DoD Annual TrainingAnswer Key

Establishing An Insider Threat Program For Your Organization

16 community-sourced questions and answers. Free — no login.

Community-sourced. Answers may be wrong or out of date. Always verify with your official training portal before submitting. Not affiliated with any branch, agency, or vendor. Details.
QUESTION 1

Thomas must establish an insider threat program for his organization. Where can he find the standards his program must meet?

ANSWER

Minimum Standards for Executive Branch Insider Threat Programs

QUESTION 2

With respect to the insider threat, what does the national policy established in Executive Order 13587 require?

ANSWER

It requires government agencies to establish their own insider threat programs.

QUESTION 3

The national policy in Executive Order 13587 defines insider threat programs to include which of the following?

ANSWER

Detecting insiders who pose a risk to classified information

QUESTION 4

The insider threat program within Susan's organization has the capability to : a. manage insider threat information; b. to train personnel on the insider threat; and c. to protect civil liberties and privacy. Has Susan's organization met the Minimum Standards for Executive Branch Insider Threat Programs?

ANSWER

No

QUESTION 5

The inside threat program within Hema's organization has the capability to: 1)manage insider threat information; 2)monitor employee classified network use; 3) train employees on the inside threat; and 4) protect civil liberties and privacy. Has Hema's organization met the Minimum Standards for Executive Branch Insider Threat Programs?

ANSWER

Yes

QUESTION 6

Jack is in charge of his organization's insider threat program. He is receiving push-back from some personnel who feel that the presence of an insider threat within the organization would be obvious, so a formal program is unnecessary. Jack should explain that the challenges to detecting insider threats include:

ANSWER

a. Insiders may operate over a long period of time b. Employees often fail to report suspicious behavior c. Unwitting insiders can also inflict serious harm d. It can be difficult for individuals alone to distinguish malicious actions from legitimate ones

QUESTION 7

Jose's organization is establishing an insider threat program by setting up a Working Group. Which of the following stakeholders should he include?

ANSWER

a,b,c, and d

QUESTION 8

Freda's organization has designated her as its Senior Official. According to the Minimum Standards. Freda's responsibilities will include:

ANSWER

a. Managing the program b. Providing resource recommendations

QUESTION 9

Lisa's organization is in the early stages of establishing an insider threat program. Should it designate a Senior Official?

ANSWER

Yes; the Minimum Standards require only for certain types of organizations.

QUESTION 10

To meet the Minimum Standards, Claire's organization must include the following capabilities in its insider threat program:

ANSWER

a. Information collection and analysis capabilities b. Response capabilities c. Documentation and resolution capabilities

QUESTION 11

When you establish your organization's insider threat program, the Minimum Standards require you to do which of the following:

ANSWER

a. Ensure access to insider threat-related information b. Establish analysis and response capabilities c. Establish user monitoring on classified networks d. Ensure personnel are trained on the insider threat

QUESTION 12

Sam's organization has established an insider threat program and is now beginning to implement it. Which of the following activities do the Minimum Standards require it to perform?

ANSWER

a. Access the organization's information to detect and analyze potential threats b. Receive insider threat reports from inside the organization c. Develop responses to address potential insider threat activity

QUESTION 13

To meet the Minimum Standards, what kind of insider threat training must Allen's organization provide?

ANSWER

It must provide specific training for insider threat program personnel and awareness and reporting for cleared personnel.

QUESTION 14

Which of the following are examples of system activity monitoring? a. Implementing banners telling users their activity is being monitored b. Establishing privileges and special c. Monitoring user search activities d. Monitoring downloads e. Tracking system restarts and shutdowns f. Monitoring logon/logoffs

ANSWER

e and f

QUESTION 15

Which of the following are examples of governance? a. Implementing banners telling users their activity is being monitored b. Establishing privileges and special c. Monitoring user search activities d. Monitoring downloads e. Tracking system restarts and shutdowns f. Monitoring logon/logoffs

ANSWER

-INCORRECT- c and e

QUESTION 16

Which of the following are examples of user activity monitoring? a. Implementing banners telling users their activity is being monitored b. Establishing privileges and special c. Monitoring user search activities d. Monitoring downloads e. Tracking system restarts and shutdowns f. Monitoring logon/logoffs

ANSWER

c and d

Looking for a different version?

CBTs get updated every year. Search for the exact version you're taking (e.g. "cyber awareness 2025").

Search all study materials