Fundamentals of Engineering Economic Analysis
1st EditionDavid Besanko, Mark Shanley, Scott Schaefer
215 solutions
Chemistry for Engineering Students
2nd EditionLawrence S. Brown, Thomas A. Holme
945 solutions
Introduction to Chemical Engineering Thermodynamics
7th EditionHendrick Van Ness, J.M. Smith, Michael Abbott
582 solutions
Chemical Reaction Engineering
3rd EditionOctave Levenspiel
228 solutions
-
Flashcards
-
Learn
-
Test
-
Match
-
Flashcards
-
Learn
-
Test
-
Match
Note: Does not include every possible question.
Terms in this set (32)
The definition of Targeted Violence includes which of these components? Select all that apply.
Any form of violence
For a specific reason
Directed at an individual or group
Which of the following are true about Insider Threats? Select all that apply.
The threat than an insider will access information without a need to know
Threat can include unauthorized disclosure of national security information or thought the loss or degradation of department resources or capabilities
Threat can include damage thought espionage or terrorism
Any person with authorized access to DoD resources by virtue of employment, volunteer activities, or contractual relationship with DoD
(select all 4 answers)
The transfer of classified or proprietary information to a system not approved for the classification level or unaccredited or unauthorized systems, individuals, applications, or media is a _____.
Spill
A member of your team openly discusses her financial difficulties and her inability to meet her financial obligations. What is the appropriate action?
Report the concerning behavior to your security officer
Insiders may include which of these groups of people? Select all that apply.
Employees
Contractors
Active duty military
Former employees
(select all 4 answers)
Which of the following is a reportable behavioral indicator?
Significant change in work habit
To whom should you report if you are contacted by a member of the media about information you are not authorized to share?
Your security office
Which of the following are things that adversaries want to know? Select all that apply.
Your organization's personnel
Countries your organization works with
Your company's competitors
Which of the following means to deliberately destroy, damage, or obstruct, especially for political or military advantage?
Sabotage
Most inside offenders display concerning behaviors before acting directly against their organization. This behavior may include (select all that apply):
Violations of workplace policies
Failure to follow standard procedures (SOP)
Legal difficulties
If you are contacted by a member of the media about information you are not authorized to share, you should take down which of the following details? Select all that apply.
Their name and their organization name
How they contacted you
Date and time of contact
Who might be interested in non-public information that an insider can provide? Select all that apply.
Terrorist organizations
Non-state actors
Foreign governments
Competitors
(select all 4 answers)
Where can elicitation techniques be used? Select all that apply.
In person
In email
Over the phone
In written communications
(select all 4 answers)
Technological advances _____. Select all that apply.
Increase risk of information loss
Allow insiders to access more data
Which of the following is a technology-related indicator? Select all that apply.
Improper use of privileged access
Bypassing technology-associated protocols
Hoarding files and data
You observe a colleague with a sudden increased alcohol intake (e.g., frequent heavy consumption, drinking until drunk) what is the appropriate action?
Report the concerning behavior to your security officer
_____ is a conversation technique used to discreetly gather information that is not readily available and do so without raising suspicion.
Elicitation
Which of the following statements is true about technology and the insider threat?
Technology changes the scale of risk from insider threats
Which of the following is a technology-related indicator? Select all that apply.
Accessing systems at unusual hours without authorization
Keeping unauthorized backups
Sharing details of your personal and professional lives or life online makes you _____ adversaries.
More vulnerable to
You can help reduce technology-associated insider threats by:
Enlisting countermeasures
Contractors must report which of these? Select all that apply.
Any event ...
Any event that may impact an individual's personnel security clearance
Anything that affects the proper safeguarding of classified information
Any indication that classified information has been lost or compromised
(select all 4 answers)
A coworker shares that she and her husband are facing foreclosure, and she doesn't know what to do. What should you do? Select all that apply.
Suggest she contact the EAP
Report the indicator to your security office
U.S. Government employees and contractors must report which of the following? Select all that apply.
Personal foreign travel
Speeches or books including information about involvement with the Intelligence Community
Foreign contacts
Which of these may be targeted by foreign entities? Select all that apply.
