DoD Annual TrainingAnswer Key

List Three Thresholds For Insider Threat

30 community-sourced questions and answers. Free — no login.

Community-sourced. Answers may be wrong or out of date. Always verify with your official training portal before submitting. Not affiliated with any branch, agency, or vendor. Details.
QUESTION 1

The transfer of classified or proprietary information to a system not approved for the classification level or unaccredited or unauthorized systems, individuals, applications, or media is a _________________.

ANSWER

Spill

QUESTION 2

Which of the following are true about insider threats? Select all that apply. in

ANSWER

-Threat can include unathorized disclosure of national security information or through the loss or degradation of department resources or capabilities. -Threat can include damage through espionage or terrorism. -Any person with authorized access to DoD resources by virtue of employment, volunteer activities, or contractual relationship with DoD

QUESTION 3

You observe a colleague with a sudden increased alcohol intake (e.g., frequent heavy consumption, drinking until drunk) what is the appropriate action?

ANSWER

Report the concerning behavior to your security officer

QUESTION 4

Most inside offenders display concerning behaviors before acting directly against their organization. This behavior may include (select all that apply):

ANSWER

-Violations of workplace policies -Failure to follow standard procedures (SOP) (Incorrect), even with third choice

QUESTION 5

Authorized access to DoD information and resources may be granted based on a person's ____________. Select all that apply.

ANSWER

-Volunteer activities -Contractual relationship with DoD -Employment

QUESTION 6

The definition of Targeted Violence includes which of these components? Select all that apply.

ANSWER

-For a specific reason -Directed at an individual or group -Any form of violence -Without warning (Incorrect)

QUESTION 7

Which of the following is considered a potential insider threat vulnerability? Select all that apply.

ANSWER

-Disgruntlement -Promiscuity -Gambling addiction (Incorrect)

QUESTION 8

Which of the following are reportable behavioral indicators? Select all that apply.

ANSWER

-Substance abuse -Addictive behaviors -Considerable change in financial circumstances

QUESTION 9

If you are contacted by a member of the media about information you are not authorized to share, you should take down which of the following details? Select all that apply.

ANSWER

-How they contacted you -Date and time of contact -Their name and their organization name

QUESTION 10

Which of the following are things that adversaries want to know? Select all that apply.

ANSWER

-Your organization's personnel -Countries your organization works with (Incorrect)

QUESTION 11

Where can elicitation techniques be used? Select all that apply.

ANSWER

-Over the phone -In email -In written communications -In person

QUESTION 12

Technological advances impact the insider threat by ________________. Select all that apply.

ANSWER

-Allowing large amounts of data to be accessed (Incorrect)

QUESTION 13

Which of the following is a technology-related indicator? Select all that apply.

ANSWER

-Hoarding files and data -Bypassing technology-associated protocols -Improper use of privileged access -Keeping unauthorized backups -Accessing systems at unusual hours without authorization

QUESTION 14

Sharing details of your personal and professional lives of life online makes you _______________ adversaries.

ANSWER

More vulnerable

QUESTION 15

You can help reduce technology-associated insider threats by:

ANSWER

Eliminating accessing data through portable devices (Incorrect)

QUESTION 16

Contractors must report which of these? Select all that apply.

ANSWER

-Any event that may impact an individual's personnel security clearance -Any event that may impact the status of the facility -Anything that affects the proper safeguarding of classified information -Any indication that classified information has been lost or compromised

QUESTION 17

The acronym EAP stands for _______________ ?

ANSWER

Employee Assistance Program

QUESTION 18

Which of the following must be reported to the Defense Counterintelligence and Security Agency and the FBI? Select all that apply.

ANSWER

-Actual, probable, or possible subversive activities -Actual, probable, or possible espionage -Actual, probable, or possible sabotage -Actual, probable, or possible terrorism

QUESTION 19

Insiders may include which of these groups of people? Select all that apply.

ANSWER

-Contractors -Former employees -Employees -Active duty military

QUESTION 20

Which of the following means to deliberately destroy, damage, or obstruct, especially for political or military advantage?

ANSWER

Sabotage

QUESTION 21

A member of your team openly discusses her financial difficulties and her inability to meet her financial obligations. What is the appropriate action?

ANSWER

Report the concerning behavior to your security officer

QUESTION 22

To whom should you report if you are contacted by a member of the media about information you are not authorized to share?

ANSWER

Your security office

QUESTION 23

Who might be interested in non-public information that an insider can provide? Select all that apply.

ANSWER

-Competitors -Terrorist organizations -Foreign governments -Non-state actors

QUESTION 24

A trained elicitor may gather information by exploiting natural human tendencies, such as (select all that apply):

ANSWER

-A tendency to gossip -A desire to be polite -A desire to appear well-informed -A tendency to believe others are honest

QUESTION 25

Which of the following statements is true about technology and the insider threat?

ANSWER

Technology changes the scale of risk from insider threats

QUESTION 26

Hostile entities may use social media to _______________ ? Select all that apply.

ANSWER

-Gather information on personnel (Incorrect, there were more choices)

QUESTION 27

Which of the following countermeasures can you implement to help reduce technology-associated insider threats? Select all that apply.

ANSWER

-Use strong passwords -Prevent unauthorized data access (Incorrect, there were more choices)

QUESTION 28

Which of these activities must be reported? Select all that apply.

ANSWER

-Bypassing security rules or protocols -Inappropriate copying of classified material -Unauthorized disclosure of classified material

QUESTION 29

A coworker shares that she and her husband are facing foreclosure, and she doesn't know what to do. What should you do? Select all that apply.

ANSWER

-Suggest she contact the EAP -Report the indicator to your security office

QUESTION 30

U.S. Government employees and contractors must report which of the following? Select all that apply.

ANSWER

-Foreign contacts -Speeches or books including information about involvement with the Intelligence Community -Personal foreign travel

Looking for a different version?

CBTs get updated every year. Search for the exact version you're taking (e.g. "cyber awareness 2025").

Search all study materials