Cyber Awareness Challenge Knowledge Check 100% Pass.
Cyber Awareness Challenge Knowledge Check 100% Pass. Which of the following actions is appropriate after finding classified Government information on the internet? - ANSWER Note any identifying information and the website's URL Which of the following may help to prevent inadvertent spillage? - ANSWER Label all files, removable media, and subject headers with appropriate classification markings. A colleague asks to leave a report containing protected health information (PHI) on his desk overnight so he can continue working on it the next day. How do you respond? - ANSWER tell your colleague that it needs to be secured in a cabinet or container Which of the following is NOT an example of sensitive information? - ANSWER press release data What does Personally Identifiable information (PII) include? - ANSWER Social Security Number, date and place of birth, mother's maiden name What is an indication that malicious code is running on your system? - ANSWER file corruption Which of the following is true of protecting classified data? - ANSWER Classified material must be appropriately marked. What is required for an individual to access classified data? - ANSWER Appropriate clearance; signed and approved non-disclosure agreement; and need-to-know. Which of the following should be reported as a potential security incident? - ANSWER A coworker removes sensitive information without authorization What are some potential insider threat indicators? - ANSWER difficult life circumstances such as substance abuse, divided loyalty or allegiance to the U.S., and extreme, persistent interpersonal difficulties Which of the following is not considered a potential insider threat indicator? - ANSWER treated mental health issues When is the best time to post details of your vacation activities on your social networking website? - ANSWER When your vacation is over, and you have returned home. Which of the following is a best practice to protect information about you and your organization on social networking sites and applications? - ANSWER Use only personal contact information when establishing personal social networking accounts, never use Government contact information. You have reached the office door to exit your controlled area. As a security best practice, what should you do before exiting? - ANSWER Remove your security badge, common access card (CAC), or personal identity verification (PIV) card. What certificates are contained on the Common Access Card (CAC)? - ANSWER Identification, encryption, and digital signature How should you protect your Common Access Card (CAC) or Personal Identity Verification (PIV) card? - ANSWER Store it in a shielded sleeve to avoid chip cloning. Which is it appropriate to have your security badge visible within a Sensitive Compartmented Information Facility (SCIF) - ANSWER At all times when in the facility What are the requirements to be granted access to sensitive compartmented information (SCI)? - ANSWER The proper security clearance and indoctrination into the SCI program Which is a risk associated with removable media? - ANSWER Spillage of classified information. While you are registering for a conference, you arrive at the website registration. What should you do? - ANSWER Since the URL does not start with "https," do not provide your credit card information. What helps protect from spear phishing? - ANSWER be wary of suspicious e-mails that use your name and/or appear to come from inside your organization. What is a way to prevent the download of viruses and other malicious code when checking your e-mail? - ANSWER View email in plain text and don't view email in Preview Pane.
Written for
- Institution
- Cyber Awareness
- Course
- Cyber Awareness
Document information
- Uploaded on
- May 1, 2024
- Number of pages
- 3
- Written in
- 2023/2024
- Type
- Exam (elaborations)
- Contains
- Questions & answers
Subjects
-
cyber awareness challenge knowledge check 100 p
-
cyber awareness challenge knowledge check 100
Also available in package deal