Page 1 of 21
COUNTERINTELLIGENCE AWARENESS AND
REPORTING COURSE FOR DOD EXAM WITH ALL
180 QUESTIONS AND CORRECT ANSWERS JUST
RELEASED THIS YEAR
Question: Personnel who fail to report CI Activities of concern as outlines in Enclosure 4 of DoD
Directive 5240.06 are subject to appropriate disciplinary action under regulations - CORRECT
ANSWER✔✔True
Question: Foreign Intelligence Entity (FIE) is defined in DoD Directive 5240.06 as "any known or
suspected foreign organization, person, or group (public, private, or governmental) that
conducts intelligence activities to acquire U.S. information, block or impair U.S. intelligence
collection, influence U.S. policy, or disrupt U.S. systems and programs. The term includes foreign
intelligence and security services and international terrorists." - CORRECT ANSWER✔✔True
Question:Cyber Vulnerabilities to DoD Systems may include:
- Disgruntled or Co-opted employee
- Weak passwords
- Viruses
- Illegal Downloads
- All of these - CORRECT ANSWER✔✔All of these
1
SUCCESS!
,Page 2 of 21
Question: Which of the following is not an example of an anomaly? - CORRECT
ANSWER✔✔Foreign diplomat attempts to defect.
Question: Collection Methods or operation frequently used by Foreign Intelligence Entities to
collect information from DoD on the critical technology being produced within the cleared
defense contractor facilities we support include: - CORRECT ANSWER✔✔All of these
Question: Counterintelligence as defined in the National Security Act of 1947, is "information
gathered and activities conducted to protect against espionage, other intelligence activities,
sabotage, or assassinations conducted by or on behalf of foreign governments or elements
thereof, foreign organizations or foreign persons, or international terrorist activities." - CORRECT
ANSWER✔✔True
Question: If you feel you are being solicited for information which of the following, should you
do? - CORRECT ANSWER✔✔All of these
Question: DoD personnel who suspect a coworker of possible espionage should: - CORRECT
ANSWER✔✔Report directly to your CI or Security Office
2
SUCCESS!
, Page 3 of 21
Question: Foreign Intelligence Entities seldom use elicitation to extract information from
people who have access to classified or sensitive information. - CORRECT ANSWER✔✔False
Question: Foreign Intelligence Entities seldom use the Internet or other communications
including social networking services as a collection method. - CORRECT ANSWER✔✔False
Question: Under DoDD 5240.06 Reportable Foreign Intelligence Contacts, Activities, Indicators
and Behaviors; which of the following is not reportable? - CORRECT ANSWER✔✔None of these
OR Authorized network access
Question: You have observed suspicious behavior by a coworker. What is your role in this
scenario? - CORRECT ANSWER✔✔Report it to your unit security or Cl office
Question: What are some examples of foreign intelligence entity threats? - CORRECT
ANSWER✔✔- State-sponsored computer experts of foreign nations
- Hackers
- Foreign Corporations
3
SUCCESS!
COUNTERINTELLIGENCE AWARENESS AND
REPORTING COURSE FOR DOD EXAM WITH ALL
180 QUESTIONS AND CORRECT ANSWERS JUST
RELEASED THIS YEAR
Question: Personnel who fail to report CI Activities of concern as outlines in Enclosure 4 of DoD
Directive 5240.06 are subject to appropriate disciplinary action under regulations - CORRECT
ANSWER✔✔True
Question: Foreign Intelligence Entity (FIE) is defined in DoD Directive 5240.06 as "any known or
suspected foreign organization, person, or group (public, private, or governmental) that
conducts intelligence activities to acquire U.S. information, block or impair U.S. intelligence
collection, influence U.S. policy, or disrupt U.S. systems and programs. The term includes foreign
intelligence and security services and international terrorists." - CORRECT ANSWER✔✔True
Question:Cyber Vulnerabilities to DoD Systems may include:
- Disgruntled or Co-opted employee
- Weak passwords
- Viruses
- Illegal Downloads
- All of these - CORRECT ANSWER✔✔All of these
1
SUCCESS!
,Page 2 of 21
Question: Which of the following is not an example of an anomaly? - CORRECT
ANSWER✔✔Foreign diplomat attempts to defect.
Question: Collection Methods or operation frequently used by Foreign Intelligence Entities to
collect information from DoD on the critical technology being produced within the cleared
defense contractor facilities we support include: - CORRECT ANSWER✔✔All of these
Question: Counterintelligence as defined in the National Security Act of 1947, is "information
gathered and activities conducted to protect against espionage, other intelligence activities,
sabotage, or assassinations conducted by or on behalf of foreign governments or elements
thereof, foreign organizations or foreign persons, or international terrorist activities." - CORRECT
ANSWER✔✔True
Question: If you feel you are being solicited for information which of the following, should you
do? - CORRECT ANSWER✔✔All of these
Question: DoD personnel who suspect a coworker of possible espionage should: - CORRECT
ANSWER✔✔Report directly to your CI or Security Office
2
SUCCESS!
, Page 3 of 21
Question: Foreign Intelligence Entities seldom use elicitation to extract information from
people who have access to classified or sensitive information. - CORRECT ANSWER✔✔False
Question: Foreign Intelligence Entities seldom use the Internet or other communications
including social networking services as a collection method. - CORRECT ANSWER✔✔False
Question: Under DoDD 5240.06 Reportable Foreign Intelligence Contacts, Activities, Indicators
and Behaviors; which of the following is not reportable? - CORRECT ANSWER✔✔None of these
OR Authorized network access
Question: You have observed suspicious behavior by a coworker. What is your role in this
scenario? - CORRECT ANSWER✔✔Report it to your unit security or Cl office
Question: What are some examples of foreign intelligence entity threats? - CORRECT
ANSWER✔✔- State-sponsored computer experts of foreign nations
- Hackers
- Foreign Corporations
3
SUCCESS!