DoD Annual TrainingAnswer Key

What Best Describes An Insider Threat Knowbe4

12 community-sourced questions and answers. Free — no login.

Community-sourced. Answers may be wrong or out of date. Always verify with your official training portal before submitting. Not affiliated with any branch, agency, or vendor. Details.
QUESTION 1

An insider is defined as any person with authorized access to any united states government resource to include personnel, facilities information, equipment, networks, or systems

ANSWER

True

QUESTION 2

Which of the following are insider threats : Fort Hood shootings Greg Chung - Economic Espionage Wiki Leaks

ANSWER

All of the above

QUESTION 3

Which of the following should be considered as reportable indicators of possible insider threats?

ANSWER

Unexplained or undue affluence Displaying questionable loyalty to U.S government Disgruntled employee

QUESTION 4

During the spot and assessment phase of the recruitment, the foreign intelligence service will often explore potential exploitable weakness which may be used as a lever against the recruit if needed later

ANSWER

true

QUESTION 5

Exploitable weaknesses by a foreign intelligence service when a considering a source for recruitment may include

ANSWER

Adultery Financial Problems Gambling Drugs or Alcohol

QUESTION 6

Unauthorized downloads or copying of files, especially for employees who have given notice of employment termination, is an indicator of a possible insider threat

ANSWER

True

QUESTION 7

Insider threat policy is only applicable to classified information. Sensitive, propriety, or need to know information is not currently protected by the insider threat program policy.

ANSWER

FALSE

QUESTION 8

Contact with a n individual who is known to be, or is suspended of being, associated with foreign intelligence, security, or terrorism, should always be considered a reportable indicator of a possible recruitment

ANSWER

True

QUESTION 9

Insiders work alone. They never recruit because it increases the chancer of them being caught.

ANSWER

False

QUESTION 10

Attempting to gain access to an unclassified automated information system without authorization may be considered an information collection indicator.

ANSWER

True

QUESTION 11

Which of the following could be considered a possible indicator of an insider threat ?

ANSWER

All of the above

QUESTION 12

An insider threat is anyone with authorized access to the information or things an organization values most, and who uses that access, either wittingly or unwittingly, to inflict harm to the organization or national security. When an insider becomes a threat, it can have far-reaching consequences on both an organization and national security.

ANSWER

True

Looking for a different version?

CBTs get updated every year. Search for the exact version you're taking (e.g. "cyber awareness 2025").

Search all study materials