Sensitive information may be store on any password-protected system
  • Which of the following is NOT a correct way to protect sensitive information?
  • Which of the following is not a constitutional spillage?
  • Which of the following is NOT an appropriate way to protect against inadvertent spillage?
  • Which of the following demonstrates proper protection of mobile devices?
Only connect, exposure of malware
  • What should the participants in this conversation involving SCI do directly?
  • What should the owner of this printed SCI do differently?
  • What portable electronic device (ped's) are permitted in a SCIF
  • What should Sara do when using publicly available internet, such as hotel WI-FI?
ALL OF THE ABOVEcorrupting files, erasing your hard drive, allowing hackers access
  • How can malicious code caused damage?
  • What is the response to an incident such as opening an uncontrolled DVD on a computer in a SCIF?
  • How can you avoid downloading malicious code?
  • What should Alex's colleagues do?
Do not access website links en e-mail messages
  • Which of the following is true about telework?
  • When is it appropriate to have your security badge visible?
  • What is the danger of using public WI-FI connections?
  • How can you avoid downloading malicious code?
Physically assess that everyone within listening distance is cleared and has a need-to-know for the information being discussed
  • What should the owner of this printed SCI do differently?
  • What should Sara do when using publicly available internet, such as hotel WI-FI?
  • What should Alex's colleagues do?
  • What should the participants in this conversation involving SCI do directly?
delete buttondelete buttonreport button
  • What should the owner of this printed SCI do differently?
  • What portable electronic device (ped's) are permitted in a SCIF
  • Books linkYesterday2 days ago (required profile update)
  • Antivirus AlertUpdate StatusFirewall StatusVirus Alert
ALL OF THE ABOVE-notify your security POC-analyze the media for viruses or malicious code-analyze the other workstations in the SCIF for viruses or malicious code
  • Which of the following is NOT an appropriate way to protect against inadvertent spillage?
  • What is the response to an incident such as opening an uncontrolled DVD on a computer in a SCIF?
  • Which of the following should you NOT do if you find classified information on the internet?
  • What is the danger of using public WI-FI connections?
Linda encrypts all of the sensitive data on her government-issued mobile devices
  • Which of the following demonstrates proper protection of mobile devices?
  • Which of the following is NOT an appropriate way to protect against inadvertent spillage?
  • Which of the following is NOT a correct way to protect sensitive information?
  • Which of the following is an example of malicious code?
Pick the one without social security number
  • What portable electronic device (ped's) are permitted in a SCIF
  • PII but not PHI?
  • What should the owner of this printed SCI do differently?
  • PHI Protected
-click update-click install-click enable-click exit
  • What is the danger of using public WI-FI connections?
  • What should the owner of this printed SCI do differently?
  • Which of the following is true of protecting classified data?
  • Antivirus AlertUpdate StatusFirewall StatusVirus Alert
Exceptionally grave damage
  • When is it okay to charge a personal mobile device using government-furnished equipment (GFE)
  • What level of damage to national security can you reasonably expect Top Secret information to cause if disclosed?
  • What should Sara do when using publicly available internet, such as hotel WI-FI?
  • Which of the following should you NOT do if you find classified information on the internet?
Only expressly authorized government-owned ped's
  • What is the danger of using public WI-FI connections?
  • What should the owner of this printed SCI do differently?
  • What portable electronic device (ped's) are permitted in a SCIF
  • What should Sara do when using publicly available internet, such as hotel WI-FI?
this is never okay
  • When is it appropriate to have your security badge visible?
  • Which of the following should you NOT do if you find classified information on the internet?
  • When is it okay to charge a personal mobile device using government-furnished equipment (GFE)
  • Which of the following is NOT an example of sensitive information?
Avoid talking questions of potential work outside of the workplace or with people without a need-to-know
  • Which of the following is NOT a correct way to protect sensitive information?
  • In addition to avoiding the temptation of green to betray his country, what would Alex do differently?
  • What should the participants in this conversation involving SCI do directly?
  • What is the response to an incident such as opening an uncontrolled DVD on a computer in a SCIF?
Classified material must be appropriate marked
  • Which of the following is true of protecting classified data?
  • Which of the following is not a constitutional spillage?
  • Which of the following is an example of malicious code?
  • Which of the following is NOT a correct way to protect sensitive information?
Software that install itself without the user's knowledge
  • Which of the following is true about telework?
  • Which of the following is an example of malicious code?
  • Which of the following is not a constitutional spillage?
  • Which of the following is true of protecting classified data?
You must have your organization's permission to telework
  • Which of the following is true about telework?
  • Which of the following is an example of malicious code?
  • Which of the following is not a constitutional spillage?
  • Which of the following is true of protecting classified data?
Classified information that should be unclassified and is downgraded
  • Which of the following is NOT a correct way to protect sensitive information?
  • Which of the following is true of protecting classified data?
  • Which of the following is not a constitutional spillage?
  • Which of the following is an example of malicious code?
Computer and CAC, pin on the board, finger prints and biometrics, DOD token, CAC/PIV
  • PHI Protected
  • PII but not PHI?
  • What should Alex's colleagues do?
  • Security Violations
BOTH OF THESE-compromise of data-exposure of malware
  • Which of the following is true about telework?
  • What should the owner of this printed SCI do differently?
  • Which of the following is an example of malicious code?
  • What is the danger of using public WI-FI connections?
Three or mroe
  • NOT permitted uses of government-furnished equip (GFE)
  • Books linkYesterday2 days ago (required profile update)
  • How many insider threat indicates does Alex demonstrate?
  • Which of the following is NOT an example of sensitive information?
0 h : 0 m : 1 s

Answered Not Answered Not Visited Correct : 0 Incorrect : 0