Cyber Awareness 2020 Knowledge Check

25 July 2022
4.7 (114 reviews)
95 test answers
question
How many potential insider threat indicators does a person who is married with two children, vacations at the beach every year, is pleasant to work with, but sometimes has poor work quality display?
answer
0 indicators
question
What is the best response if you find classified government data on the internet?
answer
Note any identifying information, such as the website's URL, and report the situation to your security POC.
question
After reading an online story about a new security project being developed on the military installation where you work, your neighbor asks you to comment about the article. You know this project is classified. What should be your response?
answer
Attempt to change the subject to something non-work related, but neither confirm nor deny the article's authenticity.
question
What is a proper response if spillage occurs?
answer
Immediately notify your security POC.
question
What should you do if a reporter asks you about potentially classified information on the web?
answer
Ask for information about the website, including the URL.
question
A user writes down details from a report stored on a classified system marked as Secret and uses those details to draft an unclassified briefing on an unclassified system without authorization. What is the best choice to describe what has occurred?
answer
Spillage because classified data was moved to a lower classification level system without authorization.
question
How many potential insider threat indicators does a coworker who often makes others uneasy by being persistent in trying to obtain information about classified projects to which he has no access, is boisterous about his wife putting them in credit card debt, and often complains about anxiety and exhaustion display?
answer
3 or more indicators
question
Which of the following can an unauthorized disclosure of information classified as Confidential reasonably be expected to cause?
answer
Damage to national security
question
Which classification level is given to information that could reasonably be expected to cause serious damage to national security?
answer
Secret
question
When classified data is not in use, how can you protect it?
answer
Store classified data appropriately in a GSA-approved vault/container when not in use.
question
Which is a good practice to protect classified information?
answer
Ensure proper labeling by appropriately marking all classified material and, when required, sensitive material.
question
Which of the following is a good practice to aid in preventing spillage?
answer
Be aware of classification markings and all handling caveats.
question
What is required for an individual to access classified data?
answer
Appropriate clearance; signed and approved non-disclosure agreement; and need-to-know.
question
What type of activity or behavior should be reported as a potential insider threat?
answer
Coworker making consistent statements indicative of hostility or anger toward the United States and its policies.
question
Which of the following practices reduces the chance of becoming a target by adversaries seeking insider information?
answer
Don't talk about work outside your workspace unless it is a specifically designated public meeting environment and is controlled by the event planners.
question
Which scenario might indicate a reportable insider threat security incident?
answer
A coworker is observed using a personal electronic device in an area where their use is prohibited.
question
Why might "insiders" be able to cause damage to their organizations more easily than others?
answer
Insiders are given a level of trust and have authorized access to Government information systems.
question
Which of the following is a best practice to protect information about you and your organization on social networking sites and applications?
answer
Use only personal contact information when establishing personal social networking accounts, never use Government contact information.
question
What should you do if an individual asks you to let her follow you into your controlled space, stating that she left her security badge at her desk?
answer
Don't allow her access into secure areas and report suspicious activity.
question
Which represents a security best practice when using social networking?
answer
Understanding and using available privacy settings.
question
Which is NOT a sufficient way to protect your identity?
answer
Use a common password for all your system and application logons.
question
Under which circumstances may you be subject to criminal, disciplinary, and/or administrative action due to online misconduct?
answer
Any time you participate in or condone misconduct, whether offline or online.
question
As someone who works with classified information, what should you do if you are contacted by a foreign national seeking information on a research project?
answer
Inform your security POC of all non-professional or non-routine contacts with foreign nations, including, but not limited to, joining each other's social media sites.
question
Which of the following is true about unclassified data?
answer
When unclassified data is aggregated, its classification level may rise.
question
What are some potential insider threat indicators?
answer
Difficult life circumstances such as substance abuse; divided loyalty or allegiance to the U.S.; or extreme, persistent interpersonal difficulties.
question
What information posted publicly on your personal social networking profile represents a security risk?
answer
Your place of birth
question
What is an individual's Personally Identifiable Information (PII) or Protected Health Information (PHI) considered?
answer
Sensitive information.
question
Under what circumstances could unclassified information be considered a threat to national security?
answer
If aggregated, the information could become classified.
