sheer?
Antworten
-
Report an unfavorable adjudicative determination to the subject
-
Recommend an adjudicative determination to the DoD CAF
-
Document complete, incomplete, and pending checks from the investigation
Frage 58
Frage
The briefing given to personnel who have recently been approved for access to classified information or assigned to a position of trust is the:
Antworten
-
Initial Briefing
-
Refresher Briefing
-
Termination Briefing
-
Foreign Travel Briefing
Frage 59
Frage
A subject interview is a standard investigative element for Tier 3 and Tier 5 investigations.
Frage 60
Frage
________________ are weaknesses, characteristics or circumstances that can be exploited by an adversary to gain access to or information from an asset.
Antworten
-
Vulnerabilities
-
Risks
-
Threats
Frage 61
Frage
Although the specific content of a Physical Security Plan may vary between components, installations, units, or activities, the format remains the same.
Frage 62
Frage
Rivers, cliffs, and dense growth are examples of which type of barrier?
Antworten
-
Active barrier
-
Natural barrier
-
Passive barrier
Frage 63
Frage
Physical security planning is deciding which security measures will be used to prevent unauthorized access to DoD assets and to safeguard those assets against threats.
Frage 64
Frage
__________________ are conducted by peers or by senior agency personnel in the chain-of-command.
Antworten
-
Compliance inspections
-
Self-inspections
-
Surveys
-
Staff assist visits
Frage 65
Frage
In a tactical environment, Physical Security Plans should be based on METT-TC, which stands for mission, _______________, terrain and weather, troops, time available, and civilian considerations.
Antworten
-
Exercises
-
Equipment
-
Enemy
Frage 66
Frage
Providing information on the capabilities and intentions of our adversaries is the responsibility of the ____________.
Antworten
-
Physical Security Officer
-
Commander or Director
-
Antiterrorism Officer
-
Operational Security Officer
-
Counterintelligence Support
Frage 67
Frage
Force Protection Conditions (FPCONs) are graduated categories of measures or actions commanders take to protect personnel and assets from attack.
Frage 68
Frage
________________ establish duties, roles and responsibilities at individual assignments, checkpoints, gates and guard posts.
Frage 69
Frage
_________________, the inspector should review any local security directives, the Physical Security Plan, its Standard Operating Procedures, and any previous inspection reports, exceptions, and waivers.
Frage 70
Frage
____________________ use Defense Terrorism Warning Reports to convey _________________.
Antworten
-
The DIA and COCOMs / DoD Terrorist Threat Levels
-
COCOMs and Installation Commanders / Force Protection Conditions
-
The DHS and COCOMs / DoD Terrorist Threat Levels
Frage 71
Frage
A ______________ defines emergency delegations of authority and orders of succession to ensure DoD Component Mission Essential Functions (MEFs) continue under all circumstances.
Antworten
-
Physical Security Plan (PSP)
-
Continuity of Operations Plan (COOP)
-
Memorandum of Agreement (MOA)
Frage 72
Frage
Threat levels assist senior leaders to determine the appropriate ________ level.
Frage 73
Frage
Two antiterrorism tools the DoD uses to safeguard DoD assets are __________________ and _______________.
Antworten
-
Force Protection Conditions (FPCONs) and Terrorist Threat Levels
-
Threat Working Group and Post Orders
-
Countermeasures and Standard Operating Procedures
Frage 74
Frage
__________________ issue Force Protection Conditions (FPCONs).
Frage 75
Frage
It’s better for an inspector not to announce the inspection in order to create a surprise effect and see how everything really operates.
Frage 76
Frage
Which system detects a change in the environment and transmits an alarm?
Antworten
-
CCTV
-
Access Controls System
-
IDS
Frage 77
Frage
___________________ are often overlooked in physical security planning and implementation.
Antworten
-
Lights
-
Barriers
-
Man-passable openings
Frage 78
Frage
Lighting deters unauthorized entry by providing a psychological deterrence to intruders.
Frage 79
Frage
______________________ are formal agreements that provide security assistance between DoD activities and from local law enforcement agencies as well as mutual aid from local fire and medical services.
