It is getting late on Friday. You are reviewing your employees annual self evaluation. Your comments are due on Monday. You can email your employees
... [Show More] information to yourself so you can work on it this weekend and go home now. Which method would be the BEST way to send this information?
Use the government email system so you can encrypt the information and open the email on your government issued laptop
What should you do if someone asks to use your government issued mobile device (phone/laptop..etc)?
Decline to lend your phone / laptop
Where should you store PII / PHI?
Information should be secured in a cabinet or container while not in use
Of the following, which is NOT an intelligence community mandate for passwords?
Maximum password age of 45 days
Which of the following is NOT Government computer misuse?
Checking work email
Which is NOT a telework guideline?
Taking classified documents from your workspace
What should you do if someone forgets their access badge (physical access)?
Alert the security office
What can you do to protect yourself against phishing?
All of the above
What should you do to protect classified data?
Answer 1 and 2 are correct
What action is recommended when somebody calls you to inquire about your work environment or specific account information?
Ask them to verify their name and office number
If classified information were released, which classification level would result in "Exceptionally grave damage to national security"?
Top Secret
Which of the following is NOT considered sensitive information?
Sanitized information gathered from personnel records
Which of the following is NOT a criterion used to grant an individual access to classified data?
Senior government personnel, military or civilian
Of the following, which is NOT a problem or concern of an Internet hoax?
Directing you to a website that looks real
Media containing Privacy Act information, PII, and PHI is not required to be labeled.
FALSE
Which of the following is NOT a home security best practice?
Setting weekly time for virus scan when you are not on the computer and it is powered off
Which of the following best describes wireless technology?
It is inherently not a secure technology
You are leaving the building where you work. What should you do?
Remove your security badge
Which of the following is a good practice to avoid email viruses?
Delete email from senders you do not know
What is considered a mobile computing device and therefore shouldn't be plugged in to your Government computer?
All of the above
Which is NOT a way to protect removable media?
As a best practice, labeling all classified removable media and considering all unlabeled removable media as unclassified
What is NOT Personally Identifiable Information (PII)?
Hobby
Of the following, which is NOT a method to protect sensitive information?
After work hours, storing sensitive information in unlocked containers, desks, or cabinets if security is not present
There are many travel tips for mobile computing. Which of the following is NOT one?
When using a public device with a card reader, only use your DoD CAC to access unclassified information
The use of webmail is
is only allowed if the organization permits it
What is considered ethical use of the Government email system?
Distributing Company newsletter
Which of the following attacks target high ranking officials and executives?
Whaling
What constitutes a strong password?
all of the above
You are logged on to your unclassified computer and just received an encrypted email from a co-worker. The email has an attachment whose name contains the word "secret". What should you do?
Contact your security POC right away
Which is a way to protect against phishing attacks?
Look for digital certificates
You receive an email from a company you have an account with. The email states your account has been compromised and you are invited to click on the link in order to reset your password. What action should you take?
Notify security [Show Less]