DoD Cyber Awareness 2019

25 July 2022
4.7 (114 reviews)
33 test answers
question
What do you do if a spillage occurs?
answer
Immediately notify your security point of contact.
question
What should you do if a reporter asks you about potentially classified information on the web?
answer
Neither confirm nor deny the information is classified.
question
Which of the following is NOT true concerning a computer labeled SECRET?
answer
May be used on an unclassified network.
question
Who can be permitted access to classified data?
answer
Only persons with appropriate clearance, a non-disclosure agreement, and need-to-know.
question
Which of the following is NOT considered a potential insider threat indicator?
answer
New interest in learning a foreign language.
question
Which of the following is NOT considered a potential insider threat indicator?
answer
Treated mental health issues.
question
What information most likely presents a security risk on your personal social networking profile?
answer
Personal email address
question
What action should you take if you receive a friend request on your social networking website from someone in Germany you met casually at a conference last year?
answer
Decline the request
question
Which of the following is an example of Protected Health Information (PHI)?
answer
Explanation of benefits from a health insurance company.
question
Which of the following is the best example of Personally Identifiable Information (PPI)?
answer
Date of Birth
question
Which of the following is NOT an example of sensitive information?
answer
Press release date
question
Which of the following represents a good physical security practice?
answer
Use your own security badge, key code, or Common Access Card (CAC)/Personal Identity Verification (PIV) card.
question
Which of the following statements is TRUE about the use of DoD Public Key Infrastructure (PKI) tokens?
answer
Always use DoD PKI tokens within their designated classification level.
question
Which of the following is NOT a good way to protect your identity?
answer
Use a single, complex password for your system and application logons.
question
After clicking on a link on a website, a box pops up and asks if you want to run an application. Is it okay to run it?
answer
No. Only allow mobile code to run from organization or your organization's trusted sites.
question
While you are registering for a conference, you arrive at the website http://www.dcsecurityconference.org/registration/. The website requires a credit card for registration. What should you do?
answer
Since the URL does not start with "https," do not provide your credit card information.
question
You receive a call from someone from the help desk who needs your assistance with a problem on your computer. How should you respond?
answer
Immediately end the phone call.
question
Which of the following is NOT true of traveling overseas with a mobile phone?
answer
Physical security of mobile phones carried overseas is not a major issue.
question
What is a critical consideration on using cloud-based file sharing and storage applications on your Government-furnished equipment (GFE)?
answer
Determine if the software or service is authorized.
question
A coworker wants to send you a sensitive document to review while you are at lunch and you only have your personal tablet. What should you do?
answer
Never allow sensitive data on non-Government-issued mobile devices.
question
When checking in at the airline counter for a business trip, you are asked if you would like to check your laptop bag. This bag contains your Government-issued laptop. What should you do?
answer
Decline so that you maintain physical control of your Government-issued laptop.
question
How can you protect your information when using wireless technology?
answer
Avoid using non-Bluetooth-paired or unencrypted wireless computer peripherals.
question
Which of the following does NOT constitute spillage?
answer
Classified information that should be unclassified and downgraded.
question
Which of the following is NOT an appropriate way to protect against inadvertent spillage?
answer
Use the classified network for all work, including unclassified work.
question
Which of the following should you NOT do if you find classified information on the internet?
answer
Download the information.
question
What should you do when you are working on an unclassified system and receive an email with a classified attachment?
answer
Call your security point of contact immediately to alert them.
question
Which of the following is true of protecting classified data?
answer
Classified material must be appropriately marked.
question
Which level of damage to national security can you reasonably expect Top Secret information to cause if disclosed?
answer
Exceptionally Grave Damage
question
Which of the following is true about telework?
answer
You must have your organization's permission to telework.
question
Which of the following should be reported as a potential security incident (in accordance with your Agency's insider threat policy)?
answer
A coworker brings a personal electronic device into prohibited areas.
question
In addition to avoiding the temptation of greed to betray his country, what should Alex do differently?
answer
Avoid talking about work outside of the workplace or with people without a need-to-know.
question
How many insider threat indicators does Alex demonstrate?
answer
Three or more
question
What should Alex's colleagues do?
answer
Report the suspicious behavior in accordance with their organization's insider threat policy.
1 of 33

