Casey Neville
Quiz by , created more than 1 year ago

SFPC SFPC Quiz on INDUSTRIAL Quiz, created by Casey Neville on 05/05/2022.

1304
3
0
Casey Neville
Created by Casey Neville over 2 years ago
Close

INDUSTRIAL Quiz

Question 1 of 50

1

Contractor CEO: My company, BuildGen Contracting, just won its first classified government contract. What are our NISP responsibilities?
What are contractor responsibilities according to the NISP?

Select one of the following:

  • Establish NISP requirements for the protection of classified information

  • Provide advice, assistance, and oversight

  • Implement NISP requirements for the protection of classified information

Explanation

Question 2 of 50

1

Identify whether the following statements describe CSAs or CSOs.
These organizations establish industrial security programs and oversee security requirements.

Select one of the following:

  • CSA

  • CSO

Explanation

Question 3 of 50

1

Identify whether the following statements describe CSAs or CSOs.
These organizations administer the NISP and provide security guidance, oversight, and policy clarifications.

Select one of the following:

  • CSA

  • CSO

Explanation

Question 4 of 50

1

Which of these are DSS responsibilities or functions?
Select all that apply.

Select one or more of the following:

  • Provide security guidance and oversight

  • Provide policy clarifications

  • Conduct Security Vulnerability Assessments (SVAs)

  • Provide installation-specific procedures for work performed on a government installation

  • Provide contract-specific security classification guidance

Explanation

Question 5 of 50

1

Identify whether the following roles are filled by government or industry employees.

Facility Security Officer (FSO)

Select one of the following:

  • Government

  • Industry

Explanation

Question 6 of 50

1

Identify whether the following roles are filled by government or industry employees.

Information System Security Professional/Security Control Assessor (ISSP/SCA)

Select one of the following:

  • Government

  • Industry

Explanation

Question 7 of 50

1

Identify whether the following roles are filled by government or industry employees.

Information System Security Manager (ISSM)

Select one of the following:

  • Government

  • Industry

Explanation

Question 8 of 50

1

Identify whether the following roles are filled by government or industry employees.

Industrial Security Representative (IS Rep)

Select one of the following:

  • Government

  • Industry

Explanation

Question 9 of 50

1

Identify whether the following roles are filled by government or industry employees.

Counterintelligence Special Agent (CISA)

Select one of the following:

  • Government

  • Industry

Explanation

Question 10 of 50

1

Identify whether the following roles are filled by government or industry employees.

Insider Threat Program Senior Official (ITPSO)

Select one of the following:

  • Government

  • Industry

Explanation

Question 11 of 50

1

This DSS employee serves as the contractor’s primary point of contact for security.

Select one of the following:

  • Information System Security Professional/Security Control Assessor (ISSP/SCA)

  • Facility Security Officer (FSO)

  • Insider Threat Program Senior Official (ITPSO)

  • Information System Security Manager (ISSM)

  • Industrial Security Representative (IS Rep)

Explanation

Question 12 of 50

1

This DSS employee oversees authorized contractor Information System use.

Select one of the following:

  • Information System Security Professional/Security Control Assessor (ISSP/SCA)

  • Facility Security Officer (FSO)

  • Insider Threat Program Senior Official (ITPSO)

  • Information System Security Manager (ISSM)

  • Industrial Security Representative (IS Rep)

Explanation

Question 13 of 50

1

This contractor employee administers and oversees the contractor security program.

Select one of the following:

  • Information System Security Professional/Security Control Assessor (ISSP/SCA)

  • Facility Security Officer (FSO)

  • Insider Threat Program Senior Official (ITPSO)

  • Information System Security Manager (ISSM)

  • Industrial Security Representative (IS Rep)

Explanation

Question 14 of 50

1

This contractor employee manages Information Systems and ensures Information System security requirements are met.

Select one of the following:

  • Information System Security Professional/Security Control Assessor (ISSP/SCA)

  • Facility Security Officer (FSO)

  • Insider Threat Program Senior Official (ITPSO)

  • Information System Security Manager (ISSM)

  • Industrial Security Representative (IS Rep)

Explanation

Question 15 of 50

1

This contractor employee establishes and maintains the insider threat program.

Select one of the following:

  • Information System Security Professional/Security Control Assessor (ISSP/SCA)

  • Facility Security Officer (FSO)

  • Insider Threat Program Senior Official (ITPSO)

  • Information System Security Manager (ISSM)

  • Industrial Security Representative (IS Rep)

Explanation

Question 16 of 50

1

What is the first step of the contracting process?

Select one of the following:

  • The GCA defines the acquisition strategy for the contract.

  • The GCA publishes a Request for Proposal (RFP).

  • The government identifies a need for a product or service.

  • The GCA defines the initial requirements for the product/service.

Explanation

Question 17 of 50

1

Who has authority to enter into, administer, and terminate contracts?

