Cyber Awareness Challenge 2020 Knowledge Check

25 July 2022
4.7 (114 reviews)
28 test answers

Unlock all answers in this set

Unlock answers (24)
question
Which of the following is a good practice to aid in preventing spillage?
answer
Be aware of classification markings and all handling caveats.
question
What is the best response if you find classified government data on the internet?
answer
Note any identifying information, such as the website's URL, and report the situation to your security POC.
question
What is required for an individual to access classified data?
answer
Appropriate clearance; signed and approved non-disclosure agreement; and need-to-know
question
When classified data is not in use, how can you protect it?
answer
store classified data appropriately in a GSA- approved vault/container when not in use.
question
which of the following practices reduces the chance of becoming a target by adversaries seeking information?
answer
Don't talk about work outside your workspace unless it is a specifically designated public meeting environment and is controlled by the event planners.
question
Why might "insiders' be able to cause damage to their organizations more easily than others?
answer
Insiders are given a level of trust and have authorized access to government information systems.
question
Which scenario might indicate a reportable insider threat security incident?
answer
A coworker is observed using a personal electronic device in an area where their use is prohibited.
question
which represents a security best practice when using social networking?
answer
Understanding and using all available privacy settings.
question
When is the best time to post details of your vacation activities on your social networking website?
answer
When your vacation is over, and you have returned home.
question
What must you do when e-mailing Personally Identifiable Information (PII) or Protected Health Information (PHI)?
answer
Encrypt the e-mail and use your Government e-mail account.
question
What is the best example of Protected Health information (PHI)?
answer
Your health insurance explanation of benefits (EOB).
question
Under what circumstances could unclassified information be considered a threat to national security?
answer
If aggregated, the information could become classified.
question
What is a good practice for physical security?
answer
Challenge people without proper badges.
question
What is a good practice when it is necessary to use a password to access a system or an application?
answer
Avoid using the same password between systems or applications.
question
Whats is the best description of two-factor authentication?
answer
Something you possess, like a CAC, and something you know, like a PIN or password.
question
What are the requirements to be granted access to SCI material?
answer
The proper security clearance and indoctrination into the SCI program.
question
What organization issues the directives concerning the dissemination of information regarding intelligence sources, methods, or activities?
answer
The Director of National Intelligence.
question
Which is a risk associated with removable media?
answer
Spillage of classified information.
question
What can malicious code do?
answer
it can cause damage by corrupting files, erasing your hard drive, and/or allowing hackers access.
question
What is a valid response when identity theft occurs?
answer
Report the crime to local law enforcement.
question
Which may be a security issue with compressed URLs?
answer
They may be used to mask malicious intent.
question
What helps protect from spear phishing?
answer
Be wary of suspicious e-mails that use your name and/or appear to come from inside your organization.
question
What is whaling?
answer
A type of phishing targeted at high-end personnel such as senior officials.
question
Upon connecting your Government-issued laptop to a public wireless connection, what should you immediately do?
answer
Connect to the Government Virtual Private Network (VPN).
question
Under what circumstances is it acceptable to use your Government-furnished computer to check personal e-mail and do other non-work related activities?
answer
If allowed by organizational policy.
question
Which is a wireless technology that enables your electronic devices to establish communications and exchange information when placed next to each other called?
answer
Near field communication (NFC).
question
Which is a rule for removable media, other portable electronic devices (PEDs), and mobile computing devices to protect Government systems?
answer
Do not use any personally owned/non-organizational removable media on your organization's systems.
question
What is a good practice to protect data on your home wireless systems?
answer
Ensure that the wireless security features are properly configured.