Antworten
-
Standard Operating Procedures (SOP)
-
Physical Security Plans (PSP)
-
Memorandums of Understanding and Agreement (MOU/MOA)
Frage 80
Frage
When assessing an asset, you must determine the nature and the value of that asset and the degree of impact if the asset is damaged or lost.
Frage 81
Frage
FPCON _________ applies in the immediate area where a terrorist attack has occurred or when intelligence has been received that terrorist action against a specific target is imminent.
Antworten
-
Normal
-
Alpha
-
Bravo
-
Charlie
-
Delta
Frage 82
Frage
There is a one for one correlation between Terrorist Threat Levels and force Protection Conditions.
Frage 83
Frage
The _____________________ develops and refines terrorism threat assessments and coordinates and disseminates threat warnings, reports, and summaries.
Antworten
-
Defense Critical Infrastructure Protection (DCIP) Working Group
-
Antiterrorism Working Group (ATWG)
-
Threat Working Group (TWG)
Frage 84
Frage
Examples of oversight tools include day-to-day observations, surveys, staff assist visits, ______________, and the operational environment.
Antworten
-
Policy manuals
-
Inspections
-
Executive Orders
Frage 85
Frage
_____________________ are based on information about terrorist groups such as their operational capability, intentions, activity, and the operational environment.
Antworten
-
Continuity of Operations Plans (COOPs)
-
Counterterrorism measures
-
DoD Terrorist Threat Levels
-
Force Protection Conditions (FPCONs)
Frage 86
Frage
Although the DoD issues DoD-wide guidance for physical security planning and implementation, you should always consult ______________ for specific guidance.
Frage 87
Frage
As a physical security specialist, you may assume different physical security roles or serve on different working groups, such as the ATWG, TWG, and DCIP.
Frage 88
Frage
_______________ can result from day-to-day observations or more formal oversight.
Antworten
-
Inspection reports
-
Incident reports
-
Surveys
Frage 89
Frage
Antiterrorism physical security measures incorporate detection, deterrence, denial and ____________.
Antworten
-
Documentation
-
Evaluation
-
Determination
-
Notification
Frage 90
Frage
The only factor that should be considered when selecting an Intrusion Detection System is the criticality of the asset.
Frage 91
Frage
What type of access control system uses verification of an acceptable form of identification such as the Common Access Card, or CAC?
Antworten
-
Manual
-
Combination
-
Biometric
-
Physical
-
Mechanical
-
Automated
Frage 92
Frage
Controlled lighting is used when it is necessary to limit the brightness of the light.
Frage 93
Frage
What kind of light should be selected in order to enable the security guards to observe intruders at a considerable distance beyond the perimeter?
Antworten
-
Glare projection
-
Emergency projection
-
Downside illumination
-
Standby illumination
Frage 94
Frage
Response forces ___________________________________ .
Antworten
-
respond to alarms and incidents
-
dispatch response forces and mobile patrols
-
guard a high-priority resource
-
can cover large areas in a timely manner
Frage 95
Frage
The purpose of an intrusion detection system is to deter, detect, and _____________ intrusion.
Antworten
-
Forbid
-
Prevent
-
Document
-
Thwart
Frage 96
Frage
A security system with a camera that captures an image, converts it to a video signal, and transmits it to a monitoring station defines _______________________ .
Frage 97
Frage
The central point for collecting the alarm status from the Premise Control Units (PCU s) handling the alarms under the control of an IDS is the _______________________________ .
Frage 98
Frage
Biometric and non-biometric access control systems are examples of the __________________________ type of access control system.
Antworten
-
Combination
-
Automated
-
Manual
-
Mechanical
-
Physical
Frage 99
Frage
What Security-in-Depth principle is illustrated by a vault with special controls to limit access to only some of the personnel that work within a secure facility?
Antworten
-
control
-
area security
-
enclaving
-
separation
Frage 100
Frage
What type of Intrusion Detection System (IDS) monitoring provides local centralized monitoring?
Frage 101
Frage
A visitor with a record in the Joint Personnel Adjudication System (JPAS) reflecting the appropriate level of access eligibility but who does not have a verified need-to-know for information protected within the controlled area would require ___________________________.
