Written by students who passed Immediately available after payment Read online or as PDF Wrong document? Swap it for free 4.6 TrustPilot
logo-home
Exam (elaborations)

SAPPC Study Guide 50 Question with correct answers latest update

Rating
-
Sold
-
Pages
6
Grade
A+
Uploaded on
18-02-2024
Written in
2023/2024

Describe the purpose, intent, and security professional's role in each step of the Command Cyber Readiness Inspections (CCRI) process - correct answerDefining the scope, the inspection phase, documentation of observations, and reporting findings. A security professional would have responsibilities in defining the scope of the inspection, overseeing the self-inspection and remediation efforts, and coordinating with the CCRI team throughout the remainder of the process List two factors that should be considered when determining position sensitivity - correct answer(1) Level of access to classified information (2) IT level needed (3) Duties associated with position Explain the process for responding to a "spillage" - correct answer1. Detection (implied) 2. Notification and preliminary inquiry 3. Containment and continuity of operations 4. Formal inquiry 5. Resolution 6. Reporting Explain how the adjudication process contributes to effective risk management of DoD assets - correct answerDetermines an individual's loyalty, reliability, and trustworthiness are in the best interest of national security Explain why access control measures are contingent on Force Protection Conditions - correct answerThe Force Protection Conditions determine the amount of control measures needed to be taken in response to various levels of threats against military facilities or installations. Define the purpose and function of the militarily critical technologies list (MCTL) - correct answerServes as a technical reference for the development and implementation of DoD technology, security policies on international transfers of defense-related goods, services, and technologies as administered by the Director, Defense Technology Security Administration (DTSA). Describe how authorization of Limited Access Authority impacts risk to DoD assets - correct answerIncreases risk by allowing a foreign national access to classified information. Reduces risk by ensuring Foreign Nationals with a unique or unusual skills set have been properly investigated, adjudicated or vetted before being granted access to specific pieces of classified information only. List three different types of threats to classified information - correct answer(1) Insider threat (2) Foreign Intelligence entities (3) Cybersecurity Threat What is the security professionals' role in pursuing and meeting cyber security goals? - correct answerThe role of the cyberspace workforce is to "secure, defend, and preserve data, networks, net-centric capabilities, and other designated systems by ensuring appropriate security controls and measures are in place, and taking internal defense actions" (DoDD 8140.01). Per DoDI 8500.01, Cybersecurity (March 14, 2014), personnel occupying cybersecurity positions must be assigned in writing and trained / qualified in accordance with their role. Identify specific baseline administrative and/or physical security controls applicable to each system categorization - correct answerControls are identified by enumerating the common controls, identifying those relevant to the categorization level as defined in NIST SP 800-53, potentially tailored by the Authorizing Official, and overlays are applied based on the nature of the system. List three (3) factors for determining whether US companies are under Foreign Ownership Control of Influence (FOCI) - correct answer1. Record of economic and government espionage against the US targets. 2. Record of enforcement/engagement in unauthorized technology transfer.

Show more Read less
Institution
Course

Content preview

SAPPC Study Guide 50 Question with correct answers
latest update
Describe the purpose, intent, and security professional's role in each step of the Command Cyber Readiness
Inspections (CCRI) process - correct answerDefining the scope, the inspection phase, documentation of
observations, and reporting findings. A security professional would have responsibilities in defining the scope of
the inspection, overseeing the self-inspection and remediation efforts, and coordinating with the CCRI team
throughout the remainder of the process

List two factors that should be considered when determining position sensitivity - correct answer(1) Level of
access to classified information (2) IT level needed (3) Duties associated with position

Explain the process for responding to a "spillage" - correct answer1. Detection (implied)
2. Notification and preliminary inquiry
3. Containment and continuity of operations
4. Formal inquiry
5. Resolution
6. Reporting

Explain how the adjudication process contributes to effective risk management of DoD assets - correct
answerDetermines an individual's loyalty, reliability, and trustworthiness are in the best interest of national
security

Explain why access control measures are contingent on Force Protection Conditions - correct answerThe
Force Protection Conditions determine the amount of control measures needed to be taken in response to
various levels of threats against military facilities or installations.

Define the purpose and function of the militarily critical technologies list (MCTL) - correct answerServes as a
technical reference for the development and implementation of DoD technology, security policies on
international transfers of defense-related goods, services, and technologies as administered by the Director,
Defense Technology Security Administration (DTSA).

Describe how authorization of Limited Access Authority impacts risk to DoD assets - correct answerIncreases
risk by allowing a foreign national access to classified information. Reduces risk by ensuring Foreign Nationals
with a unique or unusual skills set have been properly investigated, adjudicated or vetted before being granted
access to specific pieces of classified information only.

