DoD Annual TrainingAnswer Key

Which Of The Following Best Describes An Insider Threat

27 community-sourced questions and answers. Free — no login.

Community-sourced. Answers may be wrong or out of date. Always verify with your official training portal before submitting. Not affiliated with any branch, agency, or vendor. Details.
QUESTION 1

Which of the following is a mechinism in which the employees attack the organization to make political statements or embarrass a company by publicizing sensitive information describes which driving force behind an insider attack?

ANSWER

Hacktivism

QUESTION 2

Which of the following best describes what type of insider attack: A technique used to record or monitor the keystroke of a specific computer user?

ANSWER

Planting Keyloggers/Backdoors/Malware

QUESTION 3

Insiders who are uneducated on potential security threats or simply bypasses general security procedures to meet workplace efficiency are what category of insider threat?

ANSWER

Negligent Insider

QUESTION 4

Privileged Users, Disgruntled Employees, and Terminated Employees are examples of what?

ANSWER

Examples of Insider Threats

QUESTION 5

Disgruntled or terminated employees who steal data or destroy the company's networks intentionally by injecting malware into corporate network are examples of what type of insider?

ANSWER

Malicious Insider

QUESTION 6

Outsiders compromise insiders having access to critical assets or computing devices of an organization are examples of what type of insider?

ANSWER

Compromised Insider

QUESTION 7

Which of the following guidelines should be followed to reduce the likelihood of spammers obtaining an email address (email ID) from a website?

ANSWER

Avoid giving email ID's to unnecessary or unsecured websites such as discussion forums or newsgroups.

QUESTION 8

A system showing signs of malware attack after opening a link or attachment from an email is an indication of what?

ANSWER

Indication of Email Attack

QUESTION 9

Changing passwords for email accounts and restoring compromised email systems from backups are examples of what?

ANSWER

Recovery Steps to Follow after Email Incident

QUESTION 10

Which of the following is a valid way to trace email back to the originating server and, ultimately, to the email account used to send

ANSWER

Examine the message header to obtain the IP address for the originating server.

QUESTION 11

Which of the following is mostly likely to lead to an email security incident?

ANSWER

Clicking on a link in an email from an external source.

QUESTION 12

Charges for medical treatment or services which you never received are an indicator of which type of attack?

ANSWER

Indications of Identity Theft

QUESTION 13

The following are recommended items for a/an ___________________: (a) Provide recovery email address for mail recovery, (b) Check the last account activity, and (c) Disable keep me signed in/stay signed in

ANSWER

Email security checklist

QUESTION 14

Microsoft Outlook stores emails, contacts, calendar entries, and so on in the form of Personal Storage Table (PST). In MS Outlook, data deletion occurs in two categories. Which of the following defines hard deletion?

ANSWER

When a user deletes emails using Shift+Delete, Outlook deletes those permanently from the mailbox.

QUESTION 15

Recovery of deleted email messages depends upon _________________ used in the process of sending the mail

ANSWER

the email client

QUESTION 16

Which of the following email security tools enables users to securely transport (transmit) emails and files with the help of encryption and digital signatures?

ANSWER

Gpg4win

QUESTION 17

Identity theft and Cyberstalking are examples of what?

ANSWER

Crimes Supported by Emails

QUESTION 18

Using footage form surveillance cameras installed across the organization, especially at entry points of crucial areas to synchronize the footage with the time of attack is an example of what form of detecting and analyzing insider threats?

ANSWER

Physical Security Analysis

QUESTION 19

Which is the correct order of the five steps involved in Behavioral Analysis?

ANSWER

1) Extract behavioral patterns, 2) Compare behaviors across multiple users, 3) Generate clusters based on behavioral similarity , 4) Build profiles of each group, and 5) Discover outliers in each group

QUESTION 20

A competitor may inflict damage to the target organization, steal critical information, or put them out of business, by just finding a job opening, preparing someone to get through the interview, and having that person hired by the target organization describes which driving force behind an insider attack?

ANSWER

Steal Confidential Data

QUESTION 21

Incident handlers can use tools such as Wireshark to analyze and detect suspicious activities across the organizational network. This is an example of what type of network analysis?

ANSWER

Detecting Malicious Telnet Connections

QUESTION 22

This statement describes what type of insider attack? "Insiders gain access to confidential and restricted areas of the organization by resorting to tailgating. They might pretend to have forgotten their ID cards or enter after the authorized personnel without their notice. This poses a threat to sensitive zones of organization such as data centers, meeting rooms, printer and fax zones, and admin areas."

ANSWER

Tailgating

QUESTION 23

Sifers-Grayson employees with unlimited permissions to the systems, such as user end points, organization data, cloud services, customer data can change the configuration settings, grant access to other employees, as well as read and modify sensitive data. These users can misuse their rights unintentionally or maliciously or attackers can trick them to perform malicious activities. To eradicate these malicious users, the IT team disables the default administrative accounts to provide accountability. This is an example of which type of eradication method for insider threats?

ANSWER

Eradicating Insider Threats: Privileged Users

QUESTION 24

The COO of Sifers-Grayson received an email from an unknown source, revealing certain sensitive information about an upcoming drone test. The incident response team started analyzing the email fields such as sender's email address, body of email, and email headers to obtain sender's details. They found that the attacker used an internal system to download the data. Based on the correlation of time of download, they confirmed that the attacker downloaded the data directly to USB to avoid detection. What additional step can the incident response team take to find the insider?

ANSWER

Check the security cameras to detect the person using the system during the time of data download

QUESTION 25

Sifers-Grayson was planning to release their new drone software within a week of completing the final testing. A rival company released software with same features and similar looking interface before Sifers-Grayson was able to release its version. Sifers-Grayson suspects a current employee of leaking the data to the competitor. The company has hired an external incident response and forensics team to help determine how prevent such leaks in the future. What technical solution could the incident responders suggest to eliminate further breaches?

ANSWER

Use an anti-malware tool to scan all workstations and servers which could have been affected by the malware payload.

QUESTION 26

Sifers-Grayson employees have been sent a spam email which contained a malware payload. Some employees opened the email while others just deleted it. The Incident Handling & Response team eradicated the spam emails from the server and from all company inboxes. The team has also updated the spam filter on the email system. What is the next step the Incident Handling & Response team should take to ensure that the attack is contained?

ANSWER

Checking the Email Validity

QUESTION 27

A Sifers-Grayson employee reported a suspicious email to the help desk. During the process of detecting and containing malicious emails, the incident handler initiates SMTP sessions to check address acceptance, but it never actually sends email. What activity did the incident handler perform?

ANSWER

Collect details of an email security incident, such as URL, hostname, subject link, sender, and IP address, from email header analysis and block them across servers, security tools, and network devices.

Looking for a different version?

CBTs get updated every year. Search for the exact version you're taking (e.g. "cyber awareness 2025").

Search all study materials