. You are logged on to your unclassified computer and just - TopicsExpress



          

. You are logged on to your unclassified computer and just received an encrypted email from a co-worker. The email has an attachment whose name contains the word secret. What should you do? a. Open the attachment. The email was encrypted so the secret is safe with you b. You glance at the email and decide to read the email later since you are busy. c. Contact your security POC right away d. Forward the email to another coworker seeking their advice on the content of the email. 2. Which is NOT a telework guideline? a. Taking classified documents from your workspace b. Needing permission from your organization c. Using authorized equipment d. Performing telework in a dedicated area at home 3. When leaving your work area, what is the first thing you should do? a. Call your boss b. Remove your CAC/PIV c. Lock your workstation d. Change your status to out 4. P2P (Peer-to-Peer) software can do the following except: a. Compromise network configurations b. Spread viruses and spyware c. Allow unauthorized access to data d. Allow attackers physical access to network assets 5. Of the following, which is NOT a method to protect sensitive information? a. Storing sensitive data only on authorized systems b. Not transmitting, storing, or processing sensitive information on non-sensitive systems c. After work hours, storing sensitive information in unlocked containers, desks, or cabinets if security is not present d. Reducing risk of access during work hours. 6. Which is an untrue statement about unclassified data? a. Does not have the potential to cause damage to national security b. Must be clearly marked as Unclassified with caveats, if stored with classified information c. If aggregated, the classification of the information may not be changed d. If compromised, could affect the safety of government personnel, missions, and systems 7. Which of the following attacks target high ranking officials and executives? a. Whaling b. Pharming c. Vishing d. Phishing 8. Which of the following is a good practice to avoid email viruses? a. Have your personal email account automatically forward emails to your work email account b. Set email options to allow html viewing of email c. Use the imbedded links inside email to access internet sites and attachments d. Delete email from senders you do not know 9. You check your bank statement and see several debits you did not authorize. You believe that you are a victim of identity theft. Which of the following should you do immediately? a. Monitor credit card statements for unauthorized purchases b. Make a legitimate purchase and check your credit card statement to see if it is recorded. c. Wait 3 business days and recheck account balance d. Discontinue use of his ATM card and only use credit cards for purchases instead. 10. What should you do to protect yourself while on social networks? a. Post your social security number b. Validate all friend requests through another source before confirming them c. Post the location of your next deployment d. Post your home address
Posted on: Fri, 07 Mar 2014 05:56:02 +0000

Trending Topics



Recently Viewed Topics




© 2015