Which Cyber Protection Condition (CPCON) establishes a protection priority focus on critical functions
only? - CORRECT ANSWER CPCON 1
Which of the following is an example of two-factor authentication? - CORRECT ANSWER A Common
Access Card and Personal Identification Number
Which of the following is true of the Common Access Card (CAC)? - CORRECT ANSWER It contains
certificates for identification, encryption, and digital signature.
What must authorized personnel do before permitting another individual to enter a Sensitive
Compartmented Information Facility (SCIF)? - CORRECT ANSWER Confirm the individual's need-to-know
and access
A compromise of Sensitive Compartmented Information (SCI) occurs when a person who does not have
the required clearance or access caveats comes into possession of SCI - CORRECT ANSWER in any
manner
Which of the following is true of portable electronic devices (PEDs) in a Sensitive Compartmented
Information Facility (SCIF)? - CORRECT ANSWER Only connect government-owned PEDs to the same
level classification information system when authorized
What portable electronic devices (PEDs) are permitted in a SCIF? - CORRECT ANSWER Only expressly
authorized government-owned PEDs
What is the response to an incident such as opening an uncontrolled DVD on a computer in a SCIF? -
CORRECT ANSWER All of these
Which of the following must you do before using an unclassified laptop and peripherals in a collateral
classified environment? - CORRECT ANSWER Ensure that any embedded cameras, microphones, and Wi-
Fi are physically disabled