DoD Annual TrainingAnswer Key

Dod Insider Threat

14 community-sourced questions and answers. Free — no login.

Community-sourced. Answers may be wrong or out of date. Always verify with your official training portal before submitting. Not affiliated with any branch, agency, or vendor. Details.
QUESTION 1

Which of the following are true about insider threat? select all that apply.

ANSWER

A)The threat that an insider will access information without a need to know. B) threat can include an authorized disclosure of national secured information or through the loss or degradation of department resources or capabilities. C)threat can include damage through espionage or terrorism D) any person with authorized access to DOD resources by virtue of employment volunteer activities or contractual relationship (All correct)

QUESTION 2

The transfer of classified or proprietary information to a system not approved for classification level or uncredited or unauthorized systems individuals application or media is a _____.

ANSWER

Spill

QUESTION 3

A member of your team up and we can discuss is her financial difficulties at her inability to meet her financial obligations what is the appropriate action?

ANSWER

Report the concerning behavior to your Security Officer (SO).

QUESTION 4

Which of the following is a reportable behavioral indicator?

ANSWER

Significant change in work habits

QUESTION 5

Which of these may be considered part of the media? select all that apply.

ANSWER

Blogger, newspaper reporter & wiki representative

QUESTION 6

Who might be interested in non-public information that an insider can provide? select all that apply.

ANSWER

Non-state actors, Terrorist organizations, foreign governments and competitors

QUESTION 7

Elicitation

ANSWER

____is a conversation technique used to discreetly gather info that's not readily available & do so w/o raising suspicion.

QUESTION 8

Which of the following statements is true of all technology & insider threat?

ANSWER

Technology changes the scale of risk from insider threats

QUESTION 9

Which of the following is a technology related indicator? select all that apply.

ANSWER

Keeping unauthorize back ups and accessing systems at unusual hours without authorization

QUESTION 10

Which of these steps should you take on social media to limit your vulnerability? Select all that apply.

ANSWER

Set your privacy settings to limit who can see your information and limit what you share about yourself on social media services

QUESTION 11

Which of the following countermeasures can you implement to help reduce technology-associated inside threats? Select all that apply.

ANSWER

A) Take security training courses B) prevent unauthorized data access C) use strong passwords D) keep unauthorize software from secure environments. (All correct)

QUESTION 12

Which of the following are behavioral indicators that must be reported?

ANSWER

Disregard for security procedures & protocols, excessive dept

QUESTION 13

A Coworker shares that she and her husband are facing foreclosure, and she doesn't know what to do. What should you do? Select all that apply.

ANSWER

Report the indicator to Security Officer (SO) and suggest she contact the EAP

QUESTION 14

Which of the following must be reported to the Defense Counterintelligence and Security Agency and the FBI by contractors under the National Industrial Security Program? Select all that apply.

ANSWER

A) Actual probable or possible espionage B) Actual probable or possible terrorism C) Actual or probable or possible sabotage D) Actual probable or possible subversive activities (All are correct)

Looking for a different version?

CBTs get updated every year. Search for the exact version you're taking (e.g. "cyber awareness 2025").

Search all study materials