Which scenario might indicate a reportable insider threat security incident?
  • Note any identifying information, such as the website's URL, and report the situation to your security POC.
  • Ensure proper labeling by appropriately marking all classified material and, when required, sensitive material.
  • A coworker is observed using a personal electronic device in an area where their use is prohibited.
  • Secure personal mobile devices to the same level as Government-issued systems.
Under what circumstances could unclassified information be considered a threat to national security?
  • If aggregated, the information could become classified.
  • Insiders are given a level of trust and have authorized access to Government information systems.
  • Be aware of classification markings and all handling caveats.
  • Any time you participate in or condone misconduct, whether offline or online.
Which of the following is a good practice to aid in preventing spillage?
  • Understanding and using available privacy settings.
  • The proper security clearance and indoctrination into the SCI program.
  • Secure personal mobile devices to the same level as Government-issued systems.
  • Be aware of classification markings and all handling caveats.
What is a good practice for physical security?
  • Ensure that the wireless security features are properly configured.
  • It includes a threat of dire circumstances.
  • Immediately notify your security POC.
  • Challenge people without proper badges.
What must you do when e-mailing Personally Identifiable Information (PII) or Protected Health Information (PHI)?
  • Encrypt the e-mail and use your Government e-mail account.
  • Comply with Configuration/Change Management (CM) policies and procedures
  • Avoid a potential security violation by using the appropriate token for each system.
  • Ensure that the wireless security features are properly configured.
Which is a risk associated with removable media?
  • Immediately notify your security POC.
  • Challenge people without proper badges.
  • Spillage of classified information.
  • Use online sites to confirm or expose potential hoaxes.
What is a valid response when identity theft occurs?
  • Your health insurance explanation of benefits (EOB)
  • Report the crime to local law enforcement.
  • Ensure that the wireless security features are properly configured.
  • Approved Security Classification Guide (SCG)
What are the requirements to be granted access to SCI material?
  • Something you possess, like a CAC, and something you know, like a PIN or password.
  • Shred personal documents; never share passwords; and order a credit report annually.
  • Social Security Number; date and place of birth; mother's maiden name
  • The proper security clearance and indoctrination into the SCI program.
What is a good practice to protect data on your home wireless systems?
  • Ensure proper labeling by appropriately marking all classified material and, when required, sensitive material.
  • Ensure that the wireless security features are properly configured.
  • Avoid using the same password between systems or applications.
  • Challenge people without proper badges.
A coworker is observed using a personal electronic device in an area where their use is prohibited.
  • Which of the following is a good practice to aid in preventing spillage?
  • Which scenario might indicate a reportable insider threat security incident?
  • What is the best response if you find classified government data on the internet?
  • What is required for an individual to access classified data?
Note any identifying information, such as the website's URL, and report the situation to your security POC.
  • What is the best response if you find classified government data on the internet?
  • When is the best time to post details of your vacation activities on your social networking website?
  • What is the best example of Protected Health information (PHI)?
  • Whats is the best description of two-factor authentication?
A type of phishing targeted at high-end personnel such as senior officials.
  • What is a good practice to protect data on your home wireless systems?
  • What is whaling?
  • Whats is the best description of two-factor authentication?
  • What is required for an individual to access classified data?
Don't talk about work outside your workspace unless it is a specifically designated public meeting environment and is controlled by the event planners.
  • Which of the following is a good practice to aid in preventing spillage?
  • which of the following practices reduces the chance of becoming a target by adversaries seeking information?
  • When is the best time to post details of your vacation activities on your social networking website?
  • What is the best response if you find classified government data on the internet?
it can cause damage by corrupting files, erasing your hard drive, and/or allowing hackers access.
  • What helps protect from spear phishing?
  • What is whaling?
  • When classified data is not in use, how can you protect it?
  • What can malicious code do?
Spillage of classified information.
  • Which may be a security issue with compressed URLs?
  • What is a good practice for physical security?
  • Which is a risk associated with removable media?
  • Which of the following is a good practice to aid in preventing spillage?
Be wary of suspicious e-mails that use your name and/or appear to come from inside your organization.
  • What is the best response if you find classified government data on the internet?
  • What are the requirements to be granted access to SCI material?
  • What helps protect from spear phishing?
  • Which of the following is a good practice to aid in preventing spillage?
Ensure that the wireless security features are properly configured.
  • What is a good practice to protect data on your home wireless systems?
