SPED Insider Threat QUIZ| QUESTIONS WITH
100% CORRECT SOLUTIONS!!
Which statements describe critical thinking?
c. Critical thinking analyzes and evaluates various sources of information to make a holistic
judgment.
Insider Threat Analysts are responsible for
Gathering and providing data for others to review and analyze
c. Providing subject matter expertise and direct support to the insider threat program
d. Producing analytic products to support leadership decisions.
Which Insider Threat requirements would you refer to if your organization is a cleared
defense contractor?
NISPOM
Analytic thinking can be thought of as a step in the critical thinking process.
True
Which statement best reflects how analysts can avoid common analytic mistakes?
c. Apply structured analysis before considering potential solutions or coming to conclusions.
When analysts ensure their analytic assessments are not distorted or shaped by advocacy of
a particular audience, they are applying which analytic standard?
b. Independent of Political Consideration
,When analysts address critical information gaps before providing a judgment, they are
applying which analytic standard?
c. Based on Available Sources of Intelligence Information
Analytic products should implement and exhibit which of the following?
b. Accurate judgements and assessments
Analysts should produce analytic products that accomplish which of the following?
b. Express judgments as clearly and precisely as possible.
This tool can undermine and show weakness of the primary view.
b. Devil's advocacy
What are rules of Divergent Thinking
c. Build one idea upon another.
All ideas are accepted
Don't evaluate the ideas
Which organization's reports may offer some insight into the types of recommendations
they make to protect civil liberties in pending policy and law?
c. Privacy and Civil Liberties Oversight Board
What rule strikes a balance that permits important uses of information while protecting
the privacy of people who seek care and healing?
b. HIPAA Privacy Rule
, If an individual files a complaint alleging an organization conducted an unlawful search of
their personal vehicle while it was in the organization's parking lot, which Constitutional
amendment would this complaint fall under?
a. 4th Amendment
What process can be used by the Insider Threat Program to prevent the inadvertent
compromise of sensitive or classified information?
OPSEC
Necessary privacy and security safeguards, including role-based access to data and
oversight of program personnel and system administrators, falls under which tenet of the
Principle of Confidentiality?
d. Fair information practices
How do Insider Threat Programs ensure their actions are not based on legally protected
behaviors or activities?
c. By adhering to accepted potential risk indicators
Insider Threat Programs must be careful to distinguish between unauthorized disclosures
and whistleblowing activities and ensure that their actions do not impede the exercise of
free speech or constitutional liberties.
True
What must Insider Threat Program actions be based on in order to maintain an even-
handed approach?
100% CORRECT SOLUTIONS!!
Which statements describe critical thinking?
c. Critical thinking analyzes and evaluates various sources of information to make a holistic
judgment.
Insider Threat Analysts are responsible for
Gathering and providing data for others to review and analyze
c. Providing subject matter expertise and direct support to the insider threat program
d. Producing analytic products to support leadership decisions.
Which Insider Threat requirements would you refer to if your organization is a cleared
defense contractor?
NISPOM
Analytic thinking can be thought of as a step in the critical thinking process.
True
Which statement best reflects how analysts can avoid common analytic mistakes?
c. Apply structured analysis before considering potential solutions or coming to conclusions.
When analysts ensure their analytic assessments are not distorted or shaped by advocacy of
a particular audience, they are applying which analytic standard?
b. Independent of Political Consideration
,When analysts address critical information gaps before providing a judgment, they are
applying which analytic standard?
c. Based on Available Sources of Intelligence Information
Analytic products should implement and exhibit which of the following?
b. Accurate judgements and assessments
Analysts should produce analytic products that accomplish which of the following?
b. Express judgments as clearly and precisely as possible.
This tool can undermine and show weakness of the primary view.
b. Devil's advocacy
What are rules of Divergent Thinking
c. Build one idea upon another.
All ideas are accepted
Don't evaluate the ideas
Which organization's reports may offer some insight into the types of recommendations
they make to protect civil liberties in pending policy and law?
c. Privacy and Civil Liberties Oversight Board
What rule strikes a balance that permits important uses of information while protecting
the privacy of people who seek care and healing?
b. HIPAA Privacy Rule
, If an individual files a complaint alleging an organization conducted an unlawful search of
their personal vehicle while it was in the organization's parking lot, which Constitutional
amendment would this complaint fall under?
a. 4th Amendment
What process can be used by the Insider Threat Program to prevent the inadvertent
compromise of sensitive or classified information?
OPSEC
Necessary privacy and security safeguards, including role-based access to data and
oversight of program personnel and system administrators, falls under which tenet of the
Principle of Confidentiality?
d. Fair information practices
How do Insider Threat Programs ensure their actions are not based on legally protected
behaviors or activities?
c. By adhering to accepted potential risk indicators
Insider Threat Programs must be careful to distinguish between unauthorized disclosures
and whistleblowing activities and ensure that their actions do not impede the exercise of
free speech or constitutional liberties.
True
What must Insider Threat Program actions be based on in order to maintain an even-
handed approach?