Written by students who passed Immediately available after payment Read online or as PDF Wrong document? Swap it for free 4.6 TrustPilot
logo-home
Exam (elaborations)

GENERAL SECURITY (SPED)

Rating
-
Sold
-
Pages
11
Grade
A+
Uploaded on
10-07-2023
Written in
2022/2023

GENERAL SECURITY (SPED) Name the goals of integrating CI and threat awareness into a security program? 1.Maintain a strategic advantage in operations, programs, and classified research and development. 2. Assist in force protection. 3. Provide security awareness tools for establishing security countermeasures. 4. Ensure integrity of DoD and U.S. industry program secrets, technologies, and operations. 5. Protect our warfighters. Provides the legal requirement to use lawful means to ensure U.S. receives the best intelligence available, name the source. E.O. 12333 The manual that includes CI-related requirements for industry is? DoD 5220.22-M NISPOM Regulation mandating the reporting of suspicious activities or potential espionage indicators DoDD 5240.06, Counterintelligence Awareness and Reporting (CIAR) Regulation mandating the establishment of an insider threat program DoDD 5205.16, Insider Threat Program Protect anything that, if compromised, would: name all 5 of them. 1.Significantly damage national security 2. Alter the program's direction. 3. Compromise the program or system capabilities. 4. Shorten the expected system life. 5. Require research and development to counter the impact of loss. What is first line of defense against espionage? your personnel All imminent threats—whether DoD facility or personnel or contractor facility—must be reported immediately a

Show more Read less
Institution
Course

Content preview

GENERAL SECURITY (SPED)
Name the goals of integrating CI and threat awareness into a security program?
1.Maintain a strategic advantage in operations, programs, and classified research and
development.
2. Assist in force protection.
3. Provide security awareness tools for establishing security countermeasures.
4. Ensure integrity of DoD and U.S. industry program secrets, technologies, and
operations.
5. Protect our warfighters.
Provides the legal requirement to use lawful means to ensure U.S. receives the
best intelligence available, name the source.
E.O. 12333
The manual that includes CI-related requirements for industry is?
DoD 5220.22-M NISPOM
Regulation mandating the reporting of suspicious activities or potential
espionage indicators
DoDD 5240.06, Counterintelligence Awareness and Reporting (CIAR)
Regulation mandating the establishment of an insider threat program
DoDD 5205.16, Insider Threat Program
Protect anything that, if compromised, would: name all 5 of them.
1.Significantly damage national security
2. Alter the program's direction.
3. Compromise the program or system capabilities.
4. Shorten the expected system life.
5. Require research and development to counter the impact of loss.
What is first line of defense against espionage?
your personnel
All imminent threats—whether DoD facility or personnel or contractor facility—
must be reported immediately and directly to the appropriate law enforcement
agency, which, in most cases within the United States is?
FBI
In addition to collecting and processing intelligence about our enemies, the
Intelligence Community is also faced with the problem of identifying,
understanding, prioritizing, and counteracting the foreign intelligence threats that
are encountered by the United States. This activity is known as
counterintelligence.
Every cleared defense contractor (CDC) has a _________________ who is
responsible for the overall security of the facility and for ensuring that security
regulations and policies are followed.
facility security officer (FSO)
What 3 statements describe why reporting certain information is important?
Name all 3.
1. Reporting suspicious contacts can lead to the capture of individuals seeking to harm
national security.
2. Reporting adverse information about employees of cleared contractor facilities can

, help to safeguard classified information.
3. Failing to report an employee's failure to follow safeguarding procedures can lead to
the disclosure of classified information, which may result in the loss of life of our service
members.
Several regulatory and legal documents form the basis for the requirements to
report.The baseline security requirements (including the requirement to report)
that ensure protection of classified information by contractors is called what?
NISPOM (correct response)
Established the partnership between the U.S. government and private industry
that is known as the National Industrial Security Program is what order.
E.O. 12829
The contractual agreement in which contractors agree to maintain minimum
security controls to protect classified information
DD Form 441, DD Form 441 is the contractual agreement in which contractors agree to
maintain minimum security controls to protect classified information in accordance with
the NISPOM.
Different types of information require reporting to different government entities.,
Where do you report PSMO-I
Changes to personnel information (correct response)
Changes in facility information should be reported to the
DSS IS REP
According to NISPOM paragraph 1-302g, you must report a change in
company ownership. You must also report changes in the name or address of the
company or facility, changes to Key Management Personnel (KMPs), termination of
company operations for any reason, and changes in Foreign Ownership, Control, or
Influence (FOCI).
An _________________ is anyone with authorized access to the information or
things an organization values most, and who uses that access - either wittingly or
unwittingly - to inflict harm to the organization or national security. When an
insider becomes a threat, it can have far-reaching consequences on
organizations, companies, and national security.
insider threat
Employees of cleared industry must report potential threats to the
__________________?
Facility Insider Threat Program Senior Official (ITPSO) or Facility Security Officer
(FSO).
The OPSEC process consists of five steps. Each step provides the answers to
some very important questions. Name the 5 steps.
Step 1 is identifying critical information.
Step 2 is analyzing threats.
Step 3 is analyzing vulnerabilities.
Step 4 is assessing risks.
Step 5 is applying OPSEC countermeasures.
What does SAPs aim to achieve? Name all 4 of them.
1.Protect technological breakthroughs
2. Cover exploitation of adversary vulnerabilities

Written for

Course

Document information

Uploaded on
July 10, 2023
Number of pages
11
Written in
2022/2023
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

$11.49
Get access to the full document:

Wrong document? Swap it for free Within 14 days of purchase and before downloading, you can choose a different document. You can simply spend the amount again.
Written by students who passed
Immediately available after payment
Read online or as PDF

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
LectDan Teachme2-tutor
Follow You need to be logged in order to follow users or courses
Sold
220
Member since
3 year
Number of followers
157
Documents
7985
Last sold
1 month ago

4.0

47 reviews

5
25
4
12
3
2
2
3
1
5

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Working on your references?

Create accurate citations in APA, MLA and Harvard with our free citation generator.

Working on your references?

Frequently asked questions