EXAM QUESTIONS AND ALL CORRECT
ANSWERS 100% SOLVED AND
GUARANTEED SUCCESS!!
What conditions are necessary to be granted access to Sensitive Compartmented
Information (SCI)? - 🧠 ANSWER ✔✔Top Secret clearance and indoctrination into
the SCI program
Which of the following is permitted when using an unclassified laptop within a
collateral classified space? - 🧠 ANSWER ✔✔A Government-issued wired headset
with microphone
Which of the following is an authoritative source for derivative classification? - 🧠
ANSWER ✔✔Security Classification Guide
Carl receives an e-mail about a potential health risk caused by a common
ingredient in processed food. Which of the following actions should Carl NOT take
with the e-mail? - 🧠 ANSWER ✔✔Forward it
, How can an adversary use information available in public records to target you? - 🧠
ANSWER ✔✔Combine it with information from other data sources to learn how
best to bait you with a scam
Which of the following is an appropriate use of government e-mail? - 🧠 ANSWER
✔✔Using a digital signature when sending attachments
Which of the following is NOT a best practice for protecting data on a mobile
device? - 🧠 ANSWER ✔✔Disable automatic screen locking after a period of
inactivity
Annabeth becomes aware that a conversation with a co-worker that involved
Sensitive Compartmented Information (SCI) may have been overheard by someone
who does not have the required clearance. What action should Annabeth take? - 🧠
ANSWER ✔✔Contact her security POC to report the incident.
On your home computer, how can you best establish passwords when creating
separate user accounts? - 🧠 ANSWER ✔✔Have each user create their own, strong
password
Which of the following is an allowed use of government furnished equipment
(GFE)? - 🧠 ANSWER ✔✔Checking personal e-mail if your organization allows it