100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

DOD Cyber Awareness 2022 Knowledge Check, Navy eLearning

Rating
-
Sold
-
Pages
12
Grade
A+
Uploaded on
27-10-2022
Written in
2022/2023

How many potential insider threat indicators does a person who is married with two children, vacations at the beach every year, is pleasant to work with, but sometimes has poor work quality display? 0 indicators What is the best response if you find classified government data on the internet? Note any identifying information, such as the website's URL, and report the situation to your security POC. After reading an online story about a new security project being developed on the military installation where you work, your neighbor asks you to comment about the article. You know this project is classified. What should be your response? Attempt to change the subject to something non-work related, but neither confirm nor deny the article's authenticity. What is a proper response if spillage occurs? Immediately notify your security POC. What should you do if a reporter asks you about potentially classified information on the web? Ask for information about the website, including the URL. A user writes down details from a report stored on a classified system marked as Secret and uses those details to draft an unclassified briefing on an unclassified system without authorization. What is the best choice to describe what has occurred? Spillage because classified data was moved to a lower classification level system without authorization. How many potential insider threat indicators does a coworker who often makes others uneasy by being persistent in trying to obtain information about classified projects to which he has no access, is boisterous about his wife putting them in credit card debt, and often complains about anxiety and exhaustion display? 3 or more indicators Which of the following can an unauthorized disclosure of information classified as Confidential reasonably be expected to cause? Damage to national security Which classification level is given to information that could reasonably be expected to cause serious damage to national security? Secret When classified data is not in use, how can you protect it? Store classified data appropriately in a GSA-approved vault/container when not in use. Which is a good practice to protect classified information? Ensure proper labeling by appropriately marking all classified material and, when required, sensitive material. Which of the following is a good practice to aid in preventing spillage? Be aware of classification markings and all handling caveats. What is required for an individual to access classified data? Appropriate clearance; signed and approved non-disclosure agreement; and need-toknow. What type of activity or behavior should be reported as a potential insider threat? Coworker making consistent statements indicative of hostility or anger toward the United States and its policies. Which of the following practices reduces the chance of becoming a target by adversaries seeking insider information? Don't talk about work outside your workspace unless it is a specifically designated public meeting environment and is controlled by the event planners. Which scenario might indicate a reportable insider threat security incident? A coworker is observed using a personal electronic device in an area where their use is prohibited. Why might "insiders" be able to cause damage to their organizations more easily than others? Insiders are given a level of trust and have authorized access to Government information systems. Which of the following is a best practice to protect information about you and your organization on social networking sites and applications? Use only personal contact information when establishing personal social networking accounts, never use Government contact information. What should you do if an individual asks you to let her follow you into your controlled space, stating that she left her security badge at her desk? Don't allow her access into secure areas and report suspicious activity. Which represents a security best practice when using social networking? Understanding and using available privacy settings. Which is NOT sufficient to protect your identity? Use a common password for all system and application logons. Under which circumstances may you be subject to criminal, disciplinary, and/or administrative action due to online misconduct? Any time you participate in or condone misconduct, whether offline or online. As someone who works with classified information, what should you do if you are contacted by a foreign national seeking information on a research project? Inform your security POC of all non-professional or non-routine contacts with foreign nations, including, but not limited to, joining each other's social media sites. Which of the following is true about unclassified data? When unclassified data is aggregated, its classification level may rise. What are some potential insider threat indicators? Difficult life circumstances such as

Show more Read less
Institution
Cyber Awareness Challenge 2022 DoD JKO
Course
Cyber Awareness Challenge 2022 DoD JKO









Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
Cyber Awareness Challenge 2022 DoD JKO
Course
Cyber Awareness Challenge 2022 DoD JKO

Document information

Uploaded on
October 27, 2022
Number of pages
12
Written in
2022/2023
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
InsightInk West Virginia University
View profile
Follow You need to be logged in order to follow users or courses
Sold
314
Member since
4 year
Number of followers
198
Documents
4720
Last sold
1 week ago
STUDYMANIA

Why Choose Us? we believe in empowering students to achieve their best. Our carefully curated selection of high-quality study materials, notes, and resources is designed to help you excel in your coursework. From detailed lecture notes to insightful study guides, every resource is crafted with clarity and precision to ensure you grasp complex concepts with ease.

4.6

197 reviews

5
155
4
25
3
7
2
1
1
9

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions