SFPC TEST 2023-2024 ACTUAL EXAM 200 QUESTIONS AND CORRECT
DETAILED ANSWERS WITH RATIONALES (100% CORRECT AND
VERIFIED ANSWERS) |ALREADY GRADED A||BRAND NEW!!
Which of the following is correct regarding the investigation requirement for initial
assignment to a Presidential Support Activities (i.e. Yankee White) Category 2
position?
a. Favorably completed Tier 5/Single Scope Background Investigation (SSBI)
within 36 months preceding selection.
b. Favorably completed Tier 3/National Agency Check with Local Agency Check
(NACLC) within 36 months preceding selection.
c. Favorably completed Tier 5/SSBI within 24 months preceding selection.
d. Favorably completed Tier 3/NACLC within 24 months preceding selection. -
ANSWER- A
Which of the following adjudication processes refers to a person's identifiable
character traits and conduct sufficient to decide whether employment or continued
employment would or would not protect the integrity or promote the efficiency of
the Federal service?
a. Homeland Security Presidential Directory (HSPD) 12 credentialing
b. National security adjudication
c. Suitability adjudication
d. Continuous evaluation - ANSWER- C
All unclassified DoD information in the possession or control of non-DoD entities
on non-DoD information systems, to the
extent provided by the applicable grant, shall minimally be safeguarded under
which of the following standards?
a. Information holders must use the Secret Internet Protocol Router Network
(SIPRNET) to transmit such information.
b. Such information may be store in an open storage area, provided the room is
equipped with an Intrusion Detection System (IDS) with the personnel responding
to an alarm within 15 minutes of the alarm annunciation.
c. Such information must be stored in a General Services Administration (GSA)-
approved security container equipped with a lock meeting FF-L-2740 standards.
d. Organizational wireless connections holding such information must be
encrypted, and those accessing such information must use encrypted wireless
connections where available when traveling. - ANSWER- D
Copies of personnel security investigative reports must be destroyed by DoD
recipient organizations, within how many days following completion
of the necessary personnel security determination?
a. 30 days
b. 45 days
c. 60 days
d. 90 days - ANSWER- D
Which of the following limitations is true regarding Limited Access Authorization
(LAA) to non-U.S. citizens?
a. LAAs shall only be granted access at the Secret and Confidential levels.
b. A favorably completed and adjudicated Tier 3 or National Agency Check with
Local Agency Check (NACLC). investigation within the last five years is required.
c. An LAA is the same as a security clearance eligibility.
d. Access to classified information Is not limited to a specific program or project. -
ANSWER- A
28. Which of the following is not considered when making a security clearance
eligibility determination?
a. Education Level
b. Alcohol consumption
c. Financial considerations
d. Psychological Conditions - ANSWER- A
A position designated as a DoD noncritical-sensitive civilian position may fall
under any of the following criteria, EXCEPT:
a. A position not requiring eligibility for access to classified information, but
having the potential to cause significant or serious damage to the national security.
b. A position requiring eligibility for access to Top Secret information.
c. A position requiring eligibility for access to confidential information.
d. A position requiring eligibility for access to secret information. - ANSWER- B
What information must a statement of reasons (SOR) include?
a. SOR must state why an unfavorable national security eligibility determination is
being proposed.
b. SOR must explain each security concern and state the specific facts that trigger
each security concern.
c. The SOR must identify applicable adjudicative guideline(s) for each concern,
and provide the disqualifying conditions and mitigating conditions for each
guideline.
d. All of the Above - ANSWER- D
Which type of briefing is used to obtain confirmation that a cleared employee
agrees never to disclose classified information to an unauthorized person?
a. Special Briefings - Courier
b. Original Classification Authority (OCA) Briefing
c. Special Briefings - Non-Disclosure
d. Debriefing - ANSWER- C
___________is the security system performance goal of immediate indication of
deliberate attempts, security probing and warning for inadvertent or mistaken
intention
is an example of which system security capability?
a. Detect
b. Assessment
c. Deterrence
d. Delay - ANSWER- C
Two security professionals - Paul and Ashley - are discussing secure rooms,
containers, and vaults. Paul says weapons or sensitive items such as funds, jewels,
or precious metals should not be stored in the same security container as classified
information. Ashley says the General Service Administration approves security
containers used to store classified information. Who is correct?
a. Paul is correct
b. Ashley is correct
c. Paul and Ashley are both correct
d. Paul and Ashley are both incorrect - ANSWER- C
Which of the following is not a distinct phase of the Intrusion Detection System?
a. Detection
b. Control
c. Assessment
d. Response - ANSWER- B
Which of the following would be considered a public safety crime?
a. Theft of ammunition shipment for the purpose of criminal or gang related
activity.
b. Theft of sensitive, proprietary information relating to US aerospace and defense
technologies.
c. Deliberate destruction of DoD assets or interruption of normal operations.
d. Theft of an item and use of it outside of its intended purpose or without
permission. - ANSWER- A
Which of the following best describes the goal of the Physical Security Program?
a. To ensure that industry safeguards the classified information in their possession,
while performing work on contracts, bids, or research and development efforts on
behalf of the government.
b. To protect assets against compromise resulting from activities such as
espionage, sabotage, terrorism, damage or loss, and criminal.
c. To ensure that only loyal, trustworthy, and reliable individuals may access
classified information or perform sensitive duties.
d. To create uniform policies and procedures for defense acquisition by all
executive agencies. - ANSWER- B
Preventing unauthorized access to information
and equipment, safeguarding DoD assets against espionage and criminal activity,
and providing the means to counter threats when preventative measures are
ignored, best characterize the primary functions of which of the following
programs or processes?
a. Physical Security Program
b. Operations Security (OPSEC) process
c. Security incident response process
d. Personnel Security Program - ANSWER- A
The process of integrating active and passive complementary physical security
measures to ensure the protection of DoD assets is known as which of the
following concepts?
a. Area security
b. Threat-vulnerability assessment
c. Security-in-depth
d. Point security - ANSWER- C
The stealing of sensitive, proprietary information related to U.S. aerospace and
defense technologies with the intent to provide such information to a foreign
adversary is an example of which type of threat to DoD assets?
Category | Exams and Certifications |
Comments | 0 |
Rating | |
Sales | 0 |