






Study with the several resources on Docsity
Earn points by helping other students or get them with a premium plan
Prepare for your exams
Study with the several resources on Docsity
Earn points to download
Earn points by helping other students or get them with a premium plan
Community
Ask the community for help and clear up your study doubts
Discover the best universities in your country according to Docsity users
Free resources
Download our free guides on studying techniques, anxiety management strategies, and thesis advice from Docsity tutors
Integrating CI and threat awareness into a security program helps to accomplish which of the following? Select all that apply. □ Assist DoD in maintaining a tactical advantage over foreign intelligence operatives □ Protect valuable company assets from loss and compromise □ Identify which assets need protecting □ Establish countermeasures □ Protect valuable company assets from loss and compromise □ Identify which assets need protecting □ Establish countermeasures
Typology: Exams
1 / 10
This page cannot be seen from the preview
Don't miss anything!
Integrating CI and threat awareness into a security program helps to accomplish which of the following? Select all that apply. □ Assist DoD in maintaining a tactical advantage over foreign intelligence operatives □ Protect valuable company assets from loss and compromise □ Identify which assets need protecting □ Establish countermeasures 🗸🗸🗸: □ Protect valuable company assets from loss and compromise □ Identify which assets need protecting □ Establish countermeasures CI is the information gathered and activities conducted to protect against what? Select all that apply. □ Espionage, sabotage, terrorism □ Assassinations conducted for or on behalf of foreign governments, organizations, or persons □ Activities by large companies to obtain operating capital within a foreign country □ International terrorist activities 🗸🗸🗸: □ Espionage, sabotage, terrorism
□ Assassinations conducted for or on behalf of foreign governments, organizations, or persons □ International terrorist activities DoD 5220.22-M NISPOM does which of the following for industry? Select all that apply. □ Controls the disclosure of classified information to contractors □ Identifies the cost associated with particular contracts □ Protects special classes of classified information □ Requires contractors to hire counterintelligence special agents 🗸🗸🗸: □ Controls the disclosure of classified information to contractors □ Protects special classes of classified information The NISPOM requires that adverse information concerning cleared employees and any suspicious contacts be reported to DCSA. Select the best answer. o True o False 🗸🗸🗸: TRUE CI helps security officials to manage risk in which of the following ways? Select all that apply. □ Focus on assets and identify the threats to them
🗸🗸🗸: Conferences, Conventions, and Trade Shows Application to degree programs associated with cleared facilities or programs 🗸🗸🗸: Academic Solicitation Involves establishing emotional relationship with the target 🗸🗸🗸: Elicitation and Recruitment May use joint ventures or research partnerships 🗸🗸🗸: Solicitation and seeking employment Exchange employees or foreign business associates 🗸🗸🗸: Foreign visit Suspicious network activities 🗸🗸🗸: Conduct audits at least weekly Conferences, Conventions, and Trade Shows 🗸🗸🗸: Use mock-up instead of actual equipment Foreign Visits 🗸🗸🗸: Brief hosts and escorts on approved procedures
Solicitation and Seeking Employment 🗸🗸🗸: share the minimum amount of information appropriate to the scope of venture DCSA CI Directorate 🗸🗸🗸: Trends related to what is targeted and methods used Government Contracting Agency 🗸🗸🗸: Threat assessment for your current contract Federal Bureau of Investigations 🗸🗸🗸: Identify the current national security concerns that may affect your facility State or Local Law Enforcement 🗸🗸🗸: Determine the types of crimes that are being committed at facilities close to your company Which of the following activities can you use to promote CI awareness within your facility? □ Enlist your DCSA CI Special Agent to brief employees □ Post CI-related material throughout the workplace □ Share actual targeting examples with employees □ Remind employees that anyone who appears "foreign" is a threat
status of the facility's clearance, and actual, probable, or possible espionage, sabotage, terrorism, of subversive activities. Which of the following groups are vulnerable to foreign intelligence entity targeting? □ Information technology □ Facility management □ Employees traveling abroad □ Administrative assistants 🗸🗸🗸: Information technology, facility management, employees traveling abroad and administrative assistants are all groups vulnerable to foreign intelligence entity targeting. You learn from a security bulletin that a foreign country is using university students applying for low level jobs to gain entry into companies in your industry. Which group might you alert first? o Human Resources o Information Technology o Business Development o Engineers and Research & Development 🗸🗸🗸: You would alert Human Resources when a foreign country is using university students applying for low level jobs to gain entry into companies in your industry. Question: Foreign entities stepped up attempts to purchase export-controlled technology, including technology your facility develops. Who should you alert?
o Human Resources o Information Technology o Business Development o Engineers and Research & Development 🗸🗸🗸: You would alert Business Development when foreign entities step up attempts to purchase export-controlled technology, including technology your facility develops. Question: You learn of a threat from a business competitor to steal blueprints and schematics. Which group might you alert first? o Human Resources o Information Technology o Business Development o Engineers and Research & Development 🗸🗸🗸: You would alert Engineers or the R&D when you learn of a threat from a business competitor to steal blueprints and schematics. Question: There is an increase in cyber-attacks against companies in your industry. Who should you alert? o Human Resources o Information Technology o Business Development o Engineers and Research & Development
🗸🗸🗸: NISPOM 1-301 requires employees of cleared industry to report all events that indicate classified information may have been compromised to the FSO, FBI and Cognizant Security Authority (DCSA for industry).