and Complete Solutions/Verified Answers |Latest
Update 2-24-2025
How can you protect your home computer? - ANSWER Turn on the password
feature
Carl receives an e-mail about a potential health risk... - ANSWER Forward it
Which of the following is an appropriate use of government e-mail? - ANSWER
Using a digital signature when sending attachments
Sylvia commutes to work via public transportation. She often uses... - ANSWER
Yes. Eavesdroppers may be listening to Sylvia's phone calls, and shoulder surfers
may be looking at her screen.
Which of the following is true of transmitting or transporting SCI? - ANSWER
Printed SCI must be retrieved promptly from the printer
What conditions are necessary to be granted access to SCI? - ANSWER Top Secret
clearance and indoctrination into the SCI program
Terry sees a post on her social media feed that says there is smoke billowing from
the Pentagon... - ANSWER This is probably a post designed to attract Terr's
attention to click on a link and steal her information
, Which of the following statements about PHI is false? - ANSWER It is created or
received by a healthcare provider, health plan, or employer of a business
associate of these.
Which of the following is NOT a best practice for protecting your home wireless
network for telework? - ANSWER Use your router's pre-set SSID and password
Beth taps her phone at a payment terminal to pay for a purchase. Does this pose
a security risk? - ANSWER Yes, there is a risk that the signal could be intercepted
and altered
How can you prevent viruses and malicious code? - ANSWER Scan all external files
before uploading to your computer
Which of the following is an example of behavior that you should report? -
ANSWER Taking sensitive information home for telework without authorization
You receive a text message from a package shipper notifying you that your
package delivery is delayed due to needing updated delivery instructions from
you. - ANSWER Delete the message
Which of the following is an appropriate use of a DoD PKI token? - ANSWER Do
not use a token approved for NIPR on SIPR
Which of the following is a best practice when browsing the internet? - ANSWER
Only accept cookies from reputable, trusted websites