Answers
Daily audits of classified systems will prevent unauthorized logons and identify suspicious
transmissions: - answers-False
Which of the following are reportable examples of a possible transmission of classified material
via unsecured means? - answers-All of the above
Because the FBI has primary responsibility for counterintelligence investigations within the
United States, all threats should be reported only to the FBI. - answers-False
A cleared defense contractor hosted a foreign visit. Which of the following activities might you
expect to occur? - answers-A visitor attempts to wander away from his escort; Some of those
listed on the visit request form are replaced with last minute substitutes; Foreign delegation
asking questions outside the scope of the intended visit
Which of the following types of technology is strictly controlled by the Department of
Defense? - answers-Military critical technology
During a foreign conference or trade show what activities might be experienced? - answers-All
of the above
William is a sales manager with a large firm working on aviation technologies. He is working at
the company's booth at the Paris Air Show. Which of the following collection methods would an
adversary NOT use at the Paris Air Show? - answers-None of the above
Sarah is the Facility Security Officer (FSO) at a small, private firm that develops dual use
1
, technology. A foreign firm approaches Sarah's facility requesting to purchase the technology.
Which regulation is applicable to determine if they can sell the dual use technology to a foreign
firm? - answers-Export Administration Regulations (EAR)
Jack is a Facility Security Officer (FSO) for a cleared defense contractor. Where should he find
reporting procedures that pertain to his organization? - answers-National Industrial Security
Program Operating Manual (NISPOM)
Social engineering, electronic elicitation, email spoofing, spear phishing, whale phishing, or
direct questioning (such as through social networking sites) are all examples of reportable
suspicious cyber incidents. - answers-True
If you had worked with Ms. Sims, which behaviors might be considered as suspicious? -
answers-Requesting additional security access; Working long and irregular hours without
authorization; A tendency to ask questions outside of her normal scope and classification level
A Technology Control Plan (TCP) stipulates how a company will control access to its export-
controlled technology. - answers-True
Personnel from Sarah's organization were approached at a conference and were targeted for
information concerning a classified system. Which of the following information collection
methods may have been used? - answers-Recruitment and Elicitation
Technology information includes both classified and unclassified information. - answers-True
Brian is the Facility Security Officer (FSO) at a defense contractor. Who can he go to request
contract-specific threat information and program threat assessments? - answers-NOT Defense
Industrial security office (think it's Program Office)
Brian Muller is the program manager for a new weapons system at a cleared defense contract
2