A vendor conducting a pilot program with your organization contacts you for organizational data to use in a prototype. How should you respond?
Refer the
... [Show More] vendor to the appropriate personnel.
When classified data is not in use, how can you protect it?
Store classified data appropriately in a GSA-approved vault/container.
What is the basis for handling and storage of classified data?
Classification markings and handling caveats.
Which of the following must you do before using an unclassified laptop and peripherals in a collateral classified environment?
Ensure that any cameras, microphones, and Wi-Fi embedded in the laptop are physically disabled.
What level of damage to national security can you reasonably expect Top secret information to cause if disclosed?
Exceptionally grave damage.
Which of the following is true about telework?
You must have your organization's permission to telework.
Which of the following is true of protecting classified data?
Classified material must be appropriately marked.
Which of the following is a reportable insider threat activity?
Attempting to access sensitive information without need-to-know.
Which scenario might indicate a reportable insider threat?
a colleague removes sensitive information without seeking authorization in order to perform authorized telework.
Which of the following is a potential insider threat indicator?
1) Unusual interest in classified information. 2) Difficult life circumstances, such as death of spouse.
Which piece of information is safest to include on your social media profile?
Your favorite movie.
Which of the following statements is true?
Many apps and smart devices collect and share your personal information and contribute to your online identity.
How can you protect your organization on social networking sites?
Ensure there are no identifiable landmarks visible in any photos taken in a work setting that you post.
Which is a best practice for protecting Controlled Unclassified Information (CUI)?
Store it in a locked desk drawer after working hours.
Which of the following best describes a way to safely transmit Controlled Unclassified Information (CUI)?
Paul verifies that the information is CUI, includes a CUI marking in the subject header, and digitally signs an e-mail containing CUI.
Which designation includes Personally Identifiable Information (PII) and Protected Health Information (PHI)?
Controlled Unclassified Information (CUI)
Which of the following is NOT an example of CUI?
Press release data.
Which of the following is NOT a correct way to protect CUI?
CUI may be stored on any password-protected system.
Which of the following best describes good physical security?
Lionel stops an individual in his secure area who is not wearing a badge.
Which of the following is an example of two-factor authentication?
A Common Access Card and Personal Identification Number.
What is the best way to protect your Common Access Card (CAC) or Personal Identity Verification (PIV) card?
Store it in a shielded sleeve.
What must authorized personnel do before permitting another individual to enter a Sensitive Compartmented Information Facility (SCIF)?
Confirm the individual's need-to-know and access.
Which of the following is true of Sensitive Compartmented Information (SCI)?
Access requires Top Secret clearance and indoctrination into the SCI program. [Show Less]