question
What type of unclassified material should always be marked with a special handling caveat?
answer
For Official Use Only (FOUO)
question
Which is true for protecting classified data?
answer
Classified material is stored in a GSA-approved container when not in use.
question
Which of the following is true of protecting classified data?
answer
Classified material must be appropriately marked.
question
Which of the following should be reported as a potential security incident (in accordance with your Agency's insider threat policy)?
answer
A coworker brings a personal electronic device into a prohibited area.
question
How many potential insider threat indicators does a person who is playful and charming, consistently win performance awards, but is occasionally aggressive in trying to access sensitive information?
answer
1 Indicator
question
Which of the following terms refers to harm inflicted on national security through authorized access to information or information systems?
answer
Insider Threat
question
What is the best example of Personally Identifiable Information (PII)?
answer
Date and place of birth
question
What is the best example of Protected Health Information (PHI)?
answer
Your health insurance explanation of benefits (EOB)
question
When is the best time to post details of your vacation activities on your social networking website?
answer
When your vacation is over, and you have returned home
question
What does Personally Identifiable Information (PII) include?
answer
Social Security Number; date and place of birth; mother's maiden name
question
What must you ensure if you work involves the use of different types of smart card security tokens?
answer
Avoid a potential security violation by using the appropriate token for each system.
question
What must you ensure before transmitting Personally Identifiable Information (PII) or Protected Health Information (PHI) via e-mail?
answer
Transmissions must be between Government e-mail accounts and must be encrypted and digitally signed when possible.
question
What must you do when e-mailing Personally Identifiable Information (PII) or Protected Health Information (PHI)?
answer
Encrypt the e-mail and use your Government e-mail account.
question
What is a good practice for physical security?
answer
Challenge people without proper badges.
question
Is it acceptable to take a short break while a coworker monitors your computer while logged on with your CAC?
answer
No. Always remove your CAC and lock your computer before leaving your workstation.
question
What is a good practice when it is necessary to use a password to access a system or an application?
answer
Avoid using the same password between systems or applications.
question
What is the best description of two-factor authentication?
answer
Something you possess, like a CAC, and something you know, like a PIN or password.
question
What certificates are contained on the DoD Public Key Infrastructure (PKI) implemented by the Common Access Card (CAC)/Personal Identity Verification (PIV) card?
answer
Identification, encryption, and digital signature
question
What are the requirements to be granted access to SCI material?
answer
The proper security clearance and indoctrination into the SCI program.
question
What is a protection against internet hoaxes?
answer
Use online sites to confirm or expose potential hoaxes.
question
What organization issues the directives concerning the dissemination of information regarding intelligence sources, methods, or activities?
answer
Department of Defense.
question
Which term describes an event where a person who does not have the required clearance or access caveats comes into possession of Sensitive Compartmented Information (SCI)
answer
Compromise
question
What describes a Sensitive Compartmented Information (SCI) program?
answer
A program that segregates various type of classified information into distinct compartments for added protection and dissemination for distribution control.
question
What describes how Sensitive Compartmented Information is marked?
answer
Approved Security Classification Guide (SCG)
question
What must users do when using removable media within a Sensitive Compartmented Information Facility (SCIF)?
answer
Comply with Configuration/Change Management (CM) policies and procedures
question
Which is a risk associated with removable media?
answer
Spillage of classified information.
question
What is an indication that malicious code is running on your system?
answer
File corruption
question
What are some actions you can take to try to protect your identity?
answer
Shred personal documents; never share passwords, and order a credit report annually.
question
Which of the following is an appropriate use of Government e-mail?
answer
Digitally signing e-mails that contain attachments or hyperlinks.
question
What is a protection against internet hoaxes?
answer
Use online sites to confirm or expose potential hoaxes.
question
What can malicious code do?
answer
It can cause damage by corrupting files, erasing your hard drive, and/or allowing hackers access.
question
Which is true of cookies?
answer
A cookie is a text file a bed server stores on your hard drive that may track your activities on the web.
question
What is a common method used in social engineering?
answer
Telephone surveys
question
Which may be a security issue with compressed URLs?
answer
There is no way to know where the link actually leads.
question
What type of phishing attack targets particular individuals, groups of people, or organizations?
