COUNTERINTELLIGENCE
AWARENESS AND REPORTING EXAM
Cyber Vulnerabilities to COC Systems may include:
-Disgruntled or Co-opted employee
-Weak passwords
-Illegal Downloads
-All of these - Correct Answers -All of these
Personnel who fail to report CI activities of concern as outlined in Enclosure 4 of DOD
Directive 5240.06 are subject to appropriate disciplinary action under regulations.
-True
-False - Correct Answers -True
Foreign Intelligence Entities seldom use elicitation to extract information from people
who have access to classified or sensitive information.
-True
-False - Correct Answers –False
Foreign Intelligence Entities (FEI) seldom use the Internet or other communications
including social networking services as a collection method.
-True
-False - Correct Answers -False
Foreign Intelligence Entities (FEI) is defined in DOD Directive 5240.06 as "any known or
suspected foreign organization, person, or group (public, private, or governmental) that
conducts intelligence activities to acquire U.S. information, block or impair U.S.
intelligence collection, influence U.S. policy, or disrupt U.S. systems and programs. The
term includes foreign intelligence and security services and international terrorists."
-True
-False - Correct Answers -True
Which of the following is not an example of an anomaly?
-Foreign diplomat attempts to defect
-An adversary uses technical countermeasures to block a previously undisclosed or
classified U.S. intercept technology
-Foreign officials reveal details they should not have known
AWARENESS AND REPORTING EXAM
Cyber Vulnerabilities to COC Systems may include:
-Disgruntled or Co-opted employee
-Weak passwords
-Illegal Downloads
-All of these - Correct Answers -All of these
Personnel who fail to report CI activities of concern as outlined in Enclosure 4 of DOD
Directive 5240.06 are subject to appropriate disciplinary action under regulations.
-True
-False - Correct Answers -True
Foreign Intelligence Entities seldom use elicitation to extract information from people
who have access to classified or sensitive information.
-True
-False - Correct Answers –False
Foreign Intelligence Entities (FEI) seldom use the Internet or other communications
including social networking services as a collection method.
-True
-False - Correct Answers -False
Foreign Intelligence Entities (FEI) is defined in DOD Directive 5240.06 as "any known or
suspected foreign organization, person, or group (public, private, or governmental) that
conducts intelligence activities to acquire U.S. information, block or impair U.S.
intelligence collection, influence U.S. policy, or disrupt U.S. systems and programs. The
term includes foreign intelligence and security services and international terrorists."
-True
-False - Correct Answers -True
Which of the following is not an example of an anomaly?
-Foreign diplomat attempts to defect
-An adversary uses technical countermeasures to block a previously undisclosed or
classified U.S. intercept technology
-Foreign officials reveal details they should not have known