100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

Counterintelligence Awareness and Reporting Course for DOD LATEST UPDATED VERSION THIS YEAR WITH COMPLETE 180 QUESTIONS AND SOLUTIONS JUST RELEASED

Rating
-
Sold
-
Pages
20
Grade
A+
Uploaded on
04-11-2025
Written in
2025/2026

Counterintelligence Awareness and Reporting Course for DOD LATEST UPDATED VERSION THIS YEAR WITH COMPLETE 180 QUESTIONS AND SOLUTIONS JUST RELEASED

Institution
Counterintelligence Awareness And Reporting Course
Course
Counterintelligence Awareness and Reporting Course










Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
Counterintelligence Awareness and Reporting Course
Course
Counterintelligence Awareness and Reporting Course

Document information

Uploaded on
November 4, 2025
Number of pages
20
Written in
2025/2026
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

Page 1 of 20




Counterintelligence Awareness and Reporting
Course for DOD LATEST UPDATED VERSION THIS
YEAR WITH COMPLETE 180 QUESTIONS AND
SOLUTIONS JUST RELEASED



Question: Gene works for a cleared defense contractor. One day, he clicks a link in an email
which, unbeknownst to him, downloaded a virus from a foreign intelligence entity onto the
contractor's IT system. What is this an example of? - CORRECT ANSWER✔✔Foreign intelligence
entity use of insiders




Question: Which of the following are examples of a "Security Anomaly" and should be
reported? - CORRECT ANSWER✔✔- An adversary conducts activities with precision that
indicates prior knowledge

- Foreign officials reveal details they should not have known




Question: Carl is a professor at a prominent university working on a project associated with the
DOD. He receives a request from an individual to assist with fundamental research for the
project. The individual appears to be overqualified for the position, but Carl decides to hire him
anyway. In this scenario, what are the potential indicators of foreign intelligence entity
solicitation? - CORRECT ANSWER✔✔Individual seeking a position they are overqualified

Individual requested to assist on a DOD project

, Page 2 of 20




Question: Dana is a new employee working for a cleared DOD contractor. She works with
sensitive information on a regular basis. What behaviors does she need to exhibit in order to
protect national security? - CORRECT ANSWER✔✔Remain Vigilant

Be ready to report

Remain observant




Question: Cyber Vulnerabilities to DoD Systems may include:

- Disgruntled or Co-opted employee

- Weak passwords

- Viruses

- Illegal Downloads

- All of these - CORRECT ANSWER✔✔All of these




Question: Which of the following is not an example of an anomaly? - CORRECT
ANSWER✔✔Foreign diplomat attempts to defect.




Question: Collection Methods or operation frequently used by Foreign Intelligence Entities to
collect information from DoD on the critical technology being produced within the cleared
defense contractor facilities we support include: - CORRECT ANSWER✔✔All of these

, Page 3 of 20


Question: Counterintelligence as defined in the National Security Act of 1947, is "information
gathered and activities conducted to protect against espionage, other intelligence activities,
sabotage, or assassinations conducted by or on behalf of foreign governments or elements
thereof, foreign organizations or foreign persons, or international terrorist activities." - CORRECT
ANSWER✔✔True




Question: If you feel you are being solicited for information which of the following, should you
do? - CORRECT ANSWER✔✔All of these




Question: DoD personnel who suspect a coworker of possible espionage should: - CORRECT
ANSWER✔✔Report directly to your CI or Security Office




Question: Foreign Intelligence Entities seldom use elicitation to extract information from
people who have access to classified or sensitive information. - CORRECT ANSWER✔✔False




Question: Foreign Intelligence Entities seldom use the Internet or other communications
including social networking services as a collection method. - CORRECT ANSWER✔✔False




Question: Under DoDD 5240.06 Reportable Foreign Intelligence Contacts, Activities, Indicators
and Behaviors; which of the following is not reportable? - CORRECT ANSWER✔✔None of these
OR Authorized network access

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
ressyshii Chamberlain College Of Nursing
View profile
Follow You need to be logged in order to follow users or courses
Sold
45
Member since
1 year
Number of followers
7
Documents
1861
Last sold
4 days ago

3.7

9 reviews

5
5
4
0
3
1
2
2
1
1

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions