QUESTIONS AND ANSWERS
VERIFIED SOLUTIONS GRADED A+
◉ Martha supervises a government unit. To improve morale, she
frequently e-mails inspirational stories and photos with inspirational
quotes on them to her team. Is this an appropriate use of government
email? Answer: No. These e-mails generate unnecessary e-mail traffic.
◉ Consider this social media post. Are there any security concerns in it?
"I'm hosting a family reunion for my mom's side of the family, the
Smiths. Come by my place at 1234 Mockingbird Lane on the 8th...and
grab a slice of birthday cake for me while you're there!" Answer: Yes. It
contains several items of personally identifiable information (PII),
including the mother's maiden name, home address, and birthday.
◉ Oliver uses his phone to look up information about a jacket he might
want to purchase. Later, he notices ads for the jacket appearing on
websites that he views using his laptop. Why would he see this happen?
Answer: Oliver's apps and devices collect and share information about
him.
◉ which of the following is an example of a correct way to protect
classified data? Answer: Andrea verifies need-to-know and security
eligibility before sharing classified information.
◉ Which of the following is an example of an individual's activity that
you should report? Answer: Changing workplace behavior abruptly
, ◉ What is a Security Classification Guide? Answer: A primary source
for derivative classification
◉ Paula is compiling statistics on healthcare provided to Service
members over the last fiscal year. Some of her source data includes
Protected Health Information (PHI). How can she properly process this
data? Answer: Use a Government-issued device to access it from a
folder with controlled access.
◉ Delia processes healthcare claims for Service members. As part of her
duties, she sometimes needs to telephone team members and partner
organizations to resolve issues specific to individual claims. As she often
needs to access files and take notes on these calls, she prefers to use
speakerphone so that her hands are free. She works on-site at a
government facility in an open office environment. Does this pose a
security concern? Answer: Yes. Even in a closed work environment,
Delia should take care when discussing personally identifiable
Information (PII) where others without a need-to-know may overhear.
◉ Walter shares a link to a news article about the Department of
Defense on his social media. Along with the link, he states that he
disagrees with the reporting in the article as a DoD employee. Does this
pose a security concern? Answer: Yes. Walter should avoid appearing to
speak on behalf of the Government.