Counterintelligence Awareness & Reporting Course for
DOD 2021 with complete solution
Personnel who fail to report CI Activities of concern as outlines in Enclosure 4 of DoD
Directive 5240.06 are subject to appropriate
...
Counterintelligence Awareness & Reporting Course for
DOD 2021 with complete solution
Personnel who fail to report CI Activities of concern as outlines in Enclosure 4 of DoD
Directive 5240.06 are subject to appropriate disciplinary action under regulations -
Answer- True
Cyber Vulnerabilities to DoD Systems may include: -Answer- All of the above
DoD personnel who suspect a coworker of possible espionage should: -Answer- Report
directly to your CI or Security Office
Under DoDD 5240.06 Reportable Foreign Intelligence Contacts, Activities, Indicators
and Behaviors; which of the following is not reportable? -Answer- None of the above
Potential espionage indicators (PEIs) are activities, behaviors, or circumstances that
'may be indicative' of potential espionage activities by an individual who may have
volunteered or been recruited by a foreign entity as a writing espionage agent.
Examples of PEI include: -Answer- All of the above
Foreign Intelligence Entity (FIE) is defined in DoD Directive 5240.06 as "any known or
suspected foreign organization, person, or group (public, private, or governmental) that
conducts intelligence activities to acquire U.S. information, block or impair U.S.
intelligence collection, influence U.S. policy, or disrupt U.S. systems and programs. The
term includes foreign intelligence and security services and international terrorists." -
Answer- True
Counterintelligence as defined in the National Security Act of 1947, is "information
gathered and activities conducted to protect against espionage, other intelligence
activities, sabotage, or assassinations conducted by or on behalf of foreign
governments or elements thereof, foreign organizations or foreign persons, or
international terrorist activities." -Answer- True
If you feel you are being solicited for information which of the following should you do? -
Answer- All of the Above
Foreign Intelligence Entities seldom use the Internet or other communications including
social networking services as a collection method -Answer- False
Foreign Intelligence Entities seldom use elicitation to extract information from people
who have access to classified or sensitive information -Answer- False
Collection Methods or operation frequently used by Foreign Intelligence Entities to
collect information from DoD on the critical technology being produced within the
[Show More]