Which is true of cookies?
  • A coworker is observed using a personal electronic device in an area where their use is prohibited.
  • Use only personal contact information when establishing personal social networking accounts, never use Government contact information.
  • A type of phishing targeted at high-level personnel such as senior officials.
  • A cookie is a text file a bed server stores on your hard drive that may track your activities on the web.
What is a common method used in social engineering?
  • Approved Security Classification Guide (SCG)
  • Telephone surveys
  • Spillage of classified information.
  • Ensure that the wireless security features are properly configured.
What is the best example of Personally Identifiable Information (PII)?
  • Note any identifying information, such as the website's URL, and report the situation to your security POC.
  • When your vacation is over, and you have returned home
  • Date and place of birth
  • Telephone surveys
What type of unclassified material should always be marked with a special handling caveat?
  • Near field communication (NFC)
  • Your place of birth
  • For Official Use Only (FOUO)
  • It is never permitted.
What portable electronic devices (PEDs) are allow in a Secure Compartmented Information Facility (SCIF)?
  • The proper security clearance and indoctrination into the SCI program.
  • Government-owned PEDs, if expressly authorized by your agency.
  • Ask for information about the website, including the URL.
  • Completing your expense report for your government travel.
Which of the following is a best practice to protect information about you and your organization on social networking sites and applications?
  • Secure personal mobile devices to the same level as Government-issued systems.
  • Damage to national security
  • Insider Threat
  • Use only personal contact information when establishing personal social networking accounts, never use Government contact information.
What is the best example of Protected Health Information (PHI)?
  • Ensure that the wireless security features are properly configured.
  • Your health insurance explanation of benefits (EOB)
  • Date and place of birth
  • Note any identifying information, such as the website's URL, and report the situation to your security POC.
What are some examples of removable media?
  • The proper security clearance and indoctrination into the SCI program.
  • Shred personal documents; never share passwords; and order a credit report annually.
  • Memory sticks, flash drives, or external hard drives
  • Thumb drives, memory sticks, and optical disks
What is a possible indication of a malicious code attack in progress?
  • Note any identifying information, such as the website's URL, and report the situation to your security POC.
  • Something you possess, like a CAC, and something you know, like a PIN or password.
  • A pop-up window that flashes and warns that your computer is infected with a virus.
  • The proper security clearance and indoctrination into the SCI program.
What is a common indicator of a phishing attempt?
  • It includes a threat of dire circumstances.
  • Challenge people without proper badges.
  • Telephone surveys
  • Use online sites to confirm or expose potential hoaxes.
Which of the following is an appropriate use of Government e-mail?
  • Digitally signing e-mails that contain attachments or hyperlinks.
  • Secure personal mobile devices to the same level as Government-issued systems.
  • When unclassified data is aggregated, its classification level may rise.
  • Social Security Number; date and place of birth; mother's maiden name
Which term describes an event where a person who does not have the required clearance or access caveats comes into possession of Sensitive Compartmented Information (SCI)
  • Compromise
  • 1 Indicator
  • Department of Defense.
  • It can cause damage by corrupting files, erasing your hard drive, and/or allowing hackers access.
Which of the following can an unauthorized disclosure of information classified as Confidential reasonably be expected to cause?
  • Date and place of birth
  • Secure personal mobile devices to the same level as Government-issued systems.
  • Insider Threat
  • Damage to national security
0 h : 0 m : 1 s

Answered Not Answered Not Visited Correct : 0 Incorrect : 0