100% Solve Answers!!
1. To minimize the ability of an Insider
-Report all suspicious activity
Treat to go undetected, what should
you and your coworkers do?
2. What are some examples of foreign
intelli- gence entity threats? -Foreign Corporations
-State-sponsored computer experts
of foreign nations
-Hackers
3. Which of the following actions can potentially -Inputting falsified corrupted
data
reduce or compromise your network security -
phishing and place the lives of our men and
women in -hacking jeopardy?
4. Foreign intelligence entities (FIEs) -Solicitation and marketing of services
collect in- formation from DOD on
-Solicited requests for information
critical technology
produced with cleared defense contractor fa- -International conventions,
seminars,
cilities. What types of collections methods of and exhibits
operation do they frequently use? indica- tors of an
Insider Threat?
5. During which phase of the
recruitment process does the foreign
intelligence officer look for exploitable
weaknesses, such as al- cohol abuse,
drug use, extramarital affairs,
gambling, or other financial
problems?
6. Which of the following are possible
1/
9
, Counterintelligence awareness and reporting Questions With
100% Solve Answers!!
-Cyber activities x
- Assessing
-Financial irregularities
-Criminal conduct
-Substance abuse and mental health is- sues
2/
9