Counterintelligence Awareness and Reporting for DoD Employees
Using your birth date, middle name, or your Social Security number are good examples of strong passwords. Select one: True False
False
Select ALL the correct responses. Possible insider threat indicators that should be reported are: Select one or more: a. Always arriving to work on time b. Working unusual hours without being directed to work outside of normal work hours c. Requesting access to material unrelated to current projects d. Taking vacation e. Unreported foreign travel
b. Working unusual hours without being directed to work outside of normal work hours c. Requesting access to material unrelated to current projects e. Unreported foreign travel
The penalties for espionage include: Select one: a. Monetary fines b. Up to life in prison c. The death penalty d. All of the above
d. All of the above
You have been invited by a previously unknown person to attend an all-expense paid conference in a foreign country. How do you react? Select one: a. Delete the email and forget about the invitation b. Accept the invitation c. Write or call to find out more information about the conference d. Report the incident to your supervisor and your Office of Security
d. Report the incident to your supervisor and your Office of Security
f you feel you are being solicited for information which of the following should you do? Select one: a. Do not probe for information - Nonchalantly ask questions about them b. Without indicating that you are uncomfortable, change any conversation that might be too probing with respect to your duties, private life, and coworkers c. Never answer questions which make you feel uncomfortable d. Be observant - Note as much as possible about person asking questions e. All of the Above
e. All of the Above
Cyber Vulnerabilities to DoD Systems may include: Select one: a. Viruses b. Weak passwords c. Illegal downloads d. Disgruntled or Co-opted employee e. All of the above
e. All of the above
Potential espionage indicators (PEIs) are activities, behaviors, or circumstances that "may be indicative" of potential espionage activities by an individual who may have volunteered or been recruited by a foreign entity as a witting espionage agent. Examples of PEI include: Select one: a. Disgruntled employee, Attempting to gain access without need-to-know, Taking short trips b. Taking classified material home, Illegal downloads, Unreported contact with foreign nationals c. Unexplained affluence, Concealing foreign travel, Unusual work hours, Avoiding polygraph d. Copying files, Unexplained absences, Terminating employment e. All of the above
e. All of the above
Which of the following are possible indicators of an Insider Threat? Select one: a. Behavioral issues b. Criminal conduct c. Substance abuse and mental health issues d. Financial irregularities e. All of the above
e. All of the above
Offers or Invitations for cultural exchanges, individual-to-individual exchanges, or ambassador programs are indicators of this collection method: Select one: a. International conventions, seminars, and exhibits b. Visits to Department of Defense (DoD) or contractor facilities c. Elicitation d. Solicitation and Marketing of Services
Solicitation and Marketing of Services
An adversary uses technical countermeasures to block a previously undisclosed or classified U.S. intercept technology. This is an example of: Select one: a. A lucky guess b. A Security Anomaly c. A paid source d. An unidentified press release
b. A Security Anomaly
Which of the following is NOT an example of an anomaly? Select one: a. An adversary conducts activities with precision that indicates prior knowledge. b. Foreign diplomat attempts to defect. c. Foreign officials reveal details they should not have known. d. An adversary uses technical countermeasures to block a previously undisclosed or classified U.S. intercept technology.
b. Foreign diplomat attempts to defect.
Select ALL the correct responses. Examples of malicious cyber activity are: Select one or more: a. Forgetting your password b. Phishing c. Checking your personal email on the work network d. Introducing a virus into the network e. Inputting falsified corrupted data
b. Phishing d. Introducing a virus into the network e. Inputting falsified corrupted data
Foreign Intelligence Entity (FIE) is defined in DoD Directive 5240.06 as "any known or suspected foreign organization, person, or group (public, private, or governmental) that conducts intelligence activities to acquire U.S. information, block or impair U.S. intelligence collection, influence U.S. policy, or disrupt U.S. systems and programs. The term includes foreign intelligence and security services and international terrorists." Select one: True False
True
Personnel who fail to report CI Activities of concern as outlined in Enclosure 4 of DoD Directive 5240.06 are subject to appropriate disciplinary action under regulations. Select one: True False
True