Overview: FEMA IS-915 course was published on 7/10/2013 to provide guidance to critical infrastructure employees and service providers on how to identify and take action against insider threats to critical infrastructure.
Primary audience: This course is designed for all personnel and service providers who are associated with critical infrastructure.
At the end of this course, the participants will be able to:
- Describe the threat that malicious insiders pose to critical infrastructure.
- Identify common characteristics and indicators associated with malicious insiders.
- Identify actions that can be taken against insider threats.
FEMA IS-915 test answers
Question 1. The following activities are associated with potential malicious insiders, EXCEPT FOR:
A. Taking abnormal measures to keep activities unobserved.
B. Inappropriately obtaining access to unauthorized locations.
C. Making unexplainable large data transfers.
D. Frequently recognizing coworker achievements.✅
Question 2. The following are common characteristics of malicious insiders, EXCEPT FOR:
A. Expressing extreme levels of dissatisfaction with the organization.
B. Having alternate sources of income.✅
C. Being at risk for layoff or termination.
D. Having performance or behavioral problems.
Question 3. The following are protective measures that you can take against an insider threat, EXCEPT FOR:
A. Ensuring that access is terminated for employees leaving the organization.
B. Using appropriate screening processes to select new employees.
C. Issuing universal systems access and credentials to all employees.✅
D. Providing non-threatening and convenient ways for employees to report suspicions.
Question 4. Which of the following organizational factors might present an opportunity to a malicious insider?
A. The ease of leaving the premises with protected materials.✅
B. Clearly defined policies regarding working from home.
C. Thorough training for employees on protecting proprietary information.
D. Well-known and strict legal consequences for malicious activities.
Question 5. What does a malicious insider require in order to exploit an organization’s vulnerabilities?
A. Network-enabled access controllers.
B. Explicit and tacit knowledge.
C. Elimination of knowledge-related processes.
D. Access or inside knowledge.✅
Question 6. The following behaviors are associated with potential malicious insiders, EXCEPT FOR:
A. Facing workplace challenges with flexibility and patience.✅
B. Making exorbitant purchases inconsistent with income.
C. Openly conveying hostility toward the organization or coworkers.
D. Appearing overwhelmed by career disappointments.
Question 7. The following are examples of threats to critical infrastructure from malicious insider activities, EXCEPT FOR:
A. Theft of intellectual property.
B. Contamination of food or water supplies.
C. Overlaps in business processes.✅
D. Disruptions of essential services.
Question 8. The following are examples of threats to critical infrastructure from malicious insider activities, EXCEPT FOR:
A. Sabotaging control or other essential systems.
B. Developing unconventional technologies.✅
C. Stealing hazardous or essential materials.
D. Destroying equipment and inventory.
Question 9. A malicious insider exploits the vulnerabilities of an entity’s security, systems, services, products, or facilities with the intent to:
A. Cause harm.✅
B. Place blame.
C. Achieve progress.
D. Resist malice.
Question 10. The following activities are associated with potential malicious insiders, EXCEPT FOR:
A. Working odd hours without a valid reason or authorization.
B. Taking proprietary or other material without authorization.
C. Encouraging coworkers to follow effective security practices.✅
D. Meeting frequently with strangers around the workplace.
Question 11. TRUE OR FALSE: Malicious insiders can be encouraged by a work environment where employees feel rushed.
Question 12. TRUE OR FALSE: Malicious insiders include employees who are motivated by adventure or a sense of thrill.