Counterintelligence as defined in the national security act of 1947 is
"information . . . . Or international terrorist activities" Correct Ans -
True
Under DoDD 5240.06 Reportable Foreign Intelligence Contacts, Activities,
indicators & behaviors; Which of the following is not reportable?
Correct Ans - None of the Above
Collection methods of operation . . . . Facilities we support include:
Correct Ans - All of the above
Cyber vulnerabilities to DoD Systems may include Correct Ans - All
of the above
Foreign Intelligence Entity . . . . and international terrorist Correct Ans
- True
DoD personnel who suspect a coworker of possible espionage should
Correct Ans - report directly to your CI OR security Office
Personell who fail to report CI activities of concern as outlined in Enclosure
4 of DoD Directive 5240.06 are subject to appropriate disciplinary action
under regulations Correct Ans - True
Foreign Intelligence seldom use elicitation to extract information from
people who have access to classified or sensitive information Correct
Ans - false
Foreign intelligence entities seldom use the internet or other
communications including social networking services as a collection
method Correct Ans - False
Which of the following is NOT an example of anomaly? Correct Ans -
FOREIGN DIPLOMAT ATTEMPTS TO DEFECT
Potential PEIs are activities, behaviors, or circumstances . . . . Examples of
PEI include Correct Ans - All of the Above