LATEST UPDATED | ACTUAL EXAM QUESTIONS WITH SOLUTIONS |
100% RATED CORRECT | 100% VERFIED SOLTIONS | ALREADY
GRADED A+
Which of the following is a good practice for telework? - (ANSWER)Use a Virtual
Private Network (VPN) to obscure your true geographic location
What level of damage can the unauthorized disclosure of information classified as
Confidential reasonably be expected to cause? - (ANSWER)Damage to National
Security
Which of the following is a potential insider threat indicator? -
(ANSWER)Difficult life circumstances, such as death of a spouse
How can you protect your organization on social networking sites? -
(ANSWER)Validate friend requests through another source before confirming
them
,Which of the following is a security best practice when using social networking
sites? - (ANSWER)Avoiding posting your mothers maiden name
Which of the following statements is true? - (ANSWER)Many apps and smart
devices collect and share your personal information and contribute to your online
identity.
Which is a best practice for protecting Controlled Unclassified Information (CUI)?
- (ANSWER)Store it in a locked desk drawer after working hours.
Which of the following is a security best practice for protecting Personally
Identifiable Information (PII)? - (ANSWER)Only use Government-approved
equipment to process PII.
Which of the following best describes a way to safely transmit Controlled
Unclassified Information (CUI)? - (ANSWER)Paul verifies that the information is
CUI, includes a CUI marking in the subject header, and digitally signs an e-mail
containing CUI.
,Which of the following best describes good physical security? - (ANSWER)Lionel
stops an individual in his secure area who is not wearing a badge.
Which of the following is an example of a strong password? -
(ANSWER)%2ZN=Ugq
Which of the following is true of the Common Access Card (CAC)? -
(ANSWER)You should take your CAC/PIV card when leaving your workstation
Which of the following is true of Sensitive Compartmented Information (SCI)? -
(ANSWER)Never fax?
A compromise of Sensitive Compartmented Information (SCI) occurs when a
person who does not have the required clearance or access caveats comes into
possession of SCI________. - (ANSWER)in any manner
, how should you label removable media used in a scif - (ANSWER)With the
maximum classification, date of creation, point of contact, and Change
Management (CM) Control Number.
which of the following is a way to prevent the spread of malicious code -
(ANSWER)e-mail any infected files to your security point of contact - wrong
which of the following statements is true of cookies - (ANSWER)by accepting
cookies, you authorize websites to store your personal data on a web server -
WRONG
what type of social engineering targets particular groups - (ANSWER)spear
phising
which is an appropriate use of government email - (ANSWER)use a digital
signature