89%(28)25 out of 28 people found this document helpful
This preview shows page 1 - 2 out of 2 pages.
A primary and secondary password to log into a system.6.What organization issues the directives concerning the dissemination of information regarding intelligence sources, methods, or activities?Department of defense7.Which must be approved and signed by a cognizant original classification authority (OCA)?SCI8.What must users do when using removable media within a sensitive compartmented information facility (SCIF)?Comply with site 9.What are some actions you can take to try to protect your identity?Shred personal documents, never share passwords, and order a credit report annually.10. What is whaling?A type of phishing designed to interrupt computer access for personnel at all levels.11. What is a way to prevent the download of viruses and other malicious code when checking your email?Forward any suspect e-mail to your supervisor and your security POC immediately.12. Which may be a security issue with compressed URLs?May be used to mask malicious intent13. Upon connecting your government issued laptop to a public wireless connection, what should you immediately do?Connect to VPN14. Under what circumstances is it acceptable to use your government furnished compute to check personal e-mail and do other non-work related activities?If allowed by organization policy
15. What is a best practice to protect data on your mobile computing device?Lock your device screen when not in use and require a password to reactivate.16. What are some examples of removable media?Memory sticks, flash drives, or external hard drives17. What is a good practice to protect data on your home wireless systems?Ensure that the wireless security features are properly configured.