Which of the following can an unauthorised disclosure of information classified as Confidential reasonably be expected to cause?
  • Use personal information to help creat strong passwords.
  • Damage to national security.
  • protection priorities.
  • Completing your expense report for your government travel.
Which of the following helps protect data on your personal mobile device?
  • Secure personal mobile devices to the same level as government issues systems
  • When unclassified data is aggregated, Its classification level may rise.
  • Follow instructions given only by verified personnel?
  • Use personal information to help creat strong passwords.
What must users do when using removable media within a Sensitive Compartmented Information Facility (SCIF)?
  • Comply with site Configuration/Change Management (CM) policies and procedures.
  • The potential for unauthorised viewing of work-related information displayed on your screen.
  • View e-mail in plain text and dont view e-mail in Preview Pane.
  • Completing your expense report for your government travel.
Which classification level is given to information that could reasonably be expected to cause serious damage to national security?
  • Damage to national security.
  • Secret
  • protection priorities.
  • A coworker brings a personal electronic device into a prohibited area.
While you are registering for a conference, you arrive at the website http://www.dcsecurityconference.org/registration/. The website requires a credit card for registration. What should you do?
  • Try to observe the direction taken and any other useful info and immediately make a report to your security point of contact.
  • Since the URL does not start with "https," do not provide your credit card information.
  • A coworker brings a personal electronic device into a prohibited area.
  • A person who does not have the required clearance or access caveats comes into possession of SCI in any manner.
Which of the following does Cyberspace Protection Conditions (CPCON) establish during significant cyberspace events?
  • protection priorities.
  • Completing your expense report for your government travel.
  • Damage to national security.
  • A coworker brings a personal electronic device into a prohibited area.
Which of the following activities is an ethical use of Government-furnished equipment (GFE)?
  • Follow instructions given only by verified personnel?
  • Completing your expense report for your government travel.
  • Use personal information to help creat strong passwords.
  • Sudden interest in learning a new language.
Which of the following best describes the compromise of Sensitive Compartmented Information (SCI)?
  • Use personal information to help creat strong passwords.
  • Compromise.
  • Since the URL does not start with "https," do not provide your credit card information.
  • A person who does not have the required clearance or access caveats comes into possession of SCI in any manner.
What certificates are contained in the Common Access Card (CAC)
  • Follow instructions given only by verified personnel?
  • Ensure that the wireless security features are properly configured.
  • File corruption.
  • Identification, encryption, and digital signature.
Which of the following is true about unclassified data?
  • When unclassified data is aggregated, Its classification level may rise.
  • Secure personal mobile devices to the same level as government issues systems
  • Sudden interest in learning a new language.
  • Use personal information to help creat strong passwords.
0 h : 0 m : 1 s

Answered Not Answered Not Visited Correct : 0 Incorrect : 0