Skip Navigation

Vacancy Questions Preview

Vacancy Questions Preview

Grade: 12
Please answer the following questions.

* 1.Please select the response that best describes your experience as it relates to this position.
  1. I have one year of specialized experience equivalent to the GS 11 as described in the vacancy announcement.
  2. I do not have the experience described above.


Grade: 13
* 1.Please select the response that best describes your experience as it relates to this position.
  1. I have one year of specialized experience equivalent to the GS 12 as described in the vacancy announcement.
  2. I do not have the experience described above.


Grade: All Grades
Please read the definitions for Performance Improvement Plan and Letter of Requirement before addressing the question below. A Performance Improvement Plan (PIP) is a 90-day written developmental plan for an employee whose performance on one or more critical elements is rated "Unacceptable". A Letter of Requirement (LOR) is issued when a supervisor identifies leave abuse and/or when frequent absences negatively impact operations of an office.

* 1.Are you a current civilian federal employee, on a Performance Improvement Plan (PIP) or a Letter of Requirement (LOR)?
  1. Yes
  2. No


* 2.Do you have experience installing, configuring, operating and maintaining Active Directory and Group Policy in a Windows 2008 RS Server environment?
  1. Yes
  2. No


* 3.Please select the responses that describe your experience in planning, installation, configuration, testing, implementation and management of the systems environment in support of the organization's IT architecture and business needs.
  1. Analyzed systems requirements in response to business requirements, risks, and costs
  2. Evaluated, selected, verified, and validated the systems software environment
  3. Evaluated, selected, and installed compilers, assemblers, and utilities
  4. Integrated hardware and software components within the systems environment
  5. Monitored and fine-tuned performance of the systems environment
  6. Evaluated new systems engineering technologies and their effect on the operating environment
  7. Ensured that information security/information assurance policies, principles, and practices are an integral element of the operating environment
  8. None of the above


* 4.Please select the responses that describe your experience with verification and validation (V&V) activities.
  1. Developed and implemented V&V plans
  2. Verified requirements via inspection, audit or testing
  3. Validated requirements
  4. Reviewed and validated test plans
  5. Performed compliance audits against defined plans
  6. None of the above


* 5.Please select the responses that describe your experience in installing, configuring, operating and maintaining client server systems with these components.
  1. Workstations using Microsoft Windows 2000 or greater.
  2. UNIX
  3. Apple OS
  4. None of the above


* 6.Do you have prior network design and engineering experience that involved multiple sites (100 or more) with multi-tier architecture and multi-level security, including type 1 encryption?
  1. Yes
  2. No


* 7.Please select the response that best describes your experience working with a Windows distributed network.
  1. I have performed basic installation, configuration and maintenance of servers and work stations.
  2. I have supported most components of an installed network including operating system upgrades, troubleshooting server performance, PC performance, communications, organization and system security administration.
  3. I have managed the following processes: design, acquisition, installation, configuration, operations, maintenance and security of the system.
  4. I have managed units with Active Directory and have supported network services such as Global Catalogue, Dynamic DNS, DHCP and WINS.
  5. None of the above


* 8.Please select the response that best describes your experience in planning, designing and implementing information systems security.
  1. Cross-domain: federating multiple communities of interest both internal and external to your sponsoring agency/organization.
  2. Enterprise-wide: integrating multiple systems, infrastructures and user domains internal to your sponsoring agency/organization.
  3. System-or infrastructure-specific.
  4. Application-or devise-specific.
  5. No experience planning, designing and implementing information systems security.


* 9.Please select the response that best describes your highest level of experience with computer software, equipment, and operating systems.
  1. I have installed COTS packages; loaded operating systems software; maintained or modified LAN/WAN, relocated equipment, installed or updated software.
  2. I have responded to users' problems encountered with daily utilization of desktop and/or server-based applications and related equipment such as work stations, servers, printers, telecommunication and other peripheral equipment. I repaired or replaced various system components to correct hardware/software problems; tested and debugged various aspects of application/operating systems software.
  3. I am considered a technical expert with computer software, equipment, and operating systems. I handled and resolved complex issues/problems in the IT environment and others seek my technical assistance and guidance.
  4. None of the above


