2024-2025 |COMPLETE QUESTIONS AND CORRECT ANSWERS
(VERIFIED ANSWERS ) A GRADE.
Henry is working from a USDA office. He has several tasks to perform
today: 1) he logs onto his USDA computer to get started; 2) he faxes a
sensitive document to his supervisor using a fax machine with the
appropriate clearance; 3) he confirms some appointments and project
due dates and enters them into his smart phone; and 4) he calls his
supervisor on his cell phone to review the document he just faxed
over. Which of Henry's actions was a mistake? - ANSWER-Using a cell
phone to discuss sensitive information.
What is a way you can protect yourself against internal threats?
A. Keep an inventory of all equipment assigned to you
B. Do not install or use unauthorized software or hardware on the
network
C. When possible, use physical locking devices for computing
resources
D. Contact your supervisor or security personnel if you observe
suspicious activity
E. All of the above - ANSWER-E. All of the above
Edna wants to create a strong password. She should avoid all of the
following EXCEPT: - ANSWER-B. Special characters
, For Official Use Only (FOUO) and Controlled Unclassified Information
(CUI) may include all of the following EXCEPT: - ANSWER-A. Secret
information
Ken received an unencrypted email from a colleague named Barbie
that contained a driver's license image of an individual requesting
assistance. Is this considered PII? - ANSWER-A. Yes
Within the context of information systems, an insider threat is any
person without legitimate physical or administrative access to an
information system who can misuse or exploit its weaknesses. -
ANSWER-A. FALSE
Agnes wants to make sure she knows which steps to take to avoid
spillage. You advise Agnes to do all of the following EXCEPT: -
ANSWER-B. Store classified data on her Smart Phone when traveling.
Jacob collects movies. He found a way to get movies at no cost using
a service where he shares his computer's content with other users. He
sets up his work computer to use this service. This is an example of
the following vulnerability: - ANSWER-C. Peer-to-peer technology
Which of the following will help reduce your risk of identity theft when
engaging in e-commerce? - ANSWER-C. Confirm the site you are
using uses an encrypted link.