














































Study with the several resources on Docsity
Earn points by helping other students or get them with a premium plan
Prepare for your exams
Study with the several resources on Docsity
Earn points to download
Earn points by helping other students or get them with a premium plan
Community
Ask the community for help and clear up your study doubts
Discover the best universities in your country according to Docsity users
Free resources
Download our free guides on studying techniques, anxiety management strategies, and thesis advice from Docsity tutors
Ace your STEPP certification with this 2025/2026 verified Q&A guide featuring 100% correct answers. Covers critical DoD information security topics such as protecting national security information, proper classification protocols, and transparency obligations. Perfect for defense personnel, contractors, and cybersecurity professionals preparing for STEPP training or compliance certification. Português: Guia STEPP com respostas corretas sobre segurança da informação e requisitos do DoD. Español: Preguntas y respuestas STEPP verificadas para seguridad de la información del Departamento de Defensa. Italiano: Domande e risposte STEPP corrette al 100% per la sicurezza informatica del DoD. Tags: STEPP exam answers, DoD security, information classification, verified training 2025, cybersecurity prep, National Defense University, defense compliance
Typology: Exams
1 / 54
This page cannot be seen from the preview
Don't miss anything!
The purpose of the DoD information security program is to _________________________. Select all that apply. Select one or more: a. Protect national security information b. Demonstrate a commitment to transparency in Government c. Classify as much government information as possible - ✔✔A and B Which volumes of DoDM 5200.01 provide guidance and direction on classification management, marking, protection, and handling requirements for classified information? Select all that apply. Select one or more: a. Volume 1 b. Volume 2 c. Volume 3 d. Volume 4 - ✔✔A, B and C The unauthorized disclosure of this type of information could reasonably be expected to cause exceptionally grave damage to our national security. Select one: a.
Top Secret b. Secret c. Confidential - ✔✔A The unauthorized disclosure of this type of information could reasonably be expected to cause damage to our national security. Select one: a. Top Secret b. Secret c. Confidential - ✔✔C Derivative classifiers are the individuals who generate or create new material based on existing classification guidance. Select one: True False - ✔✔True If a derivative classifier believes information to be improperly classified, they can _____________ the classification decision. Select one: a. Ignore b. Override c.
b. Original Classification Authorities c. Both derivative classifiers and Original Classification Authorities - ✔✔A Who issues security classification guides (SCG) for systems, plans, programs, projects, or missions? Select one: a. Derivative classifiers b. Original Classification Authorities c. Both derivative classifiers and Original Classification Authorities - ✔✔B All _____________ GSA-approved security containers must conform to Federal Specification FF-L-2740. Select one: a. Handles on b. Doors on c. Locks for - ✔✔C When classified information is in an authorized individual's hands, why should the individual use a classified document cover sheet? Select all that apply. Select one or more: a. To prevent inadvertent viewing of classified information by unauthorized personnel b.
To alert holders to the presence of classified information c. To record the removal of classified information from a GSA-approved security container - ✔✔A and B What is required to access classified information? Select all that apply. Select one or more: a. Signed SF-312, Nondisclosure Agreement b. Need-to-know c. Eligibility - ✔✔A, B and C Which of the following are applicable when using a phone for classified conversations? Select all that apply. Select one or more: a. Know how to use your Secure Terminal Equipment (STE) b. Be aware of your surroundings and who might be able to hear your end of the conversation c. Only use Secure Terminal Equipment (STE) phones - ✔✔A, B and C Which level of classified information may be transported via USPS mail? Select all that apply. Select one or more: a. Confidential b. Secret
c. Automatic Declassification d. Scheduled Declassification - ✔✔A When information, in the interest of national security, no longer requires protection at any level, it should be: Select one: a. Declassified. b. Unclassified. c. Classified. - ✔✔A Whose guidelines should you follow for the destruction of storage media such as thumb drives, zip drives, and computers? Select one: a. Original Classification Authorities b. Local information systems personnel c. National Security Agency - ✔✔C The __________ establishes industrial security programs and oversees security requirements. Select one: a. Government Contracting Activity (GCA)
b. Cognizant Security Agency (CSA) c. Cognizant Security Office (CSO) - ✔✔B Select ALL the correct responses. What does the Facility Security Officer (FSO) need to do when an employee no longer needs access to classified information? Select one or more: a. Remove the employee's access in the DoD System of Record b. Debrief the employee c. Remove the employee's name from access rosters and/or any active Visit Authorization Letters (VALs) d. Remove the employee's eligibility in the DoD System of Record - ✔✔A, B and C What is the first step in the National Industrial Security Program (NISP) contracting process? Select one: a. Publishing a Request for Proposal (RFP) b. Defining the acquisition strategy for the contract c. Defining the initial requirements for the product/service d. Identifying a need for a product or service - ✔✔D To issue a Facility Clearance (FCL), the Facility Clearance Branch (FCB) reviews which of the following?
