SIMPLE | TRUSTED TEST SOLUTIONS!
How can you protect your home computer? Answer: Turn on the password feature
Carl receives an e-mail about a potential health risk... Answer: Forward it
Which of the following is an appropriate use of government e-mail? Answer: Using
a digital signature when sending attachments
Sylvia commutes to work via public transportation. She often uses... Answer: Yes.
Eavesdroppers may be listening to Sylvia's phone calls, and shoulder surfers may be
looking at her screen.
Which of the following is true of transmitting or transporting SCI? Answer: Printed
SCI must be retrieved promptly from the printer
What conditions are necessary to be granted access to SCI? Answer: Top Secret
clearance and indoctrination into the SCI program
Terry sees a post on her social media feed that says there is smoke billowing from
the Pentagon... Answer: This is probably a post designed to attract Terr's attention
to click on a link and steal her information
Which of the following statements about PHI is false? Answer: It is created or
received by a healthcare provider, health plan, or employer of a business associate
of these.
Which of the following is NOT a best practice for protecting your home wireless
network for telework? Answer: Use your router's pre-set SSID and password
Beth taps her phone at a payment terminal to pay for a purchase. Does this pose a
security risk? Answer: Yes, there is a risk that the signal could be intercepted and
altered
1
APPHIA - Crafted with Care and Precision for Academic Excellence.