US434) – Q&A
Cyber Vulnerabilities to COC Systems may include:
-Disgruntled or Co-opted employee
-Weak passwords
-Illegal Downloads
-All of these - ✔️ All of these
Personnel who fail to report CI activities of concern as outlined in
Enclosure 4 of DOD Directive 5240.06 are subject to appropriate
disciplinary action under regulations.
-True
-False - ✔️ True
Foreign Intelligence Entities seldom use elicitation to extract information
from people who have access to classified or sensitive information.
-True
-False - ✔️ False
Potential espionage indicators (PEIs) are activities, behaviors, or
circumstances that 'may be indicative' of potential espionage activities by
an individual who may have volunteered or been recruited by a foreign
entity as a writing espionage agent. Examples of PEI include:
-Unexplained affluence, Concealing foreign travel, Unusual work hours,
Avoiding polygraph
-Taking classified material home, Illegal downloads, Unreported contact
with foreign nationals
-Disgruntled employee, Attempting to gain access without need-to-know,
Taking short trips
-Copying files, Unexplained absences, Terminating employment
-All of these - ✔️ All of these
Foreign Intelligence Entities (FEI) seldom use the Internet or other
communications including social networking services as a collection
method.
-True
-False - ✔️ False