Question 1
Question
Contractor CEO: My company, BuildGen Contracting, just won its first classified government contract. What are our NISP responsibilities?
What are contractor responsibilities according to the NISP?
Answer
-
Establish NISP requirements for the protection of classified information
-
Provide advice, assistance, and oversight
-
Implement NISP requirements for the protection of classified information
Question 2
Question
Identify whether the following statements describe CSAs or CSOs.
These organizations establish industrial security programs and oversee security requirements.
Question 3
Question
Identify whether the following statements describe CSAs or CSOs.
These organizations administer the NISP and provide security guidance, oversight, and policy clarifications.
Question 4
Question
Which of these are DSS responsibilities or functions?
Select all that apply.
Answer
-
Provide security guidance and oversight
-
Provide policy clarifications
-
Conduct Security Vulnerability Assessments (SVAs)
-
Provide installation-specific procedures for work performed on a government installation
-
Provide contract-specific security classification guidance
Question 5
Question
Identify whether the following roles are filled by government or industry employees.
Facility Security Officer (FSO)
Question 6
Question
Identify whether the following roles are filled by government or industry employees.
Information System Security Professional/Security Control Assessor (ISSP/SCA)
Question 7
Question
Identify whether the following roles are filled by government or industry employees.
Information System Security Manager (ISSM)
Question 8
Question
Identify whether the following roles are filled by government or industry employees.
Industrial Security Representative (IS Rep)
Question 9
Question
Identify whether the following roles are filled by government or industry employees.
Counterintelligence Special Agent (CISA)
Question 10
Question
Identify whether the following roles are filled by government or industry employees.
Insider Threat Program Senior Official (ITPSO)
Question 11
Question
This DSS employee serves as the contractor’s primary point of contact for security.
Answer
-
Information System Security Professional/Security Control Assessor (ISSP/SCA)
-
Facility Security Officer (FSO)
-
Insider Threat Program Senior Official (ITPSO)
-
Information System Security Manager (ISSM)
-
Industrial Security Representative (IS Rep)
Question 12
Question
This DSS employee oversees authorized contractor Information System use.
Answer
-
Information System Security Professional/Security Control Assessor (ISSP/SCA)
-
Facility Security Officer (FSO)
-
Insider Threat Program Senior Official (ITPSO)
-
Information System Security Manager (ISSM)
-
Industrial Security Representative (IS Rep)
Question 13
Question
This contractor employee administers and oversees the contractor security program.
Answer
-
Information System Security Professional/Security Control Assessor (ISSP/SCA)
-
Facility Security Officer (FSO)
-
Insider Threat Program Senior Official (ITPSO)
-
Information System Security Manager (ISSM)
-
Industrial Security Representative (IS Rep)
Question 14
Question
This contractor employee manages Information Systems and ensures Information System security requirements are met.
Answer
-
Information System Security Professional/Security Control Assessor (ISSP/SCA)
-
Facility Security Officer (FSO)
-
Insider Threat Program Senior Official (ITPSO)
-
Information System Security Manager (ISSM)
-
Industrial Security Representative (IS Rep)
Question 15
Question
This contractor employee establishes and maintains the insider threat program.
Answer
-
Information System Security Professional/Security Control Assessor (ISSP/SCA)
-
Facility Security Officer (FSO)
-
Insider Threat Program Senior Official (ITPSO)
-
Information System Security Manager (ISSM)
-
Industrial Security Representative (IS Rep)
Question 16
Question
What is the first step of the contracting process?
Answer
-
The GCA defines the acquisition strategy for the contract.
-
The GCA publishes a Request for Proposal (RFP).
-
The government identifies a need for a product or service.
-
The GCA defines the initial requirements for the product/service.
Question 17
Question
Who has authority to enter into, administer, and terminate contracts?
Question 18
Question
Who serves as Subject Matter Expert (SME) for individual contracts?
Question 19
Question
Who provides contractual oversight and has responsibility for multiple programs?
Question 20
Question
Who closely monitors contractor performance on individual contracts?
Question 21
Question
Identify which document contains the information described.
Security requirements and classification guidance:
Question 22
Question
Identify which document contains the information described.
Contract details such as project scope, deadlines, and steps:
Question 23
Question
Identify which document contains the information described.
A security agreement between a contractor and the DoD in order to prevent the unauthorized disclosure of classified information:
Question 24
Question
Once the company’s FCL is in place, contractors may begin to access classified materials.
Question 25
Question
Key Management Personnel must be cleared before the FCL will be granted.
Question 26
Question
An employee’s approved national security eligibility determination, or PCL, is the same as his/her access.
Question 27
Question
What is the first step of the PCL process?
Answer
-
Employee completes SF-86
-
Program Manager determines need for access
-
PMSO-I validates the request
-
Investigative agency conducts investigation
-
DoD CAF grants and records PCL
-
FSO initiates PCL process
Question 28
Question
What is the second step of the PCL process?
Answer
-
Employee completes SF-86
-
Program Manager determines need for access
-
PMSO-I validates the request
-
Investigative agency conducts investigation
-
DoD CAF grants and records PCL
-
FSO initiates PCL process
Question 29
Question
What is the third step of the PCL process?
Answer
-
Employee completes SF-86
-
Program Manager determines need for access
-
PMSO-I validates the request
-
Investigative agency conducts investigation
-
DoD CAF grants and records PCL
-
FSO initiates PCL process
Question 30
Question
What is the fourth step of the PCL process?