Select one of the following:

  • Contracting Officer (CO)

  • Contracting Officer’s Representative (COR)

Explanation

Question 18 of 50

1

Who serves as Subject Matter Expert (SME) for individual contracts?

Select one of the following:

  • Contracting Officer (CO)

  • Contracting Officer’s Representative (COR)

Explanation

Question 19 of 50

1

Who provides contractual oversight and has responsibility for multiple programs?

Select one of the following:

  • Contracting Officer (CO)

  • Contracting Officer’s Representative (COR)

Explanation

Question 20 of 50

1

Who closely monitors contractor performance on individual contracts?

Select one of the following:

  • Contracting Officer

  • Contracting Officer’s Representative (COR)

Explanation

Question 21 of 50

1

Identify which document contains the information described.

Security requirements and classification guidance:

Select one of the following:

  • Statement of Work (SOW)

  • DD Form 254: DoD Contract Security Classification Specification (DD 254)

  • DD Form 441: DoD Security Agreement (DD 441)

Explanation

Question 22 of 50

1

Identify which document contains the information described.

Contract details such as project scope, deadlines, and steps:

Select one of the following:

  • Statement of Work (SOW)

  • DD Form 254: DoD Contract Security Classification Specification (DD 254)

  • DD Form 441: DoD Security Agreement (DD 441)

Explanation

Question 23 of 50

1

Identify which document contains the information described.

A security agreement between a contractor and the DoD in order to prevent the unauthorized disclosure of classified information:

Select one of the following:

  • Statement of Work (SOW)

  • DD Form 254: DoD Contract Security Classification Specification (DD 254)

  • DD Form 441: DoD Security Agreement (DD 441)

Explanation

Question 24 of 50

1

Once the company’s FCL is in place, contractors may begin to access classified materials.

Select one of the following:

  • True

  • False

Explanation

Question 25 of 50

1

Key Management Personnel must be cleared before the FCL will be granted.

Select one of the following:

  • True

  • False

Explanation

Question 26 of 50

1

An employee’s approved national security eligibility determination, or PCL, is the same as his/her access.

Select one of the following:

  • True

  • False

Explanation

Question 27 of 50

1

What is the first step of the PCL process?

Select one of the following:

  • Employee completes SF-86

  • Program Manager determines need for access

  • PMSO-I validates the request

  • Investigative agency conducts investigation

  • DoD CAF grants and records PCL

  • FSO initiates PCL process

Explanation

Question 28 of 50

1

What is the second step of the PCL process?

Select one of the following:

  • Employee completes SF-86

  • Program Manager determines need for access

  • PMSO-I validates the request

  • Investigative agency conducts investigation

  • DoD CAF grants and records PCL

  • FSO initiates PCL process

Explanation

Question 29 of 50

1

What is the third step of the PCL process?

Select one of the following:

  • Employee completes SF-86

  • Program Manager determines need for access

  • PMSO-I validates the request

  • Investigative agency conducts investigation

  • DoD CAF grants and records PCL

  • FSO initiates PCL process

Explanation

Question 30 of 50

1

What is the fourth step of the PCL process?

Select one of the following:

  • Employee completes SF-86

  • Program Manager determines need for access

  • PMSO-I validates the request

  • Investigative agency conducts investigation

  • DoD CAF grants and records PCL

  • FSO initiates PCL process

Explanation

Question 31 of 50

1

What is the fifth step of the PCL process?

Select one of the following:

  • Employee completes SF-86

  • Program Manager determines need for access

  • PMSO-I validates the request

  • Investigative agency conducts investigation

  • DoD CAF grants and records PCL

  • FSO initiates PCL process

Explanation

Question 32 of 50

1

What is the sixth step of the PCL process?

Select one of the following:

  • Employee completes SF-86

  • Program Manager determines need for access

  • PMSO-I validates the request

  • Investigative agency conducts investigation

  • DoD CAF grants and records PCL

  • FSO initiates PCL process

Explanation

Question 33 of 50

1

Which of the following organizations conducts periodic Security Vulnerability Assessments (SVAs) of contractor facilities as the CSO to the Department of Defense?

Select one of the following:

  • Federal Bureau of Investigations (FBI)

  • Federal Acquisition Service (FAS)

  • Defense Security Service (DSS)

  • Department of Homeland Security (DHS)

Explanation

Question 34 of 50

1

Select ALL the correct responses. What does the Facility Security Officer (FSO) need to do when an employee no longer needs access to classified information?

Select one or more of the following:

  • Remove the employee's eligibility in the DoD System of Record

  • Debrief the employee

  • Remove the employee's access in the DoD System of Record

  • Remove the employee's name from access rosters and/or any active Visit Authorization Letters (VALs)

Explanation

Question 35 of 50

1

Select ALL the correct responses. Which of the following are Information System Security Professional/Security Control Assessor (ISSP/SCA) responsibilities?

