s and Ansẉers n n n
2025\2026 update n
1. What does "SAPPC" stand for?
n n n n n
Security Asset Protection Professional Certification .
n n n n n
2. SPēD is an abbreviation for what?
n n n n n n
Security Professional Education Development .
n n n n
3. SPēD is a certification program of what agency?
n n n n n n n n
Department of Defense . n n n
4. What is the definition of Security Asset Protection Profession
n n n n n n n n n
al Certification (SAPPC)?
n n
The individual applies foundational security concepts, principles,
n n n n n n n
and practices .
n n
5. What is the definition of Security Fundamentals Professional
n n n n n n n n n
Certification (SFPC)? n
The individual understands foundational security concepts, princi
n n n n n n
ples, and practices .
n n n
6. What is the definition of Security Program Integration Profess
n n n n n n n n n
ional Certification (SPIPC)?
n n
The individual understands and applies risk assessment and secur
n n n n n n n n
ity program management based on security concepts, principles,
n n n n n n n n
and practices .
n n
, 7. Sharing and reporting information is essential to detecting po
n n n n n n n n n
tential insider threats. True or False?
n n n n n
True . n
8. Two security professionals are discussing security program ar
n n n n n n n n
eas. Paul says Information Security practitioners train Original C
n n n n n n n n
lassification Authorities. Ashley says Physical Security practitio
n n n n n n
ners work with the Antiterrorism Officer. Who is correct?
n n n n n n n n
Both are correct .
n n n
9. Which security area involves monitoring employees for new i
n n n n n n n n n
nformation that could affect clearance eligibility?
n n n n n
Personnel Security . n n
10. Which security area involves training Original Classification
n n n n n n n n
Authorities?
Information Security . n n
Insider Threat & Counterintelligence
n n n
11. What are the three principle incidents/events required to be
n n n n n n n n n
reported to DoD Counterintelligence (CI) organizations?
n n n n n n
Espionage, Sabotage, Terrorism & Cyber Policy .
n n n n n n
12. Who could become an insider threat?
n n n n n n
Any person with authorized access to any US government resourc
n n n n n n n n n
es .n
13. What Executive Order required government agencies to est
n n n n n n n n
ablish insider threat programs?
n n n
Executive Order 13587 . n n n