How should you protect your Common Access Card (CAC) or Personal Identity Verification (PIV) card?
  • Store it in a shielded sleeve to avoid chip cloning.
  • Avoid using non-Bluetooth-paired or unencrypted wireless computer peripherals.
  • Note any identifying information and the website's URL.
  • Avoid talking about work outside of the workplace or with people without a need-to-know
Upon connecting your Government-issued laptop to a public wireless connection, what should you immediately do?
  • Store it in a shielded sleeve to avoid chip cloning.
  • Decline so that you maintain physical contact of your Government-issued laptop.
  • Connect to the Government Virtual Private Network (VPN).
  • Note any identifying information and the website's URL.
What actions should you take upon hearing a discussion involving Sensitive Compartmented Information (SCI) while seated in a cafeteria within an SCI Facility (SCIF)?
  • Decline so that you maintain physical contact of your Government-issued laptop.
  • Avoid talking about work outside of the workplace or with people without a need-to-know
  • Remind those involved that such discussions should not take place in common area within a SCIF
  • Decline so that you maintain physical control of your Government-issued laptop
Which of the following represents a good physical security practice?
  • Sensitive information may be stored on any password-protected system.
  • A coworker removes sensitive information without authorization.
  • Use your own security badge, key code, or Common Access Card (CAC)/Personal Identity Verification (PIC) card.
  • Use antivirus software and keep it up to date.
A colleague has visited several foreign countries recently...
  • . 2 indicators
  • 3 or more indicators
  • Use antivirus software and keep it up to date.
  • Decline Request
Which of the following is NOT considered a potential insider threat indicator?
  • A coworker removes sensitive information without authorization.
  • New interest in learning a foreign language.
  • Download the information
  • Use antivirus software and keep it up to date.
What do you do if spillage occurs?
  • Both of these
  • ?
  • Its classification level may rise when aggregated.
  • They can be part of a distributed denial-of-service (DDoS) attack.
Which of the following is NOT a typical means for spreading malicious code?
  • Use antivirus software and keep it up to date.
  • Ordering a credit report annually.
  • New interest in learning a foreign language.
  • Patching from a trusted source
In addition to avoiding the temptation of greed to betray his country, what should Alex do differently?
  • Always use DoD PKI tokens within their designated classification level.
  • Avoid talking about work outside of the workplace or with people without a need-to-know
  • The potential for unauthorized viewing of work-related information displayed on your screen
  • Do not access links or hyperlinked media such as buttons and graphics in email messages.
What advantages do "insider threats" have over others that allows them to be able to do extraordinary damage to their organizations?
  • Decline so that you maintain physical control of your Government-issued laptop
  • Use TinyURL's preview feature to investigate where the link leads
  • They are trusted and have authorized access to Government information systems.
  • Remind those involved that such discussions should not take place in common area within a SCIF
Which of the following does NOT constitute spillage?
  • Classified material must be appropriately marked
  • They can be part of a distributed denial-of-service (DDoS) attack.
  • A coworker removes sensitive information without authorization.
  • Classified information that should be unclassified and is downgraded
You receive a friend request from someone in Germany that you meet casually at a conference last year?
  • Sensitive
  • Decline Request
  • . 2 indicators
  • All three sections
Is it permitted to share an unclassified draft document with a non-DoD professional discussion group?
  • Connect to the Government Virtual Private Network (VPN).
  • Do not access links or hyperlinked media such as buttons and graphics in email messages.
  • Always use DoD PKI tokens within their designated classification level.
  • As long as the document is cleared for public release, you may share it outside of DoD.
Which of the following is true of protecting classified data?
  • Use antivirus software and keep it up to date.
  • Classified material must be appropriately marked
  • Classified information that should be unclassified and is downgraded
  • Its classification level may rise when aggregated.
What is the best protection method for sharing Personally Identifiable Information (PII)?
  • Note any identifying information and the website's URL.
  • Only connect with the Government VPN
  • Maintain possession of it at all times.
  • Digitally sign and encrypt the email.
What kind of information could reasonably be expected to cause serious damage to national security in the event of unauthorized disclosure?
