Reporting Course for DOD Exam With
100% Correct Answers
Carl is a professor at a prominent university working on a project associated with the DOD. He
receives a request from an individual to assist with fundamental research for the project. The
individual appears to be overqualified for the position, but Carl decides to hire him anyway. In
this scenario, what are the potential indicators of foreign intelligence entity solicitation? -
correct answers ✔✔Individual seeking a position they are overqualified
Individual requested to assist on a DOD project
Dana is a new employee working for a cleared DOD contractor. She works with sensitive
information on a regular basis. What behaviors does she need to exhibit in order to protect
national security? - correct answers ✔✔Remain Vigilant
Be ready to report
Remain observant
Pat works for the DOD as a counterintelligence analyst. Recently, he was invited by a foreign
contact to attend a conference in the contact's country. He declined but met the foreign contact
on a recent trip overseas and they became romantically involved. In this example, what was an
indicator of foreign intelligence entity targeting? - correct answers ✔✔Being invited to attend a
conference in a foreign country
Becoming romantically involved with a foreign national
What do foreign intelligence entities (FIEs) attempt to collect information about? - correct
answers ✔✔Activities
Plans
Technologies
, Inadvertent actions, such as easy passwords, practicing poor computer security, and emailing or
placing personal files on your computer, create vulnerabilities to which method of collecting
information? - correct answers ✔✔Cyber activities
Which of the following are possible indicators of an Insider Threat? - correct answers
✔✔Substance abuse and mental health issues
Criminal conduct
Financial irregularities
You have observed suspicious behavior by a coworker. What is your role in this scenario? -
correct answers ✔✔Report it to your unit security or CI office
Which collection method do foreign intelligence entities (FIEs) frequently use to extract from
people who have access to classified or sensitive information? - correct answers ✔✔Elicitation
Which of the following actions can potentially reduce or compromise your network security and
place the lives of our men and women in jeopardy? - correct answers ✔✔Inputting falsified
corrupted data
Phishing
Hacking
During which phase of the recruitment process does the foreign intelligence officer look for
exploitable weaknesses, such as alcohol abuse, drug use, extramarital affairs, gambling, or other
financial problems? - correct answers ✔✔Assessing
Gene works for a cleared defense contractor. One day, he clicks a link in an email which,
unbeknownst to him, downloaded a virus from a foreign intelligence entity onto the
contractor's IT system. What is this an example of? - correct answers ✔✔Foreign intelligence
entity use of insiders