What type of activity or behavior should be reported as a potential insider threat?
  • It displays a label showing maximum classification, date of creation, point of contact, and Change Management (CM Control Number.
  • Maintain possession of your laptop and other government-furnished equipment (GFE) at all times.
  • Coworker making consistent statements indicative of hostility or anger toward the United States and its policies.
  • Shred personal documents, never share passwords and order a credit history annually.
Sensitive Information: Which of the following is an example of Protected Health Information (PHI)?
  • Official use only
  • Decline the request.
  • Your personal email address/addresses
  • Medical test results
Upon connecting your government-issued laptop to a public wireless connection, what should you immediately do?
  • As long as the document is cleared for public release, you may share it outside of DoD.
  • Connect to the Government Virtual Private Network (VPN).
  • Ask the caller, "What's your full name and phone number?"
  • If aggregated, the information could become classified.
When is the safest time to post details of your vacation activities on your social networking website?
  • When your vacation is over, after you have returned home
  • View email in plain text and don't view email in Preview Pane.
  • Call your security point of contact immediately.
  • Something you possess like a CAC, and a Pin or Password
Which of the following is NOT a correct way to protect sensitive information?
  • New interest in learning a foreign language
  • Sensitive information may be stored on any password-protected system.
  • Digitally signing e-mails that contain attachments or hyperlinks.
  • Follow the instructions given only by verified personnel.
What information posted publicly on your personal social networking profile represents a security risk?
  • Your place of birth
  • It is never permitted
  • Official use only
  • View email in plain text and don't view email in Preview Pane.
What is the best practice while traveling with mobile computing devices?
  • Maintain possession of it at all times.
  • Create separate user accounts with strong individual passwords.
  • Maintain possession of your laptop and other government-furnished equipment (GFE) at all times.
  • Shred personal documents, never share passwords and order a credit history annually.
How many the Cyberspace Protection Conditions (CPCON) are there?
  • 5
  • Maintain possession of it at all times.
  • Digitally signing e-mails that contain attachments or hyperlinks.
  • Classified material must be appropriately marked
Under what circumstances is it acceptable to use your Government-furnished computer to check personal e-mail and do other non-work-related activities?
  • If aggregated, the information could become classified.
  • If allowed by organizational policy.
  • At all time when is the facility.
  • No. Only use you agency trusted websites.
What must users ensure when using removable media such as a compact disk (CD)?
  • Store classified data appropriately in a GSA-approved vault/container.
  • Shred personal documents, never share passwords and order a credit history annually.
  • It displays a label showing maximum classification, date of creation, point of contact, and Change Management (CM Control Number.
  • Coworker making consistent statements indicative of hostility or anger toward the United States and its policies.
Which of the following is the best description of two-factor authentication?
  • Something you possess like a CAC, and a Pin or Password
  • Use antivirus software and keep it up to date.
  • Classified material must be appropriately marked
  • Precise guidance regarding specific elements of information to be classified
You receive a call from someone from the help desk who needs your assistance with a problem on your computer. How should you respond?
  • Decline to lend the man your phone.
  • Retrieve classified documents promptly from printers.
  • As long as the document is cleared for public release, you may share it outside of DoD.
  • Ask the caller, "What's your full name and phone number?"
What is a security best practice to employ on your home computer?
  • Create separate user accounts with strong individual passwords.
  • View e-mail in plain text and don't view e-mail in Preview Pane.
  • View email in plain text and don't view email in Preview Pane.
  • Precise guidance regarding specific elements of information to be classified
A man you do not know is trying to look at your Government-issued phone and has asked to use it. What should you do?
  • Decline to lend the man your phone.
  • Connect to the Government Virtual Private Network (VPN).
  • At all time when is the facility.
  • Call your security point of contact immediately.
What is a way to prevent the download of viruses and other malicious code when checking your e-mail?
  • Create separate user accounts with strong individual passwords.
  • View e-mail in plain text and don't view e-mail in Preview Pane.
  • Avoid using the same password between systems or applications.
  • View email in plain text and don't view email in Preview Pane.
Malicious code:After clicking on a link on a website, a box pops up and asks if you want to run an application. Is it ok to run it?
  • Decline to lend the man your phone.
  • Call your security point of contact immediately.
  • If allowed by organizational policy.
  • No. Only use you agency trusted websites.
Which of the following terms refers to someone who harms national security through authorized access to information system?
  • New interest in learning a foreign language
  • Decline the request.
  • Sensitive information may be stored on any password-protected system.
  • Insider Threat
What is the best way to protect your Common Access Card (CAC)?
  • Patching from a trusted source
  • Something you possess like a CAC, and a Pin or Password
  • Maintain possession of it at all times.
  • Create separate user accounts with strong individual passwords.
What should you do if you receive a game application request that includes permission to access your friends, profile information, cookies, and sites visited?
  • Official use only
  • Decline the request.
  • It is never permitted
  • Decline to lend the man your phone.
When classified data is not in use, how can you protect it?
  • Shred personal documents, never share passwords and order a credit history annually.
  • Digitally signing e-mails that contain attachments or hyperlinks.
  • Create separate user accounts with strong individual passwords.
  • Store classified data appropriately in a GSA-approved vault/container.
When is it appropriate to have your securing badge visible with a sensitive compartmented information facility?
  • View email in plain text and don't view email in Preview Pane.
  • At all time when is the facility.
  • Avoid using the same password between systems or applications.
  • It is never permitted
What actions should you take when printing classified material within a Sensitive Compartmented Information Facility (SCIF)?
  • Remind those involved that such a discussion should not take place in common areas within a SCIF.
  • Retrieve classified documents promptly from printers.
  • When your vacation is over, after you have returned home
  • Ask the caller, "What's your full name and phone number?"
0 h : 0 m : 1 s

Answered Not Answered Not Visited Correct : 0 Incorrect : 0