Practice Test Security Fundamentals Professional Certification (SFPC) Multiple Choice. Multiple-Choice Sample Question # 1



Similar documents
TRAINING PRODUCTS & RESOURCES

Safeguards and Security

Security and Emergency Services Community of Interest 0080-Information/Personnel Security Administration Career Road Map

Science/Safeguards and Security. Funding Profile by Subprogram

OFFICE OF ASSISTANT MANAGER FOR SAFEGUARDS, SECURITY, AND EMERGENCY MANAGEMENT OAK RIDGE OFFICE OFFICE OF SCIENCE U.S. DEPARTMENT OF ENERGY

NATO SECURITY BRIEFING NATO/ATOMAL SECURITY BRIEFING

Defense Security Service (DSS)

Department of Commerce Office of Security. Initial Information Security Briefing

POSITION CLASSIFICATION STANDARD FOR SECURITY ADMINISTRATION SERIES, GS-0080

Commanding Officer and Executive Officer. Information and Personnel Security Reference Handbook

Introduction. Derivative Classification Training JOB AID

Table of Contents CDSE. Together, we will address evolving threats to national security so that we can keep our nation and the warfighter safe.

SECURITY ORIENTATION

JOB AID. Derivative Classification Training U N I T E D A M E R I C A S TAT E S O F. Center for Development of Security Excellence (CDSE)

UNCLASSIFIED UNCLASSIFIED UNCLASSIFIED UNCLASSIFIED 1

Information Security: Roles, Responsibilities, and Data Classification. Technology Services 1/4/2013

Security Awareness Program Learning Objectives. By Aron Warren Last Update 6/29/2012

One Hundred Twelfth Congress of the United States of America


Webinar Questions and Answers

Consultant Annual DoD Security Refresher

Self-Inspection Handbook for NISP Contractors TABLE OF CONTENTS

SMSe Privacy Impact Assessment

Client Update NFA Adopts Interpretive Notice Regarding Information Systems Security Programs

V: RECOMMENDATIONS TERRORIST ATTACKS ON U.S. FACILITIES IN BENGHAZI

Public Law th Congress An Act

DSS Monthly Newsletter

Big Data As a Threat? An Alternative Approach to Cybersecurity

AIRSPACE WAIVERS AND FLIGHT AUTHORIZATIONS FOR CERTAIN AVIATION OPERATIONS (INCLUDING DCA) (Amended)

There are many examples of sensitive information falling into the wrong hands. What s the worst that can happen? The worst has already happened.

Legislative Language

The system: does NOT contain PII. If this is the case, you must only complete Section 13.

Mission, Vision and FY10 Initiatives

[SUBPART CLOUD COMPUTING (DEVIATION 2015-O0011) Prescribes policies and procedures for the acquisition of cloud computing services.

Business Case Outsourcing Information Security: The Benefits of a Managed Security Service

INTELLIGENCE AND ANALYSIS

National Information Assurance Training Standard For Senior System Managers

OSAC Committees are as follows: Threats and Information Sharing; Country Council and Outreach; and Security Awareness and Innovation.

U.S. DoD Physical Security Market

Security+ Guide to Network Security Fundamentals, Fourth Edition. Chapter 14 Risk Mitigation

Outside Director and Proxy Holder Training: Module 2: Managing Foreign Ownership, Control, or Influence (FOCI) Mitigation Defense Security Service

Department of Homeland Security DHS Directives System Directive Number: Revision Number: 00 Issue Date: SPECIAL ACCESS PROGRAM MANAGEMENT

BUDGET LETTER PEER-TO-PEER FILE SHARING , , EXECUTIVE ORDER S-16-04

United States Department of State Privacy Impact Assessment Risk Analysis and Management

John Essner, CISO Office of Information Technology State of New Jersey

TITLE III INFORMATION SECURITY

Department of Veterans Affairs VA Directive 0710 PERSONNEL SECURITY AND SUITABILITY PROGRAM

