DoD Annual TrainingAnswer Key

Elicitation Scenario Insider Threat

21 community-sourced questions and answers. Free — no login.

Community-sourced. Answers may be wrong or out of date. Always verify with your official training portal before submitting. Not affiliated with any branch, agency, or vendor. Details.
QUESTION 1

Authorized access to DoD information and resources may be granted based on a person's _______________. Select all that apply.

ANSWER

Volunteer activities Contractual relationship with DoD Employment

QUESTION 2

The transfer of classified or proprietary information to a system not approved for the classification level or unaccredited or unauthorized systems, individuals, applications, or media is a _______________.

ANSWER

Spill

QUESTION 3

A member of your team openly discusses her financial difficulties and her inability to meet her financial obligations. What is the appropriate action?

ANSWER

Report the concerning behavior to your security officer

QUESTION 4

Which of the following is a reportable behavioral indicator?

ANSWER

Significant change in work habit

QUESTION 5

If you are contacted by a member of the media about information you are not authorized to share, you should take down which of the following details? Select all that apply.

ANSWER

Their name and their organization name How they contacted you Date and time of contact

QUESTION 6

Which of these may be targeted by foreign entities? Select all that apply.

ANSWER

All of the above.

QUESTION 7

_______________ is a conversation technique used to discreetly gather information that is not readily available and do so without raising suspicion.

ANSWER

Elicitation

QUESTION 8

Technological advances impact the insider threat by _______________. Select all that apply.

ANSWER

Allowing large amounts of data to be accessed Presenting new security challenges

QUESTION 9

Which of the following is a technology-related indicator? Select all that apply.

ANSWER

Hoarding files and data Bypassing technology-associated protocols Improper use of privileged access

QUESTION 10

Which of the following countermeasures can help reduce technology-associated insider threats? Select all that apply.

ANSWER

Inventory your technology holdings Watch for behavioral indicators

QUESTION 11

Insiders may include which of these groups of people? Select all that apply.

ANSWER

Employees Former Employees Contractors Active duty Military

QUESTION 12

The definition of Targeted Violence includes which of these components? Select all that apply.

ANSWER

Any form of violence Directed at an individual or group For a specific reason

QUESTION 13

Which of the following are reportable behavioral indicators? Select all that apply.

ANSWER

Addictive behaviors Substance abuse Considerable change in financial circumstances

QUESTION 14

Contractors must report which of these? Select all that apply.

ANSWER

All of the above.

QUESTION 15

The acronym EAP stands for _______________?

ANSWER

Employee Assistance Program

QUESTION 16

To whom should you report if you are contacted by a member of the media about information you are not authorized to share?

ANSWER

Your security office

QUESTION 17

Contractors must report which of these to the insider threat program? Select all that apply.

ANSWER

Efforts to obtain unauthorized access to classified or proprietary information Any contact by cleared employees with known or suspected intelligence officers from any country Any contact that suggest the employee may be the target of attempted exploitation by the intelligence service of another country Efforts to compromise a cleared employee

QUESTION 18

Who might be interested in non-public information that an insider can provide? Select all that apply.

ANSWER

Competitors Non-state actors Terrorist organizations Foreign governments

QUESTION 19

Technological advances ______________________________. Select all that apply.

ANSWER

Increase risk of information loss Allow insiders to access more data

QUESTION 20

Hostile entities may use social media to _______________? Select all that apply.

ANSWER

All of the above

QUESTION 21

Which of these activities must be reported? Select all that apply.

ANSWER

Unauthorized disclosure of classified material Inappropriate copying of classified material Bypassing security rules or protocols

Looking for a different version?

CBTs get updated every year. Search for the exact version you're taking (e.g. "cyber awareness 2025").

Search all study materials