Cyber Awareness Challenge Knowledge Check 100% Pass.
Cyber Awareness Challenge Knowledge Check 100% Pass. Which of the following actions is appropriate after finding classified Government information on the internet? - ANSWER Note any identifying information and the website's URL Which of the following may help to prevent inadvertent spillage? - ANSWER Label all files, removable media, and subject headers with appropriate classification markings. A colleague asks to leave a report containing protected health information (PHI) on his desk overnight so he can continue working on it the next day. How do you respond? - ANSWER tell your colleague that it needs to be secured in a cabinet or container Which of the following is NOT an example of sensitive information? - ANSWER press release data What does Personally Identifiable information (PII) include? - ANSWER Social Security Number, date and place of birth, mother's maiden name What is an indication that malicious code is running on your system? - ANSWER file corruption Which of the following is true of protecting classified data? - ANSWER Classified material must be appropriately marked. What is required for an individual to access classified data? - ANSWER Appropriate clearance; signed and approved non-disclosure agreement; and need-to-know. Which of the following should be reported as a potential security incident? - ANSWER A coworker removes sensitive information without authorization What are some potential insider threat indicators? - ANSWER difficult life circumstances such as substance abuse, divided loyalty or allegiance to the U.S., and extreme, persistent interpersonal difficulties Which of the following is not considered a potential insider threat indicator? - ANSWER treated mental health issues When is the best time to post details of your vacation activities on your social networking website? - ANSWER When your vacation is over, and you have returned home. Which of the following is a best practice to protect information about you and your organization on social networking sites and applications? - ANSWER Use only personal contact information when establishing personal social networking accounts, never use Government contact information. You have reached the office door to exit your controlled area. As a security best practice, what should you do before exiting? - ANSWER Remove your security badge, common access card (CAC), or personal identity verification (PIV) card. What certificates are contained on the Common Access Card (CAC)? - ANSWER Identification, encryption, and digital signature How should you protect your Common Access Card (CAC) or Personal Identity Verificatio
Escuela, estudio y materia
- Institución
- Cyber
- Grado
- Cyber
Información del documento
- Subido en
- 16 de abril de 2024
- Número de páginas
- 3
- Escrito en
- 2023/2024
- Tipo
- Examen
- Contiene
- Preguntas y respuestas
Temas
-
cyber awareness challenge knowledge check 100
-
cyber awareness challenge knowledge check 100 pa
Documento también disponible en un lote