Data Loss Prevention Program

Online Lead Generation: Data Security Best Practices

Outside Director and Proxy Holder Training: Module 1: Intro to DSS and Foreign Ownership, Control, or Influence (FOCI) Defense Security Service

JOINT EXPLANATORY STATEMENT TO ACCOMPANY THE CYBERSECURITY ACT OF 2015

CNA 432/532 OSI Layers Security

Computer Security Incident Reporting and Response Policy

Risk Management Handbook

United States Department of Commerce. Office of Security. Orientation Briefing. Security is Everyone s Responsibility!

No. 33 February 19, The President

Army Regulation Security. Department of the Army. Information Security Program. Headquarters. Washington, DC 29 September 2000 UNCLASSIFIED

Feedback Ferret. Security Incident Response Plan

Industry. Cyber Security. Information Sharing at the Technical Level. Guidelines

GEM Technology Corporate Overview & Statement of Qualifications December 2015

CHAPTER 1 COMPUTER SECURITY INCIDENT RESPONSE TEAM (CSIRT)

developing your potential Cyber Security Training

Hosting Foreign Nationals at DOE Sites

What are you trying to secure against Cyber Attack?

Position Classification Flysheet for Security Clerical and Assistance Series, GS-0086

October 10, Protecting Whistleblowers with Access to Classified Information

Information Security Policy

HIPAA Compliance Review Analysis and Summary of Results

E3211. DOT Hazmat Security Awareness. Leader s Guide

Appendix. Key Areas of Concern. i. Inadequate coverage of cybersecurity risk assessment exercises

INTELLIGENCE COMMUNITY STANDARD NUMBER 700-1

Policies and Procedures Audit Checklist for HIPAA Privacy, Security, and Breach Notification

Overview of the HIPAA Security Rule

06100 POLICY SECURITY AND INFORMATION ASSURANCE

The President. Part VII. Tuesday, January 5, 2010

IN THE WAR ON TERRORISM

Joint Publication Operations Security

The Need to Share: The U.S. Intelligence Community and Law Enforcement

Department of Defense INSTRUCTION

Standards for Security Categorization of Federal Information and Information Systems

National Security & Homeland Security Councils Review of National Cyber Security Policy. Submission of the Business Software Alliance March 19, 2009

With the large number of. How to Avoid Disaster: RIM s Crucial Role in Business Continuity Planning. Virginia A. Jones, CRM, FAI RIM FUNDAMENTALS

REGULATIONS OF THE EUROPEAN SPACE AGENCY. Security Regulations

ANTITERRORISM AWARENESS FOR SOCIAL NETWORKING

Image credits: Front cover: U.S. Army photo by Sgt. Brandon Little, Task Force XII PAO, MND-B Inside back cover: U.S Army photo by Staff Sgt.

H. R SEC DIRECTORATE FOR INFORMATION ANALYSIS AND INFRA STRUCTURE PROTECTION.

INFORMATION SECURITY STRATEGIC PLAN

Information Classification and. Handling Policy

Department of Defense INSTRUCTION. Security of Unclassified DoD Information on Non-DoD Information Systems

Transcription:

The following Practice Test presents samples of the type, difficulty, and format of questions found on the SFPC assessment. At the end of the Practice Test, a table is provided outlining the topics and percentage of questions from each functional security category that are on the SFPC assessment. The SFPC assessment uses two basic types of questions: (1) Multiple Choice with one correct answer (2) Convergent True-or-False Multiple Choice A multiple choice item includes a question and a number of options listed as potential answers. In this type of question, your task is to choose the option that correctly answers the presented question. Three examples of this type of question are provided below. Take your time. Think carefully. Thoroughly read each question before answering: Multiple-Choice Sample Question # 1 Which of the following security program areas would you find practitioners who train and/ or advise Original Classification Authorities in the application of the process for making classification determinations? A. Information Security A. Information Security B. Physical Security C. Personnel Security D. Industrial Security SFPC Practice Test Page 1

