TEST 2026 QUESTIONS WITH SOLUTIONS
GRADED A+
◉ True. Answer: True or False: Special access requirements are
designed to provide an additional layer of security to some of our
nation's most valuable assets.
◉ False. Threats and vulnerabilities are related but distinct. Threats
to national security exploit vulnerabilities. Answer: True or False:
There is no difference between a threat and a vulnerability.
◉ What SAPs aim to achieve. Answer: 1. Protect technological
breakthroughs
2. Cover exploitation of adversary vulnerabilities
3. Protect sensitive operational plans
4. Reduce intelligence on U.S. capabilities
◉ Protection Level. Answer: This communicates how the SAP is
acknowledged and protected.
◉ Acknowledged. Answer: This protection level describes a SAP
whose existence may be openly recognized. Its purpose may be
, identified. However, the details of the program (including its
technologies, materials, and techniques) are classified as dictated by
their vulnerability to exploitation and the risk of compromise. The
funding is generally unclassified.
◉ Unacknowledged. Answer: This protection level describes a SAP
whose existence and purpose are protected. The details,
technologies, materials, and techniques are classified as dictated by
their vulnerability to exploitation and the risk of compromise. The
program funding is often classified, unacknowledged, or not directly
linked to the program.
◉ SAP Lifecycle. Answer: 1. Establishment (is extra protection
warranted?)
2. Management and Administration (continued need? processed
followed?)
3. Apportionment (proper measures in place? approval received)
4. Disestablishment (program no longer needed?)
◉ Component-level SAP Central Offices. Answer: Exist for each
military component, the Joint Chiefs of Staff, Defense Advanced
Research Projects Agency (DARPA), and Missile Defense Agency
(MDA)