100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

Thwarting the Enemy Questions and Answers Rated A+

Rating
-
Sold
-
Pages
3
Grade
A+
Uploaded on
02-09-2024
Written in
2024/2025

Thwarting the Enemy Questions and Answers Rated A+ Daily audits of classified systems will prevent unauthorized logons and identify suspicious transmissions: False Which of the following are reportable examples of a possible transmission of classified material via unsecured means? All of the above Previous Play Next Rewind 10 seconds Move forward 10 seconds Unmute 0:05 / 0:15 Full screen Brainpower Read More Because the FBI has primary responsibility for counterintelligence investigations within the United States, all threats should be reported only to the FBI. False A cleared defense contractor hosted a foreign visit. Which of the following activities might you expect to occur? A visitor attempts to wander away from his escort; Some of those listed on the visit request form are replaced with last minute substitutes; Foreign delegation asking questions outside the scope of the intended visit Which of the following types of technology is strictly controlled by the Department of Defense? Military critical technology During a foreign conference or trade show what activities might be experienced? All of the above William is a sales manager with a large firm working on aviation technologies. He is working at the company's booth at the Paris Air Show. Which of the following collection methods would an adversary NOT use at the Paris Air Show? None of the above Sarah is the Facility Security Officer (FSO) at a small, private firm that develops dual use technology. A foreign firm approaches Sarah's facility requesting to purchase the technology. Which regulation is applicable to determine if they can sell the dual use technology to a foreign firm? Export Administration Regulations (EAR) Jack is a Facility Security Officer (FSO) for a cleared defense contractor. Where should he find reporting procedures that pertain to his organization? National Industrial Security Program Operating Manual (NISPOM) Social engineering, electronic elicitation, email spoofing, spear phishing, whale phishing, or direct questioning (such as through social networking sites) are all examples of reportable suspicious cyber incidents. True If you had worked with Ms. Sims, which behaviors might be considered as suspicious? Requesting additional security access; Working long and irregular hours without authorization; A tendency to ask questions outside of her normal scope and classification level A Technology Control Plan (TCP) stipulates how a company will control access to its export-controlled technology. True Personnel from Sarah's organization were approached at a conference and were targeted for information concerning a classified system. Which of the following information collection methods may have been used? Recruitment and Elicitation Technology information includes both classified and unclassified information. True Brian is the Facility Security Officer (FSO) at a defense contractor. Who can he go to request contract-specific threat information and program threat assessments? NOT Defense Industrial security office (think it's Program Office) Brian Muller is the program manager for a new weapons system at a cleared defense contract facility. AN award of the multi-million dollar contract has been in the news and Mr. Muller is listed on the company website as the project manager for the new project. AN unknown reporter from the local newspaper called Mr. Muller and asked him several questions about the project and scope. Happy to promote the company, Mr. Muller was pleased to be of assistance. A week later, Mr. Muller attended his annual security briefing and several of the collection methods mentioned by the Facility Security Officer (FSO) made Mr. Muller suspicious of his previous phone call from the reporter. He called local newspaper and was told the reporter he asked for was not listed as an employee at the paper. What collection method may have been used against Mr. Muller? Unsolicited and direct requests

Show more Read less
Institution
Annual Security Awareness Refresher
Course
Annual security awareness refresher








Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
Annual security awareness refresher
Course
Annual security awareness refresher

Document information

Uploaded on
September 2, 2024
Number of pages
3
Written in
2024/2025
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

Thwarting the Enemy Questions and
Answers Rated A+

Daily audits of classified systems will prevent unauthorized logons and identify
suspicious transmissions: - answer False

Which of the following are reportable examples of a possible transmission of classified
material via unsecured means? - answer All of the above

Because the FBI has primary responsibility for counterintelligence investigations within
the United States, all threats should be reported only to the FBI. - answer False

A cleared defense contractor hosted a foreign visit. Which of the following activities
might you expect to occur? - answerA visitor attempts to wander away from his escort;
Some of those listed on the visit request form are replaced with last minute substitutes;
Foreign delegation asking questions outside the scope of the intended visit

Which of the following types of technology is strictly controlled by the Department of
Defense? - answerMilitary critical technology

During a foreign conference or trade show what activities might be experienced? -
answerAll of the above

William is a sales manager with a large firm working on aviation technologies. He is
working at the company's booth at the Paris Air Show. Which of the following collection
methods would an adversary NOT use at the Paris Air Show? - answerNone of the
above

Sarah is the Facility Security Officer (FSO) at a small, private firm that develops dual
use technology. A foreign firm approaches Sarah's facility requesting to purchase the
technology. Which regulation is applicable to determine if they can sell the dual use
technology to a foreign firm? - answerExport Administration Regulations (EAR)

Jack is a Facility Security Officer (FSO) for a cleared defense contractor. Where should
he find reporting procedures that pertain to his organization? - answerNational Industrial
Security Program Operating Manual (NISPOM)

Social engineering, electronic elicitation, email spoofing, spear phishing, whale
phishing, or direct questioning (such as through social networking sites) are all
examples of reportable suspicious cyber incidents. - answerTrue

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
julianah420 Phoenix University
View profile
Follow You need to be logged in order to follow users or courses
Sold
655
Member since
2 year
Number of followers
324
Documents
33836
Last sold
3 days ago
NURSING,TESTBANKS,ASSIGNMENT,AQA AND ALL REVISION MATERIALS

On this page, you find all documents, package deals, and flashcards offered by seller julianah420

4.3

149 reviews

5
101
4
20
3
8
2
5
1
15

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions