EXAM LATEST 2025 WITH QUESTIONS AND CORRECT
VERIFIED ANSWERS GRADED A+
Edna wants to create a strong password. She should avoid all of the following EXCEPT: - CORRECT
ANSWERS-B. Special characters
A file with which of the following file extensions is most likely to contain malicious code? -
CORRECT ANSWERS-D. .bat
All of the following are principles essential to a secure information system EXCEPT: - CORRECT
ANSWERS-B. Accountability
Cookies contain information about you. This information, if not encrypted, could be viewed by a third
party. The best practice to prevent this from happening is: - CORRECT ANSWERS-D. Ensure
your browser is set to not accept cookies.
For Official Use Only (FOUO) and Controlled Unclassified Information (CUI) may include all of the
following EXCEPT: - CORRECT ANSWERS-A. Secret information
Ken received an unencrypted email from a colleague named Barbie that contained a driver's license
image of an individual requesting assistance. Is this considered PII? - CORRECT ANSWERS-A.
Yes
Within the context of information systems, an insider threat is any person without legitimate physical or
administrative access to an information system who can misuse or exploit its weaknesses. -
CORRECT ANSWERS-A. FALSE
Agnes wants to make sure she knows which steps to take to avoid spillage. You advise Agnes to do all of
the following EXCEPT: - CORRECT ANSWERS-B. Store classified data on her Smart Phone when
traveling.