Facility Security Officer (FSO) d. Counterintelligence Special Agent (CISA) - ✔✔C Select ALL the correct responses. Which of the following are Information System Security Manager (ISSM) responsibilities? Select one or more: a. Conduct Information System awareness and training b. Establish Information System programs and procedures c. Develop facility procedures for handling media with classified information d. Receive company changed conditions and suspicious contact reports - ✔✔A, B and C Whose primary responsibility is working with Industrial Security Representatives (IS Reps) and contractor personnel to authorize and maintain classified Information Systems? Select one: a. Information System Security Manager (ISSM) b. Counterintelligence Special Agent (CISA) c. Facility Security Officer (FSO) d. Information System Security Professional/Security Control Assessor (ISSP/SCA) - ✔✔D Select ALL the correct responses. Which of the following are Information System Security Professional/Security Control Assessor (ISSP/SCA) responsibilities?
Select one or more: a. Perform classified Information System assessments b. Receive changed conditions and suspicious contact reports c. Oversee day-to-day personnel security program operation d. Respond to security violations involving authorized classified Information Systems - ✔✔A and D In order to receive and store classified information, facilities must be granted a Facility Clearance (FCL) and have _________________. Select one: a. full-time security personnel b. approved safeguarding capabilities c. a cleared subcontractor - ✔✔B Select ALL the correct responses. During classified visits, visitors may supply clearance information via ______________. Select one or more: a. a Visit Authorization Letter (VAL) b. an invitation acceptance form c. the DoD System of Record - ✔✔A and C
a government-industry partnership c. designed to safeguard classified information entrusted to industry d. established by Executive Order 12829 - ✔✔B, C and D Select ALL the correct responses. Which of the following are Counterintelligence Special Agent (CISA) responsibilities? Select one or more: a. Provide advice, assistance, and guidance regarding counterintelligence best practices b. Authorize and maintain Information Systems c. Assist with foreign travel briefings and debriefings - ✔✔A and C Select ALL the correct responses. The Defense Security Service (DSS) oversees which of the following? Select one or more: a. Personnel Security Clearances (PCLs) b. Changes in ownership, management, or foreign involvement c. Contract-specific requirements d. Compliance with reporting requirements - ✔✔A, B and D Which contracting document contains security requirements and classification guidance? Select one:
a. DD Form 441, Department of Defense Security Agreement b. SF 312, Classified Information Nondisclosure Agreement c. DD Form 254, Department of Defense Contract Security Classification Specification - ✔✔C Select ALL the correct responses. By signing DD Form 441, Department of Defense Security Agreement, the contractor agrees to _______________. Select one or more: a. Acknowledge government authority to review the company's security program b. Adhere to end-product objectives c. Determine whether a sub-contractor has appropriate Facility Clearance (FCL) d. Implement and maintain a security program that complies with the National Industrial Security Program Operating Manual (NISPOM) - ✔✔A, C and D Select ALL the correct responses. Which of the following are required before an individual may access classified information? Select one or more: a. Personnel Security Clearance (PCL) b. Facility Clearance (FCL) c. Approved safeguarding capability d.
c. Safeguard against threats d. Prevent theft, damage, or unauthorized access to assets - ✔✔A, C and D Select ALL the correct responses. Which of the following is an exterior intrusion detection system (IDS)? Select one or more: a. Proximity detectors b. Buried line sensors that detect vibrations c. Fence disturbance sensors - ✔✔B and C ______________ are provided to senior leaders to assist in determining the appropriate Force Protection Condition (FPCON) level. Select one: a. Threat levels b. Physical security layer strategies c. Antiterrorism countermeasures - ✔✔A Which step in the risk management process is designed to identify and assess the perceived imminence of intended aggression by a capable entity to harm a nation, a government, or its instrumentalities? Select one: a. Identify and assess Vulnerabilities
b. Determine Countermeasure Options c. Identify and assess Threats d. Identify and assess Assets - ✔✔C Who is responsible for identifying threats and informing the installation Commanding Officer on current threats? Select one: a. Threat Working Group b. Mission Assurance Senior Steering Group c. Antiterrorism Executive Committee d. Antiterrorism Working Group - ✔✔A Which physical security countermeasure is used to secure sensitive compartmented information (SCI)? Select one: a. Vault b. Secure Rooms c. Sensitive Compartmented Information Facility (SCIF) - ✔✔C
Inspections d. Lighting and cameras - ✔✔A and D Who is responsible for supporting antiterrorism concerns, efforts, and emergency response and law enforcement activities? Select one: a. Law Enforcement Officials b. Physical Security Officer c. CI Support d. OPSEC Officer - ✔✔A Select ALL the correct responses. Which of the following comprise the Mission Assurance Senior Steering Group? Select one or more: a. Counterintelligence Officers b. General or flag officers at the one and two-star levels c. OPSEC Officers d. Senior Executive Service - ✔✔B and D
Which threat level signifies anti-U.S. terrorists are present and they attack personnel as their preferred method of operation, or a group uses large casualty-producing attacks as their preferred method but has limited operational activity and the Operating Environment is neutral? Select one: a. Significant b. Moderate c. Low d. High - ✔✔A __________ authorizes commanders to issue regulations for the protection or security of property and places under their command and establishes guidelines to build consistent minimum standards for protecting DoD installations and resources. Select one: a. DoDM 5200. b. DoDI 5200. c. DoD 5200.08-R - ✔✔B Select ALL the correct responses. Which of the following protective measures can make doors more attack-resistant? Select one or more: a. Mount cameras on the roof b.