latest update
Describe the purpose, intent, and security professional's role in each step of the Command Cyber Readiness
Inspections (CCRI) process - correct answerDefining the scope, the inspection phase, documentation of
observations, and reporting findings. A security professional would have responsibilities in defining the scope of
the inspection, overseeing the self-inspection and remediation efforts, and coordinating with the CCRI team
throughout the remainder of the process
List two factors that should be considered when determining position sensitivity - correct answer(1) Level of
access to classified information (2) IT level needed (3) Duties associated with position
Explain the process for responding to a "spillage" - correct answer1. Detection (implied)
2. Notification and preliminary inquiry
3. Containment and continuity of operations
4. Formal inquiry
5. Resolution
6. Reporting
Explain how the adjudication process contributes to effective risk management of DoD assets - correct
answerDetermines an individual's loyalty, reliability, and trustworthiness are in the best interest of national
security
Explain why access control measures are contingent on Force Protection Conditions - correct answerThe
Force Protection Conditions determine the amount of control measures needed to be taken in response to
various levels of threats against military facilities or installations.
Define the purpose and function of the militarily critical technologies list (MCTL) - correct answerServes as a
technical reference for the development and implementation of DoD technology, security policies on
international transfers of defense-related goods, services, and technologies as administered by the Director,
Defense Technology Security Administration (DTSA).
Describe how authorization of Limited Access Authority impacts risk to DoD assets - correct answerIncreases
risk by allowing a foreign national access to classified information. Reduces risk by ensuring Foreign Nationals
with a unique or unusual skills set have been properly investigated, adjudicated or vetted before being granted
access to specific pieces of classified information only.
List three different types of threats to classified information - correct answer(1) Insider threat
(2) Foreign Intelligence entities
(3) Cybersecurity Threat
What is the security professionals' role in pursuing and meeting cyber security goals? - correct answerThe role
of the cyberspace workforce is to "secure, defend, and preserve data, networks, net-centric capabilities, and
other designated systems by ensuring appropriate security controls and measures are in place, and taking
internal defense actions" (DoDD 8140.01). Per DoDI 8500.01, Cybersecurity (March 14, 2014), personnel
occupying cybersecurity positions must be assigned in writing and trained / qualified in accordance with their
role.
Identify specific baseline administrative and/or physical security controls applicable to each system
categorization - correct answerControls are identified by enumerating the common controls, identifying those
relevant to the categorization level as defined in NIST SP 800-53, potentially tailored by the Authorizing Official,
and overlays are applied based on the nature of the system.
List three (3) factors for determining whether US companies are under Foreign Ownership Control of Influence
(FOCI) - correct answer1. Record of economic and government espionage against the US targets.
2. Record of enforcement/engagement in unauthorized technology transfer.
, 3. Type and sensitivity of the information that shall be accessed.
4. The source, nature and extent of FOCI.
5. Record of compliance with pertinent US laws, regulations and contracts.
6. Nature and bilateral and multilateral security and information exchange agreements.
7. Ownership or control in whole or part, by a foreign government.
How does lack of attention to the concept of compilation of information introduce risks to DoD assets? - correct
answer1. Unauthorized disclosure
2. Misclassification
3. Security Violation
4. Improper safeguarding
5. Improper dissemination
6. Improper handling
7. Improper destruction
8. Data Spill
List at least three indicators of insider threats - correct answer1. Failure to report overseas travel or contact with
foreign nationals.
2. Seeking to gain higher clearance or expand access outside the job scope.
3. Engaging in classified conversations without a need to know.
4. Working hours inconsistent with job assignment or insistence on working in private.
5. Exploitable behavior traits.
6. Repeated security violations.
7. Attempting to enter areas not granted access to.
8. Unexplained affluence/living above one's means.
9. Anomalies (adversary taking actions which indicate they are knowledgeable to information).
10. Illegal downloads of information/files.
What is the difference between physical security surveys and physical security inspections? - correct answerA
physical security survey is a formal record assessment of an installation's overall security posture; whereas a
physical security inspection is a formal record of compliance of physical procedures and measures
implemented by a unit or activity to protect its assets
Describe the security professional's possible roles in handling a security incident (*hint SSRII*) - correct
answer1. Secure
2. Safeguard
3. Report
4. Inquire
5. Investigate
List at least three individuals in the personnel security investigation (PSI) process and describe their roles -
correct answerFacility Security Officer/Security Manager/Security Officer/Security Coordinator/Security
Assistant: initiates, reviews, forwards E-Qip investigation to investigation service provider (ISP)
Subject: Completes forms and provides additional information if required
Investigator: Conducts PSI
Adjudicator: Determines security clearance eligibility
What are at least three principle incidents/events required to be reported to DoD counterintelligence (CI)
organizations? - correct answer1. Espionage
2. Sabotage
3. Terrorism
4. Cyber
5. Insider Threat
List three elements that a security professional should consider when assessing and managing risks to DoD
assets - correct answer1. Asset