DOD Cyber Awareness Challenge 2022 Already Passed
*Spillage Which of the following may help to prevent spillage? Label all files, removable media, and subject headers with appropriate classification markings. *Spillage Which of the following actions is appropriate after finding classified information on the internet? Note any identifying information and the website's Uniform Resource Locator (URL) *Classified Data Which of the following individuals can access classified data? Darryl is managing a project that requires access to classified information. He has the appropriate clearance and a signed, approved, non-disclosure agreement. *Insider Threat Which type of behavior should you report as a potential insider threat? Hostility and anger toward the United States and its policies *Insider Threat Which of the following practices may reduce your appeal as a target for adversaries seeking to exploit your insider status? Remove your security badge after leaving your controlled area or office building *Social Networking Your cousin posted a link to an article with an incendiary headline on social media. What action should you take? Research the source of the article to evaluate its credibility and reliability *Social Networking Which of the following is a security best practice when using social networking sites? Use only your personal contact information when establishing your account *Controlled Unclassified Information Select the information on the data sheet that is personally identifiable information (PII) but not protected health information (PHI) Jane Jones Social Security Number: *Controlled Unclassified Information Select the information on the data sheet that is protected health information (PHI) Interview: Dr. Nora Baker Dr. Baker was Ms. Jones's psychiatrist for three months. Dr. Baker reports that the sessions addressed Ms. Jones's depression, which poses no national security risk *Physical Security Which Cyber Protection Condition (CPCON) establishes a protection priority focus on critical and essential functions only? CPCON 2 *Identity Management What certificates does the Common Access Card (CAC) or Personal Identity Verification (PIV) card contain? Identification, encryption, digital signature *Identity Management What is the best way to protect your Common Access Card (CAC) or Personal Identity Verification (PIV) card? Maintain possession of it at all times *Sensitive Compartmented Information When faxing Sensitive Compartmented Information (SCI), what actions should you take? Mark SCI documents, appropriately and use an approved SCI fax machine *Sensitive Compartmented Information When is it appropriate to have your security badge visible within a Sensitive Compartmented Information Facility (SCIF)?
Written for
- Institution
- Cyber Awareness Challenge 2022 DoD JKO
- Course
- Cyber Awareness Challenge 2022 DoD JKO
Document information
- Uploaded on
- October 27, 2022
- Number of pages
- 4
- Written in
- 2022/2023
- Type
- Other
- Person
- Unknown
Subjects
-
dod cyber awareness challenge 2022 already passed
-
dod cyber awareness challenge 2022 already passed
Also available in package deal