DoD Annual TrainingAnswer Key

Preconditions For An Insider Threat

31 community-sourced questions and answers. Free — no login.

Community-sourced. Answers may be wrong or out of date. Always verify with your official training portal before submitting. Not affiliated with any branch, agency, or vendor. Details.
QUESTION 1

The definition of Targeted Violence includes which of these components? Select all that apply.

ANSWER

Any form of violence For a specific reason Directed at an individual or group

QUESTION 2

Which of the following are true about Insider Threats? Select all that apply.

ANSWER

The threat than an insider will access information without a need to know Threat can include unauthorized disclosure of national security information or thought the loss or degradation of department resources or capabilities Threat can include damage thought espionage or terrorism Any person with authorized access to DoD resources by virtue of employment, volunteer activities, or contractual relationship with DoD (select all 4 answers)

QUESTION 3

The transfer of classified or proprietary information to a system not approved for the classification level or unaccredited or unauthorized systems, individuals, applications, or media is a _____.

ANSWER

Spill

QUESTION 4

A member of your team openly discusses her financial difficulties and her inability to meet her financial obligations. What is the appropriate action?

ANSWER

Report the concerning behavior to your security officer

QUESTION 5

Insiders may include which of these groups of people? Select all that apply.

ANSWER

Employees Contractors Active duty military Former employees (select all 4 answers)

QUESTION 6

Which of the following is a reportable behavioral indicator?

ANSWER

Significant change in work habit

QUESTION 7

To whom should you report if you are contacted by a member of the media about information you are not authorized to share?

ANSWER

Your security office

QUESTION 8

Which of the following are things that adversaries want to know? Select all that apply.

ANSWER

Your organization's personnel Countries your organization works with Your company's competitors

QUESTION 9

Which of the following means to deliberately destroy, damage, or obstruct, especially for political or military advantage?

ANSWER

Sabotage

QUESTION 10

Most inside offenders display concerning behaviors before acting directly against their organization. This behavior may include (select all that apply):

ANSWER

Violations of workplace policies Failure to follow standard procedures (SOP) Legal difficulties

QUESTION 11

If you are contacted by a member of the media about information you are not authorized to share, you should take down which of the following details? Select all that apply.

ANSWER

Their name and their organization name How they contacted you Date and time of contact

QUESTION 12

Who might be interested in non-public information that an insider can provide? Select all that apply.

ANSWER

Terrorist organizations Non-state actors Foreign governments Competitors (select all 4 answers)

QUESTION 13

Where can elicitation techniques be used? Select all that apply.

ANSWER

In person In email Over the phone In written communications (select all 4 answers)

QUESTION 14

Technological advances _____. Select all that apply.

ANSWER

Increase risk of information loss Allow insiders to access more data

QUESTION 15

Which of the following is a technology-related indicator? Select all that apply.

ANSWER

Improper use of privileged access Bypassing technology-associated protocols Hoarding files and data

QUESTION 16

You observe a colleague with a sudden increased alcohol intake (e.g., frequent heavy consumption, drinking until drunk) what is the appropriate action?

ANSWER

Report the concerning behavior to your security officer

QUESTION 17

_____ is a conversation technique used to discreetly gather information that is not readily available and do so without raising suspicion.

ANSWER

Elicitation

QUESTION 18

Which of the following statements is true about technology and the insider threat?

ANSWER

Technology changes the scale of risk from insider threats

QUESTION 19

Sharing details of your personal and professional lives or life online makes you _____ adversaries.

ANSWER

More vulnerable to

QUESTION 20

You can help reduce technology-associated insider threats by:

ANSWER

Enlisting countermeasures

QUESTION 21

Contractors must report which of these? Select all that apply.

ANSWER

Any event ... Any event that may impact an individual's personnel security clearance Anything that affects the proper safeguarding of classified information Any indication that classified information has been lost or compromised (select all 4 answers)

QUESTION 22

A coworker shares that she and her husband are facing foreclosure, and she doesn't know what to do. What should you do? Select all that apply.

ANSWER

Suggest she contact the EAP Report the indicator to your security office

QUESTION 23

U.S. Government employees and contractors must report which of the following? Select all that apply.

ANSWER

Personal foreign travel Speeches or books including information about involvement with the Intelligence Community Foreign contacts

QUESTION 24

Which of these may be targeted by foreign entities? Select all that apply.

ANSWER

Personnel lists Classified information Unclassified information List of facility locations (select all 4 answers)

QUESTION 25

Technological advanced impact the insider threat by _____. Select all that apply.

ANSWER

Allowing large amounts of data to be accessed Presenting new security challenges

QUESTION 26

A coworker keeps requesting information access to a project to which they are not assigned. What should you do?

ANSWER

Report the incident to your Security Office

QUESTION 27

Hostile entities may use social media to _____? Select all that apply.

ANSWER

Build a profile of a person Quickly recruit someone of spying Search for classified information Gather information on personnel (select all 4 answers)

QUESTION 28

Which of the following countermeasures can help reduce technology-associated insider threats? Select all that apply.

ANSWER

Inventory your technology holdings Watch for behavioral indicators

QUESTION 29

Which of the following are behavioral indicators that must be reported?

ANSWER

Excessive debt Disregard for security procedures and protocols

QUESTION 30

The acronym EAP stands for _____?

ANSWER

Employee Assistance Program

QUESTION 31

Which of the following must be reported to the Defense Counterintelligence and Security Agency and the FBI? Select all that apply.

ANSWER

Actual, probably, or possible espionage Actual, probably, or possible terrorism Actual, probably, or possible sabotage Actual, probably, or possible subversive activities (select all 4 answers)

Looking for a different version?

CBTs get updated every year. Search for the exact version you're taking (e.g. "cyber awareness 2025").

Search all study materials