(NEWEST 2026-2027) DOD INSIDER THREAT AWARENESS PROGRAM TEST
QUESTIONS AND ALL ANSWERS CORRECT
A person may be given authorized access to DoD data and resources in
accordance with their _______________. Choose everything that applies. The
response Volunteering
Contractual arrangement with DoD
Work
A _______________ occurs when proprietary or classified data is sent to a
system that is not allowed for the classification level or to unapproved or
unaccredited systems, people, applications, or media. ANSWER Spill
One of your team members is candid about her financial struggles and her
incapacity to fulfill her financial commitments. What should be done? The
response Inform your security officer about the troubling behavior.
Which of the following describes a behavioral signal that has to be reported?
The response Considerable shift in work habits
Which of the following details should you record if a member of the media
contacts you regarding material you are not permitted to share? Choose
everything that applies. The response Both their name and the name of their
organization
How they got in touch with you
Time and date of communication
Which of these could foreign entities target? Choose everything that applies.
ANSWER : Everything mentioned above.
_______________ is a tactic used in conversation to subtly obtain information
that is not easily accessible and to avoid arousing suspicion. - Elicitation of
ANSWER s
QUESTIONS AND ALL ANSWERS CORRECT
A person may be given authorized access to DoD data and resources in
accordance with their _______________. Choose everything that applies. The
response Volunteering
Contractual arrangement with DoD
Work
A _______________ occurs when proprietary or classified data is sent to a
system that is not allowed for the classification level or to unapproved or
unaccredited systems, people, applications, or media. ANSWER Spill
One of your team members is candid about her financial struggles and her
incapacity to fulfill her financial commitments. What should be done? The
response Inform your security officer about the troubling behavior.
Which of the following describes a behavioral signal that has to be reported?
The response Considerable shift in work habits
Which of the following details should you record if a member of the media
contacts you regarding material you are not permitted to share? Choose
everything that applies. The response Both their name and the name of their
organization
How they got in touch with you
Time and date of communication
Which of these could foreign entities target? Choose everything that applies.
ANSWER : Everything mentioned above.
_______________ is a tactic used in conversation to subtly obtain information
that is not easily accessible and to avoid arousing suspicion. - Elicitation of
ANSWER s