Which of the following is NOT an example of CUI?
Quizaza Latest Questions
Which of the following is permitted when using an unclassified laptop within a collateral classified space?
Which scenario might indicate a reportable insider threat?
Which of the following is a way to prevent the spread of malicious code?
How can you prevent viruses and malicious code?
Tom is working on a report that contains employees’ names, home addresses, and salary. Which of the following is Tom prohibited from doing with the report?
Which of the following is true of internet hoaxes?
Under which Cyberspace Protection Condition (CPCON) is the priority focus limited to critical and essential functions?
Which of the following is an appropriate use of a DoD PKI token?
Which of the following best describes a way to safely transmit Controlled Unclassified Information (CUI)?
Which of the following is NOT a way that malicious code spreads?
Which of the following personally-owned computer peripherals is permitted for use with Government-furnished equipment?
Which of the following does NOT constitute spillage?
Which of the following is a best practice to protect your identity
Which of the following is NOT a best practice for teleworking in an environment where Internet of Things (IoT) devices are present? Use the devices’ default security settings Check the devices periodically for Bluetooth connections Set strong passwords for the devices Remove any voice-enabled ...
Which of these is NOT a potential indicator that your device may be under a malicious code attack?
Which of the following is a best practice for physical security?
Which of the following may help to prevent spillage?
Which of the following is true of removable media and portable electronic devices (PEDs)?
Which of the following is an appropriate use of government e-mail?
Which of the following is NOT a best practice for protecting your home wireless network for telework?
How can you protect your home computer?
Which of the following is true of transmitting or transporting SCI?
Which of the following is not a way that malicious code can spread
Based on the description provided, how many insider threat indicators are present?
Which of the following is permitted when using an unclassified laptop within a collateral classified space?
Which of the following is NOT a best practice for travelling overseas with a mobile device?
Which of the following is true of transmitting or transporting SCI?
Which of the following is true of working within a Sensitive Compartmented Information Facility (SCIF)?
Which of the following statements is true of DoD Unclassified data?
Which of these is NOT a potential indicator that your device may be under a malicious code attack?
Which of the following is permitted within a Sensitive Compartment Information Facility?
Which of the following personally-owned computer peripherals is permitted for use with Government-furnished equipment?
Which of the following is true of transmitting Sensitive Compartmented Information (SCI)?
Which of the following is true of spillage?
Among the provided options, the following is true regarding working within a Sensitive Compartmented Information Facility (SCIF):
Personnel must position monitors so that they do not face windows or close the window blinds. Phone conversations within a SCIF are inherently secure and require no further protection. Due to the physical security measures in place within a SCIF, open storage ...