I Hate CBT's

View Original

Insider Threat Awareness Answers

Question: Authorized access to DoD information and resources may be granted based on a person’s _______________. Select all that apply.

Answer: Volunteer activities

Contractual relationship with DoD

Employment

Question: The transfer of classified or proprietary information to a system not approved for the classification level or unaccredited or unauthorized systems, individuals, applications, or media is a _______________.

Answer: Spill

Question: A member of your team openly discusses her financial difficulties and her inability to meet her financial obligations. What is the appropriate action?

Answer: Report the concerning behavior to your security officer

Question: Which of the following is a reportable behavioral indicator?

Answer: Significant change in work habit

Question: If you are contacted by a member of the media about information you are not authorized to share, you should take down which of the following details? Select all that apply.

Answer: Their name and their organization name

How they contacted you

Date and time of contact

Question: Which of these may be targeted by foreign entities? Select all that apply.

Answer: All of the above.

Question: _______________ is a conversation technique used to discreetly gather information that is not readily available and do so without raising suspicion.

Answer: Elicitation

Question: Technological advances impact the insider threat by _______________. Select all that apply.

Answer: Allowing large amounts of data to be accessed

Presenting new security challenges

Question: Which of the following is a technology-related indicator? Select all that apply.

Answer: Accessing systems at unusual hours without authorization

Keeping unauthorized backups

Question: Which of the following countermeasures can help reduce technology-associated insider threats? Select all that apply.

Answer: Inventory your technology holdings

Watch for behavioral indicators