questions with answers
Authorized access to DoD information and resources may
be granted based on a person's _______________. Select all
that apply. - CORRECT ANSWERS ✔✔Volunteer activities
Contractual relationship with DoD
Employment
The transfer of classified or proprietary information to a
system not approved for the classification level or
unaccredited or unauthorized systems, individuals,
applications, or media is a _______________. - CORRECT
ANSWERS ✔✔Spill
A member of your team openly discusses her financial
difficulties and her inability to meet her financial
obligations. What is the appropriate action? - CORRECT
ANSWERS ✔✔Report the concerning behavior to your
security officer
, Which of the following is a reportable behavioral
indicator? - CORRECT ANSWERS ✔✔Significant change in
work habit
If you are contacted by a member of the media about
information you are not authorized to share, you should
take down which of the following details? Select all that
apply. - CORRECT ANSWERS ✔✔Their name and their
organization name
How they contacted you
Date and time of contact
Which of these may be targeted by foreign entities?
Select all that apply. - CORRECT ANSWERS ✔✔All of the
above.
_______________ is a conversation technique used to
discreetly gather information that is not readily available
and do so without raising suspicion. - CORRECT ANSWERS
✔✔Elicitation
Technological advances impact the insider threat by
_______________. Select all that apply. - CORRECT