Summary DoD - Cyber Awareness Challenge 2022 Knowledge Check JKO_ Answered.
DoD - Cyber Awareness Challenge 2022 Knowledge Check JKO_ Answered. *SPILLAGE* Which of the following may be helpful to prevent spillage? *SPILLAGE* Which of the following may be helpful to prevent spillage? * CLASSIFIED DATA* Which type of information could reasonably be expected to cause serious damage to national security if disclosed without authorization? *CLASSIFIED DATA* What is a good practice to protect classified information? *INSIDER THREAT* Based on the description below how many potential insider threat indicators are present? A colleague often makes others uneasy by being persistent in trying to obtain information about classified projects to which he has no access, is boisterous about his wife putting them in credit card debt, and often complains about anxiety and exhaustion display? *INSIDER THREAT* What threat do insiders with authorized access to information or information systems pose? *INSIDER THREAT* Which of the following is NOT considered a potential insider threat indicator? *SOCIAL NETWORKING* When may you be subject to criminal, disciplinary, and/or administrative action due to online misconduct? *SOCIAL NETWORKING* When is the safest time to post details of your vacation activities on your social networking profile? *SOCIAL NETWORKING* Which of the following is a security best practice when using social networking sites? *UNCONTROLLED CLASSIFIED INFORMATION* Which of the following is NOT an example of CUI? *UNCONTROLLED CLASSIFIED INFORMATION* Which of the following is NOT a correct way to protect CUI? Select the information on the data sheet that is personally identifiable information (PII) But not protected health information (PHI) Select the information on the data sheet that is protected health information (PHI) *PHYSICAL SECURITY* Within a secure area, you see an individual who you do not know and is not wearing a visible badge *IDENTITY MANAGEMENT* What certificates does the Common Access Card (CAC) or Personal Identity Verification (PIV) card contain? *IDENTITY MANAGEMENT* Which of the following is an example of a strong password? - eA1xy2!P *SENSITIVE COMPARTMENTED INFORMATION* When faxing Sensitive Compartmented Information (SCI), what actions should you take? *SENSITIVE COMPARTMENTED INFORMATION* When is it appropriate to have your security badge visible within a sensitive compartmented information facility (SCIF)? *REMOVABLE MEDIA IN A SCIF* What action should you take when using removable media in a Sensitive Compartmented Information Facility (SCIF)? *MALICIOUS CODE* Which of the following is NOT a way malicious code spreads? *WEBSITE USE* Which of the following statements is true of cookies? *SOCIAL ENGINEERING* How can you protect yourself from internet hoaxes? *SOCIAL ENGINEERING* How can you protect yourself from social engineering? *SOCIAL ENGINEERING* What action should you take with an e-mail from a friend containing a compressed Uniform Resource Locator (URL)? *TRAVEL* Which of the following is a concern when using your Government-issued laptop in public? *USE OF GFE* What is a critical consideration on using cloud-based file sharing and storage applications on your Government-furnished equipment (GFE)? *MOBILE DEVICES* Which of the following is an example of near field communication (NFC)? *MOBILE DEVICES* Which of the following is an example of removable media? *HOME COMPUTER SECