ANSWERS
A vendor conducting a pilot program with your organization contacts you for organizational data
to use in a prototype. How should you respond? - CORRECT ANSWER✅✅✅Refer the
vendor to the appropriate personnel.
When classified data is not in use, how can you protect it? - CORRECT
ANSWER✅✅✅Store classified data appropriately in a GSA-approved vault/container.
What is the basis for handling and storage of classified data? - CORRECT
ANSWER✅✅✅Classification markings and handling caveats.
Which of the following must you do before using an unclassified laptop and peripherals in a
collateral classified environment? - CORRECT ANSWER✅✅✅Ensure that any cameras,
microphones, and Wi-Fi embedded in the laptop are physically disabled.
What level of damage to national security can you reasonably expect Top secret information to
cause if disclosed? - CORRECT ANSWER✅✅✅Exceptionally grave damage.
Which of the following is true about telework? - CORRECT ANSWER✅✅✅You must have
your organization's permission to telework.
Which of the following is true of protecting classified data? - CORRECT
ANSWER✅✅✅Classified material must be appropriately marked.
Which of the following is a reportable insider threat activity? - CORRECT
ANSWER✅✅✅Attempting to access sensitive information without need-to-know.
Which scenario might indicate a reportable insider threat? - CORRECT ANSWER✅✅✅a
colleague removes sensitive information without seeking authorization in order to perform
authorized telework.
, Which of the following is a potential insider threat indicator? - CORRECT
ANSWER✅✅✅1) Unusual interest in classified information. 2) Difficult life circumstances,
such as death of spouse.
Which piece of information is safest to include on your social media profile? - CORRECT
ANSWER✅✅✅Your favorite movie.
Which of the following statements is true? - CORRECT ANSWER✅✅✅Many apps and
smart devices collect and share your personal information and contribute to your online identity.
How can you protect your organization on social networking sites? - CORRECT
ANSWER✅✅✅Ensure there are no identifiable landmarks visible in any photos taken in a
work setting that you post.
Which is a best practice for protecting Controlled Unclassified Information (CUI)? - CORRECT
ANSWER✅✅✅Store it in a locked desk drawer after working hours.
Which of the following best describes a way to safely transmit Controlled Unclassified
Information (CUI)? - CORRECT ANSWER✅✅✅Paul verifies that the information is CUI,
includes a CUI marking in the subject header, and digitally signs an e-mail containing CUI.
Which designation includes Personally Identifiable Information (PII) and Protected Health
Information (PHI)? - CORRECT ANSWER✅✅✅Controlled Unclassified Information (CUI)
Which of the following is NOT an example of CUI? - CORRECT ANSWER✅✅✅Press
release data.
Which of the following is NOT a correct way to protect CUI? - CORRECT
ANSWER✅✅✅CUI may be stored on any password-protected system.