DOD Cyber Awareness Challenge 2019

25 July 2022
4.7 (114 reviews)
24 test answers

Unlock all answers in this set

Unlock answers (20)
question
Which of these is true of unclassified data?
answer
-It must be released to the public immediately. -Its classification level may rise when aggregated. (Correct) -It does not affect the safety of Government missions. -It never requires classification markings.
question
Which type of information includes personal, payroll, medical, and operational information?
answer
Sensitive
question
Which of the following is NOT a correct way to protect sensitive information?
answer
Sensitive information may be stored on any password-protected system.
question
Which of the following is NOT a typical result from running malicious code?
answer
Disabling cookies
question
What level of damage to national security could reasonably be expected if unauthorized disclosure of Top Secret information occurred?
answer
Exceptionally grave damage
question
Which of the following is true about telework?
answer
You must have your organization's permission to telework.
question
Which of following is true of protecting classified data?
answer
Classified material must be appropriately marked.
question
Which of the following is NOT considered a potential insider threat indicator?
answer
New interest in learning another language?
question
A colleague has visited several foreign countries recently, has adequate work quality, speaks openly of unhappiness with U.S. foreign policy, and recently had his car repossessed. How many indicators does this employee display?
answer
3 or more?
question
Which of the following is NOT considered a potential insider threat indicator?
answer
Treated mental health issues.
question
What would you do if you receive a game application request on your government computer that includes permission to access your friends, profile information, cookies, and sites visited?
answer
Decline the request.
question
What information most likely presents a security risk on your personal social networking profile?
answer
Birthplace
question
You have reached the office door to exit your controlled area. As a security best practice, what should you do before exiting?
answer
Remove your security badge, common access card (CAC), or personal identity verification (PIV) card.
question
How should you protect your Common Access Card (CAC) or Personal Identity Verification (PIV) card?
answer
Store it in a shielded sleeve to avoid chip cloning.
question
Which of the following statements is TRUE about the use of DoD Public Key Infrastructure (PKI) tokens?
answer
Always use DoD PKI tokens within their designated classification level.
question
Which of the following is a best practice for handling cookies?
answer
If possible, set your browser preferences to prompt you each time a website wants to store a cookie.
question
You receive an unexpected email from a friend: "I think you'll like this: (URL)" What action should you take?
answer
Use TinyURL's preview feature to investigate where the link leads.
question
You receive an email at your official Government email address from an individual at the Office of Personnel Management (OPM). The email provides a link to a personnel portal where you must enter your personal information as part of an effort to standardize recordkeeping. What action should you take first?
answer
Look for a digital signature on the email.
question
What is TRUE of a phishing attack?
answer
Phishing can be an email with a hyperlink as bait.
question
Upon connecting your Government-issued laptop to a public wireless connection, what should you immediately do?
answer
Connect to the Government Virtual Private Network (VPN).??
question
A coworker has asked if you want to download a programmer's game to play at work. What should be your response?
answer
I'll pass.
question
A coworker wants to send you a sensitive document to review while you are at lunch and you only have your personal tablet. What should you do?
answer
Never allow sensitive data on non-Government-issued mobile devices.
question
Which of the following demonstrates proper protection of mobile devices?
answer
Linda encrypts all of the sensitive data on her government-issued mobile devices.
question
How can you protect your information when using wireless technology?
answer
Avoid using non-Bluetooth-paired or unencrypted wireless computer peripherals.