2025 QUESTIONS WITH VERIFIED
ANSWERS
What conditions are necessary to be granted access to Sensitive Compartmented Information (SCI)? -
correct answer-Top Secret clearance and indoctrination into the SCI program
Which of the following is permitted when using an unclassified laptop within a collateral classified space?
- correct answer-A Government-issued wired headset with microphone
Which of the following is an authoritative source for derivative classification? - correct answer-
Security Classification Guide
Carl receives an e-
mail about a potential health riskTcaused by a common ingredient in processed food. Which of the follow
ingTactions should Carl NOT take with the e-mail? - correct answer-Forward it
How can an adversary use information available in public records to target you? -Tcorrect answer-
Combine it with information from other data sources to learn how best to bait you with a scam
Which of the following is an appropriate use of government e-mail? - correct answer-
Using a digital signature when sending attachments
Which of the following is NOT a best practice for protecting data on a mobile device? - correct answer-
Disable automatic screen locking after a period of inactivity
Annabeth becomes aware that a conversation with a co-
worker that involved Sensitive Compartmented Information (SCI) may have been overheard by someone
who does not have the required clearance. What action should Annabeth take? - correct answer-
Contact her security POC to report the incident.
On your home computer, how can you best establish passwords when creating separate user accounts? -
correct answer-Have each user create their own, strong password