100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
Previously searched by you
SFPC CERTIFICATION EXAM /SECURITY ASSET PROTECTION PROFESSIONAL CERTIFICATION ACTUAL EXAM 100 QUESTIONS AND CORRECT DETAILED ANSWERS//A GRADE When a Terrorism Threat Level is escalated from LOW to MODERATE, a DoD Component Head should employ $27.99
Add to cart
SFPC CERTIFICATION EXAM /SECURITY ASSET PROTECTION PROFESSIONAL CERTIFICATION ACTUAL EXAM 100 QUESTIONS AND CORRECT DETAILED ANSWERS//A GRADE When a Terrorism Threat Level is escalated from LOW to MODERATE, a DoD Component Head should employ
4 views 0 purchase
Course
SFPC CERTIFICATION
Institution
SFPC CERTIFICATION
SFPC CERTIFICATION EXAM /SECURITY
ASSET PROTECTION PROFESSIONAL
CERTIFICATION ACTUAL EXAM 100 QUESTIONS AND
CORRECT DETAILED ANSWERS//A GRADE
When a Terrorism Threat Level is escalated from LOW to MODERATE, a DoD Component Head should employ which of the following countermeasures?
SFPC C...
SFPC CERTIFICATION EXAM 2024-2025 /SECURITY
ASSET PROTECTION PROFESSIONAL
CERTIFICATION ACTUAL EXAM 100 QUESTIONS AND
CORRECT DETAILED ANSWERS//A GRADE
When a Terrorism Threat Level is escalated from LOW to MODERATE, a DoD Component Head should
employ which of the following countermeasures?
a. Cease all flying except for specifically authorized operational sorties.
b. Direct the execution of advance site reviews to facilitate the antiterrorism planning process.
c. Encourage dependent family members to complete Level I Antiterrorism Awareness Training before
any travel outside the continental United States (OCONUS).
d. Conduct an immediate Terrorism Vulnerability Assessment for off-installation housing, schools,
daycare centers, transportation. - ANSWER-C
Requests for authorizing disclosure of classified information during visits must include all the following
information, EXCEPT:
a. The explanation of the government purpose to perform when disclosing classified information.
b. The subject of the meeting, scope of classified topics and classification level
c. Expected time and location of the meeting.
d. The main content of the invitation to send to the participants. - ANSWER-C
Two security professionals - Paul and Ashley
- are discussing the security procedures for visits and meetings. Paul says visits must serve a specific U.S.
Government purpose. Ashley says DoD Components should, as a minimum, establish procedures that
include verification of the identity, personnel security clearance, access (if appropriate), and need-
toknow for all visitors. Who is correct?
a. Paul is correct
b. Ashley is correct
c. Paul and Ashley are both correct
d. Paul and Ashley are both incorrect - ANSWER-A
Executive Order 12829, signed in January 1993, mandated that which of the following entities be
responsible for implementing and monitoring the National industrial Security Program (NISP)?
,a. Director of the Information Security Oversight Office (ISOO)
b. Secretary of Defense
c. National Security Council (NSC)
d. Director, Defense Security Services (DSS) - ANSWER-A
What is the role of the government contracting activity (GCA), or cleared prime contractor, when a
contractor that does not have a Facility Clearance (FCL) wants to bid on a Request
for Proposal (RFP) that requires access to classified information? a. The GCA must issue a formal letter
rejecting the contractor's bid since the contractor does not have the requisite FCL.
b. The contractor must submit a sponsorship request to DSS, who will decide whether to allow the
contractor to bid on the contract.
c. The GCA must sponsor the contractor for a facility security clearance by submitting a
sponsorship request to DSS, which initiates the facility clearance process.
d. The GCA must ensure that the all owners and senior management of the uncleared contractor
are U.S. citizens and are eligible to be processed for a personnel security clearance. - ANSWER-C
What is the purpose of the Federal Acquisition Regulations (FAR)?
a. To codify and publish uniform policies and procedures for acquisition by all executive agencies.
b. To manage DoD funds and prioritize the development of vital research and technology.
c. To provide small businesses and minority owned companies an opportunity to compete in the
government acquisition process.
d. To promote uniform standards and best practices of technology acquisition across U.S. industry. -
ANSWER-A
What is the role of the security professional during the "Award Contract" step of the contracting
process?
a. To ensure the appropriate classification level for the bid, and to define unique security requirements
associated with the product.
b. To interface with the Cognizant Security Organization (CSO) to ensure oversight is performed and
review results of and previous assessments on behalf of component.
c. To ensure that the contractor follows proper safeguarding and disposition guidance.
d. To review and define the specific security requirements with the contracting officer - specifically, block
13 of DD Form 254. - ANSWER-D
, What is the purpose of DD Form 254?
a. To convey security classification guidance and to advise contractors on the handling procedures for
classified material.
b. To document the formal agreement between the US government and a cleared contractor in which
the contactor agrees to maintain a security program in compliance with the NISPOM and the
government agrees to security guidance and program oversight.
c. To validate details regarding the foreign ownership, control or influence affecting that cleared
contractor facility.
d. It replaces the actual contract document for any contract requiring access to classified information. -
ANSWER-A
As part of Operations Security (OPSEC), a program coordinator should use which of the following tools
to assess assets as part of the risk management process for critical information? a. Critical
Information List
b. Threat vulnerability matrix
c. Risk Rating Table
d. Security Classification Guide - ANSWER-A
What is the role of the Special Access Program Oversight Committee (SAPOC) during the maintenance
phase of the Special Access Program (SAP) lifecycle?
a. To ensure that the SAP has adequate Internal Review and Audit Compliance (IRAC) support, including
accessed auditors at supporting offices, to meet program audit needs.
b. To review existing programs annually to determine whether to revalidate them as SAPs.
c. To provide oversight of SAP program and budget accomplishments.
d. To provide oversight of SAP audits and inspections. - ANSWER-B
Which of the following describes a Special Access Program (SAP) that is established to protect sensitive
research, development, testing and evaluation, modification, and procurement activities?
a. Research and Technology SAP
b. Operations and Support SAP
c. Acquisition SAP
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller Settings. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for $27.99. You're not tied to anything after your purchase.