Which of the following is true of spillage? - Answers It refers specifically to classified information that
becomes publicly available.
Which of the following is a risk associated with removable media? - Answers All of these
How can an adversary use information available in public records to target you? - Answers Combine it
with information from other data sources to learn how best to bait you with a scam
Which best describes an insider threat? Someone who uses _______ access, _______, to harm national
security through unauthorized disclosure, data modification, espionage, terrorism, or kinetic actions. -
Answers authorized; wittingly or unwittingly
Under which Cyberspace Protection Condition (CPCON) is the priority focus limited to critical and
essential functions? - Answers CPCON 2
Sylvia commutes to work via public transportation. She often uses the time to get a head start on work
by making phone calls or responding to e-mails on her government approved mobile device. Does this
pose a security concern? - Answers Yes. Eavesdroppers may be listening to Sylvia's phone calls, and
shoulder surfers may be looking at her screen. Sylvia should be aware of these risks.
Which of the following is true of Sensitive Compartmented Information Facilities (SCIFs)? - Answers
Personnel must position monitors so that they do not face windows or close the window blinds.
Which of the following is an example of behavior that uou should report? - Answers Taking sensitive
information home for teleowrk without authorization
Which of the following is an example of a good password? - Answers d+Uf_4RimUz
How should government owned removable media be stored? - Answers In a GSA-approved container
according to the appropriate security classification
On your home computer, how can you best establish passwords when creating separate user accounts?
- Answers Have each user create their own, strong password
Which of the following personally owned peripherals can you use with government furnished
equipment? - Answers A Bluetooth headset
How can you mitigate the potential risk associated with a compressed URL (e.g., TinyURL, goo.gl) -
Answers Use the preview function to see where the link actually leads
Beth taps her phone at a payment terminal to pay for a purchase. Does this pose a security risk? -
Answers Yes, there is a risk that the signal could be intercepted or altered.
Which of the following is true of telework? - Answers You must have permission from your organization
to telework