Which of the following is a best practice when browsing the internet - (correct
Answer) - look for https in the URL name
Which of the following is an allowed use of government furnished equipment -
(correct Answer) - emailing your supervisor
how do you protect data on a mobile device - (correct Answer) - use 2 factor
authentification
which of the following is true of transmitting or transporing SCI - (correct
Answer) - you must be courier briefed for sci to transport it
which of the following poses a security risk while teleworking in an environemtn
where IOT devides are present - (correct Answer) - all of these
how can you prevent viruses and malicious code - (correct Answer) - scan all email
attachments
example of removable media - (correct Answer) - compact disc
which of the following is a best practice to protect your identity - (correct
Answer) - ask how information will be used before giving it out
Which of these is not a potential indicator that your device may be under malicious
code attack - (correct Answer) - operating system update
how can you protect your home computer - (correct Answer) - install spyware
protection software
Which of the following is permitted within a sensitive compartmented information
facility SCIF? - (correct Answer) - An authorized Government-owned Portable
Electronic Device (PED)
Type of data could reasonably be expected to cause damage to national security? -
(correct Answer) - Top Secret
example of a strong password - (correct Answer) - bBrobr@791*p
Which of the following is true of working within a sensitive compartmented
information facility SCIF - (correct Answer) - badges must be worn while in the
facility and removed when leaving the facility
which of the following statements is true of DoD unclassified data? - (correct
Answer) - It does not have potential to damage national security
as you scroll through your social media feed, a news headline catches your eye.
What should you consider before sharing it - (correct Answer) - whether source is
credible and reliable
how can you protect yourself from identity theft? - (correct Answer) - review your
credit report annually
steve occasionally runs errands during virtual meetings. He joins the meeting using
his approved government device. does this pose a security concern? - (correct
Answer) - yes, eavesdroppers may be listening to steves conversation
how can you protect your home computer? - (correct Answer) - use legitament known
antivirus software
which of the following is not an appropriate use of your cac? - (correct Answer) -
exchaning for a visitor pass in another building
which of the following is true of removable media and portable electronic devices -
(correct Answer) - risks associated with them may lead to loss of life
you receive a phone call from a unknown person asking for a directory name on your
government furnished laptop so that a software update can be made, which course of
action? - (correct Answer) - document the interaction, contact security POC
how can you protect yourself on social networking sites - (correct Answer) -
validate connection requests through another source
John receives an email about a potential shutdown of a major social service unless
a petition receives enough signatures, what action should john not take - (correct
Answer) - forward it
what is an insider threat - (correct Answer) - Someone who uses authorized access,
wittingly or unwittingly, to harm national security