Complete Solutions 2025
How ,many ,potential ,insider ,threat ,indicators ,does ,a ,person ,who ,is ,married ,with
,two ,children, ,vacations ,at ,the ,beach ,every ,year, ,is ,pleasant ,to ,work ,with, ,but
,sometimes ,has ,poor ,work ,quality ,display? ,- ,CORRECT ,ANSWER-0 ,indicators
What ,is ,the ,best ,response ,if ,you ,find ,classified ,government ,data ,on ,the
,internet? ,- ,CORRECT ,ANSWER-Note ,any ,identifying ,information, ,such ,as ,the
,website's ,URL, ,and ,report ,the ,situation ,to ,your ,security ,POC.
After ,reading ,an ,online ,story ,about ,a ,new ,security ,project ,being ,developed ,on
,the ,military ,installation ,where ,you ,work, ,your ,neighbor ,asks ,you ,to ,comment
,about ,the ,article. ,You ,know ,this ,project ,is ,classified. ,What ,should ,be ,your
,response? ,- ,CORRECT ,ANSWER-Attempt ,to ,change ,the ,subject ,to ,something
,non-work ,related, ,but ,neither ,confirm ,nor ,deny ,the ,article's ,authenticity.
What ,is ,a ,proper ,response ,if ,spillage ,occurs? ,- ,CORRECT ,ANSWER-
Immediately ,notify ,your ,security ,POC.
What ,should ,you ,do ,if ,a ,reporter ,asks ,you ,about ,potentially ,classified
,information ,on ,the ,web? ,- ,CORRECT ,ANSWER-Ask ,for ,information ,about ,the
,website, ,including ,the ,URL.
A ,user ,writes ,down ,details ,from ,a ,report ,stored ,on ,a ,classified ,system ,marked
,as ,Secret ,and ,uses ,those ,details ,to ,draft ,an ,unclassified ,briefing ,on ,an
,unclassified ,system ,without ,authorization. ,What ,is ,the ,best ,choice ,to ,describe
,what ,has ,occurred? ,- ,CORRECT ,ANSWER-Spillage ,because ,classified ,data ,was
,moved ,to ,a ,lower ,classification ,level ,system ,without ,authorization.
How ,many ,potential ,insider ,threat ,indicators ,does ,a ,coworker ,who ,often ,makes
,others ,uneasy ,by ,being ,persistent ,in ,trying ,to ,obtain ,information ,about
,classified ,projects ,to ,which ,he ,has ,no ,access, ,is ,boisterous ,about ,his ,wife
,putting ,them ,in ,credit ,card ,debt, ,and ,often ,complains ,about ,anxiety ,and
,exhaustion ,display? ,- ,CORRECT ,ANSWER-3 ,or ,more ,indicators
Which ,of ,the ,following ,can ,an ,unauthorized ,disclosure ,of ,information ,classified
,as ,Confidential ,reasonably ,be ,expected ,to ,cause? ,- ,CORRECT ,ANSWER-
Damage ,to ,national ,security
, Which ,classification ,level ,is ,given ,to ,information ,that ,could ,reasonably ,be
,expected ,to ,cause ,serious ,damage ,to ,national ,security? ,- ,CORRECT ,ANSWER-
Secret
When ,classified ,data ,is ,not ,in ,use, ,how ,can ,you ,protect ,it? ,- ,CORRECT
,ANSWER-Store ,classified ,data ,appropriately ,in ,a ,GSA-approved ,vault/container
,when ,not ,in ,use.
Which ,is ,a ,good ,practice ,to ,protect ,classified ,information? ,- ,CORRECT
,ANSWER-Ensure ,proper ,labeling ,by ,appropriately ,marking ,all ,classified
,material ,and, ,when ,required, ,sensitive ,material.
-OR-
Don't ,assume ,open ,storage ,in ,a ,secure ,facility ,is ,authorized.
Which ,of ,the ,following ,is ,a ,good ,practice ,to ,aid ,in ,preventing ,spillage? ,-
,CORRECT ,ANSWER-Be ,aware ,of ,classification ,markings ,and ,all ,handling
,caveats.
What ,is ,required ,for ,an ,individual ,to ,access ,classified ,data? ,- ,CORRECT
,ANSWER-Appropriate ,clearance; ,signed ,and ,approved ,non-disclosure
,agreement; ,and ,need-to-know.
What ,type ,of ,activity ,or ,behavior ,should ,be ,reported ,as ,a ,potential ,insider
,threat? ,- ,CORRECT ,ANSWER-Coworker ,making ,consistent ,statements
,indicative ,of ,hostility ,or ,anger ,toward ,the ,United ,States ,and ,its ,policies.
Which ,of ,the ,following ,practices ,reduces ,the ,chance ,of ,becoming ,a ,target ,by
,adversaries ,seeking ,insider ,information? ,- ,CORRECT ,ANSWER-Don't ,talk ,about
,work ,outside ,your ,workspace ,unless ,it ,is ,a ,specifically ,designated ,public
,meeting ,environment ,and ,is ,controlled ,by ,the ,event ,planners.
Which ,scenario ,might ,indicate ,a ,reportable ,insider ,threat ,security ,incident? ,-
,CORRECT ,ANSWER-A ,coworker ,is ,observed ,using ,a ,personal ,electronic ,device
,in ,an ,area ,where ,their ,use ,is ,prohibited.
Why ,might ,"insiders" ,be ,able ,to ,cause ,damage ,to ,their ,organizations ,more
,easily ,than ,others? ,- ,CORRECT ,ANSWER-Insiders ,are ,given ,a ,level ,of ,trust ,and
,have ,authorized ,access ,to ,Government ,information ,systems.
Which ,of ,the ,following ,is ,a ,best ,practice ,to ,protect ,information ,about ,you ,and
,your ,organization ,on ,social ,networking ,sites ,and ,applications? ,- ,CORRECT
,ANSWER-Use ,only ,personal ,contact ,information ,when ,establishing ,personal
,social ,networking ,accounts, ,never ,use ,Government ,contact ,information.