List three different types of threats to classified information - correct answer(1) Insider threat
(2) Foreign Intelligence entities
(3) Cybersecurity Threat

What is the security professionals' role in pursuing and meeting cyber security goals? - correct answerThe role
of the cyberspace workforce is to "secure, defend, and preserve data, networks, net-centric capabilities, and
other designated systems by ensuring appropriate security controls and measures are in place, and taking
internal defense actions" (DoDD 8140.01). Per DoDI 8500.01, Cybersecurity (March 14, 2014), personnel
occupying cybersecurity positions must be assigned in writing and trained / qualified in accordance with their
role.

Identify specific baseline administrative and/or physical security controls applicable to each system
categorization - correct answerControls are identified by enumerating the common controls, identifying those
relevant to the categorization level as defined in NIST SP 800-53, potentially tailored by the Authorizing Official,
and overlays are applied based on the nature of the system.

List three (3) factors for determining whether US companies are under Foreign Ownership Control of Influence
(FOCI) - correct answer1. Record of economic and government espionage against the US targets.
2. Record of enforcement/engagement in unauthorized technology transfer.

, 3. Type and sensitivity of the information that shall be accessed.
4. The source, nature and extent of FOCI.
5. Record of compliance with pertinent US laws, regulations and contracts.
6. Nature and bilateral and multilateral security and information exchange agreements.
7. Ownership or control in whole or part, by a foreign government.

How does lack of attention to the concept of compilation of information introduce risks to DoD assets? - correct
answer1. Unauthorized disclosure
2. Misclassification
3. Security Violation
4. Improper safeguarding
5. Improper dissemination
6. Improper handling
7. Improper destruction
8. Data Spill

List at least three indicators of insider threats - correct answer1. Failure to report overseas travel or contact with
foreign nationals.
2. Seeking to gain higher clearance or expand access outside the job scope.
3. Engaging in classified conversations without a need to know.
4. Working hours inconsistent with job assignment or insistence on working in private.
5. Exploitable behavior traits.
6. Repeated security violations.
7. Attempting to enter areas not granted access to.
8. Unexplained affluence/living above one's means.
9. Anomalies (adversary taking actions which indicate they are knowledgeable to information).
10. Illegal downloads of information/files.

What is the difference between physical security surveys and physical security inspections? - correct answerA
physical security survey is a formal record assessment of an installation's overall security posture; whereas a
physical security inspection is a formal record of compliance of physical procedures and measures
implemented by a unit or activity to protect its assets

Describe the security professional's possible roles in handling a security incident (*hint SSRII*) - correct
answer1. Secure
2. Safeguard
3. Report
4. Inquire
5. Investigate

List at least three individuals in the personnel security investigation (PSI) process and describe their roles -
correct answerFacility Security Officer/Security Manager/Security Officer/Security Coordinator/Security
Assistant: initiates, reviews, forwards E-Qip investigation to investigation service provider (ISP)

Subject: Completes forms and provides additional information if required

Investigator: Conducts PSI

Adjudicator: Determines security clearance eligibility

What are at least three principle incidents/events required to be reported to DoD counterintelligence (CI)
organizations? - correct answer1. Espionage
2. Sabotage
3. Terrorism
4. Cyber
5. Insider Threat

List three elements that a security professional should consider when assessing and managing risks to DoD
assets - correct answer1. Asset

Written for

Course

Document information

Uploaded on
February 18, 2024
Number of pages
6
Written in
2023/2024
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

$9.42
Get access to the full document:

Wrong document? Swap it for free Within 14 days of purchase and before downloading, you can choose a different document. You can simply spend the amount again.
Written by students who passed
Immediately available after payment
Read online or as PDF

Get to know the seller
Seller avatar
juiceyoung81

Get to know the seller

Seller avatar
juiceyoung81 Stanford University
Follow You need to be logged in order to follow users or courses
Sold
-
Member since
2 year
Number of followers
0
Documents
119
Last sold
-
"Scholar's Hub: Your Academic Oasis"

"Elevate your learning journey with expertly curated study materials. Explore a diverse range of documents meticulously crafted to help you succeed academically. From comprehensive notes to insightful guides, find the resources you need to excel in your studies. Invest in your education today!"

0.0

0 reviews

5
0
4
0
3
0
2
0
1
0

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Working on your references?

Create accurate citations in APA, MLA and Harvard with our free citation generator.

Working on your references?

Frequently asked questions