  • What is required for an individual to access classified data?
  • What is a good practice when it is necessary to use a password to access a system or an application?
  • What is the best example of Protected Health information (PHI)?
The proper security clearance and indoctrination into the SCI program.
  • Whats is the best description of two-factor authentication?
  • What is required for an individual to access classified data?
  • What is the best example of Protected Health information (PHI)?
  • What are the requirements to be granted access to SCI material?
Near field communication (NFC).
  • Which is a wireless technology that enables your electronic devices to establish communications and exchange information when placed next to each other called?
  • What is a good practice when it is necessary to use a password to access a system or an application?
  • Under what circumstances is it acceptable to use your Government-furnished computer to check personal e-mail and do other non-work related activities?
  • Which is a risk associated with removable media?
When your vacation is over, and you have returned home.
  • What is the best response if you find classified government data on the internet?
  • What are the requirements to be granted access to SCI material?
  • What is the best example of Protected Health information (PHI)?
  • When is the best time to post details of your vacation activities on your social networking website?
Connect to the Government Virtual Private Network (VPN).
  • What must you do when e-mailing Personally Identifiable Information (PII) or Protected Health Information (PHI)?
  • Upon connecting your Government-issued laptop to a public wireless connection, what should you immediately do?
  • Under what circumstances could unclassified information be considered a threat to national security?
  • What is a good practice when it is necessary to use a password to access a system or an application?
Insiders are given a level of trust and have authorized access to government information systems.
  • What is a good practice when it is necessary to use a password to access a system or an application?
  • What is the best response if you find classified government data on the internet?
  • Why might "insiders' be able to cause damage to their organizations more easily than others?
  • Which scenario might indicate a reportable insider threat security incident?
If aggregated, the information could become classified.
  • Upon connecting your Government-issued laptop to a public wireless connection, what should you immediately do?
  • Under what circumstances is it acceptable to use your Government-furnished computer to check personal e-mail and do other non-work related activities?
  • When is the best time to post details of your vacation activities on your social networking website?
  • Under what circumstances could unclassified information be considered a threat to national security?
If allowed by organizational policy.
  • Which is a wireless technology that enables your electronic devices to establish communications and exchange information when placed next to each other called?
  • Which is a risk associated with removable media?
  • Under what circumstances could unclassified information be considered a threat to national security?
  • Under what circumstances is it acceptable to use your Government-furnished computer to check personal e-mail and do other non-work related activities?
Encrypt the e-mail and use your Government e-mail account.
  • Upon connecting your Government-issued laptop to a public wireless connection, what should you immediately do?
  • What must you do when e-mailing Personally Identifiable Information (PII) or Protected Health Information (PHI)?
  • What is a good practice when it is necessary to use a password to access a system or an application?
  • What is a good practice to protect data on your home wireless systems?
The Director of National Intelligence.
  • What can malicious code do?
  • What is a valid response when identity theft occurs?
  • Which is a rule for removable media, other portable electronic devices (PEDs), and mobile computing devices to protect Government systems?
  • What organization issues the directives concerning the dissemination of information regarding intelligence sources, methods, or activities?
Challenge people without proper badges.
  • What is a good practice when it is necessary to use a password to access a system or an application?
  • Which is a risk associated with removable media?
  • What is a good practice to protect data on your home wireless systems?
  • What is a good practice for physical security?
Your health insurance explanation of benefits (EOB).
  • What is the best response if you find classified government data on the internet?
  • When is the best time to post details of your vacation activities on your social networking website?
  • What is the best example of Protected Health information (PHI)?
  • Whats is the best description of two-factor authentication?
Report the crime to local law enforcement.
  • What is a valid response when identity theft occurs?
  • What is a good practice to protect data on your home wireless systems?
  • What is a good practice for physical security?
  • What is the best example of Protected Health information (PHI)?
Something you possess, like a CAC, and something you know, like a PIN or password.
  • What is the best response if you find classified government data on the internet?
  • What is the best example of Protected Health information (PHI)?
  • Whats is the best description of two-factor authentication?
  • What are the requirements to be granted access to SCI material?
Be aware of classification markings and all handling caveats.
  • Which is a risk associated with removable media?
  • Which of the following is a good practice to aid in preventing spillage?
  • What are the requirements to be granted access to SCI material?
  • which represents a security best practice when using social networking?
0 h : 0 m : 1 s

Answered Not Answered Not Visited Correct : 0 Incorrect : 0