Social Networking
15 community-sourced questions and answers about Social Networking, aggregated from every CBT we've indexed that covers this topic.
When is the safest time to post details of your vacation activities on your social networking profile?
If the online misconduct also occurs offline ~If you participate in or condone it at any time If you participate in it while using DoD information systems only If you participate in or condone it during work hours only
What should you do if you receive a game application request that includes permission to access your friends, profile information, cookies, and sites visited?
Pictures of your pet Your birthday Your hobbies ~Your personal e-mail address
Which of the following information is a security risk when posted publicly on your social networking profile?
Ensure there are no identifiable landmarks visible in any photos taken in a work setting that you post
Which of the following is a security best practice when using social networking sites?
If the online misconduct also occurs offline ~If you participate in or condone it at any time If you participate in it while using DoD information systems only If you participate in or condone it during work hours only
When may you be subject to criminal, disciplinary, and/or administrative action due to online misconduct?
If the online misconduct also occurs offline ~If you participate in or condone it at any time If you participate in it while using DoD information systems only If you participate in or condone it during work hours only
Your cousin posted a link to an article with an incendiary headline on social media. What action should you take?
Data about you collected from all sites, apps, and devices that you use can be aggregated to form a profile of you.
Which of the following best describes the sources that contribute to your online identity?
Data about you collected from all sites, apps, and devices that you use can be aggregated to form a profile of you.
As someone who works with classified information, what should you do if you are contacted by a foreign national seeking information on a research project?
Inform your security point of contact
Which piece if information is safest to include on your social media profile?
Adversaries exploit social networking sites to disseminate fake news.
Which of the following statements is true?
Ensure there are no identifiable landmarks visible in any photos taken in a work setting that you post
When is the safest time to post details of your vacation activities on your social networking website?
As long as the document is cleared for public release, you may share it outside of DoD.
What should you do if you receive a game application request that includes permission to access your friends, profile information, cookies, and sires visited?
Date and place of birth
-How can you protect your organization on social networking sites?
Ensure there are no identifiable landmarks visible in any photos taken in a work setting that you post
When may you be subject to criminal, disciplinary, and/or administrative action due to online harassment, bullying, stalking, hazing, discrimination, or retaliation?
If you participate in or condone it at any time
How can you protect yourself on social networking sites? -Turn on Global Positioning System (GPS) location geotagging -Connect with people you don't know only if share mutual connections -Delete posts containing personal information on a regular basis -Validate friend request through another source before confirming them
Validate friend request through another source before confirming them