Updated 2024 Cyber Awareness Challenge 2022 Knowledge Check
SPILLAGE* Which of the following may be helpful to prevent spillage? - CORRECT ANSWER Be aware of classification markings and all handling caveats. *SPILLAGE* Which of the following may be helpful to prevent spillage? - CORRECT ANSWER Label all files, removable media, and subject headers with appropriate classification markings. * CLASSIFIED DATA* Which type of information could reasonably be expected to cause serious damage to national security if disclosed without authorization? - CORRECT ANSWER Secret *CLASSIFIED DATA* What is a good practice to protect classified information? - CORRECT ANSWER Ensure proper labeling by appropriately marking all classified material and, when required, sensitive material. *INSIDER THREAT* Based on the description below how many potential insider threat indicators are present? A colleague often makes others uneasy by being persistent in trying to obtain information about classified projects to which he has no access, is boisterous about his wife putting them in credit card debt, and often complains about anxiety and exhaustion display? - CORRECT ANSWER 3 or more indicators *INSIDER THREAT* What threat do insiders with authorized access to information or information systems pose? - CORRECT ANSWER They may wittingly or unwittingly use their authorized access to perform actions that result in the loss or degradation of resources or capabilities. *INSIDER THREAT* Which of the following is NOT considered a potential insider threat indicator? - CORRECT ANSWER New interest in learning a foregin language. *SOCIAL NETWORKING* When may you be subject to criminal, disciplinary, and/or administrative action due to online misconduct? - CORRECT ANSWER If you participate in or condone it at any time. *SOCIAL NETWORKING* When is the safest time to post details of your vacation activities on your social networking profile? - CORRECT ANSWER After you have returned home following the vacation. *SOCIAL NETWORKING* Which of the following is a security best practice when using social networking sites? - CORRECT ANSWER Understanding and using the available privacy settings. *UNCONTROLLED CLASSIFIED INFORMATION* Which of the following is NOT an example of CUI? - CORRECT ANSWER Press release data *UNCONTROLLED CLASSIFIED INFORMATION* Which of the following is NOT a correct way to protect CUI? - CORRECT ANSWER Sensitive information may be stored on any password-protected system. Select the information on the data sheet that is personally identifiable information (PII) But not protected health information (PHI) - CORRECT ANSWER Jane Jones Social security number: Select the information on the data sheet that is protected health information (PHI) - CORRECT ANSWER Jane has been Dr...ect patient..ect. *PHYSICAL SECURITY* Within a secure area, you see an individual who you do not know and is not wearing a visible badge - CORRECT ANSWER Ask the individual to see an identification badge. *IDENTITY MANAGEMENT* What certificates does the Common Access Card (CAC) or Personal Identity Verification (PIV) card contain? - CORRECT ANSWER Identification, encryption, and digital signature *IDENTITY MANAGEMENT* Which of the following is an example of a strong password? - CORRECT ANSWER eA1xy2!P *SENSITIVE COMPARTMENTED INFORMATION* When faxing Sensitive Compartmented Information (SCI), what actions should you take? - CORRECT ANSWER Mark SCI documents appropriately and use an approved SCI fax machine. *SENSITIVE COMPARTMENTED INFORMATION* When is it appropriate to have your security badge visible within a sensitive compartmented information facility (SCIF)? - CORRECT ANSWER At all times while in the facility.
Written for
- Institution
- Cyber Awareness Challenge 2023
- Course
- Cyber Awareness Challenge 2023
Document information
- Uploaded on
- January 7, 2024
- Number of pages
- 4
- Written in
- 2023/2024
- Type
- Exam (elaborations)
- Contains
- Questions & answers