DOD CYBER AWARENESS

25 July 2022
4.7 (114 reviews)
31 test answers

Unlock all answers in this set

Unlock answers (27)
question
Which of the following is not a constitutional spillage?
answer
Classified information that should be unclassified and is downgraded
question
Which of the following is NOT an appropriate way to protect against inadvertent spillage?
answer
Use the classified network for all work, including unclassified work
question
Which of the following should you NOT do if you find classified information on the internet?
answer
Download the information
question
Which of the following is NOT an example of sensitive information?
answer
Press release date
question
Which of the following is NOT a correct way to protect sensitive information?
answer
Sensitive information may be store on any password-protected system
question
PII but not PHI?
answer
Pick the one with social security number
question
PHI Protected
answer
Pick the one without social security number
question
Which of the following is an example of malicious code?
answer
Software that install itself without the user's knowledge
question
How can malicious code caused damage?
answer
ALL OF THE ABOVE corrupting files, erasing your hard drive, allowing hackers access
question
How can you avoid downloading malicious code?
answer
Do not access website links en e-mail messages
question
What level of damage to national security can you reasonably expect Top Secret information to cause if disclosed?
answer
Exceptionally grave damage
question
Which of the following is true about telework?
answer
You must have your organization's permission to telework
question
Which of the following is true of protecting classified data?
answer
Classified material must be appropriate marked
question
In addition to avoiding the temptation of green to betray his country, what would Alex do differently?
answer
Avoid talking questions of potential work outside of the workplace or with people without a need-to-know
question
How many insider threat indicates does Alex demonstrate?
answer
Three or mroe
question
What should Alex's colleagues do?
answer
Report the suspicious behavior in accordance with their organization's insider threat policy
question
What should the employee do differently?
answer
Remove his CAC and lock his workstation
question
What should the employee do differently?
answer
Decline to let the person in and redirect her to security
question
Security Violations
answer
Computer and CAC, pin on the board, finger prints and biometrics, DOD token, CAC/PIV
question
When is it appropriate to have your security badge visible?
answer
At all times when in the facility
question
What should the owner of this printed SCI do differently?
answer
Retrieve classified documents promptly from printers
question
What should the participants in this conversation involving SCI do directly?
answer
Physically assess that everyone within listening distance is cleared and has a need-to-know for the information being discussed
question
What portable electronic device (ped's) are permitted in a SCIF
answer
Only expressly authorized government-owned ped's
question
What is the response to an incident such as opening an uncontrolled DVD on a computer in a SCIF?
answer
ALL OF THE ABOVE -notify your security POC -analyze the media for viruses or malicious code -analyze the other workstations in the SCIF for viruses or malicious code
question
Books link Yesterday 2 days ago (required profile update)
answer
delete button delete button report button
question
What should Sara do when using publicly available internet, such as hotel WI-FI?
answer
Only connect, exposure of malware
question
What is the danger of using public WI-FI connections?
answer
BOTH OF THESE -compromise of data -exposure of malware
question
NOT permitted uses of government-furnished equip (GFE)
answer
-viewing or downloading pornography -conducting a private gambling online -using unauthorized software -illegal downloading copyrighted materials -making unauthorized configuration changes
question
When is it okay to charge a personal mobile device using government-furnished equipment (GFE)
answer
this is never okay
question
Which of the following demonstrates proper protection of mobile devices?
answer
Linda encrypts all of the sensitive data on her government-issued mobile devices
question
Antivirus Alert Update Status Firewall Status Virus Alert
answer
-click update -click install -click enable -click exit