Home
Subjects
Textbook solutions
Create
Study sets, textbooks, questions
Log in
Sign up
Upgrade to remove ads
Only $35.99/year
Insider Threat Awareness
STUDY
Flashcards
Learn
Write
Spell
Test
PLAY
Match
Gravity
Terms in this set (28)
The transfer of classified or propriety information to a system not approved for the classification level of unaccredited or unauthorized systems, individuals, applications, or media is a _________________.
Spill
Which of the following is considered a potential insider threat vulnerability? Select all that apply
All 4 answers
Which of these may be considered part of the media? Select all that apply.
-Newspaper,-Wiki, -Blogger
_____________is a conversation technique used to directly gather information that is not readily available and do so without raising suspicion.
Elicitation
Which of the following is a technology related indicator? Select all that apply.
Bypassing technology associated protocols, -Hoarding files and data, -Improper use of privileged access
Sharing details of your personal and professional lives or life online makes you _______ adverasries.
More vulnerable
Contractors must report which of these to the Insider Threat program? Select all that apply
All 4 answers
A coworker shares that she and her husband are facing foreclosure, and she doesn't know what to do. What should you do? Select all that apply.
Suggest she contact EAP, Report to security officer
Which of the following are true about insider threats? Select all that apply.
All 4 answers.
A member of your team openly discusses her financial difficulties and her inability to meet her financial obligations. What is the appropriate action?
Report the concerning behavior to your security officer.
Most inside offenders display concerning behaviors before acting directly against their organization. This behavior may include: (Select all that apply).
3 answers except the one that starts with None.
To whom should you report if you are contacted by a member of the media about information you are not authorized to share?
Your security officer.
A coworker keeps requesting information to a project to which they are not assigned. What should you do?
Report to security officer
The acronym EAP stands for____________.
Employee Assistance Program
Contractors must report which of these? Select all that apply.
All 4 answers.
Sets with similar terms
technology final
75 terms
Nursing Informatics FINAL ATI
40 terms
Nursing Informatics FINAL ATI
40 terms
Chapter 5 Quiz EME2040
19 terms
Sets found in the same folder
Assignements
6 terms
Initial Security Orientation Army
17 terms
AM PM COLORS
2 terms
Level I Antiterrorism Awareness
45 terms
Related questions
QUESTION
There are seven steps to repelling cyberattackers. Which step suggests a sole executive be responsible for all aspects of cybersecurity?
QUESTION
A third-grade teacher taught a lesson on double-digit addition using problems created with student information. How can metacognition be used to assess the success of the lesson?
QUESTION
how do engineers manage risk in design?
QUESTION
After a teaching for 2 years. Mr Rogers is not sure whether his instructional method is effective. Which activity will provide the best feed-bachk for Mr. Rogers?