COMPLETE QUESTIONS AND ANSWERS | 100% RATED CORRECT | 100% VERFIED |
ALREADY GRADED A+
1. How can you protect your home computer?: Turn on the password feature
2. Carl receives an e-mail about a potential health risk...: Forward it
3. Which of the following is an appropriate use of government e-mail?: Using
a digital signature when sending attachments
4. Sylvia commutes to work via public transportation. She often uses...: Yes.
Eavesdroppers may be listening to Sylvia's phone calls, and shoulder surfers
may be looking at her screen.
5. Which of the following is true of transmitting or transporting SCI?: Printed
SCI must be retrieved promptly from the printer
6. What conditions are necessary to be granted access to SCI?: Top Secret
clearance and indoctrination into the SCI program
7. Terry sees a post on her social media feed that says there is smoke
billowing from the Pentagon...: This is probably a post designed to attract
Terr's attention to click on a link and steal her information
,8. Which of the following statements about PHI is false?: It is created or
received by a healthcare provider, health plan, or employer of a business
associate of these. 9. Which of the following is NOT a best practice for
protecting your home wireless network for telework?: Use your router's pre-
set SSID and password 10. Beth taps her phone at a payment terminal to
pay for a purchase. Does this pose a security risk?: Yes, there is a risk that
the signal could be intercepted and altered
11. How can you prevent viruses and malicious code?: Scan all external files
before uploading to your computer
12. Which of the following is an example of behavior that you should
report?-
: Taking sensitive information home for telework without authorization
13. You receive a text message from a package shipper notifying you that
your package delivery is delayed due to needing updated delivery
instructions from you.: Delete the message
14. Which of the following is an appropriate use of a DoD PKI token?: Do not
use a token approved for NIPR on SIPR
15. Which of the following is a best practice when browsing the internet?:
Only accept cookies from reputable, trusted websites
,16. Where are you permitted to use classified data?: Only in areas with
security appropriate to the classification level
17. Which of the following contributes to your online identity?: All of these
18. How can you protect your home computer?: Regularly back up your files
19. Which of the following statements is true of DoD Unclassified data?:
It may require access and distribution controls
20. Which of the following is NOT a way that malicious code can spread?:
Running a virus scan
21. What is the goal of an Insider Threat Program?: Deter, detect, and
mitigate 22. Which of the following uses of removable media is allowed?:
Government owned removable media that is approved as operationally necessary
23. Which of the following is permitted when using an unclassified laptop
within a collateral classified space?: A government-issued WIRED headset
with microphone
24. When is the safest time to post on social media about your vacation
plans?: After the trip
25. Which of the following is NOT an appropriate use of your CAC?: Using it
as photo identification with a commercial entity
, 26. Which of the following is NOT a best practice for traveling overseas
with a mobile device?: **Do not travel with a mobile device if you can avoid it**
wrong 27. Which of the following is true of spillage?: It refers specifically to
classified information that becomes publicly available.
28. Which of the following is permitted within a Sensitive Compartmented
Information Facility (SCIF)?: An authorized Government-owned Portable
Electronic Device (PED)
29. You receive a phone call offering you a $50 gift card if you participate in
a survey. Which course of action should you take?: Decline to participate
in the survey. This may be a social engineering attempt.
30. How should government owned removable media be stored?: In a GSA-
approved container according to the appropriate security classification.
31. Which of the following is a best practice for using government email?:
Do not send mass e-mails.
32. Which of the following is a best practice for physical security?: Use your
own security badge or key code for facility access.
33. Which of the following is least likely to pose a risk to share on a social
networking site?: Your pet's name
34. How can you protect your home computer?: Regularly back up your files.