Which of the following actions is appropriate after finding classified information on the internet? ✔✔Note any identifying information and the website's Uniform Resource Locator (URL) You receive an inquiry from a reporter about potentially classified information on the internet. How do you respond? ✔✔Refer the reporter to your organization's public affairs office What level of damage can the unauthorized disclosure of information classified as Confidential reasonably be expected to cause? ✔✔damage to national security Which type of information could reasonably be expected to cause serious damage to national security if disclosed without authorization? ✔✔Secret What level of damage to national security can you reasonably expect Top Secret information to cause if disclosed? ✔✔Exceptionally grave damage Which of the following is true about telework ✔✔You must have your organization's permission to telework. Which of the following is true of protecting classified data? ✔✔Classified material must be appropriately marked Which scenario might indicate a reportable insider threat? ✔✔A coworker uses a personal electronic device in a secure area where their use is prohibited What threat do insiders with authorized access to information or information systems pose? ✔✔They may wittingly or unwittingly use their authorized access to perform actions that result in the loss or degradation of resources or capabilities Which of the following practices may reduce your appeal as a target for adversaries seeking to exploit your insider status? ✔✔Remove your security badge after leaving your controlled area or office building In addition to avoiding the tempation of greed to betray his country, what should Alex do differently? ✔✔Avoid talking about work outside of the workplace or with people without a needto-know How many insider threat indicators does Alex demonstrate? ✔✔Three or more What should Alex's colleagues do? ✔✔Report the suspicious behavior in accordance with their organization's insider threat policy When may you be subject to criminal, disciplinary, and/or administrative action due to online misconduct? ✔✔If you participate in or condone it at any time Which of the following information is a security risk when posted publicly on your social networking profile? ✔✔Your birthday Which of the following best describes the sources that contribute to your online identity? ✔✔Data about you collected from all sites, apps, and devices that you use can be aggregated to form a profile of you. Which of the following is NOT an example of CUI? ✔✔Press Release Data Which of the following is NOT a correct way to protect CUI? ✔✔CUI may be stored on any password-protected system Select the information on the data sheet that is personally identifiable information (PII) but not protect health information (PHI). ✔✔Jane Jones | Social Security Number 123-45-6789 (Top) Select the information on the data sheet that is protect health information (PHI) but not personally identifiable information (PII). ✔✔Interview: Dr. Nora Baker...security risk. (Bottom) Within a secure area, you see an individual who you do not know and is not wearing a visible badge. What should you do? ✔✔Ask the individual for identification What is the best way to protect your Common Access Card (CAC) or Personal Identity Verification (PIV) Card? ✔✔Maintain possession of it at all times What certificates does the Common Access Card (CAC) or Personal Identity Verification (PIV) Card contain? ✔✔Identification, encryption, and digital signature What must the dissemination of information regarding intelligence sources, methods, or activities follow? ✔✔Directives issued by the Director of National Intelligence When faxing Sensitive Compartmented Information (SCI), what actions should you take? ✔✔Mark SCI documents appropriately and use an approved SCI fax machine
Category | exam bundles |
Comments | 0 |
Rating | |
Sales | 0 |