Which of the following is a best practice for securing your home computer?
  • Follow the instructions given only by verified personnel.
  • Classified material must be appropriately marked
  • New interest in learning a foreign language
  • Use antivirus software and keep it up to date.
How many potential insider threat indicators does a person who is playful and charming, consistently wins performance awards, but is occasionally aggressive in trying to access sensitive information display?
  • It is never permitted
  • Decline the request.
  • Official use only
  • 1 indicator
When is conducting a private money-making venture using your Government-furnished computer permitted?
  • Your place of birth
  • It is never permitted
  • Medical test results
  • At all time when is the facility.
Which classified level is given to information that could reasonably be expected to cause serious damage to national security?
  • New interest in learning a foreign language
  • Passport number
  • Decline the request.
  • Secret
Which of the following is the best example of Personally Identifiable Information (PII)?
  • New interest in learning a foreign language
  • Passport number
  • Use antivirus software and keep it up to date.
  • Classified material must be appropriately marked
Is it acceptable to take a short break while a coworker monitors your computer while logged on with your Common Access Card (CAC)?
  • Connect to the Government Virtual Private Network (VPN).
  • No. Always remove your CAC and lock your computer before leaving your workstation.
  • No. Only use you agency trusted websites.
  • View email in plain text and don't view email in Preview Pane.
Which of the following does a security classification guide provided?
  • Precise guidance regarding specific elements of information to be classified
  • Follow the instructions given only by verified personnel.
  • New interest in learning a foreign language
  • Use antivirus software and keep it up to date.
Which may be a security issue with compressed URLs?
  • Precise guidance regarding specific elements of information to be classified
  • Follow the instructions given only by verified personnel.
  • Classified material must be appropriately marked
  • There is no way to know where the link actually leads.
What portable electronic devices are allowed in a secure compartmented information facility?
  • Government owned PEDs if expressed authorized by your agency
  • View email in plain text and don't view email in Preview Pane.
  • Refer the reporter to your organization's public affair office
  • Difficult life circumstances such as substance abuse, divided loyalty or allegiance to the U.S., and extreme, persistent interpersonal difficulties.
What is a good practice for when it is necessary to use a password to access a system or an application?
  • At all time when is the facility.
  • View email in plain text and don't view email in Preview Pane.
  • Avoid using the same password between systems or applications.
  • Connect to the Government Virtual Private Network (VPN).
What are some actions you can take to try to protect you identity?
  • There is no way to know where the link actually leads.
  • Precise guidance regarding specific elements of information to be classified
  • Shred personal documents, never share passwords and order a credit history annually.
  • Memory sticks, flash drives, or external hard drives.
What is the best way to protect your common access card?
  • Maintain possession of it at all times.
  • Classified material must be appropriately marked
  • Use antivirus software and keep it up to date.
  • New interest in learning a foreign language
What is a way to prevent the download of viruses and other malicious code when checking your email?
  • Avoid using the same password between systems or applications.
  • Call your security point of contact immediately.
  • View email in plain text and don't view email in Preview Pane.
  • Your place of birth
What should you do when you are working on an unclassified system and receive an email with a classified attachment?
  • Call your security point of contact immediately.
  • View email in plain text and don't view email in Preview Pane.
  • Decline the request.
  • No. Only use you agency trusted websites.
Spillage: What should you do if a reporter asks you about potentially classified information on the web?
  • Refer the reporter to your organization's public affair office
  • View email in plain text and don't view email in Preview Pane.
  • Avoid using the same password between systems or applications.
  • Connect to the Government Virtual Private Network (VPN).
What are some potential insider threat indicators?
  • Difficult life circumstances such as substance abuse, divided loyalty or allegiance to the U.S., and extreme, persistent interpersonal difficulties.
  • Shred personal documents, never share passwords and order a credit history annually.
  • Government owned PEDs if expressed authorized by your agency
  • Refer the reporter to your organization's public affair office
Which of the following is a way to protect against social engineering?
  • Use antivirus software and keep it up to date.
  • Classified material must be appropriately marked
  • New interest in learning a foreign language
  • Follow the instructions given only by verified personnel.
0 h : 0 m : 1 s

Answered Not Answered Not Visited Correct : 0 Incorrect : 0