Cyber Awareness Knowledge Check
Questions with Detailed Verified
Answers
Question: How many potential insider threat indicators does a person who is
married with two children, vacations at the beach every year, is pleasant to
work with, but sometimes has poor work quality display?
Ans: 0 indicators
Question: What is the best response if you find classified government data on
the internet?
Ans: Note any identifying information, such as the website's URL, and
report the situation to your security POC.
Question: After reading an online story about a new security project being
developed on the military installation where you work, your neighbor asks you
to comment about the article. You know this project is classified. What should
be your response?
Ans: Attempt to change the subject to something non-work related, but
neither confirm nor deny the article's authenticity.
Question: What is a proper response if spillage occurs?
For academic expert services contact me at
, Page | 2
Ans: Immediately notify your security POC.
Question: What should you do if a reporter asks you about potentially
classified information on the web?
Ans: Ask for information about the website, including the URL.
Question: A user writes down details from a report stored on a classified
system marked as Secret and uses those details to draft an unclassified
briefing on an unclassified system without authorization. What is the best
choice to describe what has occurred?
Ans: Spillage because classified data was moved to a lower classification
level system without authorization.
Question: How many potential insider threat indicators does a coworker who
often makes others uneasy by being persistent in trying to obtain information
about classified projects to which he has no access, is boisterous about his
wife putting them in credit card debt, and often complains about anxiety and
exhaustion display?
Ans: 3 or more indicators
Question: Which of the following can an unauthorized disclosure of
information classified as Confidential reasonably be expected to cause?
Ans: Damage to national security
For academic expert services contact me at
, Page | 3
Question: Which classification level is given to information that could
reasonably be expected to cause serious damage to national security?
Ans: Secret
Question: When classified data is not in use, how can you protect it?
Ans: Store classified data appropriately in a GSA-approved vault/container
when not in use.
Question: Which is a good practice to protect classified information?
Ans: Ensure proper labeling by appropriately marking all classified
material and, when required, sensitive material.
-OR-
Don't assume open storage in a secure facility is authorized.
Question: Which of the following is a good practice to aid in preventing
spillage?
Ans: Be aware of classification markings and all handling caveats.
Question: What is required for an individual to access classified data?
Ans: Appropriate clearance; signed and approved non-disclosure
agreement; and need-to-know.
For academic expert services contact me at