100% de satisfacción garantizada Inmediatamente disponible después del pago Leer en línea o como PDF No estas atado a nada 4,6 TrustPilot
logo-home
Examen

Cyber Awareness Challenge

Puntuación
-
Vendido
-
Páginas
4
Grado
A+
Subido en
04-12-2023
Escrito en
2023/2024

Cyber Awareness Challenge After reading an online story about a new security project being developed on the military installation where you work, your neighbor asks you to comment about the article. You know this project is classified. What should be your response? - ANS Attempt to change the subject to something non-work related, but neither confirm nor deny the article's authenticity. What is the best response if you find classified government data on the internet? - ANS Note any identifying information, such as the website's URL, and report the situation to your security POC. What is a good practice to protect classified information? - ANS Store classified data in a locked desk drawer when not in use Which classification level is given to information that could reasonably be expected to cause serious damage to national security? - ANS Secret How many potential insider threat indicators does a person who is playful and charming, consistently wins performance awards, but is occasionally aggressive in trying to access sensitive information display? - ANS 1 indicator Who might "insiders" be able to cause damage to their organizations more easily than others? - ANS Insiders are given a level of trust and have authorized access to Government information systems. What type of activity or behavior should be reported as a potential insider threat? - ANS Coworker making consistent statements indicative of hostility or anger toward the United States in its policies. What information posted publicly on your personal social networking profile represents a security risk? - ANS Your place of birth When is the best time to post details of your vacation activities on your social networking website? - ANS When your vacation is over, and you have returned home What is the best example of Personally Identifiable Information (PII)? - ANS Date and place of birth What is the best example of Protected Health Information (PHI)? - ANS Your health insurance explanation of benefits (EOB) What does Personally Identifiable Information (PII) include? - ANS Social Security Number; date and place of birth; mother's maiden name What is a good practice for physical security? - ANS Challenge people without proper badges. Which is NOT sufficient to protect your identity? - ANS Use a common password for all your system and application logons. What certificates are contained on the DoD Public Key Infrastructure (PKI) implemented by the Common Access Card (CAC)/Personal Identity Verification (PIV) card? - ANS Identification, encryption, and digital signature Which must be approved and signed by a cognizant Original Classification Authority (OCA)? - ANS Security Classification Guide (SCG) What describes how Sensitive Compartmented Information is marked? - ANS Approved Security Classification Guide (SCG) Which is a risk associated with removable media? - ANS Spillage of classified information. What is an indication that malicious code is running on your system? - ANS File corruption What is a valid response when identity theft occurs? - ANS Report the crime to local law enforcement. What is whaling? - ANS A type of phishing targeted at high-level personnel such as senior officials. What is a best practice while traveling with mobile computing devices? - ANS Maintain possession of your laptop and other government-furnished equipment (GFE) at all times. Under what circumstances is it acceptable to use your Government-furnished computer to check personal e-mail and do other non-work-related activities? - ANS If allowed by organizational policy Which of the following helps protect data on your personal mobile devices? - ANS Secure personal mobile devices to the same level as Government-issued systems. What is a best practice to protect data on your mobile computing device? - ANS Lock your device screen when not in use and require a password to reactivate. What is a possible indication of a malicious code attack in progress? - ANS A pop-up window that flashes and warns that your computer is infected with a virus. What does "spillage" refer to? - ANS Information improperly moved from a higher protection level to a lower protection level What level of damage can the unauthorized disclosure of information classified as Top Secret reasonably be expected to cause? - ANS Exceptionally grave damage to national security Which of the following is true about telework? - ANS You must have your organization's permission to telework. Which of the following is true of protecting classified data? - ANS Classified material must be appropriately marked. Based on the description that follows, how many potential insider threat indicator(s) are displayed? A colleague abruptly becomes hostile and unpleasant after previously enjoying positive working relationships with peers, purchases an unusually expensive new car, and has unexplained absences from work. - ANS 3 or more indicators Which of the following is a potential insider threat indicator? - ANS Unusual interest in classified information Based on the description that follows, how many potential insider threat indicator(s) are displayed? A colleague saves money for an overseas vacation every year, is a single father, and occasionally consumes alcohol. - ANS 0 indicators A trusted friend in your social network posts a link to vaccine information on a website unknown to you. What action should you take? - ANS Research the source to evaluate its credibility and reliability Which of the following statements is true? - ANS Adversaries exploit social networking sites to disseminate fake news. Which piece of information is safest to include on your social media profile? - ANS Your favorite movie Which is a best practice for protecting Controlled Unclassified Information (CUI)? - ANS Store it in a locked desk drawer after working hours Which of the following is NOT an example of CUI? - ANS Press release data Which of the following is NOT a correct way to protect CUI? - ANS CUI may be stored on any password-protected system. Which of the following is a best practice for physical activity? - ANS Report suspicious activity Which of the following is an example of a strong password? - ANS %2ZN=Ugq A compromise of Sensitive Compartmented Information (SCI) occurs when a person who does not have the required clearance or access caveats comes into possession of SCI... - ANS in any manner Which of the following is true of Security Classification Guides? - ANS They provide guidance on reasons for and duration of classification of information. What portable electronic devices (PEDs) are permitted in a SCIF? - ANS Only expressly authorized government-owned PEDs What is the response to an incident such as opening an uncontrolled DVD on a computer in a SCIF? - ANS All of these

Mostrar más Leer menos
Institución
Grado








Ups! No podemos cargar tu documento ahora. Inténtalo de nuevo o contacta con soporte.

Escuela, estudio y materia

Institución
Grado
Desconocido

Información del documento

Subido en
4 de diciembre de 2023
Número de páginas
4
Escrito en
2023/2024
Tipo
Examen
Contiene
Preguntas y respuestas

Temas

$8.79
Accede al documento completo:

100% de satisfacción garantizada
Inmediatamente disponible después del pago
Leer en línea o como PDF
No estas atado a nada


Documento también disponible en un lote

Conoce al vendedor

Seller avatar
Los indicadores de reputación están sujetos a la cantidad de artículos vendidos por una tarifa y las reseñas que ha recibido por esos documentos. Hay tres niveles: Bronce, Plata y Oro. Cuanto mayor reputación, más podrás confiar en la calidad del trabajo del vendedor.
DocLaura Galen College Of Nursing
Seguir Necesitas iniciar sesión para seguir a otros usuarios o asignaturas
Vendido
152
Miembro desde
2 año
Número de seguidores
38
Documentos
6403
Última venta
1 mes hace

4.2

44 reseñas

5
27
4
4
3
10
2
2
1
1

Documentos populares

Recientemente visto por ti

Por qué los estudiantes eligen Stuvia

Creado por compañeros estudiantes, verificado por reseñas

Calidad en la que puedes confiar: escrito por estudiantes que aprobaron y evaluado por otros que han usado estos resúmenes.

¿No estás satisfecho? Elige otro documento

¡No te preocupes! Puedes elegir directamente otro documento que se ajuste mejor a lo que buscas.

Paga como quieras, empieza a estudiar al instante

Sin suscripción, sin compromisos. Paga como estés acostumbrado con tarjeta de crédito y descarga tu documento PDF inmediatamente.

Student with book image

“Comprado, descargado y aprobado. Así de fácil puede ser.”

Alisha Student

Preguntas frecuentes