COUNTERINTELLIGENCE FY23
TRAINING EXAM QUESTIONS AND
ANSWERS
CI includes only offensive activities - Correct Answers -False
CI is concerned with understanding, and possible neutralizing, all aspects of the
intelligence operations of foreign nations - Correct Answers -True
As a DoD employee, you can be the target of a Foreign Intelligence Entity - Correct
Answers -True
Family, friends, and co-workers may be used as a means to gain information about you
- Correct Answers –True
As government employees, our greatest vulnerabilities are those things we take for
granted - Correct Answers -True
Collection Methods of Operation frequently used by our adversaries include Cyber
Attacks, Solicitation and Marketing of Services, and Unsolicited Requests for
Information - Correct Answers -True
Foreign entities are overt in their collection methods and do not use subtle techniques
such as elicitation - Correct Answers -False
To defeat our objectives and advance their interests, foreign entities attempt to collect
information about our plans, technologies, activities, and operations - Correct Answers -
True
Traditional espionage activity includes foreign government-sponsored commercial
enterprises, international trafficking organizations and terrorism - Correct Answers -
False
Inadvertent actions such as using easy passwords and practicing poor computer
security can provide foreign entities an avenue to penetrate DoD systems - Correct
Answers -True
The "Spotting" phase in the initial step in the recruitment process - Correct Answers -
True
TRAINING EXAM QUESTIONS AND
ANSWERS
CI includes only offensive activities - Correct Answers -False
CI is concerned with understanding, and possible neutralizing, all aspects of the
intelligence operations of foreign nations - Correct Answers -True
As a DoD employee, you can be the target of a Foreign Intelligence Entity - Correct
Answers -True
Family, friends, and co-workers may be used as a means to gain information about you
- Correct Answers –True
As government employees, our greatest vulnerabilities are those things we take for
granted - Correct Answers -True
Collection Methods of Operation frequently used by our adversaries include Cyber
Attacks, Solicitation and Marketing of Services, and Unsolicited Requests for
Information - Correct Answers -True
Foreign entities are overt in their collection methods and do not use subtle techniques
such as elicitation - Correct Answers -False
To defeat our objectives and advance their interests, foreign entities attempt to collect
information about our plans, technologies, activities, and operations - Correct Answers -
True
Traditional espionage activity includes foreign government-sponsored commercial
enterprises, international trafficking organizations and terrorism - Correct Answers -
False
Inadvertent actions such as using easy passwords and practicing poor computer
security can provide foreign entities an avenue to penetrate DoD systems - Correct
Answers -True
The "Spotting" phase in the initial step in the recruitment process - Correct Answers -
True