Personnel lists
Classified information
Unclassified information
List of facility locations
(select all 4 answers)
Technological advanced impact the insider threat by _____. Select all that apply.
Allowing large amounts of data to be accessed
Presenting new security challenges
A coworker keeps requesting information access to a project to which they are not assigned. What should you do?
Report the incident to your Security Office
Hostile entities may use social media to _____? Select all that apply.
Build a profile of a person
Quickly recruit someone of spying
Search for classified information
Gather information on personnel
(select all 4 answers)
Which of the following countermeasures can help reduce technology-associated insider threats? Select all that apply.
Inventory your technology holdings
Watch for behavioral indicators
Which of the following are behavioral indicators that must be reported?
Excessive debt
Disregard for security procedures and protocols
The acronym EAP stands for _____?
Employee Assistance Program
Which of the following must be reported to the Defense Counterintelligence and Security Agency and the FBI? Select all that apply.
Actual, probably, or possible espionage
Actual, probably, or possible terrorism
Actual, probably, or possible sabotage
Actual, probably, or possible subversive activities
(select all 4 answers)
Sets with similar termsC724 : Unit 7 - Test Review
54 terms
rreynolds1313
DOD Cyber Awareness Challenge 2019: Knowledge Chec…
69 terms
ewizzy58
DoD Cyber Awareness 2019
38 terms
kyle_terry4
DoD Cyber Awareness 2019
38 terms
wolff4780PLUS
Sets found in the same folderInsider Threat Awareness
28 terms
alex_hargroder
Insider Threat Awareness
28 terms
matthewmey23
DoD Insider Threat Awareness
22 terms
TCB_14
Unauthorized Disclosure of Classified Information
29 terms
BuhayNiKamatayan
Verified questions
ENGINEERING
Do there exist skew-symmetric orthogonal 3x3 matrices?
Verified answer
ENGINEERING
Hydrogen enters the turbine of an Ericsson cycle at 920 K, 15 bar with a mass flow rate of 1 kg/s. At the inlet to the compressor the condition is 300 K and 1.5 bar. Assuming the ideal gas model and ignoring kinetic and potential energy effects, determine a. the net power developed, in kW. b. the thermal efficiency. c. the back work ratio.
Verified answer
ENGINEERING
Consider two identical channels, one rectangular of bottom width b and one circular of diameter D, with identical flow rates, bottom slopes, and surface linings. If the flow height in the rectangular channel is also b and the circular channel is flowing half-full, determine the relation between b and D.
Verified answer
ENGINEERING
A solid round bar with diameter of 2 in has a groove cut to a diameter of 1.8 in, with a radius of 0.1 in. The bar is not rotating. The bar is loaded with a repeated bending load that causes the bending moment at the groove to fluctuate between 0 and $25000 \mathrm{lbf} \times \mathrm{in}$. The bar is hot-rolled AISI 1095, but the groove has been machined. Determine the factor of safety for fatigue based on infinite life using the Goodman criterion, and the factor of safety for yielding.
Verified answer
Recommended textbook solutionsFundamentals of Engineering Economic Analysis
1st EditionDavid Besanko, Mark Shanley, Scott Schaefer
215 solutions
Chemistry for Engineering Students
2nd EditionLawrence S. Brown, Thomas A. Holme
945 solutions
Fox and McDonald's Introduction to Fluid Mechanics
9th EditionAlan T. McDonald, John C Leylegian, John W Mitchell, Philip J. Pritchard, Rajesh Bhaskaran, Robert W Fox
1,025 solutions
Ingenieria Mecanica: Estatica
3rd EditionAndrew Pytel
157 solutions
Other Quizlet setsPSY 255 Final Ch. 11&12
76 terms
Kristen_Squillace
Physiology Quiz 6
21 terms
abbiegummer
Chapter 6: Reaching Goals_Plans & Controls
61 terms
angeleize_hernandez
Stats Study Guide 1
40 terms
cafloring
Related questionsQUESTION
When does the WASC team visit?
3 answers
QUESTION
how to control healthcare associated infection
13 answers
QUESTION
In the Biometric Passwords Video Case, what were the two emerging biometric technologies that were explained in detail?
15 answers
QUESTION
How many courses do most full time students take each term?
10 answers