Podcast
Questions and Answers
What conditions are necessary to be granted access to Sensitive Compartmented Information (SCI)?
What conditions are necessary to be granted access to Sensitive Compartmented Information (SCI)?
Top Secret clearance and indoctrination into the SCI program
Which of the following is permitted when using an unclassified laptop within a collateral classified space?
Which of the following is permitted when using an unclassified laptop within a collateral classified space?
- A personal laptop
- A government-issued wired headset with microphone (correct)
- Unsecured USB drives
- Using personal headphones
Which of the following is an authoritative source for derivative classification?
Which of the following is an authoritative source for derivative classification?
Security Classification Guide
Which of the following actions should Carl NOT take with the e-mail about a potential health risk?
Which of the following actions should Carl NOT take with the e-mail about a potential health risk?
How can an adversary use information available in public records to target you?
How can an adversary use information available in public records to target you?
Which of the following is an appropriate use of government e-mail?
Which of the following is an appropriate use of government e-mail?
Which of the following is NOT a best practice for protecting data on a mobile device?
Which of the following is NOT a best practice for protecting data on a mobile device?
What action should Annabeth take if she believes an SCI conversation was overheard?
What action should Annabeth take if she believes an SCI conversation was overheard?
On your home computer, how can you best establish passwords when creating separate user accounts?
On your home computer, how can you best establish passwords when creating separate user accounts?
Which of the following is an allowed use of government furnished equipment (GFE)?
Which of the following is an allowed use of government furnished equipment (GFE)?
How can you prevent viruses and malicious code?
How can you prevent viruses and malicious code?
An insider threat is someone who uses __________ access, __________, to harm national security.
An insider threat is someone who uses __________ access, __________, to harm national security.
Which of the following is an example of behavior that you should report?
Which of the following is an example of behavior that you should report?
Which of the following is true of telework?
Which of the following is true of telework?
After a classified document is leaked online, which statement is true of the leaked information?
After a classified document is leaked online, which statement is true of the leaked information?
How should government-owned removable media be stored?
How should government-owned removable media be stored?
Which of the following is NOT an example of Personally Identifiable Information (PII)?
Which of the following is NOT an example of Personally Identifiable Information (PII)?
What does the Common Access Card (CAC) contain?
What does the Common Access Card (CAC) contain?
Does Sylvia's commuting behavior pose a security concern?
Does Sylvia's commuting behavior pose a security concern?
Does Beth tapping her phone at a payment terminal pose a security risk?
Does Beth tapping her phone at a payment terminal pose a security risk?
Which of the following is NOT an appropriate use of your Common Access Card (CAC)?
Which of the following is NOT an appropriate use of your Common Access Card (CAC)?
When is the safest time to post on social media about your vacation plans?
When is the safest time to post on social media about your vacation plans?
What is the best course of action if you receive a suspicious text message about delayed package delivery?
What is the best course of action if you receive a suspicious text message about delayed package delivery?
Which of the following is NOT a best practice for protecting your home wireless network for telework?
Which of the following is NOT a best practice for protecting your home wireless network for telework?
Which of the following is a best practice for using government e-mail?
Which of the following is a best practice for using government e-mail?
How can you protect your home computer?
How can you protect your home computer?
Did Carl receive an e-mail about a potential health risk and should forward it?
Did Carl receive an e-mail about a potential health risk and should forward it?
Which of the following is true of transmitting or transporting SCI?
Which of the following is true of transmitting or transporting SCI?
Terry sees a post that says there is smoke billowing from the Pentagon. What is likely true?
Terry sees a post that says there is smoke billowing from the Pentagon. What is likely true?
Which of the following statements about PHI is false?
Which of the following statements about PHI is false?
Which of the following is NOT a best practice for protecting your home wireless network for telework?
Which of the following is NOT a best practice for protecting your home wireless network for telework?
Does Beth tapping her phone at a payment terminal pose a security risk?
Does Beth tapping her phone at a payment terminal pose a security risk?
How can you prevent viruses and malicious code?
How can you prevent viruses and malicious code?
Which of the following is an example of behavior that you should report?
Which of the following is an example of behavior that you should report?
What is the best course of action if you receive a suspicious text message about delayed package delivery?
What is the best course of action if you receive a suspicious text message about delayed package delivery?
Which of the following is a permitted use of a DoD PKI token?
Which of the following is a permitted use of a DoD PKI token?
Which of the following is a best practice when browsing the internet?
Which of the following is a best practice when browsing the internet?
Where are you permitted to use classified data?
Where are you permitted to use classified data?
Which of the following contributes to your online identity?
Which of the following contributes to your online identity?
How can you protect your home computer?
How can you protect your home computer?
Which of the following statements is true of DoD Unclassified data?
Which of the following statements is true of DoD Unclassified data?
Which of the following is NOT a way that malicious code can spread?
Which of the following is NOT a way that malicious code can spread?
What is the goal of an Insider Threat Program?
What is the goal of an Insider Threat Program?
Which of the following uses of removable media is allowed?
Which of the following uses of removable media is allowed?
Which of the following is permitted when using an unclassified laptop within a collateral classified space?
Which of the following is permitted when using an unclassified laptop within a collateral classified space?
When is the safest time to post on social media about your vacation plans?
When is the safest time to post on social media about your vacation plans?
Which of the following is NOT an appropriate use of your CAC?
Which of the following is NOT an appropriate use of your CAC?
Flashcards are hidden until you start studying
Study Notes
Sensitive Compartmented Information (SCI)
- Access to SCI requires Top Secret clearance and indoctrination into the SCI program.
- Printed SCI documents must be retrieved promptly from the printer.
Government Equipment and E-mail Usage
- Use a digital signature when sending attachments via government e-mail to ensure authenticity.
- Government-owned removable media should be stored in a GSA-approved container matching the security classification.
Data Protection Practices
- Strong passwords should be created by individual users for separate accounts on home computers.
- To prevent viruses, all external files must be scanned before uploading to personal devices.
- Best practice for mobile devices includes enabling automatic screen locking and ensuring sensitive information isn’t taken home without authorization.
Insider Threats
- An insider threat occurs when someone with authorized access wittingly or unwittingly jeopardizes national security.
- A primary goal of an Insider Threat Program is to deter, detect, and mitigate potential threats.
Social Media and Public Information
- Best to share vacation plans on social media only after returning from the trip to prevent targeting by scammers.
- Information from public records can be exploited by adversaries to orchestrate scams, especially when combined with other data.
Handling Communications
- Avoid forwarding suspicious e-mails regarding health risks or unexpected package notifications; delete such messages instead.
- While using government-approved devices during public commutes, be cautious of eavesdropping and shoulder surfing.
Personal Identifiable Information (PII)
- PII includes data that can identify individuals; however, automobile make and model is not classified as PII when linked to an individual.
- Common Access Cards (CAC) contain identification, encryption, and digital signature certificates but should not be used as identification for commercial purposes.
Wireless Network Security
- Protect home wireless networks by using unique SSIDs and passwords rather than factory presets.
- Regularly back up files and enable password features on home computers to enhance security.
Internet Browsing and General Safety Measures
- Only accept cookies from trustworthy websites during internet browsing to safeguard personal data.
- Mass e-mails should be avoided when using government e-mail to maintain security protocols.
Telework Regulations
- Permission from an organization is mandatory for telework arrangements.
- Treat any leaked classified information as still classified, even after becoming publicly accessible.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.