What Are The Most Likely Indicators Of Espionage Insider Threat
12 community-sourced questions and answers. Free — no login.
An insider is defined as any person with authorized access to any united states government resource to include personnel, facilities information, equipment, networks, or systems
True
Which of the following are insider threats : Fort Hood shootings Greg Chung - Economic Espionage Wiki Leaks
All of the above
Which of the following should be considered as reportable indicators of possible insider threats?
Unexplained or undue affluence Displaying questionable loyalty to U.S government Disgruntled employee
During the spot and assessment phase of the recruitment, the foreign intelligence service will often explore potential exploitable weakness which may be used as a lever against the recruit if needed later
true
Exploitable weaknesses by a foreign intelligence service when a considering a source for recruitment may include
Adultery Financial Problems Gambling Drugs or Alcohol
Unauthorized downloads or copying of files, especially for employees who have given notice of employment termination, is an indicator of a possible insider threat
True
Insider threat policy is only applicable to classified information. Sensitive, propriety, or need to know information is not currently protected by the insider threat program policy.
FALSE
Contact with a n individual who is known to be, or is suspended of being, associated with foreign intelligence, security, or terrorism, should always be considered a reportable indicator of a possible recruitment
True
Insiders work alone. They never recruit because it increases the chancer of them being caught.
False
Attempting to gain access to an unclassified automated information system without authorization may be considered an information collection indicator.
True
Which of the following could be considered a possible indicator of an insider threat ?
All of the above
An insider threat is anyone with authorized access to the information or things an organization values most, and who uses that access, either wittingly or unwittingly, to inflict harm to the organization or national security. When an insider becomes a threat, it can have far-reaching consequences on both an organization and national security.
True
Looking for a different version?
CBTs get updated every year. Search for the exact version you're taking (e.g. "cyber awareness 2025").
Search all study materials