Correct Answers
Daily audits of classified systems will prevent unauthorized logons and identify suspicious
transmissions: - correct answers ✔✔False
Which of the following are reportable examples of a possible transmission of classified material
via unsecured means? - correct answers ✔✔All of the above
Because the FBI has primary responsibility for counterintelligence investigations within the
United States, all threats should be reported only to the FBI. - correct answers ✔✔False
A cleared defense contractor hosted a foreign visit. Which of the following activities might you
expect to occur? - correct answers ✔✔A visitor attempts to wander away from his escort; Some
of those listed on the visit request form are replaced with last minute substitutes; Foreign
delegation asking questions outside the scope of the intended visit
Which of the following types of technology is strictly controlled by the Department of Defense?
- correct answers ✔✔Military critical technology
During a foreign conference or trade show what activities might be experienced? - correct
answers ✔✔All of the above
William is a sales manager with a large firm working on aviation technologies. He is working at
the company's booth at the Paris Air Show. Which of the following collection methods would an
adversary NOT use at the Paris Air Show? - correct answers ✔✔None of the above
, Sarah is the Facility Security Officer (FSO) at a small, private firm that develops dual use
technology. A foreign firm approaches Sarah's facility requesting to purchase the technology.
Which regulation is applicable to determine if they can sell the dual use technology to a foreign
firm? - correct answers ✔✔Export Administration Regulations (EAR)
Jack is a Facility Security Officer (FSO) for a cleared defense contractor. Where should he find
reporting procedures that pertain to his organization? - correct answers ✔✔National Industrial
Security Program Operating Manual (NISPOM)
Social engineering, electronic elicitation, email spoofing, spear phishing, whale phishing, or
direct questioning (such as through social networking sites) are all examples of reportable
suspicious cyber incidents. - correct answers ✔✔True
If you had worked with Ms. Sims, which behaviors might be considered as suspicious? - correct
answers ✔✔Requesting additional security access; Working long and irregular hours without
authorization; A tendency to ask questions outside of her normal scope and classification level
A Technology Control Plan (TCP) stipulates how a company will control access to its export-
controlled technology. - correct answers ✔✔True
Personnel from Sarah's organization were approached at a conference and were targeted for
information concerning a classified system. Which of the following information collection
methods may have been used? - correct answers ✔✔Recruitment and Elicitation
Technology information includes both classified and unclassified information. - correct answers
✔✔True
Brian is the Facility Security Officer (FSO) at a defense contractor. Who can he go to request
contract-specific threat information and program threat assessments? - correct answers
✔✔NOT Defense Industrial security office (think it's Program Office)