Under DoDD 5240.06 Reportable Foreign Intelligence Contacts, Activities, Indicators and Behaviors; which of the following is not reportable? {Ans: Authorized network access}Cheryl works for the DOD. She tells her coworker she is fundraising for a foreign aid group and asks for donations. Is this a potential indicator of terrorism? {Ans: It depends on the associations the foreign aid group has}Gene works for a cleared defense contractor. One day, he clicks a link in an email which, unbeknownst to him, downloaded a virus from a foreign intelligence entity onto the contractor's IT system. What is this an example of? {Ans: Foreign intelligence entity use of insiders}Which collection method do foreign intelligence entities (FIEs) frequently use to extract from people who have access to classified or sensitive information? {Ans: Elicitation}Which of the following actions can potentially reduce or compromise your network security and place the lives of our men and women in jeopardy? {Ans: Inputting falsified corrupted data Phishing Hacking}Which of the following are Potential Espionage Indicators? {Ans: Unusual work hours Concealing foreign travel Unexplained affluence}