Docsity
Docsity

Prepare for your exams
Prepare for your exams

Study with the several resources on Docsity


Earn points to download
Earn points to download

Earn points by helping other students or get them with a premium plan


Guidelines and tips
Guidelines and tips

SPēD SFPC: General Test 2025-2026. Questions & Correct Verified Answers. Graded A, Exams of Security Analysis

SPēD SFPC: General Test 2025-2026. Questions & Correct Verified Answers. Graded A

Typology: Exams

2024/2025

Available from 07/17/2025

wilfred-mburu
wilfred-mburu 🇬🇧

3.9

(8)

4K documents

1 / 7

Toggle sidebar

This page cannot be seen from the preview

Don't miss anything!

bg1
SPēD SFPC: General Test 2025-2026.
Questions & Correct Verified Answers.
Graded A
Acknowledged – ANS This protection level describes a SAP whose
existence may be openly recognized. Its purpose may be identified.
However, the details of the program (including its technologies, materials,
and techniques) are classified as dictated by their vulnerability to
exploitation and the risk of compromise. The funding is generally
unclassified.
Antiterrorism Officer – ANS This person is responsible for the installation's
antiterrorism program
Asset, threat, vulnerability, risk, countermeasures – ANS Elements that a
security professional should consider when assessing and managing risks
to DoD assets
Authorization, Appropriations, and Intelligence Congressional -
ANSCongressional committees granted SAP access
CI Support - ANSResponsible for providing valuable information on the
capabilities, intentions, and threats of adversaries
pf3
pf4
pf5

Partial preview of the text

Download SPēD SFPC: General Test 2025-2026. Questions & Correct Verified Answers. Graded A and more Exams Security Analysis in PDF only on Docsity!

SPēD SFPC: General Test 2025-2026.

Questions & Correct Verified Answers.

Graded A

Acknowledged – ANS This protection level describes a SAP whose existence may be openly recognized. Its purpose may be identified. However, the details of the program (including its technologies, materials, and techniques) are classified as dictated by their vulnerability to exploitation and the risk of compromise. The funding is generally unclassified. Antiterrorism Officer – ANS This person is responsible for the installation's antiterrorism program Asset, threat, vulnerability, risk, countermeasures – ANS Elements that a security professional should consider when assessing and managing risks to DoD assets Authorization, Appropriations, and Intelligence Congressional - ANSCongressional committees granted SAP access CI Support - ANSResponsible for providing valuable information on the capabilities, intentions, and threats of adversaries

Component-level SAP Central Offices - ANSExist for each military component, the Joint Chiefs of Staff, Defense Advanced Research Projects Agency (DARPA), and Missile Defense Agency (MDA) DoD Special Access Central Office (SAPCO) - ANSDoD SAP legislative liaison that notifies Congress of SAP approval Elements that should be considered in identifying Critical Program Information - ANSElements which if compromised could:

  1. cause significant degradation in mission effectiveness
  2. shorten the expected combat-effective life of the system
  3. reduce technological advantage
  4. significantly alter program direction or
  5. enable an adversary to defeat, counter, copy, or reverseengineer the technology or capability Enhanced security requirements for protecting Special Access Program (SAP) information - ANS1. Within Personnel Security:
  • Access Rosters
  • Billet Structures (if required)
  • Indoctrination Agreement
  • Clearance based on an appropriate investigation completed within the last 5 years

Indicators of insider threats - ANS1. Failure to report overseas travel or contact with foreign nationals

  1. Seeking to gain higher clearance or expand access outside the job scope
  2. Engaging in classified conversations without a need to know
  3. Working hours inconsistent with job assignment or insistence on working in private
  4. Exploitable behavior traits
  5. Repeated security violations
  6. Attempting to enter areas not granted access to
  7. Unexplainable affluence/living above one's means
  8. Anomalies (adversary taking actions which indicate they are knowledgeable to information)
  9. Illegal downloads of information/files OPSEC Officer - ANSThis person analyzes threats to assets and their vulnerabilities

OSD-level SAP Central Offices - ANSExercise oversight authority for the specific SAP category under their purview. PIE-FAO - ANSPeople, information, equipment, facilities, activities, and operations Principle incident/events required to be reported to DoD counterintelligence (CI) organizations - ANSespionage, sabotage, terrorism, cyber Protection Level - ANSThis communicates how the SAP is acknowledged and protected. SAP Lifecycle - ANS1. Establishment (is extra protection warranted?)

  1. Management and Administration (continued need? processed followed?)
  2. Apportionment (proper measures in place? approval received)
  3. Disestablishment (program no longer needed?) Senior Review Group (SRG) - ANSThis group ensures there are no duplicative efforts across SAPs Special Access Program - ANSA program established for a specific class of classified information that imposes safeguarding and access requirements that exceed those normally required for information at the same classification level. Special Access Program Oversight Committee (SAPOC) - ANSThe final SAP approving body chaired by the Deputy Secretary of Defense

exploitation and the risk of compromise. The program funding is often classified, unacknowledged, or not directly linked to the program. What SAPs aim to achieve - ANS1. Protect technological breakthroughs

  1. Cover exploitation of adversary vulnerabilities
  2. Protect sensitive operational plans
  3. Reduce intelligence on U.S. capabilities