Questions with Correct Solutions
Updated 2025/2026||100% Guaranteed
Pass| A+ GRADED!!<<NEWEST
VERSION>>
Which of the following is NOT a best practice for teleworking in an environment
where Internet of Things (IoT) devices are present? - ANSWER ✓ Use the devices'
default security settings
Which of the following is permitted when using an unclassified laptop within a
collateral classified space? - ANSWER ✓ A government-issued WIRED headset
with microphone
You receive an e-mail with a link to schedule a time to update software on your
government furnished laptop. Your IT department has not scheduled software
updates like this in the past and has not announced this software update. The e-mail
is not digitally signed. What action should you take? - ANSWER ✓ Report the e-
mail to your security POC or help desk
How can you protect your home computer? - ANSWER ✓ Turn on the password
feature
Which of the following is a best practice to protect your identity? - ANSWER ✓
Order a credit report annually
What does the Common Access Card (CAC) contain? - ANSWER ✓ Certificates
for identification, encryption, and digital signature
Mabel is a government employee who needs to share a document containing
contractor proprietary information with her supervisor. Which of the following
describes the most appropriate way for Mabel to do this? - ANSWER ✓ Encrypt it
and send it via digitally signed Government e-mail.
, Which of the following is NOT an appropriate use of your Common Access Card
(CAC)? - ANSWER ✓ Using it as photo identification with a commercial entity
Tom is working on a report that contains employees' names, home addresses, and
salary. Which of the following is Tom prohibited from doing with the report? -
ANSWER ✓ Using his home computer to print the report while teleworking
What conditions are necessary to be granted access to Sensitive Compartmented
Information (SCI)? - ANSWER ✓ Top Secret clearance and indoctrination into the
SCI program
After reading an online story about a new security project being developed on the
military installation where you work, your neighbor asks you to comment about the
article. You know that this project is classified. How should you respond? -
ANSWER ✓ Attempt to change the subject to something non-work related, but
neither confirm nor deny the article's authenticity
Which of the following may help to prevent spillage? - ANSWER ✓ Label all
files, removable media, and subject headers with appropriate classification
markings.
A user writes down details marked as Secret from a report stored on a classified
system and uses those details to draft a briefing on an unclassified system without
authorization. What is the best choice to describe what has occurred? - ANSWER
✓ Spillage because classified data was moved to a lower classification level system
without authorization.
What should you do when you are working on an unclassified system and receive
an email with a classified attachment? - ANSWER ✓ Call your security point of
contact immediately
What should you do if a reporter asks you about potentially classified information
on the web? - ANSWER ✓ Ask for information about the website, including the
URL.
What should you do if a reporter asks you about potentially classified information
on the web? - ANSWER ✓ Refer the reporter to your organization's public affairs
office.
, What should you do if you suspect spillage has occurred? - ANSWER ✓
Immediately notify your security point of contact
Which of the following is a good practice to prevent spillage? - ANSWER ✓ Be
aware of classification markings and all handling caveats.
Which of the following actions is appropriate after finding classified information
on the Internet? - ANSWER ✓ Note any identifying information and the website's
Uniform Resource Locator (URL)
Which of the following may help to prevent spillage?
-Verify that any government equipment used for processing classified information
has valid anti-virus software before connecting it to the internet
-Follow procedures for transferring data to and from outside agency and non-
Government networks
-Purge the memory of any device removed from a classified network before
connecting it to an unclassified network
-Process all data at the highest classification or protection level available, including
unclassified data - ANSWER ✓ ~Verify that any government equipment used for
processing classified information has valid anti-virus software before connecting it
to the internet (wrong)
~Follow procedures for transferring data to and from outside agency and non-
Government networks
You find information that you know to be classified on the Internet. What should
you do? - ANSWER ✓ ~Note the website's URL and report the situation to your
security point of contact
When classified data is not in use, how can you protect it? - ANSWER ✓ Store
classified data appropriately in a GSA-approved vault/container.
What is required for an individual to access classified data? - ANSWER ✓
Appropriate clearance, a signed and approved non-disclosure agreement, and need-
to-know