DOD Cyber Awareness 2023 Exam with Verified
Answers
Save
Terms in this set (83)
A vendor conducting a Refer the vendor to the appropriate personnel.
pilot program with your
organization contacts you
for organizational data to
use in a prototype. How
should you respond?
When classified data is not Store classified data appropriately in a GSA-approved
in use, how can you vault/container.
protect it?
What is the basis for Classification markings and handling caveats.
handling and storage of
classified data?
Which of the following Ensure that any cameras, microphones, and Wi-Fi
must you do before using embedded in the laptop are physically disabled.
an unclassified laptop and
peripherals in a collateral
classified environment?
What level of damage to Exceptionally grave damage.
national security can you
reasonably expect Top
secret information to
cause if disclosed?
, Which of the following is You must have your organization's permission to
true about telework? telework.
Which of the following is Classified material must be appropriately marked.
true of protecting
classified data?
Which of the following is a Attempting to access sensitive information without
reportable insider threat need-to-know.
activity?
Which scenario might a colleague removes sensitive information without
indicate a reportable seeking authorization in order to perform authorized
insider threat? telework.
Which of the following is a 1) Unusual interest in classified information. 2) Difficult
potential insider threat life circumstances, such as death of spouse.
indicator?
Which piece of Your favorite movie.
information is safest to
include on your social
media profile?
Many apps and smart devices collect and share your
Which of the following
personal information and contribute to your online
statements is true?
identity.
How can you protect your Ensure there are no identifiable landmarks visible in
organization on social any photos taken in a work setting that you post.
networking sites?
Which is a best practice Store it in a locked desk drawer after working hours.
for protecting Controlled
Unclassified Information
(CUI)?
Which of the following Paul verifies that the information is CUI, includes a CUI
best describes a way to marking in the subject header, and digitally signs an e-
safely transmit Controlled mail containing CUI.
Unclassified Information
(CUI)?
Answers
Save
Terms in this set (83)
A vendor conducting a Refer the vendor to the appropriate personnel.
pilot program with your
organization contacts you
for organizational data to
use in a prototype. How
should you respond?
When classified data is not Store classified data appropriately in a GSA-approved
in use, how can you vault/container.
protect it?
What is the basis for Classification markings and handling caveats.
handling and storage of
classified data?
Which of the following Ensure that any cameras, microphones, and Wi-Fi
must you do before using embedded in the laptop are physically disabled.
an unclassified laptop and
peripherals in a collateral
classified environment?
What level of damage to Exceptionally grave damage.
national security can you
reasonably expect Top
secret information to
cause if disclosed?
, Which of the following is You must have your organization's permission to
true about telework? telework.
Which of the following is Classified material must be appropriately marked.
true of protecting
classified data?
Which of the following is a Attempting to access sensitive information without
reportable insider threat need-to-know.
activity?
Which scenario might a colleague removes sensitive information without
indicate a reportable seeking authorization in order to perform authorized
insider threat? telework.
Which of the following is a 1) Unusual interest in classified information. 2) Difficult
potential insider threat life circumstances, such as death of spouse.
indicator?
Which piece of Your favorite movie.
information is safest to
include on your social
media profile?
Many apps and smart devices collect and share your
Which of the following
personal information and contribute to your online
statements is true?
identity.
How can you protect your Ensure there are no identifiable landmarks visible in
organization on social any photos taken in a work setting that you post.
networking sites?
Which is a best practice Store it in a locked desk drawer after working hours.
for protecting Controlled
Unclassified Information
(CUI)?
Which of the following Paul verifies that the information is CUI, includes a CUI
best describes a way to marking in the subject header, and digitally signs an e-
safely transmit Controlled mail containing CUI.
Unclassified Information
(CUI)?