• wonderlic tests
  • EXAM REVIEW
  • NCCCO Examination
  • Summary
  • Class notes
  • QUESTIONS & ANSWERS
  • NCLEX EXAM
  • Exam (elaborations)
  • Study guide
  • Latest nclex materials
  • HESI EXAMS
  • EXAMS AND CERTIFICATIONS
  • HESI ENTRANCE EXAM
  • ATI EXAM
  • NR AND NUR Exams
  • Gizmos
  • PORTAGE LEARNING
  • Ihuman Case Study
  • LETRS
  • NURS EXAM
  • NSG Exam
  • Testbanks
  • Vsim
  • Latest WGU
  • AQA PAPERS AND MARK SCHEME
  • DMV
  • WGU EXAM
  • exam bundles
  • Study Material
  • Study Notes
  • Test Prep

COUNTERINTELLIGENCE AWARENESS AND

Summary Jan 8, 2026
Preview Mode - Purchase to view full document
Loading...

Loading study material viewer...

Page 0 of 0

Document Text

COUNTERINTELLIGENCE AWARENESS AND

REPORTING COURSE FOR DOD

(ASSESSMENT) FLASHCARDS

EXAM PREPARATION GUIDE | 30 ITEMS

Q:During which phase of the recruitment process does the foreign intelligence

officer look for exploitable weaknesses, such as alcohol abuse, drug use, extramarital affairs, gambling, or other financial problems?Assessing Q:Lydia works solely in the continental United States. After a recent meeting with an unknown foreign visitor, she experiences a headache, pain, nausea, unsteadiness, and cognitive "fog." Is this a mandatory reportable CI anomaly?Yes, since Lydia is experiencing symptoms of an AHI, she must report it.Q:You have observed suspicious behavior by a coworker. What is your role in this scenario?Report it to your unit security or CI office Q:A new employee, who hasn't been through CI training yet, asks you about foreign intelligence entities (FIEs). How might you summarize the threats they pose?Conducting intelligence activities to acquire U.S. informationAttempting to block or impair U.S. intelligence collectionActing as an international terrorist Q:Pat works for the DOD as a counterintelligence analyst. Recently, he was invited by a foreign contact to attend a conference in the contact's country. He declined but met the foreign contact on a recent trip overseas and they became romantically involved. In this example, what was an indicator of foreign intelligence entity targeting?Being invited to attend a conference in a foreign countryBecoming romantically involved with a foreign national

Q:Which of the following are Potential Espionage Indicators?

Unusual work hoursConcealing foreign travelUnexplained affluence

Q:Ed is a new employee with the DOD. He notices some odd behaviors from his

coworker, Jane. Which of these behaviors is a potential terrorism indicator?Advocating violence to achieve goalsAttempting to collect intelligence regarding installation securityFamilial ties to known or suspected terrorist organization Q:To minimize the ability of an Insider Threat to go undetected, what must you and your coworkers do?Report all suspicious activity

Q:Dana is a new employee working for a cleared DOD contractor. She works with

sensitive information on a regular basis. What behaviors does she need to exhibit in order to protect national security?Remain VigilantBe ready to reportRemain observant

Q:You have recently worked in a location known to result in Anomalous Health

Incidents (AHI). What symptoms would cause you to report a suspected AHI?PainHeadacheNausea

Q:Which collection method includes offers or invitations for cultural exchange,

individual-to-individual exchanges, and ambassador programs?Solicitation and Marketing of Services Q:Which of the following are signs of Potential Espionage in a coworker that you should report?Disgruntled employee, attempting to gain access without need-to-knowUnexplained affluence, concealing foreign travel, unusual work hours, avoiding polygraphTaking classified material home, unauthorized downloads, unreported contact with foreign nationals Q:Cheryl works for the DOD. She tells her coworker she is fundraising for a foreign aid group and asks for donations. Is this a potential indicator of terrorism?It depends on the associations the foreign aid group has

Q:What are some examples of foreign intelligence entity threats?

HackersState-sponsored computer experts of foreign nationsForeign Corporations

Q:You are working with a foreign contact, when you start to experience

unexplained pain, nausea, and cognitive "fog." Who should you report these symptoms to?Your chain of commandYour CI elementYour security officer Q:Inadvertent actions, such as easy passwords, practicing poor computer security, and emailing or placing personal files on your computer, create vulnerabilities to which method of collecting information?Cyber activities

Q:Kevin is working with a new foreign contact for a project. While working with

the individual, Kevin notives them browsing a website that appears to advocate violence against the United States. What should Kevin do in this instance?Report potential terrorism behaviors

Q:Foreign intelligence entities (FIEs) collect information from DOD on critical

technology produced within cleared defense contractor facilities. What types of collection methods of operation do they frequently use?Solicitation and marketing of servicesInternational conventions, seminars, and exhibitsCyber activities Q:According to DODD 5240.06 Reportable Foreign Intelligence Contacts, Activities, Indicators, and Behaviors include what?Unauthorized electronic/recording devicesAttempts to obtain information without the need to know

Q:Which of the following are possible indicators of an Insider Threat?

Substance abuse and mental health issuesCriminal conductFinancial irregularities

Q:Which of the following are examples of a "Security Anomaly" and should be reported?An adversary conducts activities with precision that indicates prior knowledgeForeign officials reveal details they should not have known

Q:Which of the following actions can potentially reduce or compromise your

network security and place the lives of our men and women in jeopardy?Inputting falsified corrupted dataPhishingHacking Q:Gene works for a cleared defense contractor. One day, he clicks a link in an email which, unbeknownst to him, downloaded a virus from a foreign intelligence entity onto the contractor's IT system. What is this an example of?Foreign intelligence entity use of insiders

Q:You have been invited by an unknown person to attend an all-expense paid

conference in a foreign country. How do you react?Report the incident to your supervisor and our Facility Security Officer (FSO).Q:What do foreign intelligence entities (FIEs) attempt to collect information about?ActivitiesPlansTechnologies

Q:Anna, a longtime DOD employee, recently traveled to France. While she was

there, she took a brief trip to Russia without disclosing the visit to her superiors.What is this a potential indicator of?Potential espionage indicator Q:Carl is a professor at a prominent university working on a project associated with the DOD. He receives a request from an individual to assist with fundamental research for the project. The individual appears to be overqualified for the position, but Carl decides to hire him anyway. In this scenario, what are the potential indicators of foreign intelligence entity solicitation?Individual seeking a position they are overqualifiedIndividual requested to assist on a DOD project

Download Study Material

Buy This Study Material

$11.99
Buy Now
  • Immediate download after payment
  • Available in the pdf format
  • 100% satisfaction guarantee

Study Material Information

Category: Summary
Description:

COUNTERINTELLIGENCE AWARENESS AND REPORTING COURSE FOR DOD (ASSESSMENT) FLASHCARDS EXAM PREPARATION GUIDE | 30 ITEMS Q:During which phase of the recruitment process does the foreign intelligence of...

UNLOCK ACCESS $11.99