(answered spring 23) all correct
Select all that apply. Counterintelligence (CI) pre- and post-foreign travel briefs support you by
providing (Course Introduction, Page 3)
Information on local and regional threat environments (correct)
Travel area intelligence and security practices and procedures (correct)
Reportable activity guidelines (correct)
Defensive actions needed to defeat threats (correct)
2) Communicating information about the national defense to injure the U.S. or give advantage to a
foreign nation is called (Lesson 1: Foreign Intelligence Entities (FIE), Page 4)
Espionage (correct)
3) It is acceptable to discuss sensitive information such as travel plans in taxis, buses, or other public
transportation while traveling in foreign countries. (Lesson 4: Traveling in a Foreign Country, Page 3)
False (correct)
Terrorist organizations are considered Foreign Intelligence Entities by the U.S. (Lesson 1: Foreign
Intelligence Entities, Page 1)
True (correct)
) Unclassified information can be collected to produce information that, when put together, would be
considered classified. (Lesson 1: Foreign Intelligence Entities, Page 3)
true
All requests to transport media back to the U.S. on behalf of a foreign country must be reported to
your Counterintelligence representative. (Lesson 5: Reporting Requirements, Page 1)
true
Foreign adversary use of social networking services causes which of the following concerns? (Select
the best answer) (Lesson 3: Internet and Social Networking Services, Page 3)
All of the answers are correct (correct)
Risk of exposure is low because cyber operations can be carried out remotely and with a high degree of
anonymity
Foreign adversaries can conduct cyber operations to collect intelligence or degrade the effectiveness of
our technologies
Cyber operations can be conducted relatively cheaply and easily, offering high returns with a low degree
of risk