1. What action is recommended when somebody calls you to inquire - TopicsExpress



          

1. What action is recommended when somebody calls you to inquire about your work environment or specific account information? a. Collect evidence b. Ask them to verify their name and office number c. Give them your username and password d. Hang up 2. You are having lunch at a local restaurant outside the installation, and you find a cd labeled favorite song. What should you do? a. Take and play the cd on your government computer b. Take and play the cd on your home computer c. Leave the cd where it is d. All of the above 3. It is getting late on Friday. You are reviewing your employees annual self evaluation. Your comments are due on Monday. You can email your employees information to yourself so you can work on it this weekend and go home now. Which method would be the BEST way to send this information? a. Send it to your personal email account b. Send it to your government account and open the email on your government issued laptop c. Send it to your government account and open the email on your personal computer d. Use the government email system so you can encrypt the information and open the email on your government issued laptop 4. Which of the following is NOT Protected Health Information (PHI)? a. Health info that identifies the individual b. Information created by a healthcare provider, health plan or employer c. Information relating to the physical or mental health of a person d. Medical care facility name 5. The following practices help prevent viruses and the downloading of malicious code except. a. Turn off automatic downloads b. Do not email infected files to anyone c. Do not access websites in email or pop-ups d. Scan external files from only unverifiable sources before uploading to computer 6. Bob, a coworker, has been going through a divorce, has financial difficulties and is displaying hostile behavior. How many potential insider threat indicators is Bob displaying? a. 1 b. 2 c. 3 d. 0 7. Which of the following makes Alexs personal information vulnerable to attacks by identity thieves? a. Avoiding common names and dates for passwords and PINs b. Picking up his mail promptly c. Shredding personal documents d. Carrying his Social Security Card with him 8. The CAC/PIV is a controlled item and contains certificates for: a. Identification b. Encryption c. Digital Signatures d. All of the above 9. Someone calls from an unknown number and says they are from IT and need some information about your computer. What should you do? a. Answer with Sure, What do you need? b. Request the users full name and phone number c. Alert your security POC d. Remove your CAC/PIV 10. UNCLASSIFIED is a designation to mark information that does not have potential to damage national security. a. TRUE b. FALSE
Posted on: Mon, 07 Jul 2014 05:55:54 +0000

Trending Topics



Recently Viewed Topics




© 2015