answers
Which of the following must be reported to the defense
counterintelligence and security agency and the fbi?
Select all that apply - CORRECT ANSWERS ✔✔ALL
Authorized access to DOD information. and resources
may be granted based on a person's _____. Select all that
apply - CORRECT ANSWERS ✔✔
Which of the following means to deliberatelydestroy,
damage, or obstruct , especially for political or military
advantage? - CORRECT ANSWERS ✔✔Sabotage
A member of your team openly discusses her financial
difficulties and her inability to meet her financial
obligations. What is the appropriate action? - CORRECT
ANSWERS ✔✔Report the concerning behavior to the
security officer
Which of the following are reportable behavioral
indicators? Select all that apply - CORRECT ANSWERS ✔✔
, If you are contacted by a member of the media about
information you are not authorized to share, you should
take down which of the following details? Select all that
apply - CORRECT ANSWERS ✔✔Their name and
organization name, How they contacted you, Date and
time of contact
Who might interested in non-public information that an
insider can provide? Select all that apply - CORRECT
ANSWERS ✔✔
Where can elicitation techniques be used? Select all that
apply - CORRECT ANSWERS ✔✔ALL
Which of the following statements is true about
technology and the insider threat? - CORRECT ANSWERS
✔✔Technology changes the scale of risk from insider
threats
A coworker keeps requesting information access to a
project to which they are not assigned. What should you
do? - CORRECT ANSWERS ✔✔Report the incident to the
security office