Sociology Questions
Explore questions in the Sociology category that you can ask Spark.E!
Which of the following is true of transmitting Sensitive Compartmented Information (SCI)?
While you are registering for a conference, you arrive at the website http://www.dcsecurityconference.org/registration/. The website requires a credit card for registration. What should you do?
Which must be approved and signed by a cognizant Original Classification Authority (OCA)?
Your DoD Common Access Card (CAC) has a Public Key Infrastructure (PKI) token approved for access to the NIPRNet. In which situation below are you permitted to use your PKI token?
Which best describes and insider threat? Someone who uses _______ access, _______________, to harm national security through unauthorized disclosure, data modification, espionage, terrorism, or kinetic actions.
Which of the following is NOT a way that malicious code spreads?
As someone who works with classified information, what should you do if you are contacted by a foreign national seeking information on a research project?
Your cousin posted a link to an article with an incendiary headline on social media. What action should you take?
When may you be subject to criminal, disciplinary, and/or administrative action due to online harassment, bullying, stalking, hazing, discrimination, or retaliation?
When is the safest time to post details of your vacation activities on your social networking profile?
How many potential insider threat indicators does a coworker who often makes others uneasy by being persistent in trying to obtain information about classified projects to which he has no access, is boisterous about his wife putting them in credit card debt, and often complains about anxiety and exhaustion display?
Which classification level is given to information that could reasonably be expected to cause serious damage to national security?
Which designation marks information that does not have potential to damage national security?
At which Cyberspace Protection Condition (CPCON) is the priority focus on critical functions only?
Which type of information could reasonably be expected to cause serious damage to national security if disclosed without authorization?
What should you do if you receive a game application request that includes permission to access your friends, profile information, cookies, and sites visited?
Which of the following may help to prevent spillage?-Verify that any government equipment used for processing classified information has valid anti-virus software before connecting it to the internet-Follow procedures for transferring data to and from outside agency and non-Government networks-Purge the memory of any device removed from a classified network before connecting it to an unclassified network-Process all data at the highest classification or protection level available, including unclassified data
Within a secure area, you see an individual who you do not know and is not wearing a visible badge. What should you do?
Who designates whether information is classified and its classification level?
Which of the following is NOT considered a potential insider threat indicator?