Spillage:
What should you do if a reporter asks you about potentially classified information on the web?
Refer the reporter to your organization's public
... [Show More] affair office
What should you do when you are working on an unclassified system and receive an email with a classified attachment?
Call your security point of contact immediately.
Which classified level is given to information that could reasonably be expected to cause serious damage to national security?
Secret
Which of the following is true of protecting classified data?
Classified material must be appropriately marked
What are some potential insider threat indicators?
Difficult life circumstances such as substance abuse, divided loyalty or allegiance to the U.S., and extreme, persistent interpersonal difficulties.
How many potential insider threat indicators does a person who is playful and charming, consistently wins performance awards, but is occasionally aggressive in trying to access sensitive information display?
1 indicator
Which of the following is NOT considered a potential insider threat indicator?
New interest in learning a foreign language
What should you do if you receive a game application request that includes permission to access your friends, profile information, cookies, and sites visited?
Decline the request.
What information posted publicly on your personal social networking profile represents a security risk?
Your place of birth
Sensitive Information:
Which of the following is an example of Protected Health Information (PHI)?
Medical test results
Which of the following is the best example of Personally Identifiable Information (PII)?
Passport number
What type of unclassified material should always be marked with a special handling caveat?
Official use only
Is it acceptable to take a short break while a coworker monitors your computer while logged on with your Common Access Card (CAC)?
No. Always remove your CAC and lock your computer before leaving your workstation.
What is the best way to protect your common access card?
Maintain possession of it at all times.
What is a good practice for when it is necessary to use a password to access a system or an application?
Avoid using the same password between systems or applications.
When is it appropriate to have your securing badge visible with a sensitive compartmented information facility?
At all time when is the facility.
Which of the following does a security classification guide provided?
Precise guidance regarding specific elements of information to be classified
What portable electronic devices are allowed in a secure compartmented information facility?
Government owned PEDs if expressed authorized by your agency
Malicious code:
After clicking on a link on a website, a box pops up and asks if you want to run an application. Is it ok to run it?
No. Only use you agency trusted websites.
What are some actions you can take to try to protect you identity?
Shred personal documents, never share passwords and order a credit history annually. [Show Less]