Overview: The FEMA IS-915 course was published on 7/10/2013 to provide guidance to critical infrastructure employees and service providers on how to identify and take action against insider threats to critical infrastructure.
Primary audience: This course is designed for all personnel and service providers who are associated with critical infrastructure.
FEMA IS-915 test answers
Each time this test is loaded, you will receive a unique set of questions and answers. The test questions are scrambled to protect the integrity of the exam.
Question 1. The following activities are associated with potential malicious insiders, EXCEPT FOR:
A. Taking abnormal measures to keep activities unobserved.
B. Inappropriately obtaining access to unauthorized locations.
C. Making unexplainable large data transfers.
D. Frequently recognizing coworker achievements.✅
Question 2. The following are common characteristics of malicious insiders, EXCEPT FOR:
A. Expressing extreme levels of dissatisfaction with the organization.
B. Having alternate sources of income.✅
C. Being at risk for layoff or termination.
D. Having performance or behavioral problems.
Question 3. The following are protective measures that you can take against an insider threat, EXCEPT FOR:
A. Ensuring that access is terminated for employees leaving the organization.
B. Using appropriate screening processes to select new employees.
C. Issuing universal systems access and credentials to all employees.✅
D. Providing non-threatening and convenient ways for employees to report suspicions.
Question 4. Which of the following organizational factors might present an opportunity to a malicious insider?
A. The ease of leaving the premises with protected materials.✅
B. Clearly defined policies regarding working from home.
C. Thorough training for employees on protecting proprietary information.
D. Well-known and strict legal consequences for malicious activities.
Question 5. What does a malicious insider require in order to exploit an organization’s vulnerabilities?
A. Network-enabled access controllers.
B. Explicit and tacit knowledge.
C. Elimination of knowledge-related processes.
D. Access or inside knowledge.✅
Question 6. The following behaviors are associated with potential malicious insiders, EXCEPT FOR:
A. Facing workplace challenges with flexibility and patience.✅
B. Making exorbitant purchases inconsistent with income.
C. Openly conveying hostility toward the organization or coworkers.
D. Appearing overwhelmed by career disappointments.
Question 7. The following are examples of threats to critical infrastructure from malicious insider activities, EXCEPT FOR:
A. Theft of intellectual property.
B. Contamination of food or water supplies.
C. Overlaps in business processes.✅
D. Disruptions of essential services.
Question 8. The following are examples of threats to critical infrastructure from malicious insider activities, EXCEPT FOR:
A. Sabotaging control or other essential systems.
B. Developing unconventional technologies.✅
C. Stealing hazardous or essential materials.
D. Destroying equipment and inventory.
Question 9. A malicious insider exploits the vulnerabilities of an entity’s security, systems, services, products, or facilities with the intent to:
A. Cause harm.✅
B. Place blame.
C. Achieve progress.
D. Resist malice.
Question 10. The following activities are associated with potential malicious insiders, EXCEPT FOR:
A. Working odd hours without a valid reason or authorization.
B. Taking proprietary or other material without authorization.
C. Encouraging coworkers to follow effective security practices.✅
D. Meeting frequently with strangers around the workplace.
Question 11. TRUE OR FALSE: Malicious insiders can be encouraged by a work environment where employees feel rushed.
Question 12. TRUE OR FALSE: Malicious insiders include employees who are motivated by adventure or a sense of thrill.
Critical Infrastructure Security and Resilience Curriculum
Security awareness courses
- IS-906: Workplace Security Awareness
- IS-907: Active Shooter: What You Can Do
- IS-912: Retail Security Awareness: Understanding the Hidden Hazards
- IS-914: Surveillance Awareness: What You Can Do
- IS-915: Protecting Critical Infrastructure Against Insider Threats
- IS-916: Critical Infrastructure Security: Theft and Diversion – What You Can do
- IS-860: The National Infrastructure Protection Plan
- IS-913: Critical Infrastructure Security and Resilience: Achieving Results through Partnership and Collaboration
- IS-870: Dam Sector: Crisis Management
- IS-871: Dam Sector: Security Awareness
- IS-872: Dam Sector: Protective Measures
- IS-1170: Introduction to the Interagency Security Committee (ISC)
- IS-1171: Overview of Interagency Security Committee (ISC) Publications
- IS-1172: The Risk Management Process for Federal Facilities: Facility Security Level (FSL) Determination
- IS-1173: Levels of Protection (LOP) and Application of the Design-Basis Threat (DBT) Report
- IS-1174: Facility Security Committees