Frage 102
Frage
A closed circuit television (CCTV) is an especially valuable security asset because it can be used effectively without establishing procedures and providing training in its use.
Frage 103
Frage
When is a security force response required?
Antworten
-
When an Intrusion Detection System (IDS) sensor is triggered.
-
When an Intrusion Detection System (IDS) is not reporting an alarm.
-
When an Intrusion Detection System (IDS) protects a highly critical asset.
-
When an Intrusion Detection System (IDS) alarm notification is received.
Frage 104
Frage
Conveyor belt style x-ray machines are classified as what type of screening equipment?
Antworten
-
Pedestrian
-
Fixed
-
Intrusive
-
Portable
Frage 105
Frage
What are the types of screening equipment most frequently used by the Department of Defense (DoD)?
Frage 106
Frage
What Intrusion Detection System (IDS) operational phase is activated when the Premise Control Unit (PCU) receives signals from sensors in a protected area and incorporates these signals into a communications scheme?
Antworten
-
Response/Assessment
-
Detection
-
Dispatch
-
Reporting
Frage 107
Frage
What is the preferred method of Intrusion Detection System (IDS) monitoring?
Frage 108
Frage
What type of access control system is a card swipe, with or without a personal identification number, or PIN?
Antworten
-
Combination
-
Physical
-
Manual
-
Automated
-
Biometric
Frage 109
Frage
What type of lighting is used when additional lighting is necessary and may be activated by alarm or motion detector?
Antworten
-
Standby lighting
-
Surface lighting
-
Emergency lighting
-
Continuous lighting
Frage 110
Frage
What are signs, barriers, and fences used for in perimeter protection systems?
Antworten
-
Deterring unlawful or unauthorized entry
-
Establishing legal boundaries
-
Preventing all types of penetration
-
Integrating protection assets
-
Preventing observation from outside
Frage 111
Frage
Active barrier systems define perimeters and ensure only authorized personnel are permitted access.
Frage 112
Frage
When are static observation posts used?
Antworten
-
When continuous surveillance is required.
-
To cover large areas in a timely manner.
-
To monitor alarms and respond to emergencies.
-
To monitor entry to a facility or secure area.
Frage 113
Frage
The use of _____________________ provides security personnel the ability to visually monitor multiple areas simultaneously.
Frage 114
Frage
What does an Intrusion Detection System (IDS) detect?
Antworten
-
Only unauthorized intrusions
-
A change in the state of an indoor detection device by a change in outdoor environmental devices
-
A change in state of detection devices that may require further investigation
-
Prevention of an unauthorized intrusion
Frage 115
Frage
While both Class V and Class VI GSA-approved containers offer protection against covert and surreptitious entry, only Class V containers offer protection against forced entry.
Frage 116
Frage
What is the purpose of the warning label on GSA-approved containers manufactured beginning April 2007?
Antworten
-
Warns against storing classified information with sensitive materials such as money and weapons
-
Warns against storing unclassified information in the container
-
Warns against unapproved modification of the container
Frage 117
Frage
In AA&E storage facilities, why must drainage structures be secured if they cross the fence line and meet certain size requirements?
Antworten
-
To prevent rats from infesting the facility
-
To prevent anyone from crawling into the area
-
To prevent water from backing up into the facility
Frage 118
Frage
Unauthorized entrance into restricted areas is subject to prosecution.
Frage 119
Frage
Which is NOT approved for the open storage of classified information?
Antworten
-
Storage closet
-
Secure room
-
Vault
Frage 120
Frage
Which DoD-mandated practice reduces protection, storage, and inventory costs?
Antworten
-
Consolidate AA&E storage facilities
-
Categorize and store AA&E by security risk categories
-
Demilitarize/dispose of obsolete and unserviceable AA&E
Frage 121
Frage
You can find construction standards for vaults and secure rooms in DoD facilities by reviewing _________________.
Frage 122
Frage
DoDM 5200.01, Volumes 1-4, Information Security Program
Which of the following statements is true about locks and keys for security containers?
Antworten
-
Keys may be stored in your desk drawer as long as it locks.
-
Key-operated locks may not be used on storage containers securing classified material.
-
Locks and keys should be afforded the same level of protection as the material or information being secured.
Frage 123
Frage
Certain non-GSA-approved security containers are approved for storage of classified information in the DoD.
Frage 124
Frage
The design goal for an AA&E storage facility is that is must meet or exceed 10 minutes of resistance to _________________ entry.
Antworten
-
covert
-
surreptitious
-
forced
Frage 125
Frage
Why should you categorize, store, and protect AA&E by security risk categories?
Frage 126
Frage
Storage containers and facilities protect valuable, sensitive, and classified information by ________________.
Antworten
-
consolidating no longer needed classified information
-
delaying unauthorized entry
-
preventing all unauthorized entry
Frage 127
Frage
If you need to know the manufacture date of a GSA-approved container, on which label would you find that information?
Frage 128
Frage
Which of these statements is true about storage of Confidential information?
Antworten
-
Supplemental protection is not normally required when storing Confidential information in an approved storage container.
-
Supplemental protection is always required when storing Confidential information regardless of which storage container is used.
-
Supplemental protection is usually required when storing Confidential information in a secure room.
Frage 129
Frage
Storage containers and facilities are not only important to our national security, but also to the safety of the general public.
Frage 130
Frage
For AA&E SRC III & IV, if no IDS is present Security Force checks during non-duty hours is required.
Frage 131
Frage
Storage containers or facilities will always provide enough protection for certain types of information or material on their own.
Frage 132
Frage
To store classified information, you may only use Class V or Class VI GSA-approved containers as the other classes of containers may no longer be used.
Frage 133
Frage
What is considered an additional measure for AA&E storage?
Antworten
-
IDS
-
Communications
-
CCTV
-
Security Forces
Frage 134
Frage
There are certain times when you must change the combination on locks securing classified information. Which of the following is not a time when you must change the combination?
Antworten
-
When the container is taken out of service
-
When the container or lock has been subject to possible compromise
-
When anyone with knowledge of the combination no longer requires access
-
Prior to going on extended leave
Frage 135
Frage
Which group uses the same set of storage requirements based on security risk categories?
Frage 136
Frage
What items can a Nuclear Storage Facility store?
Antworten
-
Nothing
-
Weapons
-
Precious metals
-
Money
Frage 137
Frage
Perimeter lighting in AA&E storage facilities is _________________________.
Frage 138
Frage
Which of these statements is true about storage of Secret information?
Antworten
-
Supplemental protection is not required when storing Secret information in a vault.
-
Supplemental protection is always required when storing Secret information.
-
Supplemental protection is never required when storing Secret information in a secure room.
Frage 139
Frage
What do the classes of GSA-approved containers represent?
Antworten
-
Which ones are approved for the storage of classified information
-
The types of sensitive material for which each container is approved
-
Varying degrees of protection against different types of unauthorized entry
Frage 140
Antworten
-
The intelligence community
-
Only those who have a Top Secret clearance
-
Anyone who stores classified information
Frage 141
Frage
If you needed to find information on physical security standards for SCIFs, which reference would you consult?
Frage 142
Frage
For storage of classified you may use which GSA-approved containers?
Antworten
-
Only containers with black labels
-
Containers with any GSA-approved label
-
Only containers with red labels
Frage 143
Frage
Which of the following is an example of a locking device?
Frage 144
Frage
You are considering locking solutions for your facility. When assessing the life safety aspect of the solution, which of the following must be considered?
Frage 145
Frage
The use of a master key system is not acceptable in ____________.
Antworten
-
barracks
-
general office areas
-
secure areas
Frage 146
Frage
Which of the following must you do when opening an electromechanical lock such as the X-07, X-08, X-09, and X-10?
Frage 147
Frage
All locks consist of three components, one of which is an operating mechanism. Which of the following is NOT one of the other two components?
Antworten
-
Locking device
-
Switching device
-
Securing device
Frage 148
Frage
Which of the following should you do before changing a combination?
Frage 149
Frage
The lock you are using has an LCD rather than a dial with imprinted numbers. You are using _______________________.
