SFPC Exam Prep Questions Answered 100% Correct
What are the 5 types of IS security violations? - answer 1. Unauthorized access
2. Data spills
3. Processing classified info on an unclassified system
4. Failure to report suspicious contacts
5. Inadvertent exposure
Define E.O. 13467 (PERSEC) - answer Established an efficient, reciprocal, and aligned system to
investigate and determine suitability and national security eligibility
What the 5 Tiers of National Security adjudication? - answer Tier 1: non-sensitive, low risk
positions
Tier 2: non-sensitive, moderate risk positions
Tier 3: non-critical sensitive positions requiring confidential, secret, or "L" access eligibility
Tier 4: non-sensitive, high risk public trust
Tier 5: Critical sensitive and special sensitive positions requiring TOP SECRET, SCI, or Q eligibility
What are the requirements for initial assignment to a Presidential Support Activities
(Yankee White) Category 2 position? - answer Favorable completion of T5 SSBI within 36
months preceding selection
, What is the purpose of the Federal Acquisition Regulation (FAR)? - answer To codify and
publish uniform policies and procedures for acquisition by all executive agencies
What is the role of the Special Access Program Oversight Committee (SAPOC) during the
maintenance phase of the SAP lifecycle? - answer To review existing programs annually to
determine whether to revalidate them as SAPs
Define acquisition SAP - answer A SAP established to protect sensitive research,
development, testing, and evaluation, modification, and procurement activities
Define intelligence SAP - answer A SAP established primarily to protect the planning
and execution of especially sensitive intelligence or CI operations or collection activities
Define operations and support SAP - answer A SAP established primarily to protect the planning
for, execution of, and support to especially sensitive military operations. An operations and
support SAP may protect organizations, property, operational concepts, plans, or activities
Define Security-in-Depth - answer Layered and complementary security controls sufficient to
deter, detect, and document unauthorized entry and movement within the facility
What is the purpose of Intrusion Detection System (IDS) - answer Deter, detect, and document
What are the components of IDS? - answer Sensors, control or transmission units, monitor
units, and computer monitoring stations
List and define the four operational phases of IDS - answer 1. Detection: begins as soon as
a detector or sensor reacts to the stimuli
2. Reporting: begins when the premise control unit (PCU) receives signals from sensors in the
protected area and incorporates the signals into a communication scheme
3. Dispatch: the first phase requiring human interaction - operator initiates the appropriate
response
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller KenAli. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for $12.49. You're not tied to anything after your purchase.