Cyber Awareness Challenge Knowledge Check

25 July 2022
4.7 (114 reviews)
28 test answers

Unlock all answers in this set

Unlock answers (24)
question
Which of the following actions is appropriate after finding classified Government information on the internet?
answer
Note any identifying information and the website's URL
question
Which of the following may help to prevent inadvertent spillage?
answer
Label all files, removable media, and subject headers with appropriate classification markings.
question
A colleague asks to leave a report containing protected health information (PHI) on his desk overnight so he can continue working on it the next day. How do you respond?
answer
tell your colleague that it needs to be secured in a cabinet or container
question
Which of the following is NOT an example of sensitive information?
answer
press release data
question
What does Personally Identifiable information (PII) include?
answer
Social Security Number, date and place of birth, mother's maiden name
question
What is an indication that malicious code is running on your system?
answer
file corruption
question
Which of the following is true of protecting classified data?
answer
Classified material must be appropriately marked.
question
What is required for an individual to access classified data?
answer
Appropriate clearance; signed and approved non-disclosure agreement; and need-to-know.
question
Which of the following should be reported as a potential security incident?
answer
A coworker removes sensitive information without authorization
question
What are some potential insider threat indicators?
answer
difficult life circumstances such as substance abuse, divided loyalty or allegiance to the U.S., and extreme, persistent interpersonal difficulties
question
Which of the following is not considered a potential insider threat indicator?
answer
treated mental health issues
question
When is the best time to post details of your vacation activities on your social networking website?
answer
When your vacation is over, and you have returned home.
question
Which of the following is a best practice to protect information about you and your organization on social networking sites and applications?
answer
Use only personal contact information when establishing personal social networking accounts, never use Government contact information.
question
You have reached the office door to exit your controlled area. As a security best practice, what should you do before exiting?
answer
Remove your security badge, common access card (CAC), or personal identity verification (PIV) card.
question
What certificates are contained on the Common Access Card (CAC)?
answer
Identification, encryption, and digital signature
question
How should you protect your Common Access Card (CAC) or Personal Identity Verification (PIV) card?
answer
Store it in a shielded sleeve to avoid chip cloning.
question
Which is it appropriate to have your security badge visible within a Sensitive Compartmented Information Facility (SCIF)
answer
At all times when in the facility
question
What are the requirements to be granted access to sensitive compartmented information (SCI)?
answer
The proper security clearance and indoctrination into the SCI program
question
Which is a risk associated with removable media?
answer
Spillage of classified information.
question
While you are registering for a conference, you arrive at the website http://www.dcsecurityconference.org/registration/. The website requires a credit card for registration. What should you do?
answer
Since the URL does not start with "https," do not provide your credit card information.
question
What helps protect from spear phishing?
answer
be wary of suspicious e-mails that use your name and/or appear to come from inside your organization.
question
What is a way to prevent the download of viruses and other malicious code when checking your e-mail?
answer
View email in plain text and don't view email in Preview Pane.
question
Which of the following is a practice that helps to prevent the download of viruses and other malicious code when checking your email?
answer
Do not access links or hyperlinked media such as buttons and graphics in email messages.
question
What is best practice while traveling with mobile computing devices?
answer
Maintain possession of your laptop and other government-furnished equipment (GFE) at all times.
question
A Coworker has asked if you want to download a programmers game to play at work. what should be your response be?
answer
I'll pass
question
What is a rule for removable media, other portable electronic devices (PEDs), and mobile computing devices to protect Government systems?
answer
Do not use any personally owned/non-organizational removable media on your organization's systems.
question
A man you do not know is trying to look at your Government-issued phone and has asked to use it. What should you do?
answer
Decline to lend the man your phone.
question
What is a security best practice to employ on your home computer?
answer
Create separate user accounts with strong individual passwords.