SFPC PRACTICE TEST 2023 AND EXAM PREP /SFPC PRACTICE EXAM ACTUAL EXAM 250 QUESTIONS AND CORRECT DETAILED ANSWERS (VERIFIED ANSWERS) |ALREADY GRADED A+
SFPC PRACTICE TEST 2023 AND EXAM PREP /SFPC
PRACTICE EXAM 2023-2024 ACTUAL EXAM 250
QUESTIONS AND CORRECT DETAILED ANSWERS
(VERIFIED ANSWERS) |ALREADY GRADED A+
Copies of personnel security investigative reports must be destroyed by DoD
recipient organizations, within how many days following completion
of the necessary personnel security determination?
a. 30 days
b. 45 days
c. 60 days
d. 90 days - ANSWER- D
Which of the following limitations is true regarding Limited Access Authorization
(LAA) to non-U.S. citizens?
a. LAAs shall only be granted access at the Secret and Confidential levels.
b. A favorably completed and adjudicated Tier 3 or National Agency Check with
Local Agency Check (NACLC). investigation within the last five years is required.
c. An LAA is the same as a security clearance eligibility.
d. Access to classified information Is not limited to a specific program or project. -
ANSWER- A
28. Which of the following is not considered when making a security clearance
eligibility determination?
a. Education Level
b. Alcohol consumption
c. Financial considerations
d. Psychological Conditions - ANSWER- A
A position designated as a DoD noncritical-sensitive civilian position may fall
under any of the following criteria, EXCEPT:
a. A position not requiring eligibility for access to classified information, but
having the potential to cause significant or serious damage to the national security.
b. A position requiring eligibility for access to Top Secret information.
c. A position requiring eligibility for access to confidential information.
d. A position requiring eligibility for access to secret information. - ANSWER- B
What information must a statement of reasons (SOR) include?
a. SOR must state why an unfavorable national security eligibility determination is
being proposed.
b. SOR must explain each security concern and state the specific facts that trigger
each security concern.
c. The SOR must identify applicable adjudicative guideline(s) for each concern,
and provide the disqualifying conditions and mitigating conditions for each
guideline.
d. All of the Above - ANSWER- D
Which type of briefing is used to obtain confirmation that a cleared employee
agrees never to disclose classified information to an unauthorized person?
a. Special Briefings - Courier
b. Original Classification Authority (OCA) Briefing
c. Special Briefings - Non-Disclosure
d. Debriefing - ANSWER- C
___________is the security system performance goal of immediate indication of
deliberate attempts, security probing and warning for inadvertent or mistaken
intention
is an example of which system security capability?
a. Detect
b. Assessment
c. Deterrence
d. Delay - ANSWER- C
Two security professionals - Paul and Ashley - are discussing secure rooms,
containers, and vaults. Paul says weapons or sensitive items such as funds, jewels,
or precious metals should not be stored in the same security container as classified
information. Ashley says the General Service Administration approves security
containers used to store classified information. Who is correct?
a. Paul is correct
b. Ashley is correct
c. Paul and Ashley are both correct
d. Paul and Ashley are both incorrect - ANSWER- C
Which of the following is not a distinct phase of the Intrusion Detection System?
a. Detection
b. Control
c. Assessment
d. Response - ANSWER- B
Which of the following would be considered a public safety crime?
a. Theft of ammunition shipment for the purpose of criminal or gang related
activity.
b. Theft of sensitive, proprietary information relating to US aerospace and defense
technologies.
c. Deliberate destruction of DoD assets or interruption of normal operations.
d. Theft of an item and use of it outside of its intended purpose or without
permission. - ANSWER- A
Which of the following best describes the goal of the Physical Security Program?
a. To ensure that industry safeguards the classified information in their possession,
while performing work on contracts, bids, or research and development efforts on
behalf of the government.
b. To protect assets against compromise resulting from activities such as
espionage, sabotage, terrorism, damage or loss, and criminal.
c. To ensure that only loyal, trustworthy, and reliable individuals may access
classified information or perform sensitive duties.
d. To create uniform policies and procedures for defense acquisition by all
executive agencies. - ANSWER- B
Preventing unauthorized access to information
and equipment, safeguarding DoD assets against espionage and criminal activity,
and providing the means to counter threats when preventative measures are
ignored, best characterize the primary functions of which of the following
programs or processes?
a. Physical Security Program
b. Operations Security (OPSEC) process
c. Security incident response process
d. Personnel Security Program - ANSWER- A
Category | Exams and Certifications |
Comments | 0 |
Rating | |
Sales | 0 |