*Spillage
Which of the following may help to prevent spillage?
Label all files, removable media, and subject headers with appropriate classification
... [Show More] markings.
*Spillage
Which of the following actions is appropriate after finding classified information on the internet?
Note any identifying information and the website's Uniform Resource Locator (URL)
*Classified Data
Which of the following individuals can access classified data?
Darryl is managing a project that requires access to classified information. He has the appropriate clearance and a signed, approved, non-disclosure agreement.
*Insider Threat
Which type of behavior should you report as a potential insider threat?
Hostility and anger toward the United States and its policies
*Insider Threat
Which of the following practices may reduce your appeal as a target for adversaries seeking to exploit your insider status?
Remove your security badge after leaving your controlled area or office building
*Social Networking
Your cousin posted a link to an article with an incendiary headline on social media. What action should you take?
Research the source of the article to evaluate its credibility and reliability
*Social Networking
Which of the following is a security best practice when using social networking sites?
Use only your personal contact information when establishing your account
*Controlled Unclassified Information
Select the information on the data sheet that is personally identifiable information (PII) but not protected health information (PHI)
Jane Jones
Social Security Number: 123-45-6789
*Controlled Unclassified Information
Select the information on the data sheet that is protected health information (PHI)
Interview: Dr. Nora Baker
Dr. Baker was Ms. Jones's psychiatrist for three months. Dr. Baker reports that the sessions addressed Ms. Jones's depression, which poses no national security risk
*Physical Security
Which Cyber Protection Condition (CPCON) establishes a protection priority focus on critical and essential functions only?
CPCON 2
*Identity Management
What certificates does the Common Access Card (CAC) or Personal Identity Verification (PIV) card contain?
Identification, encryption, digital signature
*Identity Management
What is the best way to protect your Common Access Card (CAC) or Personal Identity Verification (PIV) card?
Maintain possession of it at all times
*Sensitive Compartmented Information
When faxing Sensitive Compartmented Information (SCI), what actions should you take?
Mark SCI documents, appropriately and use an approved SCI fax machine
*Sensitive Compartmented Information
When is it appropriate to have your security badge visible within a Sensitive Compartmented Information Facility (SCIF)?
At all times while in the facility [Show Less]