Frage 150
Frage
Under Federal Specification FFL-2937, only the S&G 2740 is approved for use as a mechanical combination lock.
Frage 151
Frage
Which of the following is not a locking device for a key-operated lock?
Frage 152
Frage
Which type of cylinder provides a locking solution that minimizes the rekeying burden?
Frage 153
Frage
When assessing the life safety aspect of a locking solution for a facility door, which of the following must be considered?
Antworten
-
The door must be locked to prevent unauthorized entry, but allow those inside to exit through the door without unlocking it.
-
The door must be locked to prevent unauthorized entry and exit.
-
The door must be unlocked so that those inside can exit without having to unlock the door.
Frage 154
Frage
RIsk Management is defined as the process of selecting and implemeting ________________________ to achieve an acceptable level of risk at an acceptable cost.
Antworten
-
Assets
-
Countermeasures
-
Procedures
-
Threats
Frage 155
Frage
Select the correct order of steps in the Risk Management Process.
Antworten
-
Identify Assets, Identify Threats, Assess Vulnerabilities, Assess Risks, Determine Countermeasures
-
Identify Threats, Assess Vulnerabilities, Identify Assets, Determine Countermeasures, Assess Risks
-
Assess Vulnerabilities, Identify Assets, Determine Countermeasures, Identify Threats, Assess RIsks
-
Determine Countermeasures, Assess RIsks, Assess Vulnerabilities, Identify Assets, Identify Threats
Frage 156
Frage
A key and lock custodian should change or rotate locks at least _____________.
Antworten
-
monthly
-
annually
-
quarterly
Frage 157
Frage
Which of the following statements is true?
Antworten
-
You may not change a combination without a commercial locksmith.
-
You may never allow a commercial locksmith to change your combination.
-
You may allow a commercial locksmith to change your combination under certain circumstances.
Frage 158
Frage
Susan Johnson knows the combination to a security container and Susan lost her clearance today, but she was not terminated from her job. What must happen?
Antworten
-
The combination on that security container must be changed.
-
Nothing must happen. Susan knows she’s no longer authorized and will not access the storage container.
-
The security container must be replaced.
Frage 159
Frage
Which electromechanical lock uses battery power?
Frage 160
Frage
Which of the following is the purpose of a lock’s switching device?
Antworten
-
To allow or deny entry into a container or area
-
To authorize the locking device to open
-
To keep the area or container secured
Frage 161
Frage
You need to decide what type of locking system to use for a storage closet. The closet does not hold classified or sensitive information, but you want to deter entry. Which type of key-operated lock should you use?
Antworten
-
A padlock
-
A built-in lock
Frage 162
Frage
The two primary types of locks used within DoD are ___________ and key locks.
Antworten
-
Biometric
-
Encoded
-
Voice activated
-
Combination
Frage 163
Frage
Which statement best describes the relationship between a locking solution’s level of protection and its cost and labor effort?
Antworten
-
Locking solutions do not have a correlation between level of protection and cost and labor effort; it simply depends on the specific solution.
-
Locking solutions that provide a higher level of protection are more costly, but less labor-intensive.
-
Locking solutions that provide a higher level of protection are more costly and labor-intensive.
Frage 164
Frage
Using birth dates when changing combination numbers is acceptable as long as you don’t use your own.
Frage 165
Frage
Pin tumblers are most commonly employed on _______ locks?
Antworten
-
combination
-
tubular
-
cylinder
Frage 166
Frage
What is not a responsibility of the Key Custodian?
Frage 167
Frage
Which of the following is the switching device for a key-operated lock?
Frage 168
Frage
Which of the following is a disadvantage to using a master key system?
Antworten
-
The cost to re-key all of the locks in the system.
-
It is harder to pick the locks.
-
It is harder to copy the locks.
Frage 169
Frage
The S&G 2937 lock is an example of which type of combination lock?
Frage 170
Frage
Many building codes require a facility’s exit doors to contain which of the following devices?
Frage 171
Frage
You are making a decision about the locking system to be used in a bulk storage area that contains classified information. Which type of key-operated lock should you use?
