Answers Rated A+
Daily audits of classified systems will prevent unauthorized logons and identify
suspicious transmissions: - answer False
Which of the following are reportable examples of a possible transmission of classified
material via unsecured means? - answer All of the above
Because the FBI has primary responsibility for counterintelligence investigations within
the United States, all threats should be reported only to the FBI. - answer False
A cleared defense contractor hosted a foreign visit. Which of the following activities
might you expect to occur? - answerA visitor attempts to wander away from his escort;
Some of those listed on the visit request form are replaced with last minute substitutes;
Foreign delegation asking questions outside the scope of the intended visit
Which of the following types of technology is strictly controlled by the Department of
Defense? - answerMilitary critical technology
During a foreign conference or trade show what activities might be experienced? -
answerAll of the above
William is a sales manager with a large firm working on aviation technologies. He is
working at the company's booth at the Paris Air Show. Which of the following collection
methods would an adversary NOT use at the Paris Air Show? - answerNone of the
above
Sarah is the Facility Security Officer (FSO) at a small, private firm that develops dual
use technology. A foreign firm approaches Sarah's facility requesting to purchase the
technology. Which regulation is applicable to determine if they can sell the dual use
technology to a foreign firm? - answerExport Administration Regulations (EAR)
Jack is a Facility Security Officer (FSO) for a cleared defense contractor. Where should
he find reporting procedures that pertain to his organization? - answerNational Industrial
Security Program Operating Manual (NISPOM)
Social engineering, electronic elicitation, email spoofing, spear phishing, whale
phishing, or direct questioning (such as through social networking sites) are all
examples of reportable suspicious cyber incidents. - answerTrue