Integrating CI and threat awareness into a security program helps to accomplish
which of the following?
Select all that apply.
□ Assist DoD in maintaining a tactical advantage over foreign intelligence
operatives
□ Protect valuable company assets from loss and compromise
□ Identify which assets need protecting
□ Establish countermeasures - □ Protect valuable company assets from loss and
compromise
□ Identify which assets need protecting
□ Establish countermeasures
CI is the information gathered and activities conducted to protect against what?
Select all that apply.
□ Espionage, sabotage, terrorism
□ Assassinations conducted for or on behalf of foreign governments,
organizations, or persons
□ Activities by large companies to obtain operating capital within a foreign country
□ International terrorist activities - □ Espionage, sabotage, terrorism
□ Assassinations conducted for or on behalf of foreign governments,
organizations, or persons
□ International terrorist activities
DoD 5220.22-M NISPOM does which of the following for industry?
Select all that apply.
□ Controls the disclosure of classified information to contractors
□ Identifies the cost associated with particular contracts
□ Protects special classes of classified information
, □ Requires contractors to hire counterintelligence special agents - □ Controls the
disclosure of classified information to contractors
□ Protects special classes of classified information
The NISPOM requires that adverse information concerning cleared employees and
any suspicious contacts be reported to DCSA.
Select the best answer.
o True
o False - TRUE
CI helps security officials to manage risk in which of the following ways? Select all
that apply.
□ Focus on assets and identify the threats to them
□ Identify vulnerabilities
□ Develop and apply countermeasures
□ Develop investigation procedures
□ Develop security classification guides - □ Focus on assets and identify the threats
to them
□ Identify vulnerabilities
□ Develop and apply countermeasures
Which of the following are foreign collection methods?
□ Requests for information
□ Suspicious Network Activity
□ Seeking employment
□ Foreign visits
□ Abduction and interrogation - Requests for information
Suspicious Network Activity
Seeking employment
Foreign visits