DOD Cyber Awareness 2021 (DOD-IAA-V18.0) Knowledge Check

25 July 2022
4.7 (114 reviews)
27 test answers

Unlock all answers in this set

Unlock answers (23)
question
Spillage: What should you do if a reporter asks you about potentially classified information on the web?
answer
Refer the reporter to your organization's public affair office
question
What should you do when you are working on an unclassified system and receive an email with a classified attachment?
answer
Call your security point of contact immediately.
question
Which classified level is given to information that could reasonably be expected to cause serious damage to national security?
answer
Secret
question
Which of the following is true of protecting classified data?
answer
Classified material must be appropriately marked
question
What are some potential insider threat indicators?
answer
Difficult life circumstances such as substance abuse, divided loyalty or allegiance to the U.S., and extreme, persistent interpersonal difficulties.
question
How many potential insider threat indicators does a person who is playful and charming, consistently wins performance awards, but is occasionally aggressive in trying to access sensitive information display?
answer
1 indicator
question
Which of the following is NOT considered a potential insider threat indicator?
answer
New interest in learning a foreign language
question
What should you do if you receive a game application request that includes permission to access your friends, profile information, cookies, and sites visited?
answer
Decline the request.
question
What information posted publicly on your personal social networking profile represents a security risk?
answer
Your place of birth
question
Sensitive Information: Which of the following is an example of Protected Health Information (PHI)?
answer
Medical test results
question
Which of the following is the best example of Personally Identifiable Information (PII)?
answer
Passport number
question
What type of unclassified material should always be marked with a special handling caveat?
answer
Official use only
question
Is it acceptable to take a short break while a coworker monitors your computer while logged on with your Common Access Card (CAC)?
answer
No. Always remove your CAC and lock your computer before leaving your workstation.
question
What is the best way to protect your common access card?
answer
Maintain possession of it at all times.
question
What is a good practice for when it is necessary to use a password to access a system or an application?
answer
Avoid using the same password between systems or applications.
question
When is it appropriate to have your securing badge visible with a sensitive compartmented information facility?
answer
At all time when is the facility.
question
Which of the following does a security classification guide provided?
answer
Precise guidance regarding specific elements of information to be classified
question
What portable electronic devices are allowed in a secure compartmented information facility?
answer
Government owned PEDs if expressed authorized by your agency
question
Malicious code: After clicking on a link on a website, a box pops up and asks if you want to run an application. Is it ok to run it?
answer
No. Only use you agency trusted websites.
question
What are some actions you can take to try to protect you identity?
answer
Shred personal documents, never share passwords and order a credit history annually.
question
Which of the following is a way to protect against social engineering?
answer
Follow the instructions given only by verified personnel.
question
Which may be a security issue with compressed URLs?
answer
There is no way to know where the link actually leads.
question
What is a way to prevent the download of viruses and other malicious code when checking your email?
answer
View email in plain text and don't view email in Preview Pane.
question
Upon connecting your government-issued laptop to a public wireless connection, what should you immediately do?
answer
Connect to the Government Virtual Private Network (VPN).
question
When is conducting a private money-making venture using your Government-furnished computer permitted?
answer
It is never permitted
question
What are some examples of removable media?
answer
Memory sticks, flash drives, or external hard drives.
question
Which of the following is a best practice for securing your home computer?
answer
Use antivirus software and keep it up to date.