Accurate Real Exam Questions and Verified
Correct Answers JUST RELEASED
**Social Networking
Which of the following information is a security risk when posted publicly on your social
networking profile? - answer>>>Your mother's maiden name
**Social Networking
Your cousin posted a link to an article with an incendiary headline on social media. What action
should you take? - answer>>>Research the source of the article to evaluate its credibility and
reliability
**Social Networking
Which of the following best describes the sources that contribute to your online identity? -
answer>>>Data about you collected from all sites, apps, and devices that you use can be
aggregated to form a profile of you.
**Social Networking
As someone who works with classified information, what should you do if you are contacted by a
foreign national seeking information on a research project? - answer>>>Inform your security point
of contact
**Social Networking
-How can you protect your organization on social networking sites? - answer>>>Ensure there are
no identifiable landmarks visible in any photos taken in a work setting that you post
**Social Networking
When may you be subject to criminal, disciplinary, and/or administrative action due to online
harassment, bullying, stalking, hazing, discrimination, or retaliation? - answer>>>If you participate
in or condone it at any time
**Social Networking
Which of the following statements is true? - answer>>>Adversaries exploit social networking sites
to disseminate fake news
**Social Networking
,How can you protect yourself on social networking sites?
-Turn on Global Positioning System (GPS) location geotagging
-Connect with people you don't know only if share mutual connections
-Delete posts containing personal information on a regular basis
-Validate friend request through another source before confirming them - answer>>>Validate
friend request through another source before confirming them
*Controlled Unclassified Information
Which of the following is NOT an example of CUI? - answer>>>Press release data
*Controlled Unclassified Information
Which of the following is NOT a correct way to protect CUI? - answer>>>CUI may be stored on any
password-protected system.
*Controlled Unclassified Information
Which designation marks information that does not have potential to damage national security? -
answer>>>Unclassified
*Controlled Unclassified Information
Which of the following is true of Controlled Unclassified Information (CUI)? - answer>>>CUI must
be handled using safeguarding or dissemination controls
*Controlled Unclassified Information
Which of the following is a security practice for protecting Personally Identifiable Information
(PII)? - answer>>>Only use Government-furnished or Government-approved equipment to
process PII
*Controlled Unclassified Information
Which of the following is true of Unclassified information?
-It is releasable to the public without clearance.
-Aggregating it does not affect its sensitivity level.
-It could affect the safety of the government personnel, missions, and systems.
-It does not require markings or distribution controls. - answer>>>It could affect the safety of the
government personnel, missions, and systems.
*Controlled Unclassified Information
Which of the following best describes a way to safely transmit Controlled Unclassified Information
(CUI)?
, -Debra ensures all recipients have the required clearance and an official need-to-know before
sending CUI via encrypted e-mail.
-Paul verifies that the information is CUI, includes a CUI marking in the subject header, and
digitally signs an e-mail containing CUI.
-John submits CUI to his organization's security office to transmit it on his behalf.
-Prudence faxes CUI using an Unclassified cover sheet via a Secret fax machine. - answer>>>Debra
ensures all recipients have the required clearance and an official need-to-know before sending
CUI via encrypted e-mail.
**Physical Security
What is a good practice for physical security? - answer>>>Challenge people without proper
badges.
**Physical Security
At which Cyberspace Protection Condition (CPCON) is the priority focus on critical functions only?
- answer>>>CPCON 1
**Physical Security
Which Cyber Protection Condition (CPCON) is the priority focus on critical and essential functions
only? - answer>>>CPCON 2
**Physical Security
Within a secure area, you see an individual who you do not know and is not wearing a visible
badge. What should you do? - answer>>>Ask the individual for identification
**Physical Security
Which of the following is a best practice for physical security? - answer>>>Report suspicious
activity
**Physical Security
Which of the following best describes good physical security?
-Sharon follows her colleague into a secure area without badging in after they have lunch
together.
-Brenda borrows an access badge from her co-worker when she forgets hers.
-Lionel stops an individual in his secure area who is not wearing a badge.
-Eal takes home a copy of his secure area's access roster in preparation for telework. -
answer>>>Lionel stops an individual in his secure area who is not wearing a badge.