Questions with Correct Solutions
Updated 2025/2026||100%
Guaranteed Pass| A+
GRADED!!<<NEWEST VERSION>>
What certificates are contained on the DoD Public Key Infrastructure (PKI)
implemented by the Common Access Card (CAC)/Personal Identity Verification
(PIV) card? - ANSWER ✓ Identification, encryption, and digital signature
Which must be approved and signed by a cognizant Original Classification
Authority (OCA)? - ANSWER ✓ Security Classification Guide (SCG)
What describes how Sensitive Compartmented Information is marked? -
ANSWER ✓ Approved Security Classification Guide (SCG)
Which is a risk associated with removable media? - ANSWER ✓ Spillage of
classified information.
What is an indication that malicious code is running on your system? - ANSWER
✓ File corruption
What is a valid response when identity theft occurs? - ANSWER ✓ Report the
crime to local law enforcement.
What is whaling? - ANSWER ✓ A type of phishing targeted at high-level
personnel such as senior officials.
What is a best practice while traveling with mobile computing devices? -
ANSWER ✓ Maintain possession of your laptop and other government-furnished
equipment (GFE) at all times.
, Under what circumstances is it acceptable to use your Government-furnished
computer to check personal e-mail and do other non-work-related activities? -
ANSWER ✓ If allowed by organizational policy
Which of the following helps protect data on your personal mobile devices? -
ANSWER ✓ Secure personal mobile devices to the same level as Government-
issued systems.
What is a best practice to protect data on your mobile computing device? -
ANSWER ✓ Lock your device screen when not in use and require a password to
reactivate.
What is a possible indication of a malicious code attack in progress? - ANSWER
✓ A pop-up window that flashes and warns that your computer is infected with a
virus.
What does "spillage" refer to? - ANSWER ✓ Information improperly moved from
a higher protection level to a lower protection level
What level of damage can the unauthorized disclosure of information classified as
Top Secret reasonably be expected to cause? - ANSWER ✓ Exceptionally grave
damage to national security
Which of the following is true about telework? - ANSWER ✓ You must have
your organization's permission to telework.
Which of the following is true of protecting classified data? - ANSWER ✓
Classified material must be appropriately marked.
Based on the description that follows, how many potential insider threat
indicator(s) are displayed? A colleague abruptly becomes hostile and unpleasant
after previously enjoying positive working relationships with peers, purchases an
unusually expensive new car, and has unexplained absences from work. -
ANSWER ✓ 3 or more indicators
Which of the following is a potential insider threat indicator? - ANSWER ✓
Unusual interest in classified information