It is getting late on Friday. You are reviewing your employees annual self evaluation. Your
comments are due on Monday. You can email your employees information to yourself so you
can work on it this weekend and go home now. Which method would be the BEST way to send
this information? - ANS Use the government email system so you can encrypt the information
and open the email on your government issued laptop
What should you do if someone asks to use your government issued mobile device
(phone/laptop..etc)? - ANS Decline to lend your phone / laptop
Where should you store PII / PHI? - ANS Information should be secured in a cabinet or
container while not in use
Of the following, which is NOT an intelligence community mandate for passwords? - ANS
Maximum password age of 45 days
Which of the following is NOT Government computer misuse? - ANS Checking work email
Which is NOT a telework guideline? - ANS Taking classified documents from your workspace
What should you do if someone forgets their access badge (physical access)? - ANS Alert the
security office
What can you do to protect yourself against phishing? - ANS All of the above
What should you do to protect classified data? - ANS Answer 1 and 2 are correct
What action is recommended when somebody calls you to inquire about your work environment
or specific account information? - ANS Ask them to verify their name and office number
If classified information were released, which classification level would result in "Exceptionally
grave damage to national security"? - ANS Top Secret
Which of the following is NOT considered sensitive information? - ANS Sanitized information
gathered from personnel records
Which of the following is NOT a criterion used to grant an individual access to classified data? -
ANS Senior government personnel, military or civilian
Of the following, which is NOT a problem or concern of an Internet hoax? - ANS Directing you
to a website that looks real
, Media containing Privacy Act information, PII, and PHI is not required to be labeled. - ANS
FALSE
Which of the following is NOT a home security best practice? - ANS Setting weekly time for
virus scan when you are not on the computer and it is powered off
Which of the following best describes wireless technology? - ANS It is inherently not a secure
technology
You are leaving the building where you work. What should you do? - ANS Remove your
security badge
Which of the following is a good practice to avoid email viruses? - ANS Delete email from
senders you do not know
What is considered a mobile computing device and therefore shouldn't be plugged in to your
Government computer? - ANS All of the above
Which is NOT a way to protect removable media? - ANS As a best practice, labeling all
classified removable media and considering all unlabeled removable media as unclassified
What is NOT Personally Identifiable Information (PII)? - ANS Hobby
Of the following, which is NOT a method to protect sensitive information? - ANS After work
hours, storing sensitive information in unlocked containers, desks, or cabinets if security is not
present
There are many travel tips for mobile computing. Which of the following is NOT one? - ANS
When using a public device with a card reader, only use your DoD CAC to access unclassified
information
The use of webmail is - ANS is only allowed if the organization permits it
What is considered ethical use of the Government email system? - ANS Distributing Company
newsletter
Which of the following attacks target high ranking officials and executives? - ANS Whaling
What constitutes a strong password? - ANS all of the above
You are logged on to your unclassified computer and just received an encrypted email from a
co-worker. The email has an attachment whose name contains the word "secret". What should
you do? - ANS Contact your security POC right away