1|Page
SFPC PRACTICE TEST EXAM 2025 |
FREQUENTLY TESTED EXAM
QUESTIONS WITH 100% VERIFIED
ANSWERS
Which of the following is not a distinct phase of the Intrusion Detection System?
a. Detection
b. Control
c. Assessment
d. Response - Correct-answer-B
Which of the following would be considered a public safety crime?
a. Theft of ammunition shipment for the purpose of criminal or gang related
activity.
b. Theft of sensitive, proprietary information relating to US aerospace and
defense technologies.
c. Deliberate destruction of DoD assets or interruption of normal operations.
,2|Page
d. Theft of an item and use of it outside of its intended purpose or without
permission. - Correct-answer-A
Which of the following best describes the goal of the Physical Security Program?
a. To ensure that industry safeguards the classified information in their
possession, while performing work on contracts, bids, or research and
development efforts on behalf of the government.
b. To protect assets against compromise resulting from activities such as
espionage, sabotage, terrorism, damage or loss, and criminal.
c. To ensure that only loyal, trustworthy, and reliable individuals may access
classified information or perform sensitive duties.
d. To create uniform policies and procedures for defense acquisition by all
executive agencies. - Correct-answer-B
Preventing unauthorized access to information
and equipment, safeguarding DoD assets against espionage and criminal activity,
and providing the means to counter threats when preventative measures are
ignored, best characterize the primary functions of which of the following
programs or processes? a. Physical Security Program
b. Operations Security (OPSEC) process
c. Security incident response process
d. Personnel Security Program - Correct-answer-A
,3|Page
The process of integrating active and passive complementary physical security
measures to ensure the protection of DoD assets is known as which of the
following concepts?
a. Area security
b. Threat-vulnerability assessment
c. Security-in-depth
d. Point security - Correct-answer-C
The stealing of sensitive, proprietary information related to U.S. aerospace and
defense technologies with the intent to provide such information to a foreign
adversary is an example of which type of threat to DoD assets?
a. Criminal activity
b. Economic espionage
c. Treason
d. Terrorism - Correct-answer-B
When a Terrorism Threat Level is escalated from LOW to MODERATE, a DoD
Component Head should employ which of the following countermeasures?
a. Cease all flying except for specifically authorized operational sorties.
b. Direct the execution of advance site reviews to facilitate the antiterrorism
planning process.
, 4|Page
c. Encourage dependent family members to complete Level I Antiterrorism
Awareness Training before any travel outside the continental United States
(OCONUS).
d. Conduct an immediate Terrorism Vulnerability Assessment for off-installation
housing, schools, daycare centers, transportation. - Correct-answer-C
Requests for authorizing disclosure of classified information during visits must
include all the following information, EXCEPT:
a. The explanation of the government purpose to perform when disclosing
classified information.
b. The subject of the meeting, scope of classified topics and classification level
c. Expected time and location of the meeting.
d. The main content of the invitation to send to the participants. - Correct-
answer-C
Two security professionals - Paul and Ashley
- are discussing the security procedures for visits and meetings. Paul says visits
must serve a specific U.S. Government purpose. Ashley says DoD Components
should, as a minimum, establish procedures that include verification of the
identity, personnel security clearance, access (if appropriate), and need-to-know
for all visitors. Who is correct?
a. Paul is correct
b. Ashley is correct
SFPC PRACTICE TEST EXAM 2025 |
FREQUENTLY TESTED EXAM
QUESTIONS WITH 100% VERIFIED
ANSWERS
Which of the following is not a distinct phase of the Intrusion Detection System?
a. Detection
b. Control
c. Assessment
d. Response - Correct-answer-B
Which of the following would be considered a public safety crime?
a. Theft of ammunition shipment for the purpose of criminal or gang related
activity.
b. Theft of sensitive, proprietary information relating to US aerospace and
defense technologies.
c. Deliberate destruction of DoD assets or interruption of normal operations.
,2|Page
d. Theft of an item and use of it outside of its intended purpose or without
permission. - Correct-answer-A
Which of the following best describes the goal of the Physical Security Program?
a. To ensure that industry safeguards the classified information in their
possession, while performing work on contracts, bids, or research and
development efforts on behalf of the government.
b. To protect assets against compromise resulting from activities such as
espionage, sabotage, terrorism, damage or loss, and criminal.
c. To ensure that only loyal, trustworthy, and reliable individuals may access
classified information or perform sensitive duties.
d. To create uniform policies and procedures for defense acquisition by all
executive agencies. - Correct-answer-B
Preventing unauthorized access to information
and equipment, safeguarding DoD assets against espionage and criminal activity,
and providing the means to counter threats when preventative measures are
ignored, best characterize the primary functions of which of the following
programs or processes? a. Physical Security Program
b. Operations Security (OPSEC) process
c. Security incident response process
d. Personnel Security Program - Correct-answer-A
,3|Page
The process of integrating active and passive complementary physical security
measures to ensure the protection of DoD assets is known as which of the
following concepts?
a. Area security
b. Threat-vulnerability assessment
c. Security-in-depth
d. Point security - Correct-answer-C
The stealing of sensitive, proprietary information related to U.S. aerospace and
defense technologies with the intent to provide such information to a foreign
adversary is an example of which type of threat to DoD assets?
a. Criminal activity
b. Economic espionage
c. Treason
d. Terrorism - Correct-answer-B
When a Terrorism Threat Level is escalated from LOW to MODERATE, a DoD
Component Head should employ which of the following countermeasures?
a. Cease all flying except for specifically authorized operational sorties.
b. Direct the execution of advance site reviews to facilitate the antiterrorism
planning process.
, 4|Page
c. Encourage dependent family members to complete Level I Antiterrorism
Awareness Training before any travel outside the continental United States
(OCONUS).
d. Conduct an immediate Terrorism Vulnerability Assessment for off-installation
housing, schools, daycare centers, transportation. - Correct-answer-C
Requests for authorizing disclosure of classified information during visits must
include all the following information, EXCEPT:
a. The explanation of the government purpose to perform when disclosing
classified information.
b. The subject of the meeting, scope of classified topics and classification level
c. Expected time and location of the meeting.
d. The main content of the invitation to send to the participants. - Correct-
answer-C
Two security professionals - Paul and Ashley
- are discussing the security procedures for visits and meetings. Paul says visits
must serve a specific U.S. Government purpose. Ashley says DoD Components
should, as a minimum, establish procedures that include verification of the
identity, personnel security clearance, access (if appropriate), and need-to-know
for all visitors. Who is correct?
a. Paul is correct
b. Ashley is correct