Questions and Answers
Updated Latest (Verified Answers)
1. A vendor conducting a pilot program with your organization contacts you for organizati
g g g g g g g g g g g g
onal data to use in a prototype. How should you respond
g g g g g g g g g g
ANSWER Refer the vendor to the appropriate personnel.
g g g g g g g
2. When classified data is not in use, how can you protect it
g g g g g g g g g g g g
ANSWER Store classified data appropriately in a GSA-approved vault/container.
g g g g g g g g
3. What is the basis for handling and storage of classified data
g g g g g g g g g g
ANSWER Classification markings and handling caveats.
g g g g g
4. Which of the following must you do before using an unclassified laptop and peripherals i
g g g g g g g g g g g g g g
n a collateral classified environment
g g g g
ANSWER Ensure that any cameras, microphones, and Wi-
g g g g g g g
Fi embedded in the laptop are physically disabled.
g g g g g g g
5. What level of damage to national security can you reasonably expect Top secret infor
g g g g g g g g g g g g g
mation to cause if disclosed
g g g g
ANSWER Exceptionally grave damage.
g g g
6. Which of the following is true about telework
g g g g g g g
1g/g1
4
, ANSWER You must have your organiza- tion's permission to telework.
g g g g g g g g g
7. Which of the following is true of protecting classified data?
g g g g g g g g g
ANSWERClassified ma- terial must be appropriately marked. g g g g g g
8. Which of the following is a reportable insider threat activity
g g g g g g g g g
ANSWER Attempting to access sensitive information without need-to-know.
g g g g g g g
9. Which scenario might indicate a reportable insider threat
g g g g g g g
ANSWER a colleague removes sensitive information without seeking authorization in or
g g g g g g g g g g
der to perform authorized telework.
g g g g
10. Which of the following is a potential insider threat indicator
g g g g g g g g g
ANSWER 1) Unusual interest in classified information. 2) Difficult life circumstances, such
g g g g g g g g g g g g
as death of spouse.
g g g
11. Which piece of information is safest to include on your social media profile
g g g g g g g g g g g g
ANSWER Your favorite movie.g g g
12. Which of the following statements is true
g g g g g g
ANSWER Many apps and smart devices collect and share your personal information and c
g g g g g g g g g g g g g
ontribute to your online identity.
g g g g
13. How can you protect your organization on social networking sites
g g g g g g g g g
ANSWER Ensure there are no identifiable landmarks visible in any photos taken in a work sett
g g g g g g g g g g g g g g g
2g/g1
4