DOD Cyber Awareness Challenge 2019: Knowledge Check Questions

2 September 2022
4.7 (114 reviews)
69 test answers

Unlock all answers in this set

Unlock answers (65)
question
What should you do after you have ended a call from a reporter asking you to confirm potentially classified info found on the web?
answer
Alert your security point of contact.
question
Which of the following actions is appropriate after finding classified Government information on the internet?
answer
Note any identifying information and the website's URL.
question
Which of these is true of unclassified data?
answer
Its classification level may rise when aggregated.
question
What type of information includes personal, payroll, medical, and operational information?
answer
Sensitive
question
What is the best protection method for sharing Personally Identifiable Information (PII)?
answer
Digitally sign and encrypt the email.
question
Which of the following is NOT a typical result from running malicious code?
answer
Disables cookies.
question
Which of the following is a practice that helps to protect you from identity theft?
answer
Ordering a credit report annually.
question
Which of the following describes an appropriate use of Government email?
answer
Molly uses a digital signature when sending attachments or hyperlinks.
question
Which of the following is true of Internet hoaxes?
answer
They can be part of a distributed denial-of-service (DDoS) attack.
question
Which of the following is a practice that helps to prevent the download of viruses and other malicious code when checking your email?
answer
Do not access links or hyperlinked media such as buttons and graphics in email messages.
question
Upon connecting your Government-issued laptop to a public wireless connection, what should you immediately do?
answer
Connect to the Government Virtual Private Network (VPN).
question
Under what circumstances is it acceptable to check personal email on Government-furnished equipment (GFE)?
answer
If your organization allows it.
question
When checking in at the airline counter for a business trip...
answer
Decline so that you maintain physical contact of your Government-issued laptop.
question
A man you do not know is trying to look at your Government-issued phone and has asked to use it. What should you do?
answer
Decline to lend the man your phone.
question
How can you protect your information when using wireless technology?
answer
Avoid using non-Bluetooth-paired or unencrypted wireless computer peripherals.
question
What kind of information could reasonably be expected to cause serious damage to national security in the event of unauthorized disclosure?
answer
Top Secret
question
A colleague has visited several foreign countries recently...
answer
. 2 indicators
question
Which of the following is NOT considered a potential insider threat indicator?
answer
New interest in learning a foreign language.
question
When would be a good time to post your vacation location and dates on your social networking website?
answer
When you return from your vacation.
question
Which of the following statements is TRUE about the use of DoD Public Key Infrastructure (PKI) tokens?
answer
Always use DoD PKI tokens within their designated classification level.
question
How should you protect your Common Access Card (CAC) or Personal Identity Verification (PIV) card?
answer
Store it in a shielded sleeve to avoid chip cloning.
question
What do you do if spillage occurs?
answer
?
question
Which of the following does NOT constitute spillage?
answer
Classified information that should be unclassified and is downgraded
question
Which of the following is NOT an appropriate way to protect against inadvertent spillage?
answer
Use the classified network for all work, including unclassified work
question
Which of the following should you NOT do if you find classified information on the internet?
answer
Download the information
question
Which of the following is NOT true concerning a computer labeled SECRET?
answer
May be used on an unclassified network
question
What kind of information could reasonably be expected to cause serious damage to national security in the event of unauthorized disclosure?
answer
Secret
question
What advantages do "insider threats" have over others that allows them to be able to do extraordinary damage to their organizations?
answer
They are trusted and have authorized access to Government information systems.
question
Which of the following should be reported as a potential security incident?
answer
A coworker removes sensitive information without authorization.
question
A colleague complains about anxiety and exhaustion, makes coworkers uncomfortable by asking excessive questions about classified projects, and complains about the credit card bills that his wife runs up. How many potential insider threat indicators does this employee display?
answer
3 or more indicators
question
In addition to avoiding the temptation of greed to betray his country, what should Alex do differently?
answer
Avoid talking about work outside of the workplace or with people without a need-to-know
question
How many insider threat indicators does Alex demonstrate?
answer
Three or more
question
What should Alex's colleagues do?
answer
Report the suspicious behavior in accordance with their organization's insider threat policy
question
What information most likely presents a security risk on your personal social networking profile?
answer
Personal email address
question
What information most likely presents a security risk on your personal social networking profile?
answer
?
question
Select all sections of the profile that contain an issue. Then select Submit. [Alex Smith]
answer
All three sections
question
Select the appropriate setting for each item. Then select Save. [Alex Smith/Social Media]
answer
