Under what circumstances is it acceptable to use your government-furnished computer to check personal email?

Try the new Google Books

Show

Check out the new look and enjoy easier access to your favorite features

Under what circumstances is it acceptable to use your government-furnished computer to check personal email?

Which of the following is an appropriate use of Government e-mail? Digitally signing e-mails that contain attachments or hyperlinks. What is a protection against internet hoaxes? Use online sites to confirm or expose potential hoaxes.

Which of the following actions is appropriate after finding classified Government information?

Alert your security point of contact. Which of the following actions is appropriate after finding classified Government information on the internet? Note any identifying information and the websites URL

What is the best response if you find classified Government data on the Internet?

What is the best response if you find classified government data on the internet? Note any identifying information, such as the websites URL, and report the situation to your security POC.

Which email attachments are generally safe to open?

Email attachments that contain images, videos, and audio files are generally considered to be the safest to open. These include files with common extensions such as JPG, PNG, GIF, MOV, MP4, MPEG, MP3, and WAV.

Under what circumstances is it acceptable to use your Government-furnished computer to check personal e-mail and do other non-work-related activities? If allowed by organizational policy.

Under what circumstances is it acceptable to check personal email on Government?

Under what circumstances is it acceptable to check personal email on Government-furnished equipment (GFE)? If your organization allows it. When checking in at the airline counter for a business trip Decline so that you maintain physical contact of your Government-issued laptop.

Which of the following action is appropriate after finding classified information on the Internet?

Which of the following actions is appropriate after finding classified Government information on the internet? Note any identifying information and the websites URL.

What is the best response if you find classified government?

What is the best response if you find classified government data on the internet? Note any identifying information, such as the websites URL, and report the situation to your security POC.

What should you do if a reporter ask you about potentially classified information on the Web?

Immediately notify your security point of contact. What should you do if a reporter asks you about potentially classified information on the web? Neither confirm nor deny the information is classified.

What action should you take if you become aware that sensitive compartmented information has been compromised?

Report the crime to local law enforcement.

What should you do when going through an airport security checkpoint with a government-issued mobile device quizlet?

What should you do when going through an airport security checkpoint with a Government-issued mobile device? How can you protect your information when using wireless technology? Avoid using non-Bluetooth-paired or unencrypted wireless computer peripherals.

Which of the following is a good practice to protect classified information?

Which is a good practice to protect classified information? Ensure proper labeling by appropriately marking all classified material and, when required, sensitive material.

Which of the following is true of protecting classified data?

Which of the following is true of protecting classified data? Classified material must be appropriately marked. In addition to avoiding the temptation of greed to betray his country, what should Alex do differently?

What are some actions you can take to try to protect your identity?

The Top 10 Ways to Protect Your Identity

  • Use this checklist to protect yourself from identity theft.
  • 1: Keep your mail safe.
  • 2: Read your account statements.
  • 3: Check your credit reports.
  • 4: Shred!
  • 5: Store personal documents at home.
  • 6: Be wary of unknown phone calls and emails.
  • 7: Create difficult logins and passwords.

Which email attachments are high risk?

Five dangerous types of email attachment

  • ISO files. ISO files are generally used to create a copy of everything on a physical disc.
  • EXE files. Executables – or .exe.
  • Compressed files.
  • Installers.
  • Office documents.

Jan 16, 2021

Is there a safe way to open a suspicious email attachment?

Unexpected or suspicious email attachments should never be opened. They may execute a disguised program (malware, adware, spyware, virus, etc.) that could damage or steal your data. If in doubt, call the sender to verify.

Which type of file should you never open in an email attachment?

In addition, do not open email attachments that have file endings of .exe, .pif, or .vbs. These are filename extensions for executable files and could be dangerous if opened.

Under what circumstances is it acceptable to use your Government-furnished computer?

Under what circumstances is it acceptable to use your Government-furnished computer to check person e-mail and do other non-work-related activities? If allowed by organization policy.

Under what circumstances is it acceptable to check personal email on Government-furnished equipment?

Under what circumstances is it acceptable to check personal email on Government-furnished equipment (GFE)? If your organization allows it.

Under which circumstances is it permitted to share an unclassified draft document with a non DoD?

Is it permitted to share an unclassified draft document with a non-DoD professional discussion group? As long as the document is cleared for public release, you may share it outside of DoD.

What is appropriate after finding classified Government information on the Internet?

Which of the following actions is appropriate after finding classified Government information on the internet? Which of the following may help to prevent inadvertent spillage? Label all files, removable media, and subject headers with appropriate classification markings.

Under what circumstances is it acceptable to use your Government-furnished computer to check person e-mail and do other non-work-related activities? If allowed by organization policy.

Under which circumstances is it permitted to share an unclassified draft?

Is it permitted to share an unclassified draft document with a non-DoD professional discussion group? As long as the document is cleared for public release, you may share it outside of DoD.

What is an indication that malicious is running on your system?

Examples of basic functions that are symptomatic of a malware infection include having a system that wont boot up, wont connect to the internet (or connects with a whole bunch of windows open to sites you didnt go to), wont perform basic functions, randomly shuts down, or does other weird things.

Which of the following can be an unauthorized disclosure of information classified as confidential reasonably be expected to cause?

The unauthorized disclosure of Confidential information could reasonably be expected to cause damage to national security. The unauthorized disclosure of Secret information could reasonably be expected to cause serious damage to national security.