Counterintelligence Awareness and Reporting for DoD Employees

Ace your homework & exams now with Quizwiz!

Using your birth date, middle name, or your Social Security number are good examples of strong passwords. Select one: True False

False

Select ALL the correct responses. Possible insider threat indicators that should be reported are: Select one or more: a. Always arriving to work on time b. Working unusual hours without being directed to work outside of normal work hours c. Requesting access to material unrelated to current projects d. Taking vacation e. Unreported foreign travel

b. Working unusual hours without being directed to work outside of normal work hours c. Requesting access to material unrelated to current projects e. Unreported foreign travel

The penalties for espionage include: Select one: a. Monetary fines b. Up to life in prison c. The death penalty d. All of the above

d. All of the above

You have been invited by a previously unknown person to attend an all-expense paid conference in a foreign country. How do you react? Select one: a. Delete the email and forget about the invitation b. Accept the invitation c. Write or call to find out more information about the conference d. Report the incident to your supervisor and your Office of Security

d. Report the incident to your supervisor and your Office of Security

f you feel you are being solicited for information which of the following should you do? Select one: a. Do not probe for information - Nonchalantly ask questions about them b. Without indicating that you are uncomfortable, change any conversation that might be too probing with respect to your duties, private life, and coworkers c. Never answer questions which make you feel uncomfortable d. Be observant - Note as much as possible about person asking questions e. All of the Above

e. All of the Above

Cyber Vulnerabilities to DoD Systems may include: Select one: a. Viruses b. Weak passwords c. Illegal downloads d. Disgruntled or Co-opted employee e. All of the above

e. All of the above

Potential espionage indicators (PEIs) are activities, behaviors, or circumstances that "may be indicative" of potential espionage activities by an individual who may have volunteered or been recruited by a foreign entity as a witting espionage agent. Examples of PEI include: Select one: a. Disgruntled employee, Attempting to gain access without need-to-know, Taking short trips b. Taking classified material home, Illegal downloads, Unreported contact with foreign nationals c. Unexplained affluence, Concealing foreign travel, Unusual work hours, Avoiding polygraph d. Copying files, Unexplained absences, Terminating employment e. All of the above

e. All of the above

Which of the following are possible indicators of an Insider Threat? Select one: a. Behavioral issues b. Criminal conduct c. Substance abuse and mental health issues d. Financial irregularities e. All of the above

e. All of the above

Offers or Invitations for cultural exchanges, individual-to-individual exchanges, or ambassador programs are indicators of this collection method: Select one: a. International conventions, seminars, and exhibits b. Visits to Department of Defense (DoD) or contractor facilities c. Elicitation d. Solicitation and Marketing of Services

Solicitation and Marketing of Services

An adversary uses technical countermeasures to block a previously undisclosed or classified U.S. intercept technology. This is an example of: Select one: a. A lucky guess b. A Security Anomaly c. A paid source d. An unidentified press release

b. A Security Anomaly

Which of the following is NOT an example of an anomaly? Select one: a. An adversary conducts activities with precision that indicates prior knowledge. b. Foreign diplomat attempts to defect. c. Foreign officials reveal details they should not have known. d. An adversary uses technical countermeasures to block a previously undisclosed or classified U.S. intercept technology.

b. Foreign diplomat attempts to defect.

Select ALL the correct responses. Examples of malicious cyber activity are: Select one or more: a. Forgetting your password b. Phishing c. Checking your personal email on the work network d. Introducing a virus into the network e. Inputting falsified corrupted data

b. Phishing d. Introducing a virus into the network e. Inputting falsified corrupted data

Foreign Intelligence Entity (FIE) is defined in DoD Directive 5240.06 as "any known or suspected foreign organization, person, or group (public, private, or governmental) that conducts intelligence activities to acquire U.S. information, block or impair U.S. intelligence collection, influence U.S. policy, or disrupt U.S. systems and programs. The term includes foreign intelligence and security services and international terrorists." Select one: True False

True

Personnel who fail to report CI Activities of concern as outlined in Enclosure 4 of DoD Directive 5240.06 are subject to appropriate disciplinary action under regulations. Select one: True False

True


Related study sets

MLS Practice Exam Practice Questions

View Set

Skills Based Training Beyond the Classroom - Chapter 8

View Set

Chapter 16: Nursing Management During the postpartum period

View Set

Move from isolationism to expansionism notes

View Set

Emerging Technologies - Adaptive Reading Assignment

View Set

Wordly Wise 300 Book 7, Lesson 7

View Set

College Planner Unit 4: Paying for college

View Set