![]() Which of the following is an example of removable media? Which of the following is an example of near field communication (NFC)?Ī smartphone that transmits credit card payment information when held in proximity to a credit card reader. What is a critical consideration on using cloud-based file sharing and storage applications on your Government-furnished equipment (GFE)?ĭetermine if the software or service is authorized Which of the following is a concern when using your Government-issued laptop in public? Investigate the link’s actual destination using the preview feature What action should you take with an e-mail from a friend containing a compressed Uniform Resource Locator (URL)? How can you protect yourself from social engineering?įollow instructions given only by verified personnel Use online sites to confirm or expose potential hoaxes How can you protect yourself from internet hoaxes? You should only accept cookies from reputable, trusted websites. Which of the following statements is true of cookies? Which of the following is NOT a way malicious code spreads? Identify and disclose it with local Configuration/Change Management Control and Property Management authorities What action should you take when using removable media in a Sensitive Compartmented Information Facility (SCIF)? When is it appropriate to have your security badge visible within a sensitive compartmented information facility (SCIF)? Mark SCI documents appropriately and use an approved SCI fax machine. When faxing Sensitive Compartmented Information (SCI), what actions should you take? Which of the following is an example of a strong password? Identification, encryption, and digital signature What certificates does the Common Access Card (CAC) or Personal Identity Verification (PIV) card contain? Within a secure area, you see an individual who you do not know and is not wearing a visible badgeĪsk the individual to see an identification badge. Select the information on the data sheet that is protected health information (PHI) Select the information on the data sheet that is personally identifiable information (PII) But not protected health information (PHI) Sensitive information may be stored on any password-protected system. Which of the following is NOT a correct way to protect CUI? Which of the following is NOT an example of CUI? Understanding and using the available privacy settings. Which of the following is a security best practice when using social networking sites? When is the safest time to post details of your vacation activities on your social networking profile?Īfter you have returned home following the vacation. If you participate in or condone it at any time. When may you be subject to criminal, disciplinary, and/or administrative action due to online misconduct? ![]() New interest in learning a foregin language. Which of the following is NOT considered a potential insider threat indicator? They may wittingly or unwittingly use their authorized access to perform actions that result in the loss or degradation of resources or capabilities. What threat do insiders with authorized access to information or information systems pose? What is a good practice to protect classified information?Įnsure proper labeling by appropriately marking all classified material and, when required, sensitive material.īased on the description below how many potential insider threat indicators are present? A colleague often makes others uneasy by being persistent in trying to obtain information about classified projects to which he has no access, is boisterous about his wife putting them in credit card debt, and often complains about anxiety and exhaustion display? Which type of information could reasonably be expected to cause serious damage to national security if disclosed without authorization? Label all files, removable media, and subject headers with appropriate classification markings. Which of the following may be helpful to prevent spillage?īe aware of classification markings and all handling caveats.
0 Comments
Leave a Reply. |