(Knowledge Pre-Check) Questions &
Answers
1.Which of the following is a best practice for managing connection
requests on social networking sites?
Answer Validate connection requests through another source if possible
2.which of the following is an authoritative source for derivative
classifica- tion?
Answer Security Classification Guide
3.Which of the following is a step you should NOT take to protect against
spillage?
Answer Purge any device's memory before connecting it to a classified
1/
7
, network?
4.Which best describes an insider threat? Someone who uses access,
, to harm national security through unauthorized disclosure, data modi-
fication, espionage, terrorism, or kinetic actions.
Answer authorized, wittingly or unwit- tingly
5.Which of the following is NOT a best practice for teleworking in an envi-
ronment where Internet of Things (IoT) devices are present?
Answer Use the devices' default security settings
6.Which of the following is a best practice for using government e-mail?
Answer Do not send mass e-mails
7.How can you mitigate the potential risk associated with a compressed
2/
7