* 10.Please select the response that best describes your knowledge regarding IT systems security principles, concepts and methods needed to conduct audits and ensure the soundness of IT systems.
  1. I have performed IT security related duties that required knowledge of systems security certification and accreditation requirements and processes; Federal information systems security protocols; integrated information systems security with other security disciplines; I have lead the implementation of a security controls designed to anticipate, assess and minimize system vulnerabilities.
  2. I have planned and conducted security accreditation reviews for installed systems; recommended new or revised measures and countermeasures based on the results of accreditation reviews; identified and specified information systems security requirements associated with migrations to new environments.
  3. I have knowledge of the risk factors impacting IT security, such as computer viruses, hackers, denial of service. I have implemented correction or preventive actions, such as installing security packets and running antivirus utilities.
  4. None of the above


* 11.Please select the responses that demonstrate your presentation/communication skills.
  1. Provide telephone support to resolve technical problems with users of hardware or software.
  2. Provide informal instructions and directions to users concerning complex software use
  3. Deliver user training on applications, software, hardware or networks.
  4. Give presentations to small groups within the user community.
  5. Give presentations to large groups of users (twenty or more).
  6. Deliver formal classroom instruction covering technical subject matter.
  7. Provide IT training to upper level management.
  8. Represent my employer as a conference leader or speaker at formal conferences.
  9. Represent my employer as a lead negotiator in dealings with contractors, vendors or service providers from outside the agency
  10. None of the above


* 12.How did you hear about this position?
  1. Faith Based Initiatives
  2. Television
  3. Radio
  4. Internet
  5. Career Fairs
  6. Bill board
  7. Newspaper
  8. Magazine
  9. FBI Recruiter
  10. Employee Referral
  11. EdVenture Program

        BRANCHED: * 1.Which EdVenture Program?
    1. State University of New York at Albany
    2. Georgia State University
    3. Mercer University
    4. Delaware State University
    5. Fayetteville State University
    6. Chicago State University
    7. College of Charleston
    8. Cleveland State University
    9. University of Texas - El Paso
    10. Hawaii Pacific University
    11. Texas Southern University
    12. Florida A&M University
    13. Mississippi State University
    14. California State University
    15. Arkansas State University
    16. Kentucky State University
    17. University of Miami
    18. Tuskegee University
    19. Saint Peter's College
    20. Virginia Wesleyan College
    21. Concordia University
    22. Virginia Union University
    23. University of Texas - San Antonio
    24. Texas State University - San Marcos
    25. Cal State University - Sacramento
    26. San Diego State University
    27. San Jose State University
    28. University of Texas - Pan American
    29. University of California - Berkley
    30. Alabama A & M - Huntsville
    31. George Washington University
    32. Johns Hopkins
    33. Mississippi State University
    34. Prairie View A&M University
    35. University of Arkansas
    36. University of Southern California
    37. Savannah State
    38. Ohio University
    39. Central State University
    40. Arkansas Baptist College
    41. Wilberforce University
    42. Morehouse College
    43. Xavier University of Louisiana
    44. Alabama State University
    45. University of Albany
    46. University of Illinois, Chicago
    47. Clark Atlanta University
    48. California State University, East Bay
    49. Morgan State University
    50. Jackson State University
    51. Virginia Commonwealth University
    52. California State University, Fullerton
    53. University of Michigan, Dearborn
    54. Naval Postgraduate School
    55. New York University
    56. North Carolina A&T State University
  12. Other

        BRANCHED: * 1.Please specify where you heard about this position.

       Maximum length of 250 characters.
  13. I am currently an FBI Employee.
  14. District of Columbia Department of Employment Services


* 13.Please provide the city and state where you were born.
Maximum length of 250 characters.






This is a Federal job application system. Providing false information, creating fake IDs, or failing to answer all questions truthfully and completely may be grounds for not hiring, for disbarment from Federal employment, or for dismissal after the applicant begins work. Falsifying a Federal job application, attempting to violate the privacy of others, or attempting to compromise the operation of this system may be punishable by fine or imprisonment (US Code, Title 18, section 1001).