and CORRECT Answers
Integrating CI and threat awareness into a security program helps to accomplish which of the
following?
Select all that apply.
□ Assist DoD in maintaining a tactical advantage over foreign intelligence operatives
□ Protect valuable company assets from loss and compromise
□ Identify which assets need protecting
□ Establish countermeasures - CORRECT ANSWER - □ Protect valuable company assets
from loss and compromise
□ Identify which assets need protecting
□ Establish countermeasures
CI is the information gathered and activities conducted to protect against what?
Select all that apply.
□ Espionage, sabotage, terrorism
□ Assassinations conducted for or on behalf of foreign governments, organizations, or persons
□ Activities by large companies to obtain operating capital within a foreign country
□ International terrorist activities - CORRECT ANSWER - □ Espionage, sabotage,
terrorism
□ Assassinations conducted for or on behalf of foreign governments, organizations, or persons
□ International terrorist activities
DoD 5220.22-M NISPOM does which of the following for industry?
Select all that apply.
□ Controls the disclosure of classified information to contractors
□ Identifies the cost associated with particular contracts
□ Protects special classes of classified information
, □ Requires contractors to hire counterintelligence special agents - CORRECT ANSWER -
□ Controls the disclosure of classified information to contractors
□ Protects special classes of classified information
The NISPOM requires that adverse information concerning cleared employees and any
suspicious contacts be reported to DCSA.
Select the best answer.
o True
o False - CORRECT ANSWER - TRUE
CI helps security officials to manage risk in which of the following ways? Select all that apply.
□ Focus on assets and identify the threats to them
□ Identify vulnerabilities
□ Develop and apply countermeasures
□ Develop investigation procedures
□ Develop security classification guides - CORRECT ANSWER - □ Focus on assets and
identify the threats to them
□ Identify vulnerabilities
□ Develop and apply countermeasures
Which of the following are foreign collection methods?
□ Requests for information
□ Suspicious Network Activity
□ Seeking employment
□ Foreign visits
□ Abduction and interrogation - CORRECT ANSWER - Requests for information
Suspicious Network Activity
Seeking employment
Foreign visits