Topic Deep DiveAcross 4 CBTs

Social Networking

15 community-sourced questions and answers about Social Networking, aggregated from every CBT we've indexed that covers this topic.

Community-sourced. Answers may be wrong or out of date. Always verify with your official training portal before submitting. Not affiliated with any branch, agency, or vendor. Details.
QUESTION 1

When is the safest time to post details of your vacation activities on your social networking profile?

ANSWER

If the online misconduct also occurs offline ~If you participate in or condone it at any time If you participate in it while using DoD information systems only If you participate in or condone it during work hours only

QUESTION 2

What should you do if you receive a game application request that includes permission to access your friends, profile information, cookies, and sites visited?

ANSWER

Pictures of your pet Your birthday Your hobbies ~Your personal e-mail address

QUESTION 3

Which of the following information is a security risk when posted publicly on your social networking profile?

ANSWER

Ensure there are no identifiable landmarks visible in any photos taken in a work setting that you post

QUESTION 4

Which of the following is a security best practice when using social networking sites?

ANSWER

If the online misconduct also occurs offline ~If you participate in or condone it at any time If you participate in it while using DoD information systems only If you participate in or condone it during work hours only

QUESTION 5

When may you be subject to criminal, disciplinary, and/or administrative action due to online misconduct?

ANSWER

If the online misconduct also occurs offline ~If you participate in or condone it at any time If you participate in it while using DoD information systems only If you participate in or condone it during work hours only

QUESTION 6

Your cousin posted a link to an article with an incendiary headline on social media. What action should you take?

ANSWER

Data about you collected from all sites, apps, and devices that you use can be aggregated to form a profile of you.

QUESTION 7

Which of the following best describes the sources that contribute to your online identity?

ANSWER

Data about you collected from all sites, apps, and devices that you use can be aggregated to form a profile of you.

QUESTION 8

As someone who works with classified information, what should you do if you are contacted by a foreign national seeking information on a research project?

ANSWER

Inform your security point of contact

QUESTION 9

Which piece if information is safest to include on your social media profile?

ANSWER

Adversaries exploit social networking sites to disseminate fake news.

QUESTION 10

Which of the following statements is true?

ANSWER

Ensure there are no identifiable landmarks visible in any photos taken in a work setting that you post

QUESTION 11

When is the safest time to post details of your vacation activities on your social networking website?

ANSWER

As long as the document is cleared for public release, you may share it outside of DoD.

QUESTION 12

What should you do if you receive a game application request that includes permission to access your friends, profile information, cookies, and sires visited?

ANSWER

Date and place of birth

QUESTION 13

-How can you protect your organization on social networking sites?

ANSWER

Ensure there are no identifiable landmarks visible in any photos taken in a work setting that you post

QUESTION 14

When may you be subject to criminal, disciplinary, and/or administrative action due to online harassment, bullying, stalking, hazing, discrimination, or retaliation?

ANSWER

If you participate in or condone it at any time

QUESTION 15

How can you protect yourself on social networking sites? -Turn on Global Positioning System (GPS) location geotagging -Connect with people you don't know only if share mutual connections -Delete posts containing personal information on a regular basis -Validate friend request through another source before confirming them

ANSWER

Validate friend request through another source before confirming them