DoD Annual TrainingAnswer Key

Elicitation Insider Threat

21 community-sourced questions and answers. Free — no login.

Community-sourced. Answers may be wrong or out of date. Always verify with your official training portal before submitting. Not affiliated with any branch, agency, or vendor. Details.
QUESTION 1

Which of the following means to deliberately destroyed damage or obstruct especially for political or military advantage?

ANSWER

Sabotage

QUESTION 2

You observe a colleague with a sudden increase in alcohol intake what is the appropriate action?

ANSWER

Report his behavior to the security manager

QUESTION 3

Which of the following are reportable behavioral indicators?

ANSWER

Your security officer

QUESTION 4

To whom should you report if you are contacted by a member of the media about information you are not authorized to share?

ANSWER

Over the phone, in person

QUESTION 5

Who might be interested in non-public information that an insider can provide?

ANSWER

Report to your security manager

QUESTION 6

Where can Elicitation techniques be used?

ANSWER

Suggest they contact EAP, report to the security office

QUESTION 7

Technological advances impact the insider threat by______.

ANSWER

Spill

QUESTION 8

A coworker keeps requesting information access to a project to which they are not assigned. What should you do?

ANSWER

Significant change in behavior

QUESTION 9

Hostile entities may use social media to________?

ANSWER

Date and time of contact, their name and their organizational name, how they contacted you

QUESTION 10

Which of the following counter measures can you implement to help reduce technology associated insider threats?

ANSWER

Personnel, classified information, unclassified information, and list of facilities

QUESTION 11

Contractors must report which of these?

ANSWER

Technology changes the scale of risk from insider threats

QUESTION 12

A coworker shares that she and her husband are facing foreclosure, and she doesn't know what to do. What should you do?

ANSWER

bypassing technology associated protocols

QUESTION 13

Which of the following must be reported to the defense counter intelligence and security agency and the FBI?

ANSWER

more vulnerable to

QUESTION 14

Insiders may include which of these groups of people?

ANSWER

Bypassing security rules are protocols, inappropriate copying of classified material, unauthorized disclosure of classified material

QUESTION 15

The transfer of classified or proprietary information to a system not approved for classification level or on accredited or unauthorized system, individual, application, or media is a_____.

ANSWER

Employee assistance program

QUESTION 16

Which of the following is considered a potential insider threat vulnerability?

ANSWER

all

QUESTION 17

Which of the following is a reportable behavior indicator?

ANSWER

Report the concerning behavior to your security officer

QUESTION 18

If you are contacted by a member of the media about information you are not authorized to share, you should take down which of the following details?

ANSWER

You're a security office

QUESTION 19

Which of These may be targeted by foreign entities?

ANSWER

Technology change is the scale of risk of an insider threat

QUESTION 20

A trained elicitor May gather information by exploiting natural human tendencies, such as

ANSWER

Disregarding, excessive debt

QUESTION 21

Which of the following statement is true about technology and the insider threat?

ANSWER

All

Looking for a different version?

CBTs get updated every year. Search for the exact version you're taking (e.g. "cyber awareness 2025").

Search all study materials