100% Verified Answers.
How can you protect your home computer? correct answers Turn on the password feature
Carl receives an e-mail about a potential health risk... correct answers Forward it
Which of the following is an appropriate use of government e-mail? correct answers Using a
digital signature when sending attachments
Sylvia commutes to work via public transportation. She often uses... correct answers Yes.
Eavesdroppers may be listening to Sylvia's phone calls, and shoulder surfers may be looking at
her screen.
Which of the following is true of transmitting or transporting SCI? correct answers Printed SCI
must be retrieved promptly from the printer
What conditions are necessary to be granted access to SCI? correct answers Top Secret clearance
and indoctrination into the SCI program
Terry sees a post on her social media feed that says there is smoke billowing from the Pentagon...
correct answers This is probably a post designed to attract Terr's attention to click on a link and
steal her information
Which of the following statements about PHI is false? correct answers It is created or received
by a healthcare provider, health plan, or employer of a business associate of these.
Which of the following is NOT a best practice for protecting your home wireless network for
telework? correct answers Use your router's pre-set SSID and password
Beth taps her phone at a payment terminal to pay for a purchase. Does this pose a security risk?
correct answers Yes, there is a risk that the signal could be intercepted and altered
How can you prevent viruses and malicious code? correct answers Scan all external files before
uploading to your computer
Which of the following is an example of behavior that you should report? correct answers
Taking sensitive information home for telework without authorization
You receive a text message from a package shipper notifying you that your package delivery is
delayed due to needing updated delivery instructions from you. correct answers Delete the
message
Which of the following is an appropriate use of a DoD PKI token? correct answers Do not use a
token approved for NIPR on SIPR