Which of the following statements is true about information sought by foreign entities

Are you studying for the CEH or CISSP certifications?

Skillset can help you prepare! Sign up for your free Skillset account and take the first steps towards your certification.

Which of the following statements is true about information sought by foreign entities

Skillset helps you pass your certification exam.

Which of the following statements is true about information sought by foreign entities

Practice Questions

Study thousands of practice questions that organized by skills and ranked by difficulty.

Which of the following statements is true about information sought by foreign entities

Personalized Training

Create a tailored training plan based on the knowledge you already possess.

Which of the following statements is true about information sought by foreign entities

Exam Readiness

Know when you’re ready for the high-stakes exam. Have the confidence that you will pass on your first attempt.

Get A Free Skillset Account

Recommended textbook solutions

Which of the following statements is true about information sought by foreign entities

Fundamentals of Engineering Economic Analysis

1st EditionDavid Besanko, Mark Shanley, Scott Schaefer

215 solutions

Which of the following statements is true about information sought by foreign entities

Chemistry for Engineering Students

2nd EditionLawrence S. Brown, Thomas A. Holme

945 solutions

Which of the following statements is true about information sought by foreign entities

Introduction to Chemical Engineering Thermodynamics

7th EditionHendrick Van Ness, J.M. Smith, Michael Abbott

582 solutions

Which of the following statements is true about information sought by foreign entities

Chemical Reaction Engineering

3rd EditionOctave Levenspiel

228 solutions

Upgrade to remove ads

Only ₩37,125/year

  • Flashcards

  • Learn

  • Test

  • Match

  • Flashcards

  • Learn

  • Test

  • Match

SEC-ASCA

Terms in this set (53)

When transporting classified information, the courier must have a DD Form 2501, and as a minimum use a locked briefcase or zippered pouch made of canvas or other heavy duty material?

True

What are the three classification levels of information?

1. Confidential..

2. Secret.

3. Top Secret.

What is the purpose of the SF 701 "Activity Security Checklist" and the SF 702 "Security Container Check Sheet?"

They are used as part of the end-of-day security checks activities that process or store classified material.

If you find classified material out of proper control you should take custody of the material and safeguard it, if possible, and immediately notify your security representative or supervisor?

True.

In the event of a natural disaster, which of the following statements is true concerning an emergency action procedure for classified material?

The first priority is protection of life, followed by the protection of classified material.

Using curbside mailboxes is an approved method for mailing classified information?

False.

Which of the following statement below are true concerning security containers, vaults, or open storage areas? Select all that apply.

1. The combination must be protected at the same level as the highest classification of the material authorized for storage.

2. Do not store items such as weapons, money, jewelry, precious metals or drugs in the same container as classified material.

Which of the following are approved methods of discussing and transmitting classified material? Select all that apply.

1. SIPRnet.

2. Secure Fax.

3. Secure Telephone.

Which of the following methods are routinely used for destroying classified information? Select all that apply.

1. Burning.

2. Approved cross-cut shredding.

3. Wet-pulping.

Which of the following statements below must be on the front of a GSA-approved security container for storing classified information?

"General Services Administration-Approved Security Container"

Personnel who fail to report CI Activities of concern as outlines in Enclosure 4 of DoD Directive 5240.06 are subject to appropriate disciplinary action under regulations

True.

Cyber Vulnerabilities to DoD Systems may include:

All the above.

DoD personnel who suspect a coworker of possible espionage should:

Report directly to your CI or Security Office.

Under DoD 5240.06 Reportable Foreign Intelligence Contacts, Activities, Indicators and Behaviors; which of the following is not reportable?

None of the above.

Potential espionage indicators (PEIs) are activities, behaviors, or circumstances that 'may be indicative' of potential espionage activities by an individual who may have volunteered or been recruited by a foreign entity as a writing espionage agent. Examples of PEI include:

All of the above.

Foreign Intelligence Entity (FIE) is defined in DoD Directive 5240.06 as "any known or suspected foreign organization, person, or group (public, private, or governmental) that conducts intelligence activities to acquire U.S. information, block or impair U.S. intelligence collection, influence U.S. policy, or disrupt U.S. systems and programs. The term includes foreign intelligence and security services and international terrorists."

True.

Counterintelligence as defined in the National Security Act of 1947, is "information gathered and activities conducted to protect against espionage, other intelligence activities, sabotage, or assassinations conducted by or on behalf of foreign governments or elements thereof, foreign organizations or foreign persons, or international terrorist activities."

