DOD Cyber Awareness Challenge 2019
Did you earn a Cyber Security Awareness Challenge 2018 Certificate of Completion? - Answer No Which of the following does NOT constitute spillage? - Answer Classified information that should be unclassified and is downgraded Which of the following is NOT an appropriate way to protect against inadvertent spillage? - Answer Use the classified network for all work, including unclassified work Which of the following should you NOT do if you find classified information on the internet? - Answer Download the information What level of damage to national security can you reasonably expect Top Secret information to cause if disclosed? - Answer Exceptionally grave damage Which of the following is true about telework? - Answer You must have your organization's permission to telework. Which of the following is true of protecting classified data? - Answer Classified material must be appropriately marked. In addition to avoiding the temptation of greed to betray his country, what should Alex do differently? - Answer Avoid talking about work outside of the workplace or with people without a need-to-know Ellen's Statement How many insider threat indicators does Alex demonstrate? - Answer Three or more Mark's Statement What should Alex's colleagues do? - Answer Report the suspicious behavior in accordance with their organization's insider threat policy Select all sections of the profile that contain an issue. Then select Submit. - Answer All three sections Select the appropriate setting for each item. Then select Save. - Answer Name and profile picture - Any Status, photos, and posts - Friends Only Family and relationships - Friends Only Birthday - Friends Only Photos and videos you are in - Friends Only Check in location via GPS: Off Which of the following is NOT an example of sensitive information? - Answer Press release data Which of the following is NOT a correct way to protect sensitive information? - Answer Sensitive information may be stored on any password-protected system. Victim Select the information on the data sheet that is personally identifiable information (PII) but not protected health information (PHI). - Answer Top box Select the information on the data sheet that is protected health information (PHI). - Answer Bottom box Incident #1 What should the employee do differently? - Answer Remove his CAC and lock his workstation. Incident #2 What should the employee do differently? - Answer Decline to let the person in and redirect her to security. Incident Select all violations at this unattended workstation. Then select Submit. - Answer Laptop with CAC left inserted Sticky note with Pin number Prevalence Which of the following is an example of malicious code? - Answer Software that installs itself without the user's knowledge
Written for
- Institution
- Cyber Awareness Challenge 2022 DoD JKO
- Course
- Cyber Awareness Challenge 2022 DoD JKO
Document information
- Uploaded on
- October 27, 2022
- Number of pages
- 4
- Written in
- 2022/2023
- Type
- Other
- Person
- Unknown
Subjects
-
dod cyber awareness challenge 2019
Also available in package deal