Which of the following is an appropriate use of government e-mail?
Give this one a try later!
Using a digital signature when sending attachments
Which of the following contributes to your online identity?
, Give this one a try later!
All of these
Terry sees a post on her social media feed that says there is smoke billowing from the
Pentagon...
Give this one a try later!
This is probably a post designed to attract Terr's attention to click on a link
and steal her information
You receive a phone call offering you a $50 gift card if you participate in a survey.
Which course of action should you take?
Give this one a try later!
Decline to participate in the survey. This may be a social engineering
attempt.
Which of the following statements is true of DoD Unclassified data?
Give this one a try later!
It may require access and distribution controls
Give this one a try later!
Using a digital signature when sending attachments
Which of the following contributes to your online identity?
, Give this one a try later!
All of these
Terry sees a post on her social media feed that says there is smoke billowing from the
Pentagon...
Give this one a try later!
This is probably a post designed to attract Terr's attention to click on a link
and steal her information
You receive a phone call offering you a $50 gift card if you participate in a survey.
Which course of action should you take?
Give this one a try later!
Decline to participate in the survey. This may be a social engineering
attempt.
Which of the following statements is true of DoD Unclassified data?
Give this one a try later!
It may require access and distribution controls