answer
Spear phishing
question
While on vacation, a coworker calls and asks you to access a site to review and approve a document that is hosted behind a DoD Public Key Infrastructure (PKI) protected webpage. You do not have your government-issued laptop. What action should you take?
answer
Wait until you have access to your government-issued laptop.
question
Under what circumstances is it acceptable to use your Government-furnished computer to check person e-mail and do other non-work-related activities?
answer
If allowed by organization policy.
question
Which are examples of portable electronic devices (PEDs)?
answer
Thumb drives, memory sticks, and optical disks
question
What are some examples of removable media?
answer
Memory sticks, flash drives, or external hard drives
question
What is a valid response when identity theft occurs?
answer
Report the crime to local law enforcement.
question
What is a common indicator of a phishing attempt?
answer
It includes a threat of dire circumstances.
question
What is whaling?
answer
A type of phishing targeted at high-level personnel such as senior officials.
question
Upon connecting your Government-issued laptop to a public wireless connection, what should you immediately do?
answer
Connect to the Government Virtual Private Network (VPN).
question
Which of the following activities is an ethical use of Government-furnished equipment (GFE)?
answer
Completing your expense report for your government travel.
question
Which is a wireless technology that enables your electronic devices to establish communications and exchange information when places next to each other called?
answer
Near field communication (NFC)
question
Which of the following helps protect data on your personal mobile devices?
answer
Secure personal mobile devices to the same level as Government-issued systems.
question
What is a possible indication of a malicious code attack in progress?
answer
A pop-up window that flashes and warns that your computer is infected with a virus.
question
What should you do if a commercial entity, such as a hotel reception desk, asks for Government identification so that they can make a photocopy?
answer
Do not allow you Common Access Card (CAC) to be photocopied.
question
When is conducting a private money-making venture using your Government-furnished computer permitted?
answer
It is never permitted.
question
What is a good practice to protect data on your home wireless systems?
answer
Ensure that the wireless security features are properly configured.
question
Which must be approved and signed by a cognizant Original Classification Authority (OCA)?
answer
Security Classification Guide (SCG)
question
What portable electronic devices (PEDs) are allowed in a Secure Compartmented Information Facility (SCIF)?
answer
Government-owned PEDs, if expressly authorized by your agency.
question
What is a way to prevent the download of viruses and other malicious code when checking your e-mail?
answer
View e-mail in plain text and don't view e-mail in Preview Pane.
question
What is a best practice to protect data on your mobile computing device?
answer
Lock your device screen when not in use and require a password to reactivate.
question
Which of the following is NOT considered a potential insider threat indicator?
answer
New interest in learning a foreign language
question
What advantages do "insider threats" have over others that allows them to cause damage to their organizations more easily?
answer
Insiders are given a level of trust and have authorized access to Government information systems.
question
Besides social networking sites, what are some other potential sources of your online identity?
answer
All of the above
question
What action should you take if you receive a friend request on your social networking website from someone in Germany you met casually at a conference last year?
answer
Decline the request.
question
A colleague asks to leave a report containing Protected Health Information (PHI) on his desk overnight so he can continue working on it the next day. How do you respond?
answer
Tell your colleague that it needs to be secured in a cabinet or container.
question
Which of the following is the best example of Personally Identifiable Information (PII)?
answer
Passport number
question
What certificates are contained on the Common Access Card (CAC)?
answer
Identification, encryption, and digital signature
question
When should documents be marked within a Sensitive Compartmented Information Facility (SCIF)?
answer
All documents should be appropriately marked, regardless of format, sensitivity, or classification.
question
Which organization issues the directives concerning the dissemination of information regarding intelligence sources, methods, or activities?
answer
The Director of National Intelligence
question
You receive an email from the Internal Revenue Service (IRS) demanding immediate payment of back taxes of which you were not aware. The email provides a website and a toll-free number where you can make payment. What action should you take?
answer
Contact the IRS using their publicly available, official contact information.
question
When using your Government-issued laptop in public environments, with which of the following should you be concerned?
answer
The potential for unauthorized viewing of work-related information displayed on your screen.
question
Which is conducting a private money-making venture using your Government-furnished computer permitted?
answer
It is never permitted.
question
Which of the following is a best practice for securing your home computer?
answer
Use antivirus software and keep it up to date.
