Forgot Password

Lost your password? Please enter your email address. You will receive a link and will create a new password via email.

You must login to ask a question.

Please briefly explain why you feel this question should be reported.

Please briefly explain why you feel this answer should be reported.

Please briefly explain why you feel this user should be reported.

Quizzma Latest Articles

Protecting Assets in the NISP Answers

The National Industry Security Program (NISP) serves as a multi-faceted, federal program that aims to protect classified information within the confines of the United States and its industry partners.

Encompassing a broad spectrum of private companies, defense contractors, and academic institutions, the NISP establishes a standardized protocol for safeguarding classified information that these entities might access or store in the course of fulfilling contracts or research with the federal government.

At its core, the NISP is an integral part of the nation’s defense against external and internal threats, aiming to:

  1. Uphold the Integrity of Classified Information: By enforcing a uniform security protocol across the entire industry landscape, the NISP ensures that classified data, regardless of where it resides, remains uncompromised.
  2. Foster Collaborative Defense: By bringing both public and private sectors under a unified security umbrella, the NISP encourages collaborative efforts in national defense, intelligence, and research.
  3. Streamline Security Protocols: The NISP provides a standardized approach to security clearance, information handling, and threat response, thereby making it easier for industries to comply and cooperate.

Protecting Assets In The NISP Answers

NISP certificate
QuestionAnswer
The NISPOM requires that adverse information concerning cleared employees and any suspicious contacts be reported to DCSA.True. The National Industrial Security Program Operating Manual (NISPOM) does require cleared contractors to report certain adverse information concerning cleared employees and any suspicious contacts to the Defense Counterintelligence and Security Agency (DCSA). This ensures the continuous assessment of a cleared individual’s eligibility and helps in identifying potential threats.
CI is the information gathered and activities conducted to protect against what? Select all that apply.

Espionage, sabotage, terrorism
Assassinations conducted for or on behalf of foreign governments, organizations, or persons
Activities by large companies to obtain operating capital within a foreign country
International terrorist activities
Espionage, sabotage, terrorism
Assassinations conducted for or on behalf of foreign governments, organizations, or persons
International terrorist activities
Integrating CI and threat awareness into a security program helps to accomplish which of the following?
Select all that apply.
□ Assist DoD in maintaining a tactical advantage over foreign intelligence operatives
□ Protect valuable company assets from loss and compromise
□ Identify which assets need protecting
□ Establish countermeasures
Protect valuable company assets from loss and compromise
Identify which assets need protecting
Establish countermeasures
The NISPOM does which of the following for industry? Select all that apply.

Controls the disclosure of classified information to contractors
Identifies the cost associated with particular contracts
Protects special classes of classified information
Requires contractors to hire counterintelligence special agents
Controls the disclosure of classified information to contractors
Protects special classes of classified information
CI helps security officials to manage risk in which of the following ways? Select all that apply.
Focus on assets and identify the threats to them
Identify vulnerabilities
Develop and apply countermeasures
Develop investigation procedures
Develop security classification guides
Focus on assets and identify the threats to them
Identify vulnerabilities
Develop and apply countermeasures
The NISPOM requires that adverse information concerning cleared employees and any suspicious contacts be reported to DCSA.
Select the best answer.
o True
o False
True
Which of the following are foreign collection methods?

□ Requests for information
□ Suspicious Network Activity
□ Seeking employment
□ Foreign visits
□ Abduction and interrogation
Match foreign collection methods with corresponding activities.

requests for information Academic solicitation Elicitation and Recruitment Solicitation and seeking employment Foreign visit Conferences, Conventions, and Trade Shows

