QUESTIONS WITH ANSWERS
Personnel who fail too report CI activities of concern as outlined in Enclosure 4 of DOD
directive 520.06 are subject to appropriate diciplinary action under regulations. - CORRECT
ANSWER✅✅✅true
Foreign Intelligence Entities seldom use the Internet or other communications including social
networking services as a collection method. - CORRECT ANSWER✅✅✅False
If you ever feel you are being solicited for information which of the following should you do ? -
CORRECT ANSWER✅✅✅All of the above
Under DoDD 5240.06 reportable foreign intellegence contacts, activities, aindicators and
behaiviors; which of the following is not reportable? - CORRECT ANSWER✅✅✅none of
the above
Cyber vulnerabilities to DoD systems include - CORRECT ANSWER✅✅✅all of the above
Foreign intelligence entities seldom use elicitation to extract information from people who have
access to classified or sensative information. - CORRECT ANSWER✅✅✅false
Collection methods of operation frequently used by foreign intelligence entities to collect
information from DoD on the critical technology being produced within the cleared defense
contractor facilities we support include: - CORRECT ANSWER✅✅✅All of the above
which of the following is not an example of anomaly? - CORRECT ANSWER✅✅✅foreing
diplomat attempts to defect
DoD personel who suspect a coworker of possible espionage should - CORRECT
ANSWER✅✅✅Reports directly to your CI or security line