1 of 95

Unlock all answers in this set

Unlock answers (91)
question
How many potential insider threat indicators does a person who is married with two children, vacations at the beach every year, is pleasant to work with, but sometimes has poor work quality display?
answer
0 indicators
question
What is the best response if you find classified government data on the internet?
answer
Note any identifying information, such as the website's URL, and report the situation to your security POC.
question
After reading an online story about a new security project being developed on the military installation where you work, your neighbor asks you to comment about the article. You know this project is classified. What should be your response?
answer
Attempt to change the subject to something non-work related, but neither confirm nor deny the article's authenticity.
question
What is a proper response if spillage occurs?
answer
Immediately notify your security POC.
question
What should you do if a reporter asks you about potentially classified information on the web?
answer
Ask for information about the website, including the URL.
question
A user writes down details from a report stored on a classified system marked as Secret and uses those details to draft an unclassified briefing on an unclassified system without authorization. What is the best choice to describe what has occurred?
answer
Spillage because classified data was moved to a lower classification level system without authorization.
question
How many potential insider threat indicators does a coworker who often makes others uneasy by being persistent in trying to obtain information about classified projects to which he has no access, is boisterous about his wife putting them in credit card debt, and often complains about anxiety and exhaustion display?
answer
3 or more indicators
question
Which of the following can an unauthorized disclosure of information classified as Confidential reasonably be expected to cause?
answer
Damage to national security
question
Which classification level is given to information that could reasonably be expected to cause serious damage to national security?
answer
Secret
question
When classified data is not in use, how can you protect it?
answer
Store classified data appropriately in a GSA-approved vault/container when not in use.
question
Which is a good practice to protect classified information?
answer
Ensure proper labeling by appropriately marking all classified material and, when required, sensitive material.
question
Which of the following is a good practice to aid in preventing spillage?
answer
Be aware of classification markings and all handling caveats.
question
What is required for an individual to access classified data?
answer
Appropriate clearance; signed and approved non-disclosure agreement; and need-to-know.
question
What type of activity or behavior should be reported as a potential insider threat?
answer
Coworker making consistent statements indicative of hostility or anger toward the United States and its policies.
question
Which of the following practices reduces the chance of becoming a target by adversaries seeking insider information?
answer
Don't talk about work outside your workspace unless it is a specifically designated public meeting environment and is controlled by the event planners.
question
Which scenario might indicate a reportable insider threat security incident?
answer
A coworker is observed using a personal electronic device in an area where their use is prohibited.
question
Why might "insiders" be able to cause damage to their organizations more easily than others?
answer
Insiders are given a level of trust and have authorized access to Government information systems.
question
Which of the following is a best practice to protect information about you and your organization on social networking sites and applications?
answer
Use only personal contact information when establishing personal social networking accounts, never use Government contact information.
question
What should you do if an individual asks you to let her follow you into your controlled space, stating that she left her security badge at her desk?
answer
Don't allow her access into secure areas and report suspicious activity.
question
Which represents a security best practice when using social networking?
answer
Understanding and using available privacy settings.
question
Which is NOT a sufficient way to protect your identity?
answer
Use a common password for all your system and application logons.
question
Under which circumstances may you be subject to criminal, disciplinary, and/or administrative action due to online misconduct?
answer
Any time you participate in or condone misconduct, whether offline or online.
question
As someone who works with classified information, what should you do if you are contacted by a foreign national seeking information on a research project?
answer
Inform your security POC of all non-professional or non-routine contacts with foreign nations, including, but not limited to, joining each other's social media sites.
question
Which of the following is true about unclassified data?
answer
When unclassified data is aggregated, its classification level may rise.
question
What are some potential insider threat indicators?
answer
Difficult life circumstances such as substance abuse; divided loyalty or allegiance to the U.S.; or extreme, persistent interpersonal difficulties.
question
What information posted publicly on your personal social networking profile represents a security risk?
answer
Your place of birth
question
What is an individual's Personally Identifiable Information (PII) or Protected Health Information (PHI) considered?
answer
Sensitive information.
question
Under what circumstances could unclassified information be considered a threat to national security?
answer
If aggregated, the information could become classified.
question
What type of unclassified material should always be marked with a special handling caveat?
answer
For Official Use Only (FOUO)
question
Which is true for protecting classified data?
answer
Classified material is stored in a GSA-approved container when not in use.
question
Which of the following is true of protecting classified data?
answer
Classified material must be appropriately marked.
question
Which of the following should be reported as a potential security incident (in accordance with your Agency's insider threat policy)?
answer
A coworker brings a personal electronic device into a prohibited area.
question
How many potential insider threat indicators does a person who is playful and charming, consistently win performance awards, but is occasionally aggressive in trying to access sensitive information?
answer
1 Indicator
question
Which of the following terms refers to harm inflicted on national security through authorized access to information or information systems?
answer
Insider Threat
question
What is the best example of Personally Identifiable Information (PII)?
answer
Date and place of birth
question
What is the best example of Protected Health Information (PHI)?
answer
Your health insurance explanation of benefits (EOB)
question
When is the best time to post details of your vacation activities on your social networking website?
answer
When your vacation is over, and you have returned home
question
What does Personally Identifiable Information (PII) include?
answer
Social Security Number; date and place of birth; mother's maiden name
question
What must you ensure if you work involves the use of different types of smart card security tokens?
answer
Avoid a potential security violation by using the appropriate token for each system.
question
What must you ensure before transmitting Personally Identifiable Information (PII) or Protected Health Information (PHI) via e-mail?
answer
Transmissions must be between Government e-mail accounts and must be encrypted and digitally signed when possible.
question
What must you do when e-mailing Personally Identifiable Information (PII) or Protected Health Information (PHI)?
answer
Encrypt the e-mail and use your Government e-mail account.
question
What is a good practice for physical security?
answer
Challenge people without proper badges.
question
Is it acceptable to take a short break while a coworker monitors your computer while logged on with your CAC?
answer
No. Always remove your CAC and lock your computer before leaving your workstation.
question
What is a good practice when it is necessary to use a password to access a system or an application?
answer
Avoid using the same password between systems or applications.
question
What is the best description of two-factor authentication?
answer
Something you possess, like a CAC, and something you know, like a PIN or password.
question
What certificates are contained on the DoD Public Key Infrastructure (PKI) implemented by the Common Access Card (CAC)/Personal Identity Verification (PIV) card?
answer
Identification, encryption, and digital signature
question
What are the requirements to be granted access to SCI material?
answer
The proper security clearance and indoctrination into the SCI program.
question
What is a protection against internet hoaxes?
answer
Use online sites to confirm or expose potential hoaxes.
question
What organization issues the directives concerning the dissemination of information regarding intelligence sources, methods, or activities?
answer
Department of Defense.
question
Which term describes an event where a person who does not have the required clearance or access caveats comes into possession of Sensitive Compartmented Information (SCI)
answer
Compromise
question
What describes a Sensitive Compartmented Information (SCI) program?
answer
A program that segregates various type of classified information into distinct compartments for added protection and dissemination for distribution control.
question
What describes how Sensitive Compartmented Information is marked?
answer
Approved Security Classification Guide (SCG)
question
What must users do when using removable media within a Sensitive Compartmented Information Facility (SCIF)?
answer
Comply with Configuration/Change Management (CM) policies and procedures
question
Which is a risk associated with removable media?
answer
Spillage of classified information.
question
What is an indication that malicious code is running on your system?
answer
File corruption
question
What are some actions you can take to try to protect your identity?
answer
Shred personal documents; never share passwords, and order a credit report annually.
question
Which of the following is an appropriate use of Government e-mail?
answer
Digitally signing e-mails that contain attachments or hyperlinks.
question
What is a protection against internet hoaxes?
answer
Use online sites to confirm or expose potential hoaxes.
question
What can malicious code do?
answer
It can cause damage by corrupting files, erasing your hard drive, and/or allowing hackers access.
question
Which is true of cookies?
answer
A cookie is a text file a bed server stores on your hard drive that may track your activities on the web.
question
What is a common method used in social engineering?
answer
Telephone surveys
question
Which may be a security issue with compressed URLs?
answer
There is no way to know where the link actually leads.
question
What type of phishing attack targets particular individuals, groups of people, or organizations?
