Dod Insider Threat
14 community-sourced questions and answers. Free — no login.
Which of the following are true about insider threat? select all that apply.
A)The threat that an insider will access information without a need to know. B) threat can include an authorized disclosure of national secured information or through the loss or degradation of department resources or capabilities. C)threat can include damage through espionage or terrorism D) any person with authorized access to DOD resources by virtue of employment volunteer activities or contractual relationship (All correct)
The transfer of classified or proprietary information to a system not approved for classification level or uncredited or unauthorized systems individuals application or media is a _____.
Spill
A member of your team up and we can discuss is her financial difficulties at her inability to meet her financial obligations what is the appropriate action?
Report the concerning behavior to your Security Officer (SO).
Which of the following is a reportable behavioral indicator?
Significant change in work habits
Which of these may be considered part of the media? select all that apply.
Blogger, newspaper reporter & wiki representative
Who might be interested in non-public information that an insider can provide? select all that apply.
Non-state actors, Terrorist organizations, foreign governments and competitors
Elicitation
____is a conversation technique used to discreetly gather info that's not readily available & do so w/o raising suspicion.
Which of the following statements is true of all technology & insider threat?
Technology changes the scale of risk from insider threats
Which of the following is a technology related indicator? select all that apply.
Keeping unauthorize back ups and accessing systems at unusual hours without authorization
Which of these steps should you take on social media to limit your vulnerability? Select all that apply.
Set your privacy settings to limit who can see your information and limit what you share about yourself on social media services
Which of the following countermeasures can you implement to help reduce technology-associated inside threats? Select all that apply.
A) Take security training courses B) prevent unauthorized data access C) use strong passwords D) keep unauthorize software from secure environments. (All correct)
Which of the following are behavioral indicators that must be reported?
Disregard for security procedures & protocols, excessive dept
A Coworker shares that she and her husband are facing foreclosure, and she doesn't know what to do. What should you do? Select all that apply.
Report the indicator to Security Officer (SO) and suggest she contact the EAP
Which of the following must be reported to the Defense Counterintelligence and Security Agency and the FBI by contractors under the National Industrial Security Program? Select all that apply.
A) Actual probable or possible espionage B) Actual probable or possible terrorism C) Actual or probable or possible sabotage D) Actual probable or possible subversive activities (All are correct)
Looking for a different version?
CBTs get updated every year. Search for the exact version you're taking (e.g. "cyber awareness 2025").
Search all study materials