Elicitation Insider Threat
21 community-sourced questions and answers. Free — no login.
Which of the following means to deliberately destroyed damage or obstruct especially for political or military advantage?
Sabotage
You observe a colleague with a sudden increase in alcohol intake what is the appropriate action?
Report his behavior to the security manager
Which of the following are reportable behavioral indicators?
Your security officer
To whom should you report if you are contacted by a member of the media about information you are not authorized to share?
Over the phone, in person
Who might be interested in non-public information that an insider can provide?
Report to your security manager
Where can Elicitation techniques be used?
Suggest they contact EAP, report to the security office
Technological advances impact the insider threat by______.
Spill
A coworker keeps requesting information access to a project to which they are not assigned. What should you do?
Significant change in behavior
Hostile entities may use social media to________?
Date and time of contact, their name and their organizational name, how they contacted you
Which of the following counter measures can you implement to help reduce technology associated insider threats?
Personnel, classified information, unclassified information, and list of facilities
Contractors must report which of these?
Technology changes the scale of risk from insider threats
A coworker shares that she and her husband are facing foreclosure, and she doesn't know what to do. What should you do?
bypassing technology associated protocols
Which of the following must be reported to the defense counter intelligence and security agency and the FBI?
more vulnerable to
Insiders may include which of these groups of people?
Bypassing security rules are protocols, inappropriate copying of classified material, unauthorized disclosure of classified material
The transfer of classified or proprietary information to a system not approved for classification level or on accredited or unauthorized system, individual, application, or media is a_____.
Employee assistance program
Which of the following is considered a potential insider threat vulnerability?
all
Which of the following is a reportable behavior indicator?
Report the concerning behavior to your security officer
If you are contacted by a member of the media about information you are not authorized to share, you should take down which of the following details?
You're a security office
Which of These may be targeted by foreign entities?
Technology change is the scale of risk of an insider threat
A trained elicitor May gather information by exploiting natural human tendencies, such as
Disregarding, excessive debt
Which of the following statement is true about technology and the insider threat?
All
Looking for a different version?
CBTs get updated every year. Search for the exact version you're taking (e.g. "cyber awareness 2025").
Search all study materials