DOD Cyber Awareness Challenge 2019 (DOD-IAA-V16.0)

25 July 2022
4.7 (114 reviews)
35 test answers

Unlock all answers in this set

Unlock answers (31)
question
Did you earn a Cyber Security Awareness Challenge 2018 Certificate of Completion?
answer
No
question
Which of the following does NOT constitute spillage?
answer
Classified information that should be unclassified and is downgraded
question
Which of the following is NOT an appropriate way to protect against inadvertent spillage?
answer
Use the classified network for all work, including unclassified work
question
Which of the following should you NOT do if you find classified information on the internet?
answer
Download the information
question
What level of damage to national security can you reasonably expect Top Secret information to cause if disclosed?
answer
Exceptionally grave damage
question
Which of the following is true about telework?
answer
You must have your organization's permission to telework.
question
Which of the following is true of protecting classified data?
answer
Classified material must be appropriately marked.
question
In addition to avoiding the temptation of greed to betray his country, what should Alex do differently?
answer
Avoid talking about work outside of the workplace or with people without a need-to-know
question
Ellen's Statement How many insider threat indicators does Alex demonstrate?
answer
Three or more
question
Mark's Statement What should Alex's colleagues do?
answer
Report the suspicious behavior in accordance with their organization's insider threat policy
question
Select all sections of the profile that contain an issue. Then select Submit.
answer
All three sections
question
Select the appropriate setting for each item. Then select Save.
answer
Name and profile picture - Any Status, photos, and posts - Friends Only Family and relationships - Friends Only Birthday - Friends Only Photos and videos you are in - Friends Only Check in location via GPS: Off
question
Which of the following is NOT an example of sensitive information?
answer
Press release data
question
Which of the following is NOT a correct way to protect sensitive information?
answer
Sensitive information may be stored on any password-protected system.
question
Victim Select the information on the data sheet that is personally identifiable information (PII) but not protected health information (PHI).
answer
Top box
question
Select the information on the data sheet that is protected health information (PHI).
answer
Bottom box
question
Incident #1 What should the employee do differently?
answer
Remove his CAC and lock his workstation.
question
Incident #2 What should the employee do differently?
answer
Decline to let the person in and redirect her to security.
question
Incident Select all violations at this unattended workstation. Then select Submit.
answer
Laptop with CAC left inserted Sticky note with Pin number
question
Prevalence Which of the following is an example of malicious code?
answer
Software that installs itself without the user's knowledge
question
Damage How can malicious code cause damage?
answer
All of these
question
Spread How can you avoid downloading malicious code?
answer
Do not access website links in e-mail messages
question
Incident Select all security issues. Then select Submit.
answer
Top and Bottom sections
question
From Alice Murphy Select an action.
answer
Delete e-mail
question
From Pursuit Bank Select an action.
answer
Delete e-mail
question
From John Anderson Select an action.
answer
Report e-mail
question
Incident What should Sara do when using publicly available Internet, such as hotel Wi-Fi?
answer
Only connect Government VPN
question
What is the danger of using public Wi-Fi connetions?
answer
Both of these
question
Incident Select Yes or No for each item. Then select Submit. (Permitted Uses of Government-Furnished Equipment GFE))
answer
Viewing or downloading pornography - No Gambling online - No Conducting a private money-making venture - No Using unauthorized software - No Illegally downloading copyrighted material - No Making unauthorized configuration changes - No
question
Incident When is it okay to charge a personal mobile device using government-furnished equipment (GFE)?
answer
This is never okay.
question
Which of the following demonstrates proper protection of mobile devices?
answer
Linda encrypts all of the sensitive data on her government-issued mobile devices.
question
Evidence Your antivirus is out-of-date. Update now?
answer
Update
question
Security updates are ready to install. Install now?
answer
Install
question
Firewall disabled. Would you like to enable the firewall?
answer
Enable
question
A virus has been detected.
answer
Exit