May use joint ventures or research partnerships
Involves establishing emotional relationship with the target
Exchange employees or foreign business associates
Unsolicited employees or foreign business associates
Experts may receive all-expense-paid invitations to lecture
Unsolicited and direct requests often submitted via email is an example of requests for information.
Application to degree programs associated with cleared facilities or programs is an example of academic solicitation.
Establishing an emotional relationship with a target is an example of elicitation and recruitment.
Using joint ventures or research partnerships is an example of solicitation and seeking employment.
Experts receiving all-expense-paid invitations to lecture are an example of conferences, conventions, and trade shows. Exchange employees or foreign business associates are an example of foreign visit.
Match potential countermeasures with foreign collection methods.
Conduct audits at least weekly
Use mock-ups instead of actual equipment
Brief hosts and escorts on approved procedures
Share the minimum amount of information appropriate to the scope of venture

Solicitation and seeking employment
Suspicious network activities
Conference, Conventions, and Trade Shows
Foreign visits
Solicitation and seeking employment – Share the minimum amount of information appropriate to the scope of venture
Suspicious network activities – Conduct audits at least weekly
Conference, Conventions, and Trade Shows – Use mock-ups instead of actual equipment
Foreign visits – Brief hosts and escorts on approved procedures
You decide that you need three specific types of information for the training session that you are planning.
Match the information that you need with the source from which you can obtain the information:

Trends related to what is targeted and methods used.
Threat assessment for your current contract.
Identify the current national security concerns that may affect your facility
Determine the types of crimes that are being committed at facilities close to your company.

FBI
State or Local Law Enforcement Government Contracting Activity DCSA CI Directorate
Trends related to what is targeted and methods used – DCSA CI Directorate
Threat assessment for your current contract – Government Contracting Activity
Identify the current national security concerns that may affect your facility – FBI
Determine the types of crimes that are being committed at facilities close to your company – State or Local Law Enforcement
Which of the following activities can you use to promote CI awareness within your facility?
□ Enlist your DCSA CI Special Agent to brief employees
□ Post CI-related material throughout the workplace
□ Share actual targeting examples with employees
□ Remind employees that anyone who appears “foreign” is a threat
Enlist your DCSA CI Special Agent to brief employees
Post CI-related material throughout the workplace
Share actual targeting examples with employees
Foreign travel increases the risk of FIE targeting.
o True
o False
True
Although employees may be targeted at any time or any place, FIEs have greater access to employees during foreign travel.
The National Industrial Security Program Operating Manual (NISPOM) requires employees of cleared industry to report which of the following events?
□ Suspicious contacts
□ Lost or compromised classified information
□ Actions/events that may affect the status of an employee’s personnel security clearance
□ Actions/events that may affect the status of the facility’s clearance
□ Actual, probable, or possible espionage, sabotage, terrorism, of subversive activities
□ Suspicious contacts
□ Lost or compromised classified information
□ Actions/events that may affect the status of an employee’s personnel security clearance
□ Actions/events that may affect the status of the facility’s clearance
□ Actual, probable, or possible espionage, sabotage, terrorism, of subversive activities
Which of the following groups are vulnerable to foreign intelligence entity targeting?
□ Information technology
□ Facility management
□ Employees traveling abroad
□ Administrative assistants
Information technology
Facility management
Employees traveling abroad
Administrative assistants
What is the role of reporting in counterintelligence and threat awareness?Reporting helps to disrupt foreign collection activity.
Reporting identifies threats so that countermeasures can be developed.
An employee observes coworkers sharing images of and discussing a component that is in development in an unsecured location with a person she didn’t recognize.Yes
Hello. This is Victor from Facilities Management. I’m in the Engineering Department. None of the engineers are here and the classified storage container is open. It’s not just unlocked; the drawer is pulled out and there are several folders visible.
To whom should you report this incident?
□ FSO
□ FBI
□ DCSA
□ Local Law Enforcement
FSO
FBI
DCSA
Carolyn was approached by a stranger…Yes
You learn from a security bulletin that a foreign country is using university students applying for low level jobs to gain entry into companies in your industry. Which group might you alert first?