Multiple-Choice Sample Question # 2 Which of the following security program areas would you find practitioners working with a facility s Antiterrorism Officer to deploy defensive measures designed to reduce the facility s vulnerability from terrorist attacks? B. Physical Security A. Information Security B. Physical Security C. Personnel Security D. Industrial Security Multiple Choice Sample Question # 3 Which of the following security programs areas would you find practitioners involved with processes that monitor employees for new information that could affect their security clearance eligibility status? E. Personnel Security A. Foreign Disclosure B. Information Security C. International Security D. Operations Security E. Personnel Security F. Physical Security G. Research and Technology Protection H. Information Assurance SFPC Practice Test Page 2

True or False A convergent true-or-false question consists of an item stem that: (1) identifies the general topic area being addressed by the item, and (2) presents two statements regarding that topic area. It then asks the respondent to determine if one or both of the statements are correct/incorrect with respect to the topic area. Two examples of this type of question are provided below. Read each question carefully and then select your answer: Convergent True-or-False Sample Question # 1 Two security professionals Paul and Ashley are discussing security program areas. C. Paul and Ashley are both correct Paul says that Information Security practitioners train and/or advise Original Classification Authorities in the application of the process for making classification determinations. Ashley says that Physical Security practitioners work with a facility s Antiterrorism Officer to deploy defensive measures designed to reduce the facility s vulnerability from terrorist attacks. Who is correct? A. Paul is correct B. Ashley is correct C. Paul and Ashley are both correct D. Paul and Ashley are both incorrect SFPC Practice Test Page 3

Convergent True-or-False Sample Question # 2 Two security professionals Paul and Ashley are discussing security program areas. D. Paul and Ashley are both incorrect Paul says that Information Security practitioners work with a facility s Antiterrorism Officer to deploy defensive measures designed to reduce the facility s vulnerability from terrorist attacks. Ashley says that Personnel Security practitioners train and/or advise Original Classification Authorities in the application of the process for making classification determinations. Who is correct? A. Paul is correct B. Ashley is correct C. Paul and Ashley are both correct D. Paul and Ashley are both incorrect SFPC Practice Test Page 4

Topics covered on the SFPC assessment: General Security 12% Counterintelligence Concepts Protected Information Categories Research and Technology Protection Concepts Release of Classified Material to Foreign Persons Security Briefings OPSEC Concepts OPSEC Threat Analysis, Indicators, and Measures Special Access Program Concepts Insider Threat Concepts and Principles Risk Assessment and Management Basic Security Forms Industrial Security 13% Contracts and Contract Administration Personnel & Facility Security Clearance Visits and Meetings Industrial Security Concepts Foreign Ownership, Control, or Influence Information Security 25% Information Security Program Classification Concepts Derivative Classification Concepts Declassification Concepts Classification Markings Policies/Procedures for Handling Special Types of Information Safeguarding Transmission and Transportation Information Assurance Concepts Information Protection Principles Classification Duration Special Classification Considerations Controlled Unclassified Information Marking Procedures Downgrading and Upgrading Classified Information Storage, Disposition, and Destruction Security Incidents SFPC Practice Test Page 5

Personnel Security 25% Personnel Security Concepts and Principles Position Sensitivity Designations Special Personnel Security Clearance Requirements Unfavorable Administrative Actions Personnel Security Investigations Personnel Security Investigative Requirements Adjudication Safeguarding Personnel Records Physical Security 25% Physical Security Concepts Facility Access Control Protective Barriers Key, Combination, and Lock Control Anti-Terrorism Concepts and Principles Search and Seizure Physical Security Standards for Storage of Classified Information Site Design Strategies Site Lighting Security Systems Devices Law Enforcement Concepts and Principles SFPC Practice Test Page 6