Unlock all answers in this set

Unlock answers (29)
question
What do you do if a spillage occurs?
answer
Immediately notify your security point of contact.
question
What should you do if a reporter asks you about potentially classified information on the web?
answer
Neither confirm nor deny the information is classified.
question
Which of the following is NOT true concerning a computer labeled SECRET?
answer
May be used on an unclassified network.
question
Who can be permitted access to classified data?
answer
Only persons with appropriate clearance, a non-disclosure agreement, and need-to-know.
question
Which of the following is NOT considered a potential insider threat indicator?
answer
New interest in learning a foreign language.
question
Which of the following is NOT considered a potential insider threat indicator?
answer
Treated mental health issues.
question
What information most likely presents a security risk on your personal social networking profile?
answer
Personal email address
question
What action should you take if you receive a friend request on your social networking website from someone in Germany you met casually at a conference last year?
answer
Decline the request
question
Which of the following is an example of Protected Health Information (PHI)?
answer
Explanation of benefits from a health insurance company.
question
Which of the following is the best example of Personally Identifiable Information (PPI)?
answer
Date of Birth
question
Which of the following is NOT an example of sensitive information?
answer
Press release date
question
Which of the following represents a good physical security practice?
answer
Use your own security badge, key code, or Common Access Card (CAC)/Personal Identity Verification (PIV) card.
question
Which of the following statements is TRUE about the use of DoD Public Key Infrastructure (PKI) tokens?
answer
Always use DoD PKI tokens within their designated classification level.
question
Which of the following is NOT a good way to protect your identity?
answer
Use a single, complex password for your system and application logons.
question
After clicking on a link on a website, a box pops up and asks if you want to run an application. Is it okay to run it?
answer
No. Only allow mobile code to run from organization or your organization's trusted sites.
question
While you are registering for a conference, you arrive at the website http://www.dcsecurityconference.org/registration/. The website requires a credit card for registration. What should you do?
answer
Since the URL does not start with "https," do not provide your credit card information.
question
You receive a call from someone from the help desk who needs your assistance with a problem on your computer. How should you respond?
answer
Immediately end the phone call.
question
Which of the following is NOT true of traveling overseas with a mobile phone?
answer
Physical security of mobile phones carried overseas is not a major issue.
question
What is a critical consideration on using cloud-based file sharing and storage applications on your Government-furnished equipment (GFE)?
answer
Determine if the software or service is authorized.
question
A coworker wants to send you a sensitive document to review while you are at lunch and you only have your personal tablet. What should you do?
answer
Never allow sensitive data on non-Government-issued mobile devices.
question
When checking in at the airline counter for a business trip, you are asked if you would like to check your laptop bag. This bag contains your Government-issued laptop. What should you do?
answer
Decline so that you maintain physical control of your Government-issued laptop.
question
How can you protect your information when using wireless technology?
answer
Avoid using non-Bluetooth-paired or unencrypted wireless computer peripherals.
question
Which of the following does NOT constitute spillage?
answer
Classified information that should be unclassified and downgraded.
question
Which of the following is NOT an appropriate way to protect against inadvertent spillage?
answer
Use the classified network for all work, including unclassified work.
question
Which of the following should you NOT do if you find classified information on the internet?
answer
Download the information.
question
What should you do when you are working on an unclassified system and receive an email with a classified attachment?
answer
Call your security point of contact immediately to alert them.
question
Which of the following is true of protecting classified data?
answer
Classified material must be appropriately marked.
question
Which level of damage to national security can you reasonably expect Top Secret information to cause if disclosed?
answer
Exceptionally Grave Damage
question
Which of the following is true about telework?
answer
You must have your organization's permission to telework.
question
Which of the following should be reported as a potential security incident (in accordance with your Agency's insider threat policy)?
answer
A coworker brings a personal electronic device into prohibited areas.
question
In addition to avoiding the temptation of greed to betray his country, what should Alex do differently?
answer
Avoid talking about work outside of the workplace or with people without a need-to-know.
question
How many insider threat indicators does Alex demonstrate?
answer
Three or more
question
What should Alex's colleagues do?
answer
Report the suspicious behavior in accordance with their organization's insider threat policy.