What conditions are necessary to be granted access to Sensitive Compartmented Information
(SCI)? - Top Secret clearance and indoctrination into the SCI program
Which of the following is permitted when using an unclassified laptop within a collateral
classified space? - A Government-issued wired headset with microphone
Which of the following is an authoritative source for derivative classification? - Security
Classification Guide
Carl receives an e-mail about a potential health risk caused by a common ingredient in
processed food. Which of the following actions should Carl NOT take with the e-mail? - Forward
it
How can an adversary use information available in public records to target you? - Combine it
with information from other data sources to learn how best to bait you with a scam
Which of the following is an appropriate use of government e-mail? - Using a digital signature
when sending attachments
Which of the following is NOT a best practice for protecting data on a mobile device? - Disable
automatic screen locking after a period of inactivity
Annabeth becomes aware that a conversation with a co-worker that involved Sensitive
Compartmented Information (SCI) may have been overheard by someone who does not have
Category | Exams and Certifications |
Comments | 0 |
Rating | |
Sales | 0 |