Try your knowledge of the NISPOM and industrial security with these challenging questions:
1. Which of the following can the CSA approve when no other alarm response options are available:
a. Response by neighborhood watch
b. Monitor by hidden camera
c. Guarded by working dogs
d. Installation of wire security
e. Response by cleared employee
2. In the Protection Profile Table for Confidentiality, which Data Transmission is required for PL2?
a. Trans 1
b. Trans 2
c. Trans 3, 4
d. Trans 5
e. Trans 6
3. In the Protection Profile Table for Confidentiality, which System Assurance is required for PL1?
a. SysAssur 1
b. SysAssur 2
c. SysAssur 3,4
d. SysAssur 5
e. SysAssur 6
4. In the Protection Profile Table for Integrity, which Backup and Restoration of Data is required for Basic?
a. Backup 1
b. Backup 2
c. Backup 3
d. Backup 5
e. Backup 6
5. Classified intelligence documents at a contractor facility shall be controlled according to NISPOM, with possible additional instructions from:
a. NRC
b. DNI
c. CSA
d. GCA
e. FSO
SCROLL DOWN FOR ANSWERS
1. Which of the following can the CSA approve when no other alarm response options are available:
e. Response by cleared employee (NISPOM 5-906d)
2. In the Protection Profile Table for Confidentiality, which Data Transmission is required for PL2?
a. Trans 1 (NISPOM Chapter 8 Table 5)
3. In the Protection Profile Table for Confidentiality, which System Assurance is required for PL1?
a. SysAssur 1 (NISPOM Chapter 8 Table 5)
4. In the Protection Profile Table for Integrity, which Backup and Restoration of Data is required for Basic?
a. Backup 1 (NISPOM Chapter 8 Table 6)
5. Classified intelligence documents at a contractor facility shall be controlled according to NISPOM, with possible additional instructions from:
d. GCA (NISPOM 9-305)
Find way more questions in Red Bike Publishing's Unofficial Guide to ISP Certification and more NISPOM information in DoD Security Clearances and Contracts Guidebook and the print copy of NISPOM
Jeffrey W. Bennett, ISP is the owner of Red Bike Publishing Red Bike Publishing .
He regularly consults, presents security training, and recommends export compliance and intellectual property protection countermeasures.
He is an accomplished writer of non-fiction books, novels and periodicals. Jeff is an expert in security and has written many security books including: "Insider's Guide to Security Clearances" and "DoD Security Clearances and Contracts Guidebook", "ISP Certification-The Industrial Security Professional Exam Manual", and NISPOM/FSO Training".
No comments:
Post a Comment