what type of information does this personnel email to sell anything
roster represent - ANSWER -controlled -you should use a digital signature when sending
unclassified information hyperlinks
-you should not use unauthorized services, such
as fileshare services, on GFE
when emailing this personnel roster, which of the
following should you do - ANSWER -
encrypt the PII, digitally sign the email, use your how can malicious code spread? select all that
government email account apply. - ANSWER --email attachment
-downloading files
-visiting inected websites
your meeting notes are unclassified. this means
that your notes - ANSWER -do not have
the potential to damage national security how can you prevent the download of malicious
code? - ANSWER --scan external files
before uploading to your device
which of the following poses a physical security -research apps and their vulnerabilities' before
risk - ANSWER -posting an access roster in downloading
public view
which payment method poses the least risk -
which of the following must you do when using ANSWER -cash
an unclassified laptop in a collateral classified
environment - ANSWER -disable the
embedded camera, microphone and wifi which method of getting online poses the least
risk - ANSWER -approved mobile hotspot
Use government-issued wired peripherals
which action will keep DoD data the safest -
which of the following must you do when working ANSWER -leave the coffee shop
in a SCIF - ANSWER --Verify that all
personnel in listening distance have a need-to-
know what step should be taken next to securely
-ensure the monitors do not provide telework - ANSWER -secure the area so
unobstructed views others cannot view your monitor
-escort uncleared personnel and warn others in
the SCIF
which of these personally owned computer
peripherals may be used with government-
is this an appropriate use of government- furnished equipment - ANSWER --HDMI
furnished equipment - ANSWER -no monitor
-USB keyboard
this is not an appropriate use of GFE. why? -
ANSWER --you should not use government does this action pose potential security risk -
1/2