Question Answer
John receives an e-mail about a potential
shutdown of a major social service unless a
petition receives enough signatures. Which of the
following actions should John NOT take with the
e-mail?
Forward it
How can you prevent viruses and maliciouscode? Scan all e-mail attachments
You receive an e-mail marked important from
your agency head asking you to call them using a
number you do not recognize. The e-mail was sent
from a personal e-mail address that you do not
recognize, but it addresses you by name. What
action should you take?
This may be a spear phishing attempt. Report it to
your security POC or help desk.
Which type of data could reasonably be expected
to cause damage to national security?
Confidential
Which of the following is an appropriate use of
government e-mail?
Using a digital signature when sending hyperlinks
Which of the following is an example of a strong
password?
bRobr@79I*P
Which of the following uses of removable media
is allowed?
Sam uses approved Government-owned
removable media to transfer files between
government systems as authorized.
Which of the following is a best practice to protect
your identity?
Ask how information will be used before giving it
out.
Matt is a government employee who needs to
share a document containing source selection data
with his supervisor. Which of the following
describes the most appropriate way for Matt to do
this?
Encrypt it and send it via digitally signed
Government e-mail.
Under which Cyberspace Protection Condition
(CPCON) is the priority focus limited to critical
functions?
CPCON 1
Which of the following is the safest to share on a
social networking site?
Your favorite movie
Does it pose a security risk to tap your smartwatch
to pay for a purchase at a store?
Only if you do not have two-factor authentication
enabled on your linked phone.
What is a best practice for creating user accounts
for your home computer?
Create separate accounts for each user and have
each user create their own password.
Which of the following is true of removable media
and portable electronic devices (PEDs)?
Removable media pose more risks than PEDs and
are not permitted in government facilities.
Which of the following is true of compressed
URLs (e.g., TinyURL, goo.gl)?
They may be used to mask malicious intent
You receive an e-mail with alinkto run an anti-
virus scan. Your IT department has not
sentlinkslike this in the past. The e-mail is not
digitally signed. What action should you take?
Report the e-mail to your security POC or help
desk.
Which of the following is a way to protect
classified data?
Store it in a GSA-approved container
How can you protect your home computer? Use legitimate, known antivirus software
Which of the following poses a security risk while
teleworking in an environment where Internet of
Things (IoT) devices are present?
All of these.
Which of these is NOT a potential indicator that
your device may be under a maliciouscodeattack
An operating system update
What are the requirements for access to Sensitive
Compartmented Information (SCI)?
Top Secret clearance and indoctrination into the
SCI program