True.

If you feel you are being solicited for information which of the following should you do?

All of the above.

Foreign Intelligence Entities seldom use the Internet or other communications including social networking services as a collection method?

False.

Foreign Intelligence Entities seldom use elicitation to extract information from people who have access to classified or sensitive information?

False.

Collection Methods or operation frequently used by Foreign Intelligence Entities to collect information from DoD on the critical technology being produced within the cleared defense contractor facilities we support include:

All the above.

Which of the following is not an example of an anomaly?

Foreign diplomat attempts to defect..

Which of the following statements are correct concerning why a person would need to obtain a security clearance? Select all that apply.

1. To ensure trustworthy people have access to classified information.

2. To ensure only trustworthy people hold national security sensitive positions.

All DoD civilian positions are categorized into which following security groups?

Special Sensitive, Critical Sensitive, Non-Critical Sensitive, and Non-Sensitive.

Which of the following procedures is used to monitor personnel for new information or changes that could affect their eligibility to hold a security clearance or fill a sensitive position?

Continuous evaluation.

Which of the following organizations is the sole authority for determining the clearance eligibility for non-intelligence agency DoD?

Department of Defense Consolidated Adjudications Facility (DoD CAF)

Which of the following are part of the 13 national security adjudicators use to determine your eligibility for a clearance? Select all that apply.

1. Personal conduct.

2. Criminal conduct.

3. Allegiance to the United States.

When a security clearance is denied or revoked, the decision is final?

False.

Which of the following are you expected to do when you hold a secret clearance, of fill a national security sensitive position? Select all that apply.

1. Comply with the high standards of conduct required of persons having access to classified information or performing national sensitive duties.

2. Keep your security office informed of certain changes in your personal life or activities that have potential security ramifications.

3. Report any factual information that comes to your attention that raises potential security concerns about co-workers.

Which of the following statements are true concerning continuous evaluation? Select all that apply.

1. Individuals holding security clearances are subjected to periodic reinvestigations.

2. Individuals holding security clearance are subject to a reasonable degree of monitoring by supervisors, coworkers, and security professionals.

3. Individuals granted security clearances sometimes fall into a pattern of unreliable or untrustworthy behavior after being granted an initial eligibility.

Which of the following statements is true concerning self-reporting for an individual who holds a security clearance?

It is mandatory. It also demonstrates personal integrity and is preferable to the incident or change being discovered and reported by others.

A security clearance determination is based on a pattern of behavior and not a single action?

True.

What is the primary goal of OPSEC?

Increasing mission effectiveness while protecting critical information from exploitation by our adversaries.

Which of the following are threats to our critical information? Select all that apply.

1. Private organizations.

2. Terrorists.

3. Friendly foreign governments.

Which of the following are critical information? Select all that apply.

1. Backorders affecting readiness.

2. IT system architecture.

3. PII.

How often does J or D code, major subordinate command and regional command update their unique critical information list?

Annually.

Which of the following are effective countermeasures to protect critical information? Select all that apply.

1. Encryption.

2. Shredding.

3. Enforcing need-to-know.

Friendly detectable actions are critical information?

True.

Geolocation applications are not authorized for use in:

Operational Areas.

Official documents may be thrown away in recycle bins?

False.

It is illegal for someone to rummage through your trash when you leave it outside for pickup?

False.

All DLA personnel work with critical information?

True.

Which of the following are key objectives of DLA's Counterintelligence Mission? Select all that apply.

1. Developing and implementing capabilities to detect, deter, and mitigate insider threats.

2. Stopping the theft and exploration of critical U.S. technologies, data, and information.

3. Neutralizing or mitigating adversarial attempts to exploit U.S. Supply Chain and Acquisition vulnerabilities.

Which of the following terms describes information gathered and activities conducted to identify, deceive, exploit, disrupt, or protect against espionage?

Counterintelligence.

Which of the following terms include foreign intelligence and security services and international terrorists and is defined as any known or suspected foreign organization, person, or group (public, private, or governmental) that conducts intelligence activities to acquire U.S. information, block, or impair U.S. Intelligence collection, influence U.S. policy, or disrupt U.S. system and programs?

Foreign Intelligence Entity (FIE).