Human Resources
Information Technology
Business Development
Engineers and Research & Development
You would alert Human Resources when a foreign country is using university students applying for low level jobs to gain entry into companies in your industry.
Foreign entities stepped up attempts to purchase export-controlled technology, including technology your facility develops. Who should you alert?

Human Resources
Information Technology
Business Development
Engineers and Research & Development
You would alert Business Development when foreign entities step up attempts to purchase export-controlled technology, including technology your facility develops.
You learn of a threat from a business competitor to steal blueprints and schematics. Which group might you alert first?

Human Resources
Information Technology
Business Development
Engineers and Research & Development
You would alert Engineers or the R&D when you learn of a threat from a business competitor to steal blueprints and schematics.
There is an increase in cyber-attacks against companies in your industry. Who should you alert?

Human Resources
Information Technology
Business Development
Engineers and Research & Development
You would alert IT when there is an increase in cyber-attacks against companies in your industry.

NISP Final Exam Answers

  1. Personnel from this group are targeted because of their access to the company’s supply chain.
    – Facility management
    – Manufacturing
    – Purchasing
    – Research and Development
    Answer: Personnel from the Purchasing group are targeted because of their access to the company’s supply chain.
  2. Security requirements for industry Partners are found in which of these documents?
    – Counterintelligence Awareness and Reporting (CIAR) (DoD Policy Directive 5240.06)
    – NISPOM
    – NISCI
    – NIS Policy Directive
    Answer: Security requirements for industry Partners are found in the NISPOM (National Industrial Security Program Operating Manual).
  3. The NISPOM requires reporting of which of the following?
    – Daily arrival and departure times of cleared employees
    – Actual, probable, or possible espionage, sabotage, terrorism or subversive activities
    – Adverse information concerning cleared employees
    – Suspicious contacts
    Answer: The NISPOM requires reporting of: Actual, probable, or possible espionage, sabotage, terrorism or subversive activities; Adverse information concerning cleared employees; Suspicious contacts.
  4. A successful CI program adopts a Risk-based approach…
    Answer: Risk.
  5. Steps in the risk management process include:
    – Identify assets and determine the impact of loss or compromise
    – Develop and apply countermeasures
    – Identify threats
    – Identify vulnerabilities, assess risk
    Answer: All of the above.
  6. The _______ provides CI functional services to cleared industry and is a key resource for your company.
    – FBI
    – DOD Counterintelligence Command
    – DCSA Counterintelligence Directorate
    – Department of Homeland Security
    Answer: DCSA Counterintelligence Directorate provides CI functional services to cleared industry and is a key resource for your company.
  7. Which of the following are types of threats facing industry?
    – Threats from foreign intelligence entities
    – Terrorist Organizations
    – Insider Threats
    – Criminal Activities
    – Business Competitors
    Answer: All of the options listed are types of threats facing industry.
  8. Which group is targeted because of access to personnel info and the hiring process?
    – Facility management
    – Human Resources
    – Business Development
    – Purchasing
    Answer: Human Resources
  9. Personnel from this group are targeted because of their access to the company’s supply chain.
    – Research and Development
    – Purchasing
    – Manufacturing
    – Facility Management
    Answer: Personnel from the Purchasing group are targeted because of their access to the company’s supply chain.
  10. A request to add someone to a visiting foreign delegation at the last minute is a potential indicator of a foreign intelligence collection method.
    Answer: True.
  11. Suspicious network activity is the fastest growing collection method for foreign entities seeking to gain information about U.S. interests.
    Answer: True.
  12. Which of these documents summarizes the threat reports received from cleared contractor facilities and provides information on trends related to what is targeted and the methods used?
    – DCSA CI Directorate annual trend report
    – Defense Intelligence Agency (DIA) ThreatCon Report
    – National Counterintelligence and Security Center (NCSC) CI Awareness Briefing
    – Department of Homeland Security (DHS) Security Bulletin
    Answer: DCSA CI Directorate annual trend report.
  13. Which of the following agencies has primary responsibility for counterintelligence investigations within the United States?
    – DIA
    – FBI
    – DHS
    – NCSC
    Answer: FBI.
  14. Which of the following is/are strategies for the implementation of countermeasures?
    – Share your technology control plan (TCP) with visitors.
    – Respond to any active threat action Control access to the target
    – Train employees to recognize and report potential threats
    – Deter foreign intelligence entities from acting
    Answer: Respond to any active threat action; Control access to the target; Train employees to recognize and report potential threats; Deter foreign intelligence entities from acting.
  15. The purpose of countermeasures is to adjust the behavior of potential foreign intelligence entities so that they do not pose a threat to your company. True or false?
    Answer: True.
  16. The purpose of a foreign travel program is to:
    – Discourage personnel from travel to certain countries
    – Arm travelers with strategies to handle events
    – Prepare travelers to conduct intelligence activities overseas
    – Prepare travelers for any events they may encounter
    – Reduce security requirements for foreign visitors
    Answer: Arm travelers with strategies to handle events; Prepare travelers for any events they may encounter.
  17. Which of the following may not be covered in a Foreign Travel Debriefing?
    Answer: Internal U.S travel warnings.
  18. The NISPOM requires all contractors to do all of the following for CI training except:
    Answer: Train employees only upon initial access to classified.
  19. Which of the following are ways for an FSO to effectively CI and threat awareness training?
    Answer: Visual awareness reminders; Implementing a vigilance campaign; Sharing security information.
  20. A cleared employee who meets frequently with a foreign national may be an example of which reportable event?
    Answer: Foreign influence

