100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

DOD Cyber Awareness 2023 Knowledge Check

Rating
-
Sold
-
Pages
5
Grade
A+
Uploaded on
03-12-2023
Written in
2023/2024

DOD Cyber Awareness 2023 Knowledge Check Spillage: What should you do if a reporter asks you about potentially classified information on the web? - ANS Refer the reporter to your organization's public affair office What must users ensure when using removable media such as a compact disk (CD)? - ANS It displays a label showing maximum classification, date of creation, point of contact, and Change Management (CM Control Number. What should you do when you are working on an unclassified system and receive an email with a classified attachment? - ANS Call your security point of contact immediately. Which classified level is given to information that could reasonably be expected to cause serious damage to national security? - ANS Secret Under what circumstances is it acceptable to use your Government-furnished computer to check personal e-mail and do other non-work-related activities? - ANS If allowed by organizational policy. What actions should you take when printing classified material within a Sensitive Compartmented Information Facility (SCIF)? - ANS Retrieve classified documents promptly from printers. What actions should you take upon hearing a discussion involving Sensitive Compartmented Information (SCI) while seated in a cafeteria with an SCI Facility (SCIF)? - ANS Remind those involved that such a discussion should not take place in common areas within a SCIF. Which of the following is true of protecting classified data? - ANS Classified material must be appropriately marked When classified data is not in use, how can you protect it? - ANS Store classified data appropriately in a GSA-approved vault/container. What type of activity or behavior should be reported as a potential insider threat? - ANS Coworker making consistent statements indicative of hostility or anger toward the United States and its policies. In setting up your personal social networking service account, what email address should you use? - ANS Your personal email address/addresses When is the safest time to post details of your vacation activities on your social networking website? - ANS When your vacation is over, after you have returned home What are some potential insider threat indicators? - ANS Difficult life circumstances such as substance abuse, divided loyalty or allegiance to the U.S., and extreme, persistent interpersonal difficulties. Which of the following terms refers to someone who harms national security through authorized access to information system? - ANS Insider Threat Under what circumstances could unclassified information be considered a threat to national security? - ANS If aggregated, the information could become classified. Under which circumstances is permitted to share an unclassified draft document with a non-DoD professional discussion group? - ANS As long as the document is cleared for public release, you may share it outside of DoD. How many the Cyberspace Protection Conditions (CPCON) are there? - ANS 5 How many potential insider threat indicators does a person who is playful and charming, consistently wins performance awards, but is occasionally aggressive in trying to access sensitive information display? - ANS 1 indicator A man you do not know is trying to look at your Government-issued phone and has asked to use it. What should you do? - ANS Decline to lend the man your phone. Which of the following is NOT considered a potential insider threat indicator? - ANS New interest in learning a foreign language What is the best practice while traveling with mobile computing devices? - ANS Maintain possession of your laptop and other government-furnished equipment (GFE) at all times. What is the best way to protect your Common Access Card (CAC)? - ANS Maintain possession of it at all times. While you are waiting for your lunch bill, a stranger picks up your Government-issued phone from your table and proceeds to exit the facility with it. What should you do? - ANS Try to observe the direction taken and any other useful information and immediately make a report to your security point of contact. What should you do if you receive a game application request that includes permission to access your friends, profile information, cookies, and sites visited? - ANS Decline the request. You receive a call from someone from the help desk who needs your assistance with a problem on your computer. How should you respond? - ANS Ask the caller, "What's your full name and phone number?" Which of the following is an appropriate use of Government e-mail? - ANS Digitally signing e-mails that contain attachments or hyperlinks. Which of the following is the best description of two-factor authentication? - ANS Something you possess like a CAC, and a Pin or Password What information posted publicly on your personal social networking profile represents a security risk? - ANS Your place of birth Sensitive Information: Which of the following is an example of Protected Health Information (PHI)? - ANS Medical test results Which of the following is the best example of Personally Identifiable Information (PII)? - ANS Passport number What type of unclassified material should always be marked with a special handling caveat? - ANS Official use only What is a security best practice to employ on your home computer? - ANS Create separate user accounts with strong individual passwords. Is it acceptable to take a short break while a coworker monitors your computer while logged on with your Common Access Card (CAC)? - ANS No. Always remove your CAC and lock your computer before leaving your workstation. What is the best way to protect your common access card? - ANS Maintain possession of it at all times. What is a valid response when identity theft occurs? - ANS Report the crime to local law enforcement. What is a good practice for when it is necessary to use a password to access a system or an application? - ANS Avoid using the same password between systems or applications. When is it appropriate to have your securing badge visible with a sensitive compartmented information facility? - ANS At all time when is the facility. Which of the following does a security classification guide provided? - ANS Precise guidance regarding specific elements of information to be classified What portable electronic devices are allowed in a secure compartmented information facility? - ANS Government owned PEDs if expressed authorized by your agency Malicious code: After clicking on a link on a website, a box pops up and asks if you want to run an application. Is it ok to run it? - ANS No. Only use you agency trusted websites. What are some actions you can take to try to protect you identity? - ANS Shred personal documents, never share passwords and order a credit history annually. Which of the following is a way to protect against social engineering? - ANS Follow the instructions given only by verified personnel. Which may be a security issue with compressed URLs? - ANS There is no way to know where the link actually leads. What is a way to prevent the download of viruses and other malicious code when checking your email? - ANS View email in plain text and don't view email in Preview Pane. Upon connecting your government-issued laptop to a public wireless connection, what should you immediately do? - ANS Connect to the Government Virtual Private Network (VPN). When is conducting a private money-making venture using your Government-furnished computer permitted? - ANS It is never permitted What is a way to prevent the download of viruses and other malicious code when checking your e-mail? - ANS View e-mail in plain text and don't view e-mail in Preview Pane. Which of the following is NOT a typical means for spreading malicious code? - ANS Patching from a trusted source Which of the following is not a best practice to protect data on your mobile computing device? - ANS Which of the following is NOT a correct way to protect sensitive information? - ANS Sensitive information may be stored on any password-protected system. What are some examples of removable media? - ANS Memory sticks, flash drives, or external hard drives. Which of the following is a best practice for securing your home computer? - ANS Use antivirus software and keep it up to date.

Show more Read less
Course









Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Course
Unknown

Document information

Uploaded on
December 3, 2023
Number of pages
5
Written in
2023/2024
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
DocLaura Galen College Of Nursing
View profile
Follow You need to be logged in order to follow users or courses
Sold
146
Member since
2 year
Number of followers
38
Documents
6487
Last sold
1 day ago

4.2

44 reviews

5
27
4
4
3
10
2
2
1
1

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions