A coworker brings a personal electronic device into prohibited areas.
  • Which of the following is NOT considered a potential insider threat indicator?
  • Which of the following is NOT an appropriate way to protect against inadvertent spillage?
  • Which of the following is NOT true of traveling overseas with a mobile phone?
  • Which of the following should be reported as a potential security incident (in accordance with your Agency's insider threat policy)?
Use a single, complex password for your system and application logons.
  • Which of the following is NOT a good way to protect your identity?
  • Which of the following represents a good physical security practice?
  • Which of the following is an example of Protected Health Information (PHI)?
  • Which of the following is NOT an appropriate way to protect against inadvertent spillage?
Decline so that you maintain physical control of your Government-issued laptop.
  • What is a critical consideration on using cloud-based file sharing and storage applications on your Government-furnished equipment (GFE)?
  • What action should you take if you receive a friend request on your social networking website from someone in Germany you met casually at a conference last year?
  • When checking in at the airline counter for a business trip, you are asked if you would like to check your laptop bag. This bag contains your Government-issued laptop. What should you do?
  • Which of the following should be reported as a potential security incident (in accordance with your Agency's insider threat policy)?
Download the information.
  • Which of the following should you NOT do if you find classified information on the internet?
  • Which of the following is NOT true concerning a computer labeled SECRET?
  • Which of the following is NOT considered a potential insider threat indicator?
  • Which of the following is NOT an appropriate way to protect against inadvertent spillage?
Avoid talking about work outside of the workplace or with people without a need-to-know.
  • What should you do if a reporter asks you about potentially classified information on the web?
  • Which of the following statements is TRUE about the use of DoD Public Key Infrastructure (PKI) tokens?
  • How can you protect your information when using wireless technology?
  • In addition to avoiding the temptation of greed to betray his country, what should Alex do differently?
Classified material must be appropriately marked.
  • Which of the following is NOT an example of sensitive information?
  • Which of the following is NOT true concerning a computer labeled SECRET?
  • Which of the following is NOT considered a potential insider threat indicator?
  • Which of the following is true of protecting classified data?
Since the URL does not start with "https," do not provide your credit card information.
  • While you are registering for a conference, you arrive at the website http://www.dcsecurityconference.org/registration/. The website requires a credit card for registration. What should you do?
  • Which of the following should be reported as a potential security incident (in accordance with your Agency's insider threat policy)?
  • When checking in at the airline counter for a business trip, you are asked if you would like to check your laptop bag. This bag contains your Government-issued laptop. What should you do?
  • After clicking on a link on a website, a box pops up and asks if you want to run an application. Is it okay to run it?
You must have your organization's permission to telework.
  • Which of the following does NOT constitute spillage?
  • Which of the following is true about telework?
  • Which of the following is true of protecting classified data?
  • Which of the following is NOT a good way to protect your identity?
No. Only allow mobile code to run from organization or your organization's trusted sites.
  • When checking in at the airline counter for a business trip, you are asked if you would like to check your laptop bag. This bag contains your Government-issued laptop. What should you do?
  • In addition to avoiding the temptation of greed to betray his country, what should Alex do differently?
  • After clicking on a link on a website, a box pops up and asks if you want to run an application. Is it okay to run it?
  • A coworker wants to send you a sensitive document to review while you are at lunch and you only have your personal tablet. What should you do?
Physical security of mobile phones carried overseas is not a major issue.
  • Which of the following is NOT true of traveling overseas with a mobile phone?
  • Which of the following is NOT considered a potential insider threat indicator?
  • Which of the following is NOT an appropriate way to protect against inadvertent spillage?
  • Which of the following is an example of Protected Health Information (PHI)?
Neither confirm nor deny the information is classified.
  • Which of the following is NOT an appropriate way to protect against inadvertent spillage?
  • What should you do if a reporter asks you about potentially classified information on the web?
  • What should you do when you are working on an unclassified system and receive an email with a classified attachment?
  • Which of the following is NOT considered a potential insider threat indicator?
Only persons with appropriate clearance, a non-disclosure agreement, and need-to-know.
  • Who can be permitted access to classified data?
  • Which of the following represents a good physical security practice?
  • Which of the following does NOT constitute spillage?
  • While you are registering for a conference, you arrive at the website http://www.dcsecurityconference.org/registration/. The website requires a credit card for registration. What should you do?
May be used on an unclassified network.
  • Which of the following is true of protecting classified data?
  • Which of the following is NOT true concerning a computer labeled SECRET?
  • Which of the following is NOT considered a potential insider threat indicator?
  • Which of the following statements is TRUE about the use of DoD Public Key Infrastructure (PKI) tokens?
Always use DoD PKI tokens within their designated classification level.
  • Which of the following is NOT true of traveling overseas with a mobile phone?
  • Which of the following is NOT true concerning a computer labeled SECRET?
  • Which of the following statements is TRUE about the use of DoD Public Key Infrastructure (PKI) tokens?
  • Which of the following is an example of Protected Health Information (PHI)?
Classified information that should be unclassified and downgraded.
  • Which of the following statements is TRUE about the use of DoD Public Key Infrastructure (PKI) tokens?
  • Which of the following does NOT constitute spillage?
  • Which of the following is true about telework?
  • Which of the following is true of protecting classified data?
Determine if the software or service is authorized.
  • What action should you take if you receive a friend request on your social networking website from someone in Germany you met casually at a conference last year?
  • What is a critical consideration on using cloud-based file sharing and storage applications on your Government-furnished equipment (GFE)?
  • What should you do when you are working on an unclassified system and receive an email with a classified attachment?
  • When checking in at the airline counter for a business trip, you are asked if you would like to check your laptop bag. This bag contains your Government-issued laptop. What should you do?
Three or more
  • Which of the following is NOT an example of sensitive information?
  • Which of the following is the best example of Personally Identifiable Information (PPI)?
  • How can you protect your information when using wireless technology?
  • How many insider threat indicators does Alex demonstrate?
Explanation of benefits from a health insurance company.
  • Which of the following is NOT considered a potential insider threat indicator?
  • Which of the following is an example of Protected Health Information (PHI)?
  • Which of the following is NOT true concerning a computer labeled SECRET?
  • Which of the following is NOT true of traveling overseas with a mobile phone?
Exceptionally Grave Damage
  • Which of the following should you NOT do if you find classified information on the internet?
  • Which level of damage to national security can you reasonably expect Top Secret information to cause if disclosed?
  • You receive a call from someone from the help desk who needs your assistance with a problem on your computer. How should you respond?
  • Which of the following is an example of Protected Health Information (PHI)?
Press release date
  • Which of the following is NOT true concerning a computer labeled SECRET?
  • Which of the following is NOT an example of sensitive information?
  • Which of the following is NOT a good way to protect your identity?
  • Which of the following is true of protecting classified data?
Use your own security badge, key code, or Common Access Card (CAC)/Personal Identity Verification (PIV) card.
  • Which of the following is an example of Protected Health Information (PHI)?
  • Which of the following is NOT an appropriate way to protect against inadvertent spillage?
  • Which of the following is NOT true of traveling overseas with a mobile phone?
  • Which of the following represents a good physical security practice?
0 h : 0 m : 1 s

Answered Not Answered Not Visited Correct : 0 Incorrect : 0