Counterintelligence Awareness and Security Brief

¡Supera tus tareas y exámenes ahora con Quizwiz!

Which of the following is/are examples of suspicious indicators related to foreign travel?

All of these

Confidential

Confidential information is information or material of which unauthorized disclosure could reasonably be expected to cause damage to the national security that the Original Classification Authority is able to identify or describe.

The three levels of classified information are:

Confidential, Secret, Top Secret

Because the FBI has primary responsibility for counterintelligence investigations, all threats should be reported directly to them.

False

Maria is a senior engineer who has been employed with a U.S. defense contractor for 25 years. She has recently made several requests for classified information that are outside of her scope of her work and is making the requests outside of the normal channels for such requests. Because of Maria's long history and record of loyalty to her company, these events do not need to be reported.

False

Possible espionage cases should only be reported to the FBI as they have investigative jurisdiction within the U.S.

False

The export of Militarily Critical Technology is strictly controlled and enforced by the Export Administration Regulations (EAR).

False

Which of the following events must be reported?

Following an unscheduled visit by personnel not well known to the facility, personnel at Bob's facility discovered papers outlining bomb-making instructions and dates and locations where the devices would be placed.

Which of the following events should be reported as suspicious behavior?

Kerrie, a DOD employee, makes 5 extra copies when making the classified copies and cannot explain why.

Information at Andrea's facility was compromised when a team from a foreign firm, with whom Andrea's facility was partnered, requested information beyond the approved scope of the project. Andrea's facility was targeted using the _______________________ collection method.

Request for information(RFI)/solicitation

Secret

Secret information is information or material of which unauthorized disclosure could reasonably be expected to cause serious damage to the national security that the Original Classification Authority is able to identify or describe.

Top Secret

Top Secret information is information or material of which unauthorized disclosure could reasonably be expected to cause exceptionally grave damage to the national security that the Original Classification Authority is able to identify or describe.

A Technology Control Plan (TCP) is required to control access by foreign nationals assigned to or employed by a cleared facility possessing classified or export controlled information.

True

An unsolicited email from peers in their academic field soliciting assistance on fundamental and developing research may be an indicator of an Academic Solicitation collection.

True

Any employee who travels abroad may be at risk for targeting and should receive a foreign travel briefing prior to departure.

True

Export of Militarily Critical Technology is strictly controlled by the International Traffic in Arms Regulations (ITAR).

True

Frequent computer audits are one countermeasure to protect against exploitation of cyber operations.

True

Mark is a DOD employee. Recently, co-workers have witnessed Mark changing the classified markings on Secret documents. When asked about it, Mark could not provide an explanation. This should be reported.

True

When considering potential espionage indicators, Savita knows there are certain life experiences that alter people's normal behavior and may cause them to act illegally. These include financial difficulties, sudden or unexplained affluence, and extreme and persistent interpersonal difficulties.

True

A foreign student studying aerodynamics at a major foreign university contacted a U.S. defense company about the possibility of an intern position in the company's aerodynamics research branch. Should the security manager of the company be concerned?

Yes, the student may be attempting to gain access to information that should be protected.

Jane just started an internship with a cleared defense contractor. She does not hold a security clearance and will not work with the facility's protected technology. Based on this information, is she a potential target for adversaries?

Yes. Adversaries target personnel both for what they know and for their access.

Employees must be aware that adversaries may target them for the information they know. What type(s) of information must employees protect? Select all that apply.

a. Intellectual property b. Classified information c. Controlled unclassified information (CUI) d. Business proprietary information

Which of the following is/are examples of suspicious indicators related to suspicious network activity and cyber threats? Select all that apply.

a. Unauthorized hardware and software modifications b. Unauthorized system access attempts c. Unauthorized transmission d. E-mails received form unknown senders


Conjuntos de estudio relacionados

Chapter 9 Psychology-Intelligence, Aptitude, and Cognitive Abilities

View Set

Chapter 9 - Entry Strategies and Organizational Structures

View Set