Cyber Awareness 2020 Notes

9 December 2023
5 (107 reviews)
24 test answers

Unlock all answers in this set

Unlock answers (20)
question
Which of the following may be helpful to prevent inadvertent spillage?
answer
Which of the following may be helpful to prevent inadvertent spillage?
question
What should you do after you have ended a call from a reporter asking you to confirm potentially classified info found on the web?
answer
Alert your security point of contact.
question
Which of the following is NOT an example of sensitive information?
answer
Which of the following is NOT an example of sensitive information?
question
PII
answer
SSN, date and place of birth, mother's maiden name, biometric records, PHI, passport number
question
PHI
answer
Subset of PII, health information that identifies the individual, relates to physical or mental health of an individual, provision of health care to an individual, or payment of healthcare for individual
question
Which of the following is NOT a typical result from running malicious code?
answer
Disable cookies
question
What kind of information could reasonably be expected to cause serious damage to national security in the event of unauthorized disclosure?
answer
Secret
question
Telework
answer
Have your permissions from your organization, follow your organization guideline, use authorized equipment and software, employ cyber security best practice, perform telework in dedicated when home.
question
Which of the following should be reported as a potential security incident (in accordance with your Agency's insider threat policy)?
answer
A coworker brings a personal electronic device into prohibited areas.
question
A colleague complains about anxiety and exhaustion, makes coworkers uncomfortable by asking excessive questions about classified projects, and complains about the credit card bills that his wife runs up. How many potential insider threat indicators does this employee display?
answer
3 or more indicators
question
A colleague has won 10 high-performance awards, can be playful and charming, is not currently in a relationship, and occasionally aggressive in trying to access sensitive information. How many potential insider threat indicators does this employee display?
answer
1 indicator
question
What information most likely presents a security risk on your personal social networking profile?
answer
Mother's maiden name
question
Which of the following represents a good physical security practice?
answer
Use your own security badge, key code, or Common Access Card (CAC)/Personal Identity Verification (PIC) card.
question
How should you protect your Common Access Card (CAC) or Personal Identity Verification (PIV) card?
answer
Store it in a shielded sleeve to avoid chip cloning.
question
Which of the following statements is NOT true about protecting your virtual identity?
answer
Use personal information to help create strong passwords.
question
While you are registering for a conference, you arrive at the website http://www.dcsecurityconference.org/registration/. The website requires a credit card for registration. What should you do?
answer
Since the URL does not start with "https," do not provide your credit card information.
question
You receive an email from the Internal Revenue Service (IRS) demanding immediate payment of back taxes of which you were not aware. The email provides a website and a toll-free number where you can make payment. What action should you take?
answer
Contact the IRS using their publicly available, official contact information.
question
Which of the following is a practice that helps to prevent the download of viruses and other malicious code when checking your email?
answer
Do not access links or hyperlinked media such as buttons and graphics in email messages.
question
Which of the following is true of Internet hoaxes?
answer
They can be part of a distributed denial-of-service (DDoS) attack.
question
Which of the following is NOT true of traveling overseas with a mobile phone?
answer
Physical security of mobile phones carried overseas is not a major issue.
question
A coworker has asked if you want to download a programmer's game to play at work. What should be your response?
answer
I'll pass.
question
A coworker wants to send you a sensitive document to review while you are at lunch and you only have your personal tablet. What should you do?
answer
Never allow sensitive data on non-Government-issued mobile devices.
question
A man you do not know is trying to look at your Government-issued phone and has asked to use it. What should you do?
answer
Decline to lend the man your phone.
question
How can you protect your information when using wireless technology?
answer
Avoid using non-Bluetooth-paired or unencrypted wireless computer peripherals.