Employees – Q’s And A’s
Cyber Vulnerabilities to DoD Systems may include: Correct Ans - All
of the above
Foreign Intelligence Entities seldom use the Internet or other
communications including social networking services as a collection
method. Correct Ans - False
Select ALL the correct responses. Examples of malicious cyber activity are:
Correct Ans - Phishing, Introducing a virus into the network, Inputting
falsified corrupted data
Select ALL the correct responses. Possible insider threat indicators that
should be reported are: Correct Ans - Unreported foreign travel,
Working unusual hours without being directed to work outside of normal
work hours, Requesting access to material unrelated to current projects
Offers or Invitations for cultural exchanges, individual-to-individual
exchanges, or ambassador programs are indicators of this collection
method: Correct Ans - Solicitation and Marketing of Services
An adversary uses technical countermeasures to block a previously
undisclosed or classified U.S. intercept technology. This is an example of:
Correct Ans - A Security Anomaly
Which of the following is NOT an example of an anomaly? Correct Ans
- Foreign diplomat attempts to defect.
If you feel you are being solicited for information which of the following
should you do? Correct Ans - All of the Above
According to DoDD 5240.06 Reportable Foreign Intelligence Contacts,
Activities, Indicators, and Behaviors include: Correct Ans - All of
the above