Antworten
-
A built-in lock
-
An approved padlock
Frage 172
Frage
You need to review the requirements that electromechanical locks meet. Which of the following specifications should you reference?
Antworten
-
Federal Specification FF-L-2740B
-
Federal Specification FF-P-110
-
Federal Specification FF-L-2937
Frage 173
Frage
Which of the following is authorized by the DoD for securing conventional arms, ammunition, and explosives (AA&E)?
Antworten
-
X-10 lock
-
Combination padlock
-
S&G 833C
Frage 174
Frage
You need to secure classified information. Which of these locks could you use?
Frage 175
Frage
In the Risk Management Process, Assets can be assigned to each of the following categories:
Frage 176
Frage
Which of the following are undesirable events that can adversely affect an asset?
Frage 177
Frage
In the Risk Management Process, a _____________ rating indicates that a compromise to assets would have serious consequences resulting in loss of classified or highly sensitive data that could impair operations affecting nation interest for a limited period of time
Frage 178
Frage
Which of the following are examples of threats?
Antworten
-
Terrorists
-
Insiders
-
Natural Disasters
-
All of the above
Frage 179
Frage
A threat may include which of the following?
Antworten
-
The intention and capability of an adversary to undertake detrimental action against an asset owners interest.
-
Potential vulnerabilities related to specific assets and their undesirable actions.
-
Any indication, or event with the potential to cause loss or damage to an asset.
Frage 180
Frage
Which of the following are general areas of potential vulnerabilities?
Antworten
-
Operational
-
Facility
-
Security
-
Human
-
Information
Frage 181
Frage
Compute this Risk Assessment formula: Risk = Impact x (Threat x Vulnerability)
Impact = 75
Threat = 0.6
Vulnerability = 0.5
Frage 182
Frage
Which of the following are categories of countermeasures in the Risk Management Process?
Antworten
-
Security
-
Manpower
-
Procedures
-
Equipment
Frage 183
Frage
Risk Management is the process of selecting and implementing security countermeasures to achieve an acceptable level of risk at any cost.
Frage 184
Frage
Capability refers to an adversary's ability to act as a potential threat.
Frage 185
Frage
What common vulnerability areas might an adversary exploit?
Frage 186
Frage
Wireless computer networks are an example of a vulnerability in which category?
Antworten
-
Human
-
Operational
-
Informational
-
Facility
-
Equipment
Frage 187
Frage
Which property control systems are an example of a vulnerability in which category?
Antworten
-
Human
-
Operational
-
Informational
-
Facility
-
Equipment
Frage 188
Frage
Which of the following are important roles of the NISP in Continuous Monitoring?
Antworten
-
to establish organizational business practices
-
to ensure that cleared industry safeguards classified information and information systems
-
to protect critical assets
-
to thwart foreign adversaries and insider threats to information systems
Frage 189
Frage
This guidance requires that individuals' actions on a classified contractor information system be auditable.
Frage 190
Frage
These policies and guidance establishes the requirement for a continuous and integrated capability to monitor and audit for threats and vulnerabilities from internal and external sources.
Frage 191
Frage
This publication provides detailed guidance on the development and implementation of an Information Security Continuous Monitoring (ISCM) program and security-focused configuration management.
Frage 192
Frage
Which of the following identify how the RMF supports risk management?
Antworten
-
The RMF process ensures that business process decisions can override user information system concerns.
-
The RMF process provides a flexible approach with decision-making at tier 3.
-
The RMF process ensures traceability and transparency across all levels of the organization,
-
The RMF process emphasizes continuous monitoring and timely correction of deficiencies,
Frage 193
Frage
An Information Systems Owner (ISO) categorizes systems at this RMF level:
Frage 194
Frage
The Program Manager/System Manager (PM/SM) enforces RMF authorizations decisions at this level:
Frage 195
Frage
ISCM strategy at this level is focused on the controls that address the establishment and management of the organization's information security program, including establishing the minimum frequency with which each security control or metric is to be assessed or monitored.
Frage 196
Frage
ISCM strategy at this level is focused on high-level information security governance policy as it relates to risk to the organization as a whole, to its core missions, and to its business functions.