Sharing details of your personal and professional lives or life online makes you ___________________
adversaries. - Answers more vulnerable to
Which of these activities must be reported? Select all that apply. - Answers -bypassing security rules or
protocols
-unauthorized disclosure of classified material
-inappropriate copying of classified material
Which of the countermeasures can you implement to help reduce technology-associated insider
threats? Select all that apply. - Answers -take security training courses
-prevent unauthorized data access
-use strong passwords
-keep unauthorized software from secure environments
A coworker shares that she and her husband are facing foreclosure, and she doesn't know what to do.
What should you do? Select all that apply. - Answers -Suggest she contact the EAP
-Report the indicator to the security office
Insiders may include which of these groups of people? Select all that apply. - Answers -former
employees
-contractors
-employees
-active duty military
The definition of Targeted Violence includes which of these components? Select all that apply. - Answers
-directed at an individual or a group
-wrong
You observe a colleague with a sudden increased alcohol intake (e.g. frequent heavy consumption,
drinking until drunk) what is the appropriate action? - Answers -report the concerning behavior to your
security officier
Most inside offenders display concerning behaviors before acting directly against their organization. This
behavior may include (select all that apply): - Answers -violation of workplace policies
-failure to follow standard procedures (SOP)
, -legal difficulties
Which of these may be considered part of the media? Select all that apply. - Answers -not all of the
answers
-not just newspaper reporter
Which of the following are things that adversaries want to know? Select all that apply. - Answers -your
organization's personnel
-countries your organization works with
-your company's competitors
_____________ is a a conversation technique used to discretely gather information that is not readily
available and do so without raising suspicion. - Answers Elicitation
Technological advances impact the insider threat by _____________. Select all that apply. - Answers -
Presenting new security challenges
-Allowing large amounts of data to be accessed
Which of the following is a technology-related indicator. Select all that apply. - Answers -keeping
unauthorized backups
-accessing systems at unusual hours without without authorization
Which of these steps should you take on social media to limit your vulnerability? Select all that apply. -
Answers -all answers
You can help reduce technology-associated insider threats by: - Answers -not practicing
counterintelligence
Contractors must report which of these? Select all that apply. - Answers -any event that may impact the
status of the facility
-anything that affects the proper safeguarding of classified information
-any indication that classified information has been lost or compromised.
-efforts to obtain
-all answers
U.S. Government employees and contractors must report which of the following? Select all that apply. -
Answers -foreign contacts
Which of the following are true about insider threats? - Answers -all answers