DOD Cyber Awareness 2023 Questions and
Answers
Save
Terms in this set (63)
Which of the following is Classified material must be appropriately marked.
true of protecting
classified data?
(CLASSIFIED DATA)
A vendor conducting a Refer the vendor to the appropriate personnel.
pilot program with your
organization contacts you
for organizational data to
use in a prototype. How
should you respond?
(CLASSIFIED DATA)
When classified data is not Store classified data appropriately in a GSA-approved
in use, how can you vault/container.
protect it?
(CLASSIFIED DATA)
What is the basis for Classification markings and handling caveats.
handling and storage of
classified data?
(CLASSIFIED DATA)
, Which of the following is a Don't assume open storage in a secure facility is
good practice to protect permitted.
classified information?
(CLASSIFIED DATA)
Which of the following Ensure that any cameras, microphones, and Wi-Fi
must you do before using embedded in the laptop are physically disabled.
an unclassified laptop and
peripherals in a collateral
classified environment?
(CLASSIFIED DATA)
What level of damage to Exceptionally grave damage.
national security can you
reasonably expect Top
secret information to
cause if disclosed?
(CLASSIFIED DATA)
How should you secure Implement Wi-Fi Protected Access 2 (WPA2) Personal
your home wireless encryption at a minimum.
network for teleworking?
(HOME COMPUTER
SECURITY)
Which of the following is You must have your organization's permission to
true about telework? telework.
(HOME COMPUTER
SECURITY)
Which of the following is a Attempting to access sensitive information without
reportable insider threat need-to-know.
activity?
(INSIDER THREAT)
Which scenario might A colleague removes sensitive information without
indicate a reportable seeking authorization in order to perform authorized
insider threat? telework.
(INSIDER THREAT)
Answers
Save
Terms in this set (63)
Which of the following is Classified material must be appropriately marked.
true of protecting
classified data?
(CLASSIFIED DATA)
A vendor conducting a Refer the vendor to the appropriate personnel.
pilot program with your
organization contacts you
for organizational data to
use in a prototype. How
should you respond?
(CLASSIFIED DATA)
When classified data is not Store classified data appropriately in a GSA-approved
in use, how can you vault/container.
protect it?
(CLASSIFIED DATA)
What is the basis for Classification markings and handling caveats.
handling and storage of
classified data?
(CLASSIFIED DATA)
, Which of the following is a Don't assume open storage in a secure facility is
good practice to protect permitted.
classified information?
(CLASSIFIED DATA)
Which of the following Ensure that any cameras, microphones, and Wi-Fi
must you do before using embedded in the laptop are physically disabled.
an unclassified laptop and
peripherals in a collateral
classified environment?
(CLASSIFIED DATA)
What level of damage to Exceptionally grave damage.
national security can you
reasonably expect Top
secret information to
cause if disclosed?
(CLASSIFIED DATA)
How should you secure Implement Wi-Fi Protected Access 2 (WPA2) Personal
your home wireless encryption at a minimum.
network for teleworking?
(HOME COMPUTER
SECURITY)
Which of the following is You must have your organization's permission to
true about telework? telework.
(HOME COMPUTER
SECURITY)
Which of the following is a Attempting to access sensitive information without
reportable insider threat need-to-know.
activity?
(INSIDER THREAT)
Which scenario might A colleague removes sensitive information without
indicate a reportable seeking authorization in order to perform authorized
insider threat? telework.
(INSIDER THREAT)