Integrating CI and threat awareness into a security program helps to accomplish
which of the following?
Select all that apply.
□ Assist DoD in maintaining a tactical advantage over foreign intelligence
operatives
□ Protect valuable company assets from loss and compromise
□ Identify wh...
NISP Study Guide 2024
Integrating CI and threat awareness into a security program helps to accomplish
which of the following?
Select all that apply.
□ Assist DoD in maintaining a tactical advantage over foreign intelligence
operatives
□ Protect valuable company assets from loss and compromise
□ Identify which assets need protecting
□ Establish countermeasures - □ Protect valuable company assets from loss and
compromise
□ Identify which assets need protecting
□ Establish countermeasures
CI is the information gathered and activities conducted to protect against what?
Select all that apply.
□ Espionage, sabotage, terrorism
□ Assassinations conducted for or on behalf of foreign governments,
organizations, or persons
□ Activities by large companies to obtain operating capital within a foreign country
□ International terrorist activities - □ Espionage, sabotage, terrorism
□ Assassinations conducted for or on behalf of foreign governments,
organizations, or persons
□ International terrorist activities
DoD 5220.22-M NISPOM does which of the following for industry?
Select all that apply.
□ Controls the disclosure of classified information to contractors
□ Identifies the cost associated with particular contracts
□ Protects special classes of classified information
, □ Requires contractors to hire counterintelligence special agents - □ Controls the
disclosure of classified information to contractors
□ Protects special classes of classified information
The NISPOM requires that adverse information concerning cleared employees and
any suspicious contacts be reported to DCSA.
Select the best answer.
o True
o False - TRUE
CI helps security officials to manage risk in which of the following ways? Select all
that apply.
□ Focus on assets and identify the threats to them
□ Identify vulnerabilities
□ Develop and apply countermeasures
□ Develop investigation procedures
□ Develop security classification guides - □ Focus on assets and identify the threats
to them
□ Identify vulnerabilities
□ Develop and apply countermeasures
Which of the following are foreign collection methods?
□ Requests for information
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller Topskills. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for $14.49. You're not tied to anything after your purchase.