Which of these is NOT a potential indicator that your device may be under a malicious code attack? - answer A notification for a system update that has been publicized
Which of the following is true of Controlled Unclassified Information (CUI)? - answer It must be handled using safeguarding or dissemination controls.
Which of the following is true of working within a Sensitive Compartmented Information Facility (SCIF)? -
answer Authorized personnel who permit another individual to enter the SCIF are responsible for confirming the individual's need-to-know and access.
Carl receives an e-mail about a potential health risk caused by a common ingredient in processed food. Which of the following actions should Carl NOT take with the e-mail? - answer Forward it.
How can an adversary use information available in public records to target you? - answer Combine it with information from other data sources to learn how best to bait you with a scam.
You receive an e-mail marked important from your boss asking for data that they need immediately for a meeting starting now. The e-mail was sent from a personal e-mail address that you do not recognize, bit it addresses you by name. What concern does the e-mail pose? - answer This may be a spear phishing attempt. Contact your boss using contact information that you know to be legitimate.
Which best describes an insider threat? Someone who uses ______ access, ______, to harm national security through unauthorized disclosure, data modification, espionage, terrorism, or kinetic actions. - answer authorized; wittingly or unwittingly
Which of the following uses of removable media is allowed? - answer Government owned removable media that is approved as operationally necessary.