Home
Browse
Create
Search
Log in
Sign up
Upgrade to remove ads
Only $2.99/month
Insider Threat Awareness
STUDY
Flashcards
Learn
Write
Spell
Test
PLAY
Match
Gravity
Terms in this set (28)
Sharing details of your personal and professional lives or life online makes you ___________________ adversaries.
more vulnerable to
Which of these activities must be reported? Select all that apply.
-bypassing security rules or protocols
-unauthorized disclosure of classified material
-inappropriate copying of classified material
Which of the countermeasures can you implement to help reduce technology-associated insider threats? Select all that apply.
-take security training courses
-prevent unauthorized data access
-use strong passwords
-keep unauthorized software from secure environments
A coworker shares that she and her husband are facing foreclosure, and she doesn't know what to do. What should you do? Select all that apply.
-suggest she contact the EAP
-report the indicator to the security office
Insiders may include which of these groups of people? Select all that apply.
-former employees
-contractors
-employees
-active duty military
The definition of Targeted Violence includes which of these components? Select all that apply.
-directed at an individual or a group
-wrong
You observe a colleague with a sudden increased alcohol intake (e.g. frequent heavy consumption, drinking until drunk) what is the appropriate action?
-report the concerning behavior to your security officier
Most inside offenders display concerning behaviors before acting directly against their organization. This behavior may include (select all that apply):
-violation of workplace policies
-failure to follow standard procedures (SOP)
-legal difficulties
Which of these may be considered part of the media? Select all that apply.
-not all of the answers
-not just newspaper reporter
Which of the following are things that adversaries want to know? Select all that apply.
-your organization's personnel
-countries your organization works with
-your company's competitors
_____________ is a a conversation technique used to discretely gather information that is not readily available and do so without raising suspicion.
Elicitation
Technological advances impact the insider threat by _____________. Select all that apply.
-increase risk of information loss
-all insiders to access more data
Which of the following is a technology-related indicator. Select all that apply.
-keeping unauthorized backups
-accessing systems at unusual hours without without authorization
Which of these steps should you take on social media to limit your vulnerability? Select all that apply.
-all answers
You can help reduce technology-associated insider threats by:
-not practicing counterintelligence
Contractors must report which of these? Select all that apply.
-any event that may impact the status of the facility
-anything that affects the proper safeguarding of classified information
-any indication that classified information has been lost or compromised.
-efforts to obtain
-all answers
U.S. Government employees and contractors must report which of the following? Select all that apply.
-foreign contacts
Which of the following are true about insider threats?
-all answers
Which of the following means to deliberately destroy, damage, or obstruct, especially for political or military advantage?
sabotage
Which of the following is considered a potential insider threat vulnerability? Select all that apply.
-disgruntlement
Which of the following is a reportable behavioral indicator?
significant change in work habit
If you are contacted by a member of the media about information you are not authorized to share, you should take down which of the following details? Select all that apply.
-physical description
-date and time of contact
-how they contacted you
-their name and their organization name
-wrong
Who might be interested in non-public information that an insider can provide. Select all that apply.
-all answers.
Where can elicitation techniques be used? Select all that apply.
-all answers
Which of these may be targeted by foreign entities? Select all that apply.
-unclassified information
-list of facility locations
-classified information
-personnel lists
Hostile entities may use social media to __________________? Select all that apply.
all answers
Which of the countermeasures can you implement to help reduce technology-associated insider threats? Select all that apply.
-inventory your technology holdings
-never use portable storage devices
Which of the following are behavioral indicators that must be reported?
-excessive debt
-disregard for security procedures and protocols
THIS SET IS OFTEN IN FOLDERS WITH...
DoD Insider Threat Awareness
22 terms
Insider Threat Awareness
12 terms
Insider Threat Awareness OPSEC
32 terms
DoD Insider Threat Awareness
22 terms
YOU MIGHT ALSO LIKE...
DoD Cyber Awareness 2019
38 terms
DoD Cyber Awareness 2019
38 terms
C724 : Unit 7 - Test Review
54 terms
DOD Cyber Awareness Challenge 2019: Knowledge Chec…
69 terms
OTHER SETS BY THIS CREATOR
Extra Cards for Final
23 terms
Ch 12- Pulling It All Together- Dietary Guidelines
37 terms
Ch 11- Nutrition and Athletic Performance
54 terms
Ch. 10 Nutrition Basics for Better Health and Perf…
34 terms