CHALLENGE KNOWLEDGE CHECK
QUESTIONS & UPDATED CORRECT
ANSWERS
What risk is posed by Internet of Things (IoT) devices? - Correct Answer ✔✔ Their
connectivity can be exploited as an attack vector to any other device on the same
network.
Which of the following is an example of Protected Health Information (PHI)? - Correct
Answer ✔✔ An individual's medical records maintained by a healthcare provider.
What is a risk to Government systems posed by removable media? - Correct Answer
✔✔ Their data storage and ability to connect to systems can lead to unintended
transfers of information, such as introduction of malicious code or spillage.
How can you protect your home computer? - Correct Answer ✔✔ Scan files for viruses.
Trisha receives an e-mail with a sensational rumor about a celebrity's personal life.
Which of the following actions should Trisha NOT take with the e-mail? - Correct
Answer ✔✔ Forward it
While scrolling your social media feed, you are presented with a news article with an
incendiary headline accompanied by a video. What should you consider before sharing
this article? - Correct Answer ✔✔ You should consider the source and whether this
information appears elsewhere.
Oscar is on official Government travel with a Government-issued laptop. While at the
airport he uses the laptop to work on a report containing controlled unclassified
information (CUI). For connectivity, he uses his personal phone as a mobile hotspot.
Are there any security concerns? - Correct Answer ✔✔ Yes. He should be vigilant for
"shoulder surfing," where others may be able to view the information on his screen.
Which of the following is an example of a correct way to protect classified data? -
Correct Answer ✔✔ Andrea verifies need-to-know and security eligibility before sharing
classified information.
How can you identify the separation of Sensitive Compartmented Information (SCI)
classified material from collateral classified material? - Correct Answer ✔✔ Markings
that identify the compartment with which it is affiliated.