NISP QUESTIONS WITH 100 % CORRECT ANSWERS | VERIFIED
Integrating CI and threat awareness into a security program helps to accomplish which of the following? Select all that apply. □ Assist DoD in maintaining a tactical advantage over foreign intelligence operatives □ Protect valuable company assets from loss and compromise □ Identify which assets need protecting □ Establish countermeasures - □ Protect valuable company assets from loss and compromise □ Identify which assets need protecting □ Establish countermeasures CI is the information gathered and activities conducted to protect against what? Select all that apply. □ Espionage, sabotage, terrorism □ Assassinations conducted for or on behalf of foreign governments, organizations, or persons □ Activities by large companies to obtain operating capital within a foreign country □ International terrorist activities - □ Espionage, sabotage, terrorism □ Assassinations conducted for or on behalf of foreign governments, organizations, or persons □ International terrorist activities DoD 5220.22-M NISPOM does which of the following for industry? Select all that apply. □ Controls the disclosure of classified information to contractors □ Identifies the cost associated with particular contracts □ Protects special classes of classified information □ Requires contractors to hire counterintelligence special agents - □ Controls the disclosure of classified information to contractors □ Protects special classes of classified informationThe NISPOM requires that adverse information concerning cleared employees and any suspicious contacts be reported to DCSA. Select the best answer. o True o False - TRUE CI helps security officials to manage risk in which of the following ways? Select all that apply. □ Focus on assets and identify the threats to them □ Identify vulnerabilities □ Develop and apply countermeasures □ Develop investigation procedures □ Develop security classification guides - □ Focus on assets and identify the threats to them □ Identify vulnerabilities □ Develop and apply countermeasures Which of the following are foreign collection methods? □ Requests for information □ Suspicious Network Activity □ Seeking employment □ Foreign visits □ Abduction and interrogation - Requests for information Suspicious Network Activity Seeking employment Foreign visits Unsolicited and direct requests often submitted via email - Requests for Information Experts may receive all-expense-paid invitations to lecture - Conferences, Conventions, and Trade ShowsApplication to degree programs associated with cleared facilities or programs -Academic Solicitation Involves establishing emotional relationship with the target - Elicitation and Recruitment May use joint ventures or research partnerships - Solicitation and seeking employment Exchange employees or foreign business associates -Foreign visit
Written for
- Institution
- NISP
- Course
- NISP
Document information
- Uploaded on
- December 3, 2023
- Number of pages
- 6
- Written in
- 2023/2024
- Type
- Exam (elaborations)
- Contains
- Questions & answers
Subjects
Also available in package deal