Which of the following is not a constitutional spillage? - ANS Classified information that should
be unclassified and is downgraded
Which of the following is NOT an appropriate way to protect against inadvertent spillage? - ANS
Use the classified network for all work, including unclassified work
Which of the following should you NOT do if you find classified information on the internet? -
ANS Download the information
Which of the following is NOT an example of sensitive information? - ANS Press release date
Which of the following is NOT a correct way to protect sensitive information? - ANS Sensitive
information may be store on any password-protected system
PII but not PHI? - ANS Pick the one with social security number
PHI Protected - ANS Pick the one without social security number
Which of the following is an example of malicious code? - ANS Software that install itself
without the user's knowledge
How can malicious code caused damage? - ANS ALL OF THE ABOVE
corrupting files, erasing your hard drive, allowing hackers access
How can you avoid downloading malicious code? - ANS Do not access website links en e-mail
messages
What level of damage to national security can you reasonably expect Top Secret information to
cause if disclosed? - ANS Exceptionally grave damage
Which of the following is true about telework? - ANS You must have your organization's
permission to telework
Which of the following is true of protecting classified data? - ANS Classified material must be
appropriate marked
In addition to avoiding the temptation of green to betray his country, what would Alex do
differently? - ANS Avoid talking questions of potential work outside of the workplace or with
people without a need-to-know
How many insider threat indicates does Alex demonstrate? - ANS Three or mroe
, What should Alex's colleagues do? - ANS Report the suspicious behavior in accordance with
their organization's insider threat policy
What should the employee do differently? - ANS Remove his CAC and lock his workstation
What should the employee do differently? - ANS Decline to let the person in and redirect her to
security
Security Violations - ANS Computer and CAC, pin on the board, finger prints and biometrics,
DOD token, CAC/PIV
When is it appropriate to have your security badge visible? - ANS At all times when in the
facility
What should the owner of this printed SCI do differently? - ANS Retrieve classified documents
promptly from printers
What should the participants in this conversation involving SCI do directly? - ANS Physically
assess that everyone within listening distance is cleared and has a need-to-know for the
information being discussed
What portable electronic device (ped's) are permitted in a SCIF - ANS Only expressly
authorized government-owned ped's
What is the response to an incident such as opening an uncontrolled DVD on a computer in a
SCIF? - ANS ALL OF THE ABOVE
-notify your security POC
-analyze the media for viruses or malicious code
-analyze the other workstations in the SCIF for viruses or malicious code
Books link
Yesterday
2 days ago (required profile update) - ANS delete button
delete button
report button
What should Sara do when using publicly available internet, such as hotel WI-FI? - ANS Only
connect, exposure of malware
What is the danger of using public WI-FI connections? - ANS BOTH OF THESE
-compromise of data
-exposure of malware