1. When requesting the retention of CONFIDENTIAL material
beyond two years, the contractor can identify it by approximate number of documents
and ____.
a. General subject matter
b. Author’s name
c. Media type
d. Title
e. Date of creation
b. Author’s name
c. Media type
d. Title
e. Date of creation
2. Pulverizing may only be used to destroy these kinds of
products.
a. Paper
b. Metal
c. Plastic
d. Rubber
e. Computer
b. Metal
c. Plastic
d. Rubber
e. Computer
3. Which cleared employee, identified by position,
ensures that IS security education is developed and presented?
a. CSA
b. GCA
c. FSO
d. ISSM
e. FBI
b. GCA
c. FSO
d. ISSM
e. FBI
4. The Director of National Intelligence prescribes the sections
of NISPOM that address _____ and _____ including _____.
a. Operations, intelligence sources, procurement
b. Intelligence sources, methods, SCI
c. SAP, Intelligence sources, means
d. Organization, classification, procurement
b. Intelligence sources, methods, SCI
c. SAP, Intelligence sources, means
d. Organization, classification, procurement
Scroll down to see how you did...
1. When requesting the retention of CONFIDENTIAL material
beyond two years, the contractor can identify it by approximate number of documents
and ____.
a.
General subject matter (NISPOM 5-701a2)
b.
Author’s name
c.
Media type
d.
Title
e.
Date of creation
2. Pulverizing may only be used to destroy these kinds of products.
a.
Paper (NISPOM 5-705)
b.
Metal
c.
Plastic
d.
Rubber
e.
Computer
3. Which cleared employee, identified by position, ensures that IS security education is developed and presented?
a.
CSA
b.
GCA
c.
FSO
d.
ISSM (NISPOM 8-103
e.
FBI
4. The Director of National Intelligence prescribes the sections of NISPOM that address _____ and _____ including _____.
a.
Operations,
intelligence sources, procurement
b.
Intelligence sources, methods, SCI (NISPOM 1-101b)
c.
SAP,
Intelligence sources, means
d.
Organization,
classification, procurementJeffrey W. Bennett, ISP is the owner of Red Bike Publishing Red Bike Publishing . He regularly consults, presents security training, and recommends export compliance and intellectual property protection countermeasures. He is an accomplished writer of non-fiction books, novels and periodicals. Jeff is an expert in security and has written many security books including: "Insider's Guide to Security Clearances" and "DoD Security Clearances and Contracts Guidebook", "ISP Certification-The Industrial Security Professional Exam Manual", and NISPOM/FSO Training".
No comments:
Post a Comment