Cyber Awareness Challenge 2021

17 October 2022
4.7 (114 reviews)
26 test answers

Unlock all answers in this set

Unlock answers (22)
question
After reading an online story about a new security project being developed on the military installation where you work, your neighbor asks you to comment about the article. You know this project is classified. What should be your response?
answer
attempt to change the subject to something non-work related, but neither confirm nor deny the article's authenticity.
question
what is required for an individual to access classified data?
answer
Appropriate clearance, a signed and approved non-disclosure agreement, and need-to-know
question
Which of the following is true of protecting classified data?
answer
classified material must be appropriately marked.
question
Which of the following terms refers to someone who harms national security through authorized access to information or information systems?
answer
Insider threat
question
Which of the following should be reported as potential security incident?
answer
A coworker removes sensitive information without authorization
question
A colleague has visited several foreign countries recently, has adequate work quality, speaks openly of unhappiness with U.S. foreign policy, and recently had his car repossessed. How many potential insider threat indicators does this employee display?
answer
3 or more indicators
question
Under which circumstances may you be subject to criminal, disciplinary, and/or administrative action due to online misconduct?
answer
Any time you participate in or condone misconduct, whether offline or online
question
What action should you take if you receive a friend request on your social networking website from someone in Germany you met casually at a conference last year?
answer
decline the request
question
Under which circumstances is it permitted to share an unclassified draft document with a non-DoD professional discussion group?
answer
As long as the document is cleared for public release, you may release it outside of DoD
question
Which of the following is the best example of Protected Health Information (PHI)?
answer
Your health insurance explanation of benefits (EOB)
question
Which of the following is the best example of Personally Identifiable Information (PII)?
answer
Passport Number
question
Is it acceptable to take a short break while a coworker monitors your computer while logged on with you common access card (CAC)?
answer
No. Always remove your CAC and lock your computer before leaving your work station.
question
What is Sensitive Compartment Information (SCI) program?
answer
A program that segregates various type of classified information
question
What must you ensure if your work involves the use of different types of smart card security tokens?
answer
Use the appropriate token for each system.
question
Which must be approved and signed by a cognizant Original Classification Authority (OCA)?
answer
Sensitive Compartment Information (SCI) policy
question
When is it appropriate to have your security bade visible?
answer
At all times when in the facility
question
What should the owner of this printed SCI do differently?
answer
Retrieve classified documents promptly from printers
question
What should the participants in this conversation involving SCI do differently?
answer
Physically assess that everyone within listening distance is cleared and has a need-to-know for the information being discussed
question
What portable electronic devices (PEDs) are allowed in a secure Compartmented Information Facility (SCIF)?
answer
Government-owned PEDs, if expressly authorized by your agency.
question
Which of the following is NOT a typical means for spreading malicious code?
answer
Patching from a trusted source
question
While you were registering for conference, you arrive at the website http://www.dcsecurityconference.org/registration/. The website requires a credit card for registration. what should you do?
answer
Since the URL does not start with "https", do not provide your credit card information.
question
Upon connecting your Government-issued laptop to a public wireless connection, what should you immediately do?
answer
connect to the Government Virtual Private Network (VPN)
question
Under what circumstances is it acceptable to use your government-furnished computer to check personal e-mail and do non-work-related activities?
answer
If allowed by organizational policy
question
Which is a rule for removable media, other portable electronic devices (PEDs), and mobile computing devices to protect Government systems?
answer
Do not use any personally owned/ non-organizational removable media on your oranizations systems
question
What are some examples of removable media?
answer
memory sticks, flash drives, or external hard drives
question
Which of the following is a best practice for securing your home computer?
answer
Use antivirus software and keep it up to date