100% Corre Answers | Verified
1. Cyber Vulnerabilities to COC Systems may
All of these
include:
-Disgruntled or Co-opted employee
-Weak passwords
-Illegal Downloads
-All of these
True
2. Personnel who fail to report CI activities of
concern as outlined in Enclosure 4 of DOD
Directive 5240.06 are subject to appropriate
disciplinary action under regulations.
-True
-False
False
3. Foreign Intelligence Entities seldom use
elicitation to extract information from people
who have access to classified or sensitive
information.
-True
-False
4. Potential espionage indicators (PEIs) are activities, be- All of these
haviors, or circumstances that 'may be
indicative' of potential espionage activities by
an individual who may have volunteered or
been recruited by a foreign entity as a writing
espionage agent. Examples of PEI include:
-Unexplained affluence, Concealing foreign travel,
Un- usual work hours, Avoiding polygraph
-Taking classified material home, Illegal
downloads, Unreported contact with foreign
nationals
1/
7
, Counterintelligence Awareness and Reporting Questions With
100% Corre Answers | Verified
-Disgruntled employee, Attempting to gain
access without need-to-know, Taking short
trips
2/
7