How can you protect your home computer? - ANSWER-Turn on the
password feature
Carl receives an e-mail about a potential health risk... -
ANSWER-Forward it
Which of the following is an appropriate use of government e-mail?
- ANSWER-Using a digital signature when sending attachments
Sylvia commutes to work via public transportation. She often
uses... - ANSWER-Yes. Eavesdroppers may be listening to Sylvia's
phone calls, and shoulder surfers may be looking at her screen.
Which of the following is true of transmitting or transporting SCI? -
ANSWER-Printed SCI must be retrieved promptly from the printer
What conditions are necessary to be granted access to SCI? -
ANSWER-Top Secret clearance and indoctrination into the SCI
program
Terry sees a post on her social media feed that says there is
smoke billowing from the Pentagon... - ANSWER-This is probably a
post designed to attract Terr's attention to click on a link and steal
her information
, Which of the following statements about PHI is false? - ANSWER-It
is created or received by a healthcare provider, health plan, or
employer of a business associate of these.
Which of the following is NOT a best practice for protecting your
home wireless network for telework? - ANSWER-Use your router's
pre-set SSID and password
Beth taps her phone at a payment terminal to pay for a purchase.
Does this pose a security risk? - ANSWER-Yes, there is a risk that
the signal could be intercepted and altered
How can you prevent viruses and malicious code? - ANSWER-Scan
all external files before uploading to your computer
Which of the following is an example of behavior that you should
report? - ANSWER-Taking sensitive information home for telework
without authorization
You receive a text message from a package shipper notifying you
that your package delivery is delayed due to needing updated
delivery instructions from you. - ANSWER-Delete the message
Which of the following is an appropriate use of a DoD PKI token? -
ANSWER-Do not use a token approved for NIPR on SIPR