How many potential insider threat indicators are there?
How many potential insider threat indicators are there?
Indicators of a potential insider threat can be broken into four categories--indicators of: recruitment, information collection, information transmittal and general suspicious behavior.
Which email attachments are generally safe to open?
Email attachments that contain images, videos, and audio files are generally considered to be the safest to open. These include files with common extensions such as JPG, PNG, GIF, MOV, MP4, MPEG, MP3, and WAV.2021-09-01
Which of the following is a best practice for securing your home computer?
To protect against theft of the device and the information on the device, maintain physical control when possible, enable automatic screen locking after a period of inactivity, and use a hard-to-guess password or PIN.
What level of damage to national security can you reasonably expect top secret information to cause if disclosed?
Information that must be controlled to protect the national security is assigned one of three levels of classification, as follows: TOP SECRET information is information which, if disclosed without authorization, could reasonably be expected to cause exceptionally grave damage to the national security.
What are the insider threat indicators?
Indicators of a potential insider threat can be broken into four categories--indicators of: recruitment, information collection, information transmittal and general suspicious behavior.