Cyber Awareness Knowledge Check Correct Answers 100% Guarantee Pass.
yber Awareness Knowledge Check Correct Answers 100% Guarantee Pass. How many potential insider threat indicators does a person who is married with two children, vacations at the beach every year, is pleasant to work with, but sometimes has poor work quality display? - correct answers 0 indicators What is the best response if you find classified government data on the internet? - correct answers Note any identifying information, such as the website's URL, and report the situation to your security POC. After reading an online story about a new security project being developed on the military installation where you work, your neighbor asks you to comment about the article. You know this project is classified. What should be your response? - correct answers Attempt to change the subject to something non-work related, but neither confirm nor deny the article's authenticity. What is a proper response if spillage occurs? - correct answers Immediately notify your security POC. What should you do if a reporter asks you about potentially classified information on the web? - correct answers Ask for information about the website, including the URL. A user writes down details from a report stored on a classified system marked as Secret and uses those details to draft an unclassified briefing on an unclassified system without authorization. What is the best choice to describe what has occurred? - correct answers Spillage because classified data was moved to a lower classification level system without authorization. How many potential insider threat indicators does a coworker who often makes others uneasy by being persistent in trying to obtain information about classified projects to which he has no access, is boisterous about his wife putting them in credit card debt, and often complains about anxiety and exhaustion display? - correct answers 3 or more indicators Which of the following can an unauthorized disclosure of information classified as Confidential reasonably be expected to cause? - correct answers Damage to national security Which classification level is given to information that could reasonably be expected to cause serious damage to national security? - correct answers Secret When classified data is not in use, how can you protect it? - correct answers Store classified data appropriately in a GSA-approved vault/container when not in use. Which is a good practice to protect classified information? - correct answers Ensure proper labeling by appropriately marking all classified material and, when required, sensitive material. Which of the following is a good practice to aid in preventing spillage? - correct answers Be aware of classification markings and all handling caveats. What is required for an individual to access classified data? - correct answers Appropriate clearance; signed and approved non-disclosure agreement; and need-toknow. What type of activity or behavior should be reported as a potential insider threat? - correct answers Coworker making consistent statements indicative of hostility or anger toward the United States and its policies. Which of the following practices reduces the chance of becoming a target by adversaries seeking insider information? - correct answers Don't talk about work outside your workspace unless it is a specifically designated public meeting environment and is controlled by the event planners. Which scenario might indicate a reportable insider threat security incident? - correct answers A coworker is observed using a personal electronic device in an area where their use is prohibited
Written for
- Institution
- Cyber Awarenes
- Course
- Cyber Awarenes
Document information
- Uploaded on
- May 1, 2024
- Number of pages
- 8
- Written in
- 2023/2024
- Type
- Exam (elaborations)
- Contains
- Questions & answers
Subjects
-
cyber awareness knowledge check correc
-
cyber awareness knowledge check corre
Also available in package deal