100% satisfaction guarantee Immediately available after payment Read online or as PDF No strings attached 4.6 TrustPilot
logo-home
Exam (elaborations)

Cyber Awareness Challenge

Rating
-
Sold
-
Pages
4
Grade
A+
Uploaded on
04-12-2023
Written in
2023/2024

Cyber Awareness Challenge After reading an online story about a new security project being developed on the military installation where you work, your neighbor asks you to comment about the article. You know this project is classified. What should be your response? - ANS Attempt to change the subject to something non-work related, but neither confirm nor deny the article's authenticity. What is the best response if you find classified government data on the internet? - ANS Note any identifying information, such as the website's URL, and report the situation to your security POC. What is a good practice to protect classified information? - ANS Store classified data in a locked desk drawer when not in use Which classification level is given to information that could reasonably be expected to cause serious damage to national security? - ANS Secret How many potential insider threat indicators does a person who is playful and charming, consistently wins performance awards, but is occasionally aggressive in trying to access sensitive information display? - ANS 1 indicator Who might "insiders" be able to cause damage to their organizations more easily than others? - ANS Insiders are given a level of trust and have authorized access to Government information systems. What type of activity or behavior should be reported as a potential insider threat? - ANS Coworker making consistent statements indicative of hostility or anger toward the United States in its policies. What information posted publicly on your personal social networking profile represents a security risk? - ANS Your place of birth When is the best time to post details of your vacation activities on your social networking website? - ANS When your vacation is over, and you have returned home What is the best example of Personally Identifiable Information (PII)? - ANS Date and place of birth What is the best example of Protected Health Information (PHI)? - ANS Your health insurance explanation of benefits (EOB) What does Personally Identifiable Information (PII) include? - ANS Social Security Number; date and place of birth; mother's maiden name What is a good practice for physical security? - ANS Challenge people without proper badges. Which is NOT sufficient to protect your identity? - ANS Use a common password for all your system and application logons. What certificates are contained on the DoD Public Key Infrastructure (PKI) implemented by the Common Access Card (CAC)/Personal Identity Verification (PIV) card? - ANS Identification, encryption, and digital signature Which must be approved and signed by a cognizant Original Classification Authority (OCA)? - ANS Security Classification Guide (SCG) What describes how Sensitive Compartmented Information is marked? - ANS Approved Security Classification Guide (SCG) Which is a risk associated with removable media? - ANS Spillage of classified information. What is an indication that malicious code is running on your system? - ANS File corruption What is a valid response when identity theft occurs? - ANS Report the crime to local law enforcement. What is whaling? - ANS A type of phishing targeted at high-level personnel such as senior officials. What is a best practice while traveling with mobile computing devices? - ANS Maintain possession of your laptop and other government-furnished equipment (GFE) at all times. Under what circumstances is it acceptable to use your Government-furnished computer to check personal e-mail and do other non-work-related activities? - ANS If allowed by organizational policy Which of the following helps protect data on your personal mobile devices? - ANS Secure personal mobile devices to the same level as Government-issued systems. What is a best practice to protect data on your mobile computing device? - ANS Lock your device screen when not in use and require a password to reactivate. What is a possible indication of a malicious code attack in progress? - ANS A pop-up window that flashes and warns that your computer is infected with a virus. What does "spillage" refer to? - ANS Information improperly moved from a higher protection level to a lower protection level What level of damage can the unauthorized disclosure of information classified as Top Secret reasonably be expected to cause? - ANS Exceptionally grave damage to national security Which of the following is true about telework? - ANS You must have your organization's permission to telework. Which of the following is true of protecting classified data? - ANS Classified material must be appropriately marked. Based on the description that follows, how many potential insider threat indicator(s) are displayed? A colleague abruptly becomes hostile and unpleasant after previously enjoying positive working relationships with peers, purchases an unusually expensive new car, and has unexplained absences from work. - ANS 3 or more indicators Which of the following is a potential insider threat indicator? - ANS Unusual interest in classified information Based on the description that follows, how many potential insider threat indicator(s) are displayed? A colleague saves money for an overseas vacation every year, is a single father, and occasionally consumes alcohol. - ANS 0 indicators A trusted friend in your social network posts a link to vaccine information on a website unknown to you. What action should you take? - ANS Research the source to evaluate its credibility and reliability Which of the following statements is true? - ANS Adversaries exploit social networking sites to disseminate fake news. Which piece of information is safest to include on your social media profile? - ANS Your favorite movie Which is a best practice for protecting Controlled Unclassified Information (CUI)? - ANS Store it in a locked desk drawer after working hours Which of the following is NOT an example of CUI? - ANS Press release data Which of the following is NOT a correct way to protect CUI? - ANS CUI may be stored on any password-protected system. Which of the following is a best practice for physical activity? - ANS Report suspicious activity Which of the following is an example of a strong password? - ANS %2ZN=Ugq A compromise of Sensitive Compartmented Information (SCI) occurs when a person who does not have the required clearance or access caveats comes into possession of SCI... - ANS in any manner Which of the following is true of Security Classification Guides? - ANS They provide guidance on reasons for and duration of classification of information. What portable electronic devices (PEDs) are permitted in a SCIF? - ANS Only expressly authorized government-owned PEDs What is the response to an incident such as opening an uncontrolled DVD on a computer in a SCIF? - ANS All of these

Show more Read less
Course








Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Course
Unknown

Document information

Uploaded on
December 4, 2023
Number of pages
4
Written in
2023/2024
Type
Exam (elaborations)
Contains
Questions & answers

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
DocLaura Galen College Of Nursing
View profile
Follow You need to be logged in order to follow users or courses
Sold
152
Member since
2 year
Number of followers
38
Documents
6403
Last sold
1 month ago

4.2

44 reviews

5
27
4
4
3
10
2
2
1
1

Trending documents

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions