100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

Thwarting The Enemy Exam With Correct Answers

Rating
1,0
(1)
Sold
1
Pages
5
Grade
A+
Uploaded on
06-06-2025
Written in
2024/2025

Daily audits of classified systems will prevent unauthorized logons and identify suspicious transmissions: - correct answers False Which of the following are reportable examples of a possible transmission of classified material via unsecured means? - correct answers All of the above Because the FBI has primary responsibility for counterintelligence investigations within the United States, all threats should be reported only to the FBI. - correct answers False A cleared defense contractor hosted a foreign visit. Which of the following activities might you expect to occur? - correct answers A visitor attempts to wander away from his escort; Some of those listed on the visit request form are replaced with last minute substitutes; Foreign delegation asking questions outside the scope of the intended visit Which of the following types of technology is strictly controlled by the Department of Defense? - correct answers Military critical technology During a foreign conference or trade show what activities might be experienced? - correct answers All of the above

Show more Read less
Institution
Thwarting The Enemy E
Course
Thwarting The Enemy E









Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
Thwarting The Enemy E
Course
Thwarting The Enemy E

Document information

Uploaded on
June 6, 2025
Number of pages
5
Written in
2024/2025
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

Thwarting The Enemy Exam With
Correct Answers

Daily audits of classified systems will prevent unauthorized logons and identify suspicious
transmissions: - correct answers ✔✔False



Which of the following are reportable examples of a possible transmission of classified material
via unsecured means? - correct answers ✔✔All of the above



Because the FBI has primary responsibility for counterintelligence investigations within the
United States, all threats should be reported only to the FBI. - correct answers ✔✔False



A cleared defense contractor hosted a foreign visit. Which of the following activities might you
expect to occur? - correct answers ✔✔A visitor attempts to wander away from his escort; Some
of those listed on the visit request form are replaced with last minute substitutes; Foreign
delegation asking questions outside the scope of the intended visit



Which of the following types of technology is strictly controlled by the Department of Defense?
- correct answers ✔✔Military critical technology



During a foreign conference or trade show what activities might be experienced? - correct
answers ✔✔All of the above



William is a sales manager with a large firm working on aviation technologies. He is working at
the company's booth at the Paris Air Show. Which of the following collection methods would an
adversary NOT use at the Paris Air Show? - correct answers ✔✔None of the above

, Sarah is the Facility Security Officer (FSO) at a small, private firm that develops dual use
technology. A foreign firm approaches Sarah's facility requesting to purchase the technology.
Which regulation is applicable to determine if they can sell the dual use technology to a foreign
firm? - correct answers ✔✔Export Administration Regulations (EAR)



Jack is a Facility Security Officer (FSO) for a cleared defense contractor. Where should he find
reporting procedures that pertain to his organization? - correct answers ✔✔National Industrial
Security Program Operating Manual (NISPOM)



Social engineering, electronic elicitation, email spoofing, spear phishing, whale phishing, or
direct questioning (such as through social networking sites) are all examples of reportable
suspicious cyber incidents. - correct answers ✔✔True



If you had worked with Ms. Sims, which behaviors might be considered as suspicious? - correct
answers ✔✔Requesting additional security access; Working long and irregular hours without
authorization; A tendency to ask questions outside of her normal scope and classification level



A Technology Control Plan (TCP) stipulates how a company will control access to its export-
controlled technology. - correct answers ✔✔True



Personnel from Sarah's organization were approached at a conference and were targeted for
information concerning a classified system. Which of the following information collection
methods may have been used? - correct answers ✔✔Recruitment and Elicitation



Technology information includes both classified and unclassified information. - correct answers
✔✔True



Brian is the Facility Security Officer (FSO) at a defense contractor. Who can he go to request
contract-specific threat information and program threat assessments? - correct answers
✔✔NOT Defense Industrial security office (think it's Program Office)

Reviews from verified buyers

Showing all reviews
3 weeks ago

questions do not match the test

1,0

1 reviews

5
0
4
0
3
0
2
0
1
1
Trustworthy reviews on Stuvia

All reviews are made by real Stuvia users after verified purchases.

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
QUILLSKY Yale University
Follow You need to be logged in order to follow users or courses
Sold
506
Member since
2 year
Number of followers
275
Documents
13973
Last sold
4 days ago
,STUDY GUIDES,TESTBANKS AND QUALITY EXAMS IS THE KEY TO STUDENTS CAREER EXCELLENCE!!!

On this page, you find all documents, package deals, and flashcards offered by seller MAXGRADES WELCOME TO MAXGRADES ALL THE BEST !!!!!!

3,6

126 reviews

5
48
4
23
3
28
2
6
1
21

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their exams and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can immediately select a different document that better matches what you need.

Pay how you prefer, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card or EFT and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions