Docsity
Docsity

Prepare for your exams
Prepare for your exams

Study with the several resources on Docsity


Earn points to download
Earn points to download

Earn points by helping other students or get them with a premium plan


Guidelines and tips
Guidelines and tips

NISP Questions & 100% Verified Answers | Latest Update | Already Graded A+, Exams of Cybercrime, Cybersecurity and Data Privacy

Integrating CI and threat awareness into a security program helps to accomplish which of the following? Select all that apply. □ Assist DoD in maintaining a tactical advantage over foreign intelligence operatives □ Protect valuable company assets from loss and compromise □ Identify which assets need protecting □ Establish countermeasures □ Protect valuable company assets from loss and compromise □ Identify which assets need protecting □ Establish countermeasures

Typology: Exams

2024/2025

Available from 06/19/2025

tizian-kylan
tizian-kylan 🇺🇸

2.7

(21)

3.7K documents

1 / 10

Toggle sidebar

This page cannot be seen from the preview

Don't miss anything!

bg1
1 | P a g e
NISP Questions & 100% Verified Answers |
Latest Update | Already Graded A+
Integrating CI and threat awareness into a security program helps to accomplish which
of the following?
Select all that apply.
□ Assist DoD in maintaining a tactical advantage over foreign intelligence operatives
□ Protect valuable company assets from loss and compromise
□ Identify which assets need protecting
□ Establish countermeasures
🗸🗸🗸: Protect valuable company assets from loss and compromise
□ Identify which assets need protecting
□ Establish countermeasures
CI is the information gathered and activities conducted to protect against what?
Select all that apply.
□ Espionage, sabotage, terrorism
□ Assassinations conducted for or on behalf of foreign governments, organizations, or
persons
□ Activities by large companies to obtain operating capital within a foreign country
□ International terrorist activities
🗸🗸🗸: Espionage, sabotage, terrorism
pf3
pf4
pf5
pf8
pf9
pfa

Partial preview of the text

Download NISP Questions & 100% Verified Answers | Latest Update | Already Graded A+ and more Exams Cybercrime, Cybersecurity and Data Privacy in PDF only on Docsity!

NISP Questions & 100% Verified Answers |

Latest Update | Already Graded A+

Integrating CI and threat awareness into a security program helps to accomplish which of the following? Select all that apply. □ Assist DoD in maintaining a tactical advantage over foreign intelligence operatives □ Protect valuable company assets from loss and compromise □ Identify which assets need protecting □ Establish countermeasures 🗸🗸🗸: □ Protect valuable company assets from loss and compromise □ Identify which assets need protecting □ Establish countermeasures CI is the information gathered and activities conducted to protect against what? Select all that apply. □ Espionage, sabotage, terrorism □ Assassinations conducted for or on behalf of foreign governments, organizations, or persons □ Activities by large companies to obtain operating capital within a foreign country □ International terrorist activities 🗸🗸🗸: □ Espionage, sabotage, terrorism

□ Assassinations conducted for or on behalf of foreign governments, organizations, or persons □ International terrorist activities DoD 5220.22-M NISPOM does which of the following for industry? Select all that apply. □ Controls the disclosure of classified information to contractors □ Identifies the cost associated with particular contracts □ Protects special classes of classified information □ Requires contractors to hire counterintelligence special agents 🗸🗸🗸: □ Controls the disclosure of classified information to contractors □ Protects special classes of classified information The NISPOM requires that adverse information concerning cleared employees and any suspicious contacts be reported to DCSA. Select the best answer. o True o False 🗸🗸🗸: TRUE CI helps security officials to manage risk in which of the following ways? Select all that apply. □ Focus on assets and identify the threats to them

🗸🗸🗸: Conferences, Conventions, and Trade Shows Application to degree programs associated with cleared facilities or programs 🗸🗸🗸: Academic Solicitation Involves establishing emotional relationship with the target 🗸🗸🗸: Elicitation and Recruitment May use joint ventures or research partnerships 🗸🗸🗸: Solicitation and seeking employment Exchange employees or foreign business associates 🗸🗸🗸: Foreign visit Suspicious network activities 🗸🗸🗸: Conduct audits at least weekly Conferences, Conventions, and Trade Shows 🗸🗸🗸: Use mock-up instead of actual equipment Foreign Visits 🗸🗸🗸: Brief hosts and escorts on approved procedures

Solicitation and Seeking Employment 🗸🗸🗸: share the minimum amount of information appropriate to the scope of venture DCSA CI Directorate 🗸🗸🗸: Trends related to what is targeted and methods used Government Contracting Agency 🗸🗸🗸: Threat assessment for your current contract Federal Bureau of Investigations 🗸🗸🗸: Identify the current national security concerns that may affect your facility State or Local Law Enforcement 🗸🗸🗸: Determine the types of crimes that are being committed at facilities close to your company Which of the following activities can you use to promote CI awareness within your facility? □ Enlist your DCSA CI Special Agent to brief employees □ Post CI-related material throughout the workplace □ Share actual targeting examples with employees □ Remind employees that anyone who appears "foreign" is a threat

status of the facility's clearance, and actual, probable, or possible espionage, sabotage, terrorism, of subversive activities. Which of the following groups are vulnerable to foreign intelligence entity targeting? □ Information technology □ Facility management □ Employees traveling abroad □ Administrative assistants 🗸🗸🗸: Information technology, facility management, employees traveling abroad and administrative assistants are all groups vulnerable to foreign intelligence entity targeting. You learn from a security bulletin that a foreign country is using university students applying for low level jobs to gain entry into companies in your industry. Which group might you alert first? o Human Resources o Information Technology o Business Development o Engineers and Research & Development 🗸🗸🗸: You would alert Human Resources when a foreign country is using university students applying for low level jobs to gain entry into companies in your industry. Question: Foreign entities stepped up attempts to purchase export-controlled technology, including technology your facility develops. Who should you alert?

o Human Resources o Information Technology o Business Development o Engineers and Research & Development 🗸🗸🗸: You would alert Business Development when foreign entities step up attempts to purchase export-controlled technology, including technology your facility develops. Question: You learn of a threat from a business competitor to steal blueprints and schematics. Which group might you alert first? o Human Resources o Information Technology o Business Development o Engineers and Research & Development 🗸🗸🗸: You would alert Engineers or the R&D when you learn of a threat from a business competitor to steal blueprints and schematics. Question: There is an increase in cyber-attacks against companies in your industry. Who should you alert? o Human Resources o Information Technology o Business Development o Engineers and Research & Development

🗸🗸🗸: NISPOM 1-301 requires employees of cleared industry to report all events that indicate classified information may have been compromised to the FSO, FBI and Cognizant Security Authority (DCSA for industry).