What should the owner of this printed SCI do differently?
  • memory sticks, flash drives, or external hard drives
  • Physically assess that everyone within listening distance is cleared and has a need-to-know for the information being discussed
  • A program that segregates various type of classified information
  • Retrieve classified documents promptly from printers
What action should you take if you receive a friend request on your social networking website from someone in Germany you met casually at a conference last year?
  • Insider threat
  • Use the appropriate token for each system.
  • decline the request
  • Passport Number
When is it appropriate to have your security bade visible?
  • Use antivirus software and keep it up to date
  • At all times when in the facility
  • classified material must be appropriately marked.
  • Patching from a trusted source
Which of the following should be reported as potential security incident?
  • Use antivirus software and keep it up to date
  • Your health insurance explanation of benefits (EOB)
  • A coworker removes sensitive information without authorization
  • classified material must be appropriately marked.
Which must be approved and signed by a cognizant Original Classification Authority (OCA)?
  • Sensitive Compartment Information (SCI) policy
  • Use antivirus software and keep it up to date
  • If allowed by organizational policy
  • Use the appropriate token for each system.
What portable electronic devices (PEDs) are allowed in a secure Compartmented Information Facility (SCIF)?
  • Your health insurance explanation of benefits (EOB)
  • Government-owned PEDs, if expressly authorized by your agency.
  • connect to the Government Virtual Private Network (VPN)
  • Use the appropriate token for each system.
Which of the following is the best example of Protected Health Information (PHI)?
  • Use antivirus software and keep it up to date
  • A coworker removes sensitive information without authorization
  • classified material must be appropriately marked.
  • Your health insurance explanation of benefits (EOB)
what is required for an individual to access classified data?
  • Appropriate clearance, a signed and approved non-disclosure agreement, and need-to-know
  • Physically assess that everyone within listening distance is cleared and has a need-to-know for the information being discussed
  • Retrieve classified documents promptly from printers
  • A program that segregates various type of classified information
What is Sensitive Compartment Information (SCI) program?
  • Appropriate clearance, a signed and approved non-disclosure agreement, and need-to-know
  • Retrieve classified documents promptly from printers
  • A program that segregates various type of classified information
  • A coworker removes sensitive information without authorization
After reading an online story about a new security project being developed on the military installation where you work, your neighbor asks you to comment about the article. You know this project is classified. What should be your response?
  • Appropriate clearance, a signed and approved non-disclosure agreement, and need-to-know
  • As long as the document is cleared for public release, you may release it outside of DoD
  • attempt to change the subject to something non-work related, but neither confirm nor deny the article's authenticity.
  • Any time you participate in or condone misconduct, whether offline or online
Which of the following terms refers to someone who harms national security through authorized access to information or information systems?
  • Insider threat
  • Passport Number
  • Your health insurance explanation of benefits (EOB)
  • decline the request
A colleague has visited several foreign countries recently, has adequate work quality, speaks openly of unhappiness with U.S. foreign policy, and recently had his car repossessed. How many potential insider threat indicators does this employee display?
  • 3 or more indicators
  • Passport Number
  • decline the request
  • Insider threat
Under which circumstances may you be subject to criminal, disciplinary, and/or administrative action due to online misconduct?
  • Any time you participate in or condone misconduct, whether offline or online
  • connect to the Government Virtual Private Network (VPN)
  • No. Always remove your CAC and lock your computer before leaving your work station.
  • As long as the document is cleared for public release, you may release it outside of DoD
Which is a rule for removable media, other portable electronic devices (PEDs), and mobile computing devices to protect Government systems?
  • Sensitive Compartment Information (SCI) policy
  • Since the URL does not start with "https", do not provide your credit card information.
  • Do not use any personally owned/ non-organizational removable media on your oranizations systems
  • If allowed by organizational policy
0 h : 0 m : 1 s

Answered Not Answered Not Visited Correct : 0 Incorrect : 0