cyber awareness challenge 2020 example #71542

26 April 2023
4.5 (222 reviews)
53 test answers

Unlock all answers in this set

Unlock answers (49)
question
Which of the following can an unauthorized disclosure of information...?
answer
damage to national security
question
A user writes down details from a report stored on a classified system marked as secret and uses those details to draft an unclassified briefing on an unclassified system without authorization...
answer
Spillage because classified data was moved....
question
What is the proper response if spillage occurs
answer
Immediately notify your security POC
question
When classified data is not in use, how can you protect it?
answer
Store classified data appropriately in GSA-approved vault/container when not in use.
question
Which is the best response if you find classified government data on the internet?
answer
Note any identifying information
question
What is required for an individual to access classified data
answer
Appropriate clearance; signed and approved...
question
Which of the following practices reduces the chance of becoming a target by adversaries seeking insider information
answer
Don't talk about work outside your workspace unless it is a specifically...
question
Which of the following terms refers to harm inflicted or national security through authorized...?
answer
insider threat
question
Which is good practice to protect classified information?
answer
Ensure proper labeling by appropriately marking all classified material.
question
Which classification level is given to information that could reasonably be expected to cause serious damage to national security?
answer
secret
question
How many potential insider threat indicators does a person who is playful...?
answer
1
question
what are some potential insider threat indicators?
answer
Difficult life circumstances such as...
question
Which scenario might indicate a reportable insider threat security incident?
answer
A coworker is observed using a personal electronic device...
question
Which of the following is a best practice to protect information about you and your organization on social networking sites and applications?
answer
Use only personal contact information when establishing personal social networking accounts...
question
AS someone who works with classified information, what should you do if you are contacted by a foreign national seeking information on a research project?
answer
inform your security POC of all bob-professional or non-routine contacts with foreign nationals....
question
under which circumstances may you be subject..... online misconduct?
answer
Any time you participate in or condone misconduct...
question
When is the best time to post details of your vacation....
answer
When your vacation is over
question
what type of unclassified material should always be marked with special handling caveat?
answer
FOUO
question
what is an individuals PII or PHI considered?
answer
Sensitive information
question
What is the best example of PII
answer
Date and Place of birth
question
What is the best example of PHI
answer
your health insurance explanation of benefits (EOB)
question
What must you ensure before transmitting PII or PHI via email?
answer
Transmissions must be between government e-mail accounts and must be encrypted
question
what must you do when e-mailing PII or PHI
answer
Encrypt the email and use your government e-mail
question
What does PII include
answer
Social security, date and place of birth, mothers maiden name
question
It is acceptable to take a short break while a coworker monitors you computer...
answer
No. Always remove your cac ...
question
what certificates are contained on the DOD PKI implemented by the CAC/PIV
answer
Identification, Encryption, digital signature
question
What is a good practice when it is necessary to use a password to access a system or an application?
answer
Avoid using the same password between systems or applications
question
Which is not sufficient to protect your identity?
answer
use a common password for all your system and application logons.
question
Which term describes an event where a person who does not have the required clearance or access caveats comes into possession of sensitive compartmented information?
answer
compromise
question
What are the requirements to be granted access to SCI material?
answer
The proper security clearance and indoctrination into the SCI program
question
What is a SCI program?
answer
a program that segregates various information....
question
what organization issues directives concerning the dissemination of information...?
answer
OCA
question
what portable electronic devices are allowed in a SCIF
answer
Government- owned PEDS
question
What must users do when using removable media within a SCIF?
answer
User shall comply with site CM polices and procedures
question
What is an indication that malicious code is running on your system?
answer
File corruption
question
What can malicious code do?
answer
It can cause damage by corrupting files...
question
Which is true of cookies?
answer
Text file
question
What is a valid response when identity theft occurs?
answer
Report the crime to local law enforcement
question
What are some actions you can take to try to protect your identity?
answer
Shred personal documents; never share password; and order a credit report annually.
question
What is whaling?
answer
A type of phishing targeted at high level personnel such as senior officials
question
What is a common method used in social engineering?
answer
Telephone surveys
question
Which of the following is an appropriate use of government e-mail?
answer
Digitally signing e-mails that contain attachment or hyperlinks.
question
What is a protection against internet hoaxes?
answer
Use online sites to confirm or expose potential hoaxes.
question
Which may be a security issue with compressed URLs?
answer
They may be used to mask malicious intent
question
what is best practice while traveling with mobile computing devices?
answer
Maintain possession of your laptop and other...
question
upon connecting your Government-issued laptop to a public wireless connection, what should you immediately do?
answer
Connect to the Government Virtual Private Network (VPN)
question
When conducting a private money- making venture using your government...?
answer
It is never permitted
question
Which of the following helps protect data on your personal mobile devices?
answer
Secure personal mobile devices to the same level as government issued systems
question
Which is a wireless technology that enables your electronic devices to establish communications and exchange information when placed next to each other called?
answer
NFC
question
What are some examples of removable media?
answer
Memory sticks, flash drives, or external hard drives
question
Which is best practice to protect data on your mobile computing device?
answer
lock your device when not in use and require a password to reactivate
question
What is a good practice to protect data on your home wireless systems?
answer
Ensure that the wireless security features are properly configured
question
What is a possible indication of a malicious code attack in progress?
answer
A pop-up window that flashes and warns that your computer is infected with a virus.