Insider Threat Awareness Answers

Question: Authorized access to DoD information and resources may be granted based on a person's _______________. Select all that apply.

Answer: Volunteer activitiesContractual relationship with DoDEmployment

Question: The transfer of classified or proprietary information to a system not approved for the classification level or unaccredited or unauthorized systems, individuals, applications, or media is a _______________.

Answer: Spill

Question: A member of your team openly discusses her financial difficulties and her inability to meet her financial obligations. What is the appropriate action?

Answer: Report the concerning behavior to your security officer

Question: Which of the following is a reportable behavioral indicator?

Answer: Significant change in work habit

Question: If you are contacted by a member of the media about information you are not authorized to share, you should take down which of the following details? Select all that apply.

Answer: Their name and their organization nameHow they contacted youDate and time of contact

Question: Which of these may be targeted by foreign entities? Select all that apply.

Answer: All of the above.

Question: _______________ is a conversation technique used to discreetly gather information that is not readily available and do so without raising suspicion.

Answer: Elicitation

Question: Technological advances impact the insider threat by _______________. Select all that apply.

Answer: Allowing large amounts of data to be accessedPresenting new security challenges

Question: Which of the following is a technology-related indicator? Select all that apply.

Answer: Accessing systems at unusual hours without authorizationKeeping unauthorized backups

Question: Which of the following countermeasures can help reduce technology-associated insider threats? Select all that apply.

Answer: Inventory your technology holdingsWatch for behavioral indicators

Question: Insiders may include which of these groups of people? Select all that apply.

Answer: EmployeesFormer EmployeesContractorsActive duty Military

Question: The definition of Targeted Violence includes which of these components? Select all that apply.

Answer: Any form of violenceDirected at an individual or groupFor a specific reason

Question: Which of the following are reportable behavioral indicators? Select all that apply.

Answer: Addictive behaviorsSubstance abuseConsiderable change in financial circumstances

Question: Contractors must report which of these? Select all that apply.

Answer: All of the above.

Question: The acronym EAP stands for _______________?

Answer: Employee Assistance Program

Question: To whom should you report if you are contacted by a member of the media about information you are not authorized to share?

Answer: Your security office

Question: Contractors must report which of these to the insider threat program? Select all that apply.

Answer: Efforts to obtain unauthorized access to classified or proprietary informationAny contact by cleared employees with known or suspected intelligence officers from any countryAny contact that suggest the employee may be the target of attempted exploitation by the intelligence service of another countryEfforts to compromise a cleared employee

Question: Who might be interested in non-public information that an insider can provide? Select all that apply.

Answer: CompetitorsNon-state actorsTerrorist organizationsForeign governments

Question: Technological advances ______________________________. Select all that apply.

Answer: Increase risk of information lossAllow insiders to access more data

Question: Which of the following is a technology-related indicator? Select all that apply. (*)

Answer: Hoarding files and dataBypassing technology-associated protocolsImproper use of privileged access

Question: Hostile entities may use social media to _______________? Select all that apply.

Answer: All of the above

Question: Which of these activities must be reported? Select all that apply.

Answer: Unauthorized disclosure of classified materialInappropriate copying of classified materialBypassing security rules or protocols

Donation Page

Support Our Work

Do you appreciate the value this website provides? If so, please consider donating to help keep it running. Your donation will go a long way in helping us continue to provide the same quality of content and services. Every bit helps, and your support is greatly appreciated. Thank you for your generosity.