Select one or more of the following:

  • Receive changed conditions and suspicious contact reports

  • Oversee day-to-day personnel security program operation

  • Respond to security violations involving authorized classified Information Systems

  • Perform classified Information System assessments

Explanation

Question 36 of 50

1

Select ALL the correct responses. Which of the following are Facility Security Officer (FSO) responsibilities?

Select one or more of the following:

  • Conduct Security Vulnerability Assessments (SVAs)

  • Ensure the security program is compliant with the National Industrial Security Program Operating Manual (NISPOM)

  • Administer and oversee the contractor's security program

Explanation

Question 37 of 50

1

After a need is identified, the Government Contracting Activity (GCA) ___________________.

Select one of the following:

  • awards the contract

  • evaluates the contractors' proposals

  • defines the initial requirements for the product/service

  • publishes a Request for Proposal (RFP)

Explanation

Question 38 of 50

1

True or false? Each Cognizant Security Agency (CSA) has one or more Cognizant Security Offices (CSOs) that administer the National Industrial Security Program (NISP) on their behalf.

Select one of the following:

  • True

  • False

Explanation

Question 39 of 50

1

Select ALL the correct responses. Which of the following are Contracting Officer's Representative (COR) responsibilities?

Select one or more of the following:

  • Initiates sponsorship for a Facility Clearance (FCL) if necessary

  • Closely monitors contractor performance

  • Enters into, administers, and terminates contracts

  • Communicates security requirements to the contractor

Explanation

Question 40 of 50

1

Select ALL the correct responses. The National Industrial Security Program (NISP) is:

Select one or more of the following:

  • a voluntary program for cleared contractor facilities

  • established by Executive Order 12829

  • designed to safeguard classified information entrusted to industry

  • a government-industry partnership

Explanation

Question 41 of 50

1

What form must employees complete in order to initiate the Personnel Security Clearance (PCL) process?

Select one of the following:

  • DD Form 441, DoD Security Agreement

  • DD 254, DoD Contract Security Classification Specification

  • SF 312, Non-Disclosure Agreement

  • SF 86, Questionnaire for National Security Positions

Explanation

Question 42 of 50

1

True or false? The Facility Clearance (FCL) is contingent upon all Key Management Personnel (KMP) being granted a Personnel Security Clearance (PCL).

Select one of the following:

  • True

  • False

Explanation

Question 43 of 50

1

True or false? Once an individual is granted a Personnel Security Clearance (PCL), he or she may access all classified information entrusted to the facility.

Select one of the following:

  • True

  • False

Explanation

Question 44 of 50

1

Select ALL the correct responses. During classified visits, visitors may supply clearance information via ______________.

Select one or more of the following:

  • a Visit Authorization Letter (VAL)

  • the DoD System of Record

  • an invitation acceptance form

Explanation

Question 45 of 50

1

Select ALL the correct responses. Who helps to conduct Security Vulnerability Assessments (SVAs)?

Select one or more of the following:

  • Counterintelligence Special Agent (CISA)

  • Information System Security Professional/Security Control Assessor (ISSP/SCA)

  • Insider Threat Program Senior Official (ITPSO)

  • Industrial Security Representative (IS Rep)

Explanation

Question 46 of 50

1

Select ALL the correct responses. By signing DD Form 441, Department of Defense Security Agreement, the contractor agrees to _______________.

Select one or more of the following:

  • Acknowledge government authority to review the company's security program

  • Determine whether a sub-contractor has appropriate Facility Clearance (FCL)

  • Implement and maintain a security program that complies with the National Industrial Security Program Operating Manual (NISPOM)

  • Adhere to end-product objectives

Explanation

Question 47 of 50

1

True or false? A contractor facility may access and store classified material as soon as the Facility Clearance (FCL) is granted.

Select one of the following:

  • True

  • False

Explanation

Question 48 of 50

1

Which contracting document contains information such as project background, scope, deadlines, and steps for project completion?

Select one of the following:

  • DD Form 254, Department of Defense Contract Security Classification Specification

  • Statement of Work (SOW)

  • DD Form 441, Department of Defense Security Agreement

Explanation

Question 49 of 50

1

Select ALL the correct responses. Which of the following are Information System Security Manager (ISSM) responsibilities?

Select one or more of the following:

  • Receive company changed conditions and suspicious contact reports

  • Conduct Information System awareness and training

  • Establish Information System programs and procedures

  • Develop facility procedures for handling media with classified information

Explanation

Question 50 of 50

1

Select ALL the correct responses. Which of the following roles are filled by government employees?

Select one or more of the following:

  • Information System Security Professional/Security Control Assessor (ISSP/SCA)

  • Industrial Security Representative (IS Rep)

  • Information System Security Manager (ISSM)

  • Facility Security Officer (FSO)

Explanation