Name and profile picture - Any (depends on personal preference) Biographical data - Friends Only; Status, photos, and posts - Friends Only; Family and relationships - Friends Only; Birthday - Friends Only; Photos and videos you are in - Friends Only; Check in location via GPS - Off
question
Which of the following is NOT a correct way to protect sensitive information?
answer
Sensitive information may be stored on any password-protected system.
question
Is it permitted to share an unclassified draft document with a non-DoD professional discussion group?
answer
As long as the document is cleared for public release, you may share it outside of DoD.
question
Which type of information includes personal, payroll, medical, and operational information?
answer
Sensitive
question
After clicking on a link on a website, a box pops up and asks if you want to run an application. Is it okay to run it?
answer
No. Only allow mobile code to run from your organization or your organization's trusted sites.
question
Which of the following represents a good physical security practice?
answer
Use your own security badge, key code, or Common Access Card (CAC)/Personal Identity Verification (PIC) card.
question
Which of the following statements is TRUE about the use of DoD Public Key Infrastructure (PKI) tokens?
answer
Always use DoD PKI tokens within their designated classification level.
question
What is the best way to protect your Common Access Card (CAC) or Personal Identity Verification (PIV) card?
answer
Maintain possession of it at all times.
question
Which of the following is a best practice for handling cookies?
answer
?
question
Select all security issues. Then select Submit. [Isabel/Website Use]
answer
Top and bottom sections only
question
You receive an email at your official Government email address from an individual at the Office of Personnel Management (OPM). The email provides a link to a personnel portal where you must enter your personal information as part of an effort to standardize recordkeeping. What action should you take first?
answer
Look for a digital signature on the email.
question
You receive an email from the Internal Revenue Service (IRS) demanding immediate payment of back taxes of which you were not aware. The email provides a website and a toll-free number where you can make payment. What action should you take?
answer
Contact the IRS using their publicly available, official contact information.
question
Which email attachments are generally SAFE to open?
answer
Attachments contained in a digitally signed email from someone known
question
Which of the following is NOT true of traveling overseas with a mobile phone?
answer
?
question
What should Sara do when using publicly available Internet, such as hotel Wi-Fi?
answer
Only connect with the Government VPN
question
What is the danger of using public Wi-Fi connections?
answer
Both of these
question
A coworker has asked if you want to download a programmer's game to play at work. What should be your response?
answer
I'll pass.
question
While you are waiting for your lunch bill, a stranger picks up your Government-issued phone from your table and proceeds to exit the facility with it. What should you do?
answer
Try to observe the direction taken and any other useful information and immediately make a report to your security point of contact.
question
Mobile devices include fitness bands, tablets, smartphones, electronic readers, and Bluetooth- enabled devices.
answer
True
question
Which of the following is a best practice for securing your home computer?
answer
Use antivirus software and keep it up to date.
question
Which of the following is true of protecting classified data?
answer
Classified material must be appropriately marked
question
A colleague has won 10 high-performance awards, can be playful and charming, is not currently in a relationship, and is occasionally aggressive in trying to access sensitive information. How many potential insider threat indicators does this employee display?
answer
1 indicator
question
You receive a friend request from someone in Germany that you meet casually at a conference last year?
answer
Decline Request
question
In setting up your personal social networking service account, what email address should you use?
answer
Your personal email address
question
Which of the following is the example of Personally Identifiable Information (PII)?
answer
Date of Birth
question
Which is it appropriate to have your security badge visible within a Sensitive Compartmented Information Facility (SCIF)
answer
At all times when in the facility
question
What actions should you take upon hearing a discussion involving Sensitive Compartmented Information (SCI) while seated in a cafeteria within an SCI Facility (SCIF)?
answer
Remind those involved that such discussions should not take place in common area within a SCIF
question
What portable electronic devices (PEDs) are permitted in a Sensitive Comnpartmented Information Facility (SCIF)?
answer
Government -owned PEDs expressly authorized by your Agency
question
Which of the following is NOT a typical means for spreading malicious code?
answer
Patching from a trusted source
question
What is TRUE of a phishing attack?
answer
Phishing can be an email with a hyperlink as bait
question
You receive an unexpected email from a friend: "I think you'll like this: https://tinyurl.com/2fcbvy." What action should you take?
answer
Use TinyURL's preview feature to investigate where the link leads
question
When using your Government-issued laptop in public environments, with which of the following should you be concerned?
answer
The potential for unauthorized viewing of work-related information displayed on your screen
question
When checking in at the airline counter for a business trip, you are asked if you would like to check your laptop bag. This bag contains your Government-issued laptop. What should you do?
answer
Decline so that you maintain physical control of your Government-issued laptop