Key Stakeholders and Participants in the NISP

The NISP operates as a collective effort among several entities:

  1. U.S. Government Agencies: Various federal agencies play a role in oversight, policy formulation, and compliance monitoring.
  2. Private Industries and Defense Contractors: Entities that engage in contracts or projects that require access to classified data.
  3. Research Institutions: Academic and research entities that collaborate on government projects requiring access to sensitive data.

Role of CI in Ensuring the Security of Classified Information

Counterintelligence (CI) operates as the shield against espionage, sabotage, and other malicious activities aimed at compromising national security. Within the NISP:

  1. Detection and Deterrence: CI activities help in identifying potential threats, providing a proactive line of defense against espionage attempts.
  2. Information Safeguarding: CI ensures that classified data, whether in transit or at rest, remains outside the reach of adversaries, thus maintaining the integrity of the information.
  3. Response and Recovery: Should a security incident occur, CI provides mechanisms for swift response, mitigation, and recovery, ensuring minimal damage and swift return to normal operations.

Benefits of Heightened CI Awareness for Industry Personnel

  1. Enhanced Security Posture: A well-informed workforce, aware of CI principles, can act as the first line of defense against potential threats.
  2. Efficient Threat Identification: With heightened CI awareness, industry personnel can better identify and report suspicious activities, ensuring timely interventions.
  3. Robust Collaboration: An understanding of CI promotes better coordination between industry entities and government agencies, fostering a collaborative approach to national security.
  4. Risk Mitigation: By being aware of the tactics, techniques, and procedures of adversaries, personnel can avoid potential pitfalls and traps set up to compromise information or operations.

Resources

  1. NISP Reporting Requirements
  2. Protecting Assets in the NISP

Was this helpful?




Quizzma Team

Quizzma Team

The Quizzma Team is a collective of experienced educators, subject matter experts, and content developers dedicated to providing accurate and high-quality educational resources. With a diverse range of expertise across various subjects, the team collaboratively reviews, creates, and publishes content to aid in learning and self-assessment.
Each piece of content undergoes a rigorous review process to ensure accuracy, relevance, and clarity. The Quizzma Team is committed to fostering a conducive learning environment for individuals and continually strives to provide reliable and valuable educational resources on a wide array of topics. Through collaborative effort and a shared passion for education, the Quizzma Team aims to contribute positively to the broader learning community.

Related Posts