  • True
  • Sensitive
  • Secret
  • Alert your security point of contact.
In setting up your personal social networking service account, what email address should you use?
  • Your personal email address
  • Personal email address
  • Avoid talking about work outside of the workplace or with people without a need-to-know
  • Download the information
What is the danger of using public Wi-Fi connections?
  • Download the information
  • Disables cookies.
  • Both of these
  • Date of Birth
Which email attachments are generally SAFE to open?
  • Attachments contained in a digitally signed email from someone known
  • Sensitive information may be stored on any password-protected system.
  • They can be part of a distributed denial-of-service (DDoS) attack.
  • Molly uses a digital signature when sending attachments or hyperlinks.
While you are waiting for your lunch bill, a stranger picks up your Government-issued phone from your table and proceeds to exit the facility with it. What should you do?
  • A coworker removes sensitive information without authorization.
  • Do not access links or hyperlinked media such as buttons and graphics in email messages.
  • Always use DoD PKI tokens within their designated classification level.
  • Try to observe the direction taken and any other useful information and immediately make a report to your security point of contact.
A colleague has won 10 high-performance awards, can be playful and charming, is not currently in a relationship, and is occasionally aggressive in trying to access sensitive information. How many potential insider threat indicators does this employee display?
  • 3 or more indicators
  • I'll pass.
  • 1 indicator
  • . 2 indicators
When using your Government-issued laptop in public environments, with which of the following should you be concerned?
  • Store it in a shielded sleeve to avoid chip cloning.
  • The potential for unauthorized viewing of work-related information displayed on your screen
  • They are trusted and have authorized access to Government information systems.
  • Use the classified network for all work, including unclassified work
You receive an email from the Internal Revenue Service (IRS) demanding immediate payment of back taxes of which you were not aware. The email provides a website and a toll-free number where you can make payment. What action should you take?
  • Contact the IRS using their publicly available, official contact information.
  • Connect to the Government Virtual Private Network (VPN).
  • Use TinyURL's preview feature to investigate where the link leads
  • Decline so that you maintain physical control of your Government-issued laptop
Which of these is true of unclassified data?
  • Note any identifying information and the website's URL.
  • They can be part of a distributed denial-of-service (DDoS) attack.
  • Its classification level may rise when aggregated.
  • New interest in learning a foreign language.
Mobile devices include fitness bands, tablets, smartphones, electronic readers, and Bluetooth- enabled devices.
  • All three sections
  • True
  • Secret
  • Date of Birth
Select the appropriate setting for each item. Then select Save. [Alex Smith/Social Media]
  • Use the classified network for all work, including unclassified work
  • All three sections
  • Top and bottom sections only
  • Name and profile picture - Any (depends on personal preference)Biographical data - Friends Only; Status, photos, and posts - Friends Only;Family and relationships - Friends Only;Birthday - Friends Only;Photos and videos you are in - Friends Only;Check in location via GPS - Off
Which of the following actions is appropriate after finding classified Government information on the internet?
  • Note any identifying information and the website's URL.
  • Always use DoD PKI tokens within their designated classification level.
  • Ordering a credit report annually.
  • Use the classified network for all work, including unclassified work
Select all sections of the profile that contain an issue. Then select Submit. [Alex Smith]
  • Disables cookies.
  • All three sections
  • Date of Birth
  • Decline Request
What type of information includes personal, payroll, medical, and operational information?
  • Secret
  • Decline Request
  • Sensitive
  • Personal email address
When checking in at the airline counter for a business trip...
  • Decline so that you maintain physical contact of your Government-issued laptop.
  • As long as the document is cleared for public release, you may share it outside of DoD.
  • Molly uses a digital signature when sending attachments or hyperlinks.
  • They can be part of a distributed denial-of-service (DDoS) attack.
Which type of information includes personal, payroll, medical, and operational information?
  • Secret
  • Sensitive
  • Date of Birth
  • Use antivirus software and keep it up to date.
Under what circumstances is it acceptable to check personal email on Government-furnished equipment (GFE)?
