DoD Insider Threat
Awareness question
and answers
2025/2026
Authorized access to DoD information and resources may be granted based on a person's
_______________. Select all that apply. - correct answersVolunteer activities
Contractual relationship with DoD
Employment
The transfer of classified or proprietary information to a system not approved for the
classification level or unaccredited or unauthorized systems, individuals, applications, or media
is a _______________. - correct answersSpill
, A member of your team openly discusses her financial difficulties and her inability to meet her
financial obligations. What is the appropriate action? - correct answersReport the concerning
behavior to your security officer
Which of the following is a reportable behavioral indicator? - correct answersSignificant change
in work habit
If you are contacted by a member of the media about information you are not authorized to
share, you should take down which of the following details? Select all that apply. - correct
answersTheir name and their organization name
How they contacted you
Date and time of contact
Which of these may be targeted by foreign entities? Select all that apply. - correct answersAll of
the above.
_______________ is a conversation technique used to discreetly gather information that is not
readily available and do so without raising suspicion. - correct answersElicitation
Technological advances impact the insider threat by _______________. Select all that apply. -
correct answersAllowing large amounts of data to be accessed
Presenting new security challenges
Which of the following is a technology-related indicator? Select all that apply. - correct
answersAccessing systems at unusual hours without authorization
Keeping unauthorized backups
Awareness question
and answers
2025/2026
Authorized access to DoD information and resources may be granted based on a person's
_______________. Select all that apply. - correct answersVolunteer activities
Contractual relationship with DoD
Employment
The transfer of classified or proprietary information to a system not approved for the
classification level or unaccredited or unauthorized systems, individuals, applications, or media
is a _______________. - correct answersSpill
, A member of your team openly discusses her financial difficulties and her inability to meet her
financial obligations. What is the appropriate action? - correct answersReport the concerning
behavior to your security officer
Which of the following is a reportable behavioral indicator? - correct answersSignificant change
in work habit
If you are contacted by a member of the media about information you are not authorized to
share, you should take down which of the following details? Select all that apply. - correct
answersTheir name and their organization name
How they contacted you
Date and time of contact
Which of these may be targeted by foreign entities? Select all that apply. - correct answersAll of
the above.
_______________ is a conversation technique used to discreetly gather information that is not
readily available and do so without raising suspicion. - correct answersElicitation
Technological advances impact the insider threat by _______________. Select all that apply. -
correct answersAllowing large amounts of data to be accessed
Presenting new security challenges
Which of the following is a technology-related indicator? Select all that apply. - correct
answersAccessing systems at unusual hours without authorization
Keeping unauthorized backups