answer
Spear phishing
question
While on vacation, a coworker calls and asks you to access a site to review and approve a document that is hosted behind a DoD Public Key Infrastructure (PKI) protected webpage. You do not have your government-issued laptop. What action should you take?
answer
Wait until you have access to your government-issued laptop.
question
Under what circumstances is it acceptable to use your Government-furnished computer to check person e-mail and do other non-work-related activities?
answer
If allowed by organization policy.
question
Which are examples of portable electronic devices (PEDs)?
answer
Thumb drives, memory sticks, and optical disks
question
What are some examples of removable media?
answer
Memory sticks, flash drives, or external hard drives
question
What is a valid response when identity theft occurs?
answer
Report the crime to local law enforcement.
question
What is a common indicator of a phishing attempt?
answer
It includes a threat of dire circumstances.
question
What is whaling?
answer
A type of phishing targeted at high-level personnel such as senior officials.
question
Upon connecting your Government-issued laptop to a public wireless connection, what should you immediately do?
answer
Connect to the Government Virtual Private Network (VPN).
question
Which of the following activities is an ethical use of Government-furnished equipment (GFE)?
answer
Completing your expense report for your government travel.
question
Which is a wireless technology that enables your electronic devices to establish communications and exchange information when places next to each other called?
answer
Near field communication (NFC)
question
Which of the following helps protect data on your personal mobile devices?
answer
Secure personal mobile devices to the same level as Government-issued systems.
question
What is a possible indication of a malicious code attack in progress?
answer
A pop-up window that flashes and warns that your computer is infected with a virus.
question
What should you do if a commercial entity, such as a hotel reception desk, asks for Government identification so that they can make a photocopy?
answer
Do not allow you Common Access Card (CAC) to be photocopied.
question
When is conducting a private money-making venture using your Government-furnished computer permitted?
answer
It is never permitted.
question
What is a good practice to protect data on your home wireless systems?
answer
Ensure that the wireless security features are properly configured.
question
Which must be approved and signed by a cognizant Original Classification Authority (OCA)?
answer
Security Classification Guide (SCG)
question
What portable electronic devices (PEDs) are allowed in a Secure Compartmented Information Facility (SCIF)?
answer
Government-owned PEDs, if expressly authorized by your agency.
question
What is a way to prevent the download of viruses and other malicious code when checking your e-mail?
answer
View e-mail in plain text and don't view e-mail in Preview Pane.
question
What is a best practice to protect data on your mobile computing device?
answer
Lock your device screen when not in use and require a password to reactivate.
question
Which of the following is NOT considered a potential insider threat indicator?
answer
New interest in learning a foreign language
question
What advantages do "insider threats" have over others that allows them to cause damage to their organizations more easily?
answer
Insiders are given a level of trust and have authorized access to Government information systems.
question
Besides social networking sites, what are some other potential sources of your online identity?
answer
All of the above
question
What action should you take if you receive a friend request on your social networking website from someone in Germany you met casually at a conference last year?
answer
Decline the request.
question
A colleague asks to leave a report containing Protected Health Information (PHI) on his desk overnight so he can continue working on it the next day. How do you respond?
answer
Tell your colleague that it needs to be secured in a cabinet or container.
question
Which of the following is the best example of Personally Identifiable Information (PII)?
answer
Passport number
question
What certificates are contained on the Common Access Card (CAC)?
answer
Identification, encryption, and digital signature
question
When should documents be marked within a Sensitive Compartmented Information Facility (SCIF)?
answer
All documents should be appropriately marked, regardless of format, sensitivity, or classification.
question
Which organization issues the directives concerning the dissemination of information regarding intelligence sources, methods, or activities?
answer
The Director of National Intelligence
question
You receive an email from the Internal Revenue Service (IRS) demanding immediate payment of back taxes of which you were not aware. The email provides a website and a toll-free number where you can make payment. What action should you take?
answer
Contact the IRS using their publicly available, official contact information.
question
When using your Government-issued laptop in public environments, with which of the following should you be concerned?
answer
The potential for unauthorized viewing of work-related information displayed on your screen.
question
Which is conducting a private money-making venture using your Government-furnished computer permitted?
answer
It is never permitted.
question
Which of the following is a best practice for securing your home computer?
answer
Use antivirus software and keep it up to date.