  • Download the information
  • Digitally sign and encrypt the email.
  • If your organization allows it.
  • Alert your security point of contact.
Which of the following statements is TRUE about the use of DoD Public Key Infrastructure (PKI) tokens?
  • Use the classified network for all work, including unclassified work
  • Sensitive information may be stored on any password-protected system.
  • Note any identifying information and the website's URL.
  • Always use DoD PKI tokens within their designated classification level.
How can you protect your information when using wireless technology?
  • Molly uses a digital signature when sending attachments or hyperlinks.
  • Store it in a shielded sleeve to avoid chip cloning.
  • Avoid talking about work outside of the workplace or with people without a need-to-know
  • Avoid using non-Bluetooth-paired or unencrypted wireless computer peripherals.
Which of the following describes an appropriate use of Government email?
  • Always use DoD PKI tokens within their designated classification level.
  • Sensitive information may be stored on any password-protected system.
  • Molly uses a digital signature when sending attachments or hyperlinks.
  • May be used on an unclassified network
Which of the following is NOT an appropriate way to protect against inadvertent spillage?
  • Molly uses a digital signature when sending attachments or hyperlinks.
  • Use your own security badge, key code, or Common Access Card (CAC)/Personal Identity Verification (PIC) card.
  • Note any identifying information and the website's URL.
  • Use the classified network for all work, including unclassified work
Which of the following is true of Internet hoaxes?
  • Always use DoD PKI tokens within their designated classification level.
  • They can be part of a distributed denial-of-service (DDoS) attack.
  • Use the classified network for all work, including unclassified work
  • Use antivirus software and keep it up to date.
Which of the following is a practice that helps to prevent the download of viruses and other malicious code when checking your email?
  • Use antivirus software and keep it up to date.
  • Sensitive information may be stored on any password-protected system.
  • Do not access links or hyperlinked media such as buttons and graphics in email messages.
  • Molly uses a digital signature when sending attachments or hyperlinks.
Which of the following is a practice that helps to protect you from identity theft?
  • New interest in learning a foreign language.
  • Download the information
  • Patching from a trusted source
  • Ordering a credit report annually.
What should you do after you have ended a call from a reporter asking you to confirm potentially classified info found on the web?
  • Alert your security point of contact.
  • When you return from your vacation.
  • Maintain possession of it at all times.
  • Store it in a shielded sleeve to avoid chip cloning.
After clicking on a link on a website, a box pops up and asks if you want to run an application. Is it okay to run it?
  • No. Only allow mobile code to run from your organization or your organization's trusted sites.
  • Decline so that you maintain physical control of your Government-issued laptop
  • The potential for unauthorized viewing of work-related information displayed on your screen
  • As long as the document is cleared for public release, you may share it outside of DoD.
What is the best way to protect your Common Access Card (CAC) or Personal Identity Verification (PIV) card?
  • Ordering a credit report annually.
  • Alert your security point of contact.
  • Digitally sign and encrypt the email.
  • Maintain possession of it at all times.
Which of the following should be reported as a potential security incident?
  • A coworker removes sensitive information without authorization.
  • May be used on an unclassified network
  • Always use DoD PKI tokens within their designated classification level.
  • Classified information that should be unclassified and is downgraded
What information most likely presents a security risk on your personal social networking profile?
  • ?
  • Sensitive
  • Top Secret
  • Always use DoD PKI tokens within their designated classification level.
When checking in at the airline counter for a business trip, you are asked if you would like to check your laptop bag. This bag contains your Government-issued laptop. What should you do?
  • Use TinyURL's preview feature to investigate where the link leads
  • Decline so that you maintain physical control of your Government-issued laptop
  • They are trusted and have authorized access to Government information systems.
  • As long as the document is cleared for public release, you may share it outside of DoD.
Which of the following is the example of Personally Identifiable Information (PII)?
  • Ordering a credit report annually.
  • Date of Birth
  • Disables cookies.
  • Both of these
0 h : 0 m : 1 s

Answered Not Answered Not Visited Correct : 0 Incorrect : 0