Which of the following is an activity or knowledge, outside the norm, that suggests a foreign entity has foreknowledge of U.S. information, processes, or capabilities?

Anomaly.

Foreign visits to DoD facilities should be coordinated how many days in advance/

30 days.

Which of the following is a technique used to subtly and inconspicuously gather information about you, your mission, or, your colleagues?

Elicitation.

An unexplained and sudden reversal of large debt is an indicator of counterintelligence concern and should be reported for further investigation?

True.

To whom are all DoD personnel required to report all projected foreign travel?

Security representative.

Any deviation from foreign travel itineraries must be reported within how many days of returning from travel?

5 days.

A one-time encounter with a foreign national involving the exchange of contact information must be reported to your security representative?

True.

Which of the following terms describes a known or suspected foreign organization, person, or group who conducts intelligence activities to acquire U.S. information?

Foreign Intelligence Entity (FIE).

Sets with similar terms

Counterintelligence Awareness and Reporting

11 terms

staycalmandloveblue

Counterintelligence Awareness and Reporting - PreT…

18 terms

VeronicaNunez-Galvan

CISM - domain 3a - Q/A

123 terms

Rumen_Chikov

DoD Cyber Awareness 2019

38 terms

kyle_terry4

Sets found in the same folder

Level I Antiterrorism Awareness

45 terms

BuhayNiKamatayan

Cyber Awareness 2020 Knowledge Check

95 terms

Lilwhiteshark97

Initial Security Orientation Army

17 terms

Asullivan235PLUS

Army OPSEC level 1 (Newcomers & Refresher)

29 terms

elsieteel

Other sets by this creator

ACQ 0040

7 terms

staycalmandloveblue

Combating Trafficking In Person (CTIP) 2022

22 terms

staycalmandloveblue

DoD Mandatory Controlled Unclassified Information…

20 terms

staycalmandloveblue

ALL HAZARDS AWARENESS

10 terms

staycalmandloveblue

Recommended textbook solutions

Which of the following statements is true about information sought by foreign entities

Information Technology Project Management: Providing Measurable Organizational Value

5th EditionJack T. Marchewka

346 solutions

Which of the following statements is true about information sought by foreign entities

Information Technology Project Management: Providing Measurable Organizational Value

5th EditionJack T. Marchewka

346 solutions

Which of the following statements is true about information sought by foreign entities

Human Resource Management

15th EditionJohn David Jackson, Patricia Meglich, Robert Mathis, Sean Valentine

249 solutions

Which of the following statements is true about information sought by foreign entities

Operations Management: Sustainability and Supply Chain Management

12th EditionBarry Render, Chuck Munson, Jay Heizer

1,698 solutions

Other Quizlet sets

Sherpath Lesson 10

50 terms

lenciacrockett

MOST MISSED

123 terms

nesto_225

3A1x1 Block 3 Study Guide

75 terms

lizbeth_yanna_ortiz

Ch 11

14 terms

thebigmackenzie

Related questions

QUESTION

Michael Porter, a noted authority on strategic management, said that successful managers

15 answers

QUESTION

T/F: Common law is derived from Roman law and is found in the non-Islamic and non-socialist countries such as France, some countries in Latin America and even Louisiana in the United States.

2 answers

QUESTION

Which drug is the most effective treatment for trichomoniasis?

15 answers

QUESTION

As an exception, medical assistants who want to work in inpatient settings in a purely administrative role are usually permitted to do so.

4 answers

What type of information do foreign intelligence entities want?

Foreign Intelligence Entities frequently use elicitation to extract information from people who have access to classified or sensitive information. An unsolicited request for information is any request that was not sought or encouraged by DoD for information from a known or unknown company, or from another country.

Which step in the foreign recruitment cycle involves identifying a potential target?

Spotting. Recruiting process typically begins with "spotting". Spotting is the identification of targets—people—who appear to have access to information, or are attractive for some support role.

Which of the following methods are routinely used for destroying classified information?

Classified material may be destroyed by burning, shredding, pulping, melting, mutilation, chemical decomposition, or pulverizing (for example, hammer mills, choppers, and hybridized disin- tegration equipment). Pulpers, pulverizers, or shedders may be used only for the destruction of paper products.

Is a conversation technique used to discreetly gather information?

Elicitation is a technique commonly used to discreetly gather information through face to face, telephone and internet interaction. It is a conversation designed to collect information that is not readily available without disclosing the intent of the conversation.