Answer
-
Employee completes SF-86
-
Program Manager determines need for access
-
PMSO-I validates the request
-
Investigative agency conducts investigation
-
DoD CAF grants and records PCL
-
FSO initiates PCL process
Question 31
Question
What is the fifth step of the PCL process?
Answer
-
Employee completes SF-86
-
Program Manager determines need for access
-
PMSO-I validates the request
-
Investigative agency conducts investigation
-
DoD CAF grants and records PCL
-
FSO initiates PCL process
Question 32
Question
What is the sixth step of the PCL process?
Answer
-
Employee completes SF-86
-
Program Manager determines need for access
-
PMSO-I validates the request
-
Investigative agency conducts investigation
-
DoD CAF grants and records PCL
-
FSO initiates PCL process
Question 33
Question
Which of the following organizations conducts periodic Security Vulnerability Assessments (SVAs) of contractor facilities as the CSO to the Department of Defense?
Answer
-
Federal Bureau of Investigations (FBI)
-
Federal Acquisition Service (FAS)
-
Defense Security Service (DSS)
-
Department of Homeland Security (DHS)
Question 34
Question
Select ALL the correct responses. What does the Facility Security Officer (FSO) need to do when an employee no longer needs access to classified information?
Answer
-
Remove the employee's eligibility in the DoD System of Record
-
Debrief the employee
-
Remove the employee's access in the DoD System of Record
-
Remove the employee's name from access rosters and/or any active Visit Authorization Letters (VALs)
Question 35
Question
Select ALL the correct responses. Which of the following are Information System Security Professional/Security Control Assessor (ISSP/SCA) responsibilities?
Answer
-
Receive changed conditions and suspicious contact reports
-
Oversee day-to-day personnel security program operation
-
Respond to security violations involving authorized classified Information Systems
-
Perform classified Information System assessments
Question 36
Question
Select ALL the correct responses. Which of the following are Facility Security Officer (FSO) responsibilities?
Answer
-
Conduct Security Vulnerability Assessments (SVAs)
-
Ensure the security program is compliant with the National Industrial Security Program Operating Manual (NISPOM)
-
Administer and oversee the contractor's security program
Question 37
Question
After a need is identified, the Government Contracting Activity (GCA) ___________________.
Answer
-
awards the contract
-
evaluates the contractors' proposals
-
defines the initial requirements for the product/service
-
publishes a Request for Proposal (RFP)
Question 38
Question
True or false? Each Cognizant Security Agency (CSA) has one or more Cognizant Security Offices (CSOs) that administer the National Industrial Security Program (NISP) on their behalf.
Question 39
Question
Select ALL the correct responses. Which of the following are Contracting Officer's Representative (COR) responsibilities?
Answer
-
Initiates sponsorship for a Facility Clearance (FCL) if necessary
-
Closely monitors contractor performance
-
Enters into, administers, and terminates contracts
-
Communicates security requirements to the contractor
Question 40
Question
Select ALL the correct responses. The National Industrial Security Program (NISP) is:
Answer
-
a voluntary program for cleared contractor facilities
-
established by Executive Order 12829
-
designed to safeguard classified information entrusted to industry
-
a government-industry partnership
Question 41
Question
What form must employees complete in order to initiate the Personnel Security Clearance (PCL) process?
Answer
-
DD Form 441, DoD Security Agreement
-
DD 254, DoD Contract Security Classification Specification
-
SF 312, Non-Disclosure Agreement
-
SF 86, Questionnaire for National Security Positions
Question 42
Question
True or false? The Facility Clearance (FCL) is contingent upon all Key Management Personnel (KMP) being granted a Personnel Security Clearance (PCL).
Question 43
Question
True or false? Once an individual is granted a Personnel Security Clearance (PCL), he or she may access all classified information entrusted to the facility.
Question 44
Question
Select ALL the correct responses. During classified visits, visitors may supply clearance information via ______________.
Question 45
Question
Select ALL the correct responses. Who helps to conduct Security Vulnerability Assessments (SVAs)?
Answer
-
Counterintelligence Special Agent (CISA)
-
Information System Security Professional/Security Control Assessor (ISSP/SCA)
-
Insider Threat Program Senior Official (ITPSO)
-
Industrial Security Representative (IS Rep)
Question 46
Question
Select ALL the correct responses. By signing DD Form 441, Department of Defense Security Agreement, the contractor agrees to _______________.
Answer
-
Acknowledge government authority to review the company's security program
-
Determine whether a sub-contractor has appropriate Facility Clearance (FCL)
-
Implement and maintain a security program that complies with the National Industrial Security Program Operating Manual (NISPOM)
-
Adhere to end-product objectives
Question 47
Question
True or false? A contractor facility may access and store classified material as soon as the Facility Clearance (FCL) is granted.
Question 48
Question
Which contracting document contains information such as project background, scope, deadlines, and steps for project completion?
Answer
-
DD Form 254, Department of Defense Contract Security Classification Specification
-
Statement of Work (SOW)
-
DD Form 441, Department of Defense Security Agreement
Question 49
Question
Select ALL the correct responses. Which of the following are Information System Security Manager (ISSM) responsibilities?
Answer
-
Receive company changed conditions and suspicious contact reports
-
Conduct Information System awareness and training
-
Establish Information System programs and procedures
-
Develop facility procedures for handling media with classified information
Question 50
Question
Select ALL the correct responses. Which of the following roles are filled by government employees?
Answer
-
Information System Security Professional/Security Control Assessor (ISSP/SCA)
-
Industrial Security Representative (IS Rep)
-
Information System Security Manager (ISSM)
-
Facility Security Officer (FSO)