Establishing An Insider Threat Program
16 community-sourced questions and answers. Free — no login.
Thomas must establish an insider threat program for his organization. Where can he find the standards his program must meet?
Minimum Standards for Executive Branch Insider Threat Programs
With respect to the insider threat, what does the national policy established in Executive Order 13587 require?
It requires government agencies to establish their own insider threat programs.
The national policy in Executive Order 13587 defines insider threat programs to include which of the following?
Detecting insiders who pose a risk to classified information
The insider threat program within Susan's organization has the capability to : a. manage insider threat information; b. to train personnel on the insider threat; and c. to protect civil liberties and privacy. Has Susan's organization met the Minimum Standards for Executive Branch Insider Threat Programs?
No
The inside threat program within Hema's organization has the capability to: 1)manage insider threat information; 2)monitor employee classified network use; 3) train employees on the inside threat; and 4) protect civil liberties and privacy. Has Hema's organization met the Minimum Standards for Executive Branch Insider Threat Programs?
Yes
Jack is in charge of his organization's insider threat program. He is receiving push-back from some personnel who feel that the presence of an insider threat within the organization would be obvious, so a formal program is unnecessary. Jack should explain that the challenges to detecting insider threats include:
a. Insiders may operate over a long period of time b. Employees often fail to report suspicious behavior c. Unwitting insiders can also inflict serious harm d. It can be difficult for individuals alone to distinguish malicious actions from legitimate ones
Jose's organization is establishing an insider threat program by setting up a Working Group. Which of the following stakeholders should he include?
a,b,c, and d
Freda's organization has designated her as its Senior Official. According to the Minimum Standards. Freda's responsibilities will include:
a. Managing the program b. Providing resource recommendations
Lisa's organization is in the early stages of establishing an insider threat program. Should it designate a Senior Official?
Yes; the Minimum Standards require only for certain types of organizations.
To meet the Minimum Standards, Claire's organization must include the following capabilities in its insider threat program:
a. Information collection and analysis capabilities b. Response capabilities c. Documentation and resolution capabilities
When you establish your organization's insider threat program, the Minimum Standards require you to do which of the following:
a. Ensure access to insider threat-related information b. Establish analysis and response capabilities c. Establish user monitoring on classified networks d. Ensure personnel are trained on the insider threat
Sam's organization has established an insider threat program and is now beginning to implement it. Which of the following activities do the Minimum Standards require it to perform?
a. Access the organization's information to detect and analyze potential threats b. Receive insider threat reports from inside the organization c. Develop responses to address potential insider threat activity
To meet the Minimum Standards, what kind of insider threat training must Allen's organization provide?
It must provide specific training for insider threat program personnel and awareness and reporting for cleared personnel.
Which of the following are examples of system activity monitoring? a. Implementing banners telling users their activity is being monitored b. Establishing privileges and special c. Monitoring user search activities d. Monitoring downloads e. Tracking system restarts and shutdowns f. Monitoring logon/logoffs
e and f
Which of the following are examples of governance? a. Implementing banners telling users their activity is being monitored b. Establishing privileges and special c. Monitoring user search activities d. Monitoring downloads e. Tracking system restarts and shutdowns f. Monitoring logon/logoffs
-INCORRECT- c and e
Which of the following are examples of user activity monitoring? a. Implementing banners telling users their activity is being monitored b. Establishing privileges and special c. Monitoring user search activities d. Monitoring downloads e. Tracking system restarts and shutdowns f. Monitoring logon/logoffs
c and d
Looking for a different version?
CBTs get updated every year. Search for the exact version you're taking (e.g. "cyber awareness 2025").
Search all study materials