Save
Students also studied
Flashcard sets Study guides Practice tests
SFPC Practice Test DCSA SPeD: Physical Security Certif... CCSP 2020 BEST EXA
100 terms 64 terms 902 terms
rcmegan21 Preview cgonchar Preview Andreas-the-best
SPeD is an abbreviation for? Security Professional Education Development
SPed is a certification program Department of Defense
of what agency?
Security Fundamentals The individual understands foundational security concepts,
Professional Certification (SFPC) principles, and practices. (Core Certification for SPed)
Security Asset Protection The Individual applies foundational security concepts, principles,
Professional Certification and practices. (Core Certification for SPed)
(SAPPC)
Security Program Integration The individual understands and applies risk assessment and
Professional Certification security program management based on security concepts,
(SPIPC) principles, and practices. (Core Certification for SPed)
Security Enterprise Professional The individual understands and applies concepts, principles, and
Certification (SEPC) practices for managing enterprise-wide security
What are the three principle Answer: Espionage, Sabotage, Terrorism, & Cyber Policy: DoD
incident/events required to be 5220.22M, "NISPOM" - E.O. 12333-DoDI 5200.01, DoD Information
reported to DoD Security and Protection of SCI
Counterintelligence (CI)
organizations?
PMO is an abbreviation for? Program Management Office
Provides the legal requirements E.O. 12333
to use lawful means to ensure U.
S. receives the best intelligence
available
The manual that includes CI- DoD 5220.2.2-M NISPOM
related requirements for
industry
Regulation mandating CI- DoDI5240.6: CI Awareness, Briefing, and Reporting Programs
specific training, briefing, and
reporting
, Regulation providing DoD 5200.1-R: information Security Program
procedures to follow when
classified information is
compromised
What are three principle Espionage Sabotage Terrorism Cyber
incidents/ events required to
report to DoD
counterintelligence (CI)
organizations?
1. Insider Threat
List three different types of
2. Foreign Intelligence Entities (FIE)
threats to classified information.
3. Cybersecurity Threat
Failure to report overseas travel or contact with foreign nationals
Seeking to gain higher clearance or expand access outside the
job scope
Engaging in classified conversations without a need to know
List three indicators of insider
Working hours inconsistent with job assignment or insistence on
threats.
working in private
Exploitable behavior traits
Repeated security violations
Attempting to enter areas not granted access to
Elements which if compromised could:
1. Cause significant degradation in mission effectiveness
List three elements that should
2. Shorten the expected combat-effective life of the system
be considered in identifying
3. Reduce technological advantage
Critical Program Information.
4. Significantly alter program direction
5. Enable an adversary to defeat, counter, copy, or reverse-
engineer the technology or capability.
An employee who may represent a threat to national security.
These threats encompass potential espionage, violent acts
Briefly describe the concept of against the Government or the nation, and unauthorized
insider threat. disclosure of classified information, including the vast amounts of
classified data available on interconnected United States
Government computer networks and systems.
Asset
List three elements that a
Threat
security professional should
Vulnerability
consider when assessing and
Risk
managing risks to DoD assets.
Countermeasures
To track and approve access by a foreign entity to information
Describe the purpose of the that is classified; and to approve access by a foreign entity to
Foreign Visitor Program. information that is unclassified, related to a U.S. Government
contract, or plant visits covered by ITAR.
1. Acquisition
List three categories of Special
2. Intelligence
Access Programs.
3. Operations and Support
A program established for a specific class of classified
Briefly define a Special Access information that imposes safeguarding and access requirements
Program. that exceed those normally required for information at the same
classification level.