What conditions are necessary to be granted access to Sensitive Compartmented Information (SCI)? - CORRECT ANSWER Top Secret clearance and indoctrination into the SCI program
Which of the following is permitted when using an unclassified laptop within a collateral classified space? - CORRECT ANSWER A Government-issued wired headset with microphone
Which of the following is an authoritative source for derivative classification? - CORRECT ANSWER Security Classification Guide
Carl receives an e-mail about a potential health risk caused by a common ingredient in processed food. Which of the following actions should Carl NOT take with the e-mail? - CORRECT ANSWER Forward it
How can an adversary use information available in public records to target you? - CORRECT ANSWER Combine it with information from other data sources to learn how best to bait you with a scam
Which of the following is an appropriate use of government e-mail? - CORRECT ANSWER Using a digital signature when sending attachments
Which of the following is NOT a best practice for protecting data on a mobile device? - CORRECT ANSWER Disable automatic screen locking after a period of inactivity
Annabeth becomes aware that a conversation with a co-worker that involved Sensitive Compartmented Information (SCI) may have been overheard by someone who does not have the required clearance. What action should Annabeth take? - CORRECT ANSWER Contact her security POC to report the incident.
On your home computer, how can you best establish passwords when creating separate user accounts? - CORRECT ANSWER Have each user create their own, strong password