PDF Download
COUNTERINTELLIGENCE AWARENESS AND REPORTING
COURSE FOR DOD (ASSESSMENT) EXAM QUESTIONS
Actual Qs and Ans Expert-Verified Explanation
This Exam contains:
-Guarantee passing score -30 Questions and Answers -format set of multiple-choice -Expert-Verified Explanation Question 1: Ed is a new employee with the DOD. He notices some odd behaviors from his coworker, Jane. Which of these behaviors is a potential terrorism indicator?
Answer:
Advocating violence to achieve goals Attempting to collect intelligence regarding installation security Familial ties to known or suspected terrorist organization Question 2: Which of the following are signs of Potential Espionage in a coworker that you should report?
Answer:
Disgruntled employee, attempting to gain access without need-to-know Unexplained affluence, concealing foreign travel, unusual work hours, avoiding polygraph Taking classified material home, unauthorized downloads, unreported contact with foreign nationals Question 3: Cheryl works for the DOD. She tells her coworker she is fundraising for a foreign aid group and asks for donations. Is this a potential indicator of terrorism?
Answer:
It depends on the associations the foreign aid group has
Question 4: Carl is a professor at a prominent university working on a project associated with the DOD. He receives a request from an individual to assist with fundamental research for the project. The individual appears to be overqualified for the position, but Carl decides to hire him anyway. In this scenario, what are the potential indicators of foreign intelligence entity solicitation?
Answer:
Individual seeking a position they are overqualified Individual requested to assist on a DOD project
Question 5: Which of the following are Potential Espionage Indicators?
Answer:
Unusual work hours Concealing foreign travel Unexplained affluence Question 6: Inadvertent actions, such as easy passwords, practicing poor computer security, and emailing or placing personal files on your computer, create vulnerabilities to which method of collecting information?
Answer:
Cyber activities Question 7: Dana is a new employee working for a cleared DOD contractor. She works with sensitive information on a regular basis. What behaviors does she need to exhibit in order to protect national security?
Answer:
Remain Vigilant Be ready to report Remain observant Question 8: You have been invited by an unknown person to attend an all-expense paid conference in a foreign country. How do you react?
Answer:
Report the incident to your supervisor and our Facility Security Officer (FSO).Question 9: According to DODD 5240.06 Reportable Foreign Intelligence Contacts, Activities, Indicators, and Behaviors include what?
Answer:
Unauthorized electronic/recording devices Attempts to obtain information without the need to know
Question 10: Gene works for a cleared defense contractor. One day, he clicks a link in an email which, unbeknownst to him, downloaded a virus from a foreign intelligence entity onto the contractor's IT system. What is this an example of?
Answer:
Foreign intelligence entity use of insiders Question 11: Which of the following are examples of a "Security Anomaly" and should be reported?
Answer:
An adversary conducts activities with precision that indicates prior knowledge Foreign officials reveal details they should not have known Question 12: To minimize the ability of an Insider Threat to go undetected, what must you and your coworkers do?
Answer:
Report all suspicious activity Question 13: Anna, a longtime DOD employee, recently traveled to France. While she was there, she took a brief trip to Russia without disclosing the visit to her superiors. What is this a potential indicator of?
Answer:
Potential espionage indicator Question 14: You are working with a foreign contact, when you start to experience unexplained pain, nausea, and cognitive "fog." Who should you report these symptoms to?
Answer:
Your chain of command Your CI element Your security officer Question 15: Lydia works solely in the continental United States. After a recent meeting with an unknown foreign visitor, she experiences a headache, pain, nausea, unsteadiness, and cognitive "fog." Is this a mandatory reportable CI anomaly?
Answer:
Yes, since Lydia is experiencing symptoms of an AHI, she must report it.
Question 16: Kevin is working with a new foreign contact for a project. While working with the individual, Kevin notives them browsing a website that appears to advocate violence against the United States. What should Kevin do in this instance?
Answer:
Report potential terrorism behaviors Question 17: Which collection method includes offers or invitations for cultural exchange, individual-to-individual exchanges, and ambassador programs?
Answer:
Solicitation and Marketing of Services Question 18: Foreign intelligence entities (FIEs) collect information from DOD on critical technology produced within cleared defense contractor facilities. What types of collection methods of operation do they frequently use?
Answer:
Solicitation and marketing of services International conventions, seminars, and exhibits Cyber activities Question 19: During which phase of the recruitment process does the foreign intelligence officer look for exploitable weaknesses, such as alcohol abuse, drug use, extramarital affairs, gambling, or other financial problems?
Answer:
Assessing Question 20: A new employee, who hasn't been through CI training yet, asks you about foreign intelligence entities (FIEs). How might you summarize the threats they pose?
Answer:
Conducting intelligence activities to acquire U.S. information Attempting to block or impair U.S. intelligence collection Acting as an international terrorist Question 21: Which collection method do foreign intelligence entities (FIEs) frequently use to extract from people who have access to classified or sensitive information?
Answer:
Elicitation