Cyber Awareness Knowledge Check 2021

6 October 2022
4.7 (114 reviews)
27 test answers

Unlock all answers in this set

Unlock answers (23)
question
What should you do if a reporter asks you about potentially classified information on the web?
answer
Refer to public affair office.
question
Which of the following can an unauthorised disclosure of information classified as Confidential reasonably be expected to cause?
answer
Damage to national security.
question
Which classification level is given to information that could reasonably be expected to cause serious damage to national security?
answer
Secret
question
Which of the following should be reported as a potential security incident (in accordance with your Agency's insider threat policy)?
answer
A coworker brings a personal electronic device into a prohibited area.
question
Which of the following is NOT considered a potential insider threat indicator?
answer
Sudden interest in learning a new language.
question
What type of activity or behavior should be reported as a potential insider threat?
answer
Coworker making consistent statements indicative of hostility or anger toward the United States and Its policies.
question
What information most likely presents a security risk on your personal social networking profile?
answer
Personal email address
question
Which of the following is a best practice to protect information about you and your organization on social networking sites and applications?
answer
Use only personal contact information when establishing personal social networking accounts, never use Government contact information.
question
Which of the following is true about unclassified data?
answer
When unclassified data is aggregated, Its classification level may rise.
question
Under what circumstances could unclassified information be considered a threat to national security?
answer
If aggregated, the information could become classified.
question
Under which circumstances is it permitted to share an unclassified draft document with a non-DoD professional discussion group?
answer
As long as the document is cleared fir public release, you may share it outside of DoD
question
Which of the following does Cyberspace Protection Conditions (CPCON) establish during significant cyberspace events?
answer
protection priorities.
question
Which of the following statements is NOT true about protecting your virtual identity?
answer
Use personal information to help creat strong passwords.
question
What certificates are contained in the Common Access Card (CAC)
answer
Identification, encryption, and digital signature.
question
Which of the following best describes the compromise of Sensitive Compartmented Information (SCI)?
answer
A person who does not have the required clearance or access caveats comes into possession of SCI in any manner.
question
Which term describes an event where a person who does not have the required clearance or access caveats comes into possession of Sensitive Compartmented Information (SCI)
answer
Compromise.
question
What must users do when using removable media within a Sensitive Compartmented Information Facility (SCIF)?
answer
Comply with site Configuration/Change Management (CM) policies and procedures.
question
What is an indication that malicious code is running on your system?
answer
File corruption.
question
While you are registering for a conference, you arrive at the website http://www.dcsecurityconference.org/registration/. The website requires a credit card for registration. What should you do?
answer
Since the URL does not start with "https," do not provide your credit card information.
question
What is a common method used in social engineering?
answer
Telephone surveys
question
Which of the following is a way to protect against social engineering?
answer
Follow instructions given only by verified personnel?
question
What is a way to prevent the download of viruses and other malicious code when checking your email?
answer
View e-mail in plain text and dont view e-mail in Preview Pane.
question
When using your Government-issued laptop in public environments, with which of the following should you be concerned?
answer
The potential for unauthorised viewing of work-related information displayed on your screen.
question
Which of the following activities is an ethical use of Government-furnished equipment (GFE)?
answer
Completing your expense report for your government travel.
question
While you are waiting for your lunch bill, a stranger picks up your Government issued phone from your table and proceeds to exit the facility with it. What should you do?
answer
Try to observe the direction taken and any other useful info and immediately make a report to your security point of contact.
question
Which of the following helps protect data on your personal mobile device?
answer
Secure personal mobile devices to the same level as government issues systems
question
What is a good practice to protect data on your home wireless systems?
answer
Ensure that the wireless security features are properly configured.