Counterintelligence as defined in the national security act of 1947 is "information . . . . Or international terrorist activities" - Answer - True
Under DoDD 5240.06 Reportable Foreign Intelligence Contacts, Activities, indicators & behaviors; Which of the following is not reportable? - Answer - None of the Above
Collection methods of operation . . . . Facilities we support include: - Answer - All of the above
Cyber vulnerabilities to DoD Systems may include - Answer - All of the above
Foreign Intelligence Entity . . . . and international terrorist - Answer - True
DoD personnel who suspect a coworker of possible espionage should - Answer - report directly to your CI OR security Office
Personell who fail to report CI activities of concern as outlined in Enclosure 4 of DoD Directive 5240.06 are subject to appropriate disciplinary action under regulations - Answer - True
Foreign Intelligence seldom use elicitation to extract information from people who have access to classified or sensitive information - Answer - false
Foreign intelligence entities seldom use the internet or other communications including social networking services as a collection method - Answer - False
Which of the following is NOT an example of anomaly? - Answer - FOREIGN DIPLOMAT ATTEMPTS TO DEFECT
Potential PEIs are activities, behaviors, or circumstances . . . . Examples of PEI include - Answer - All of the Above
If you feel you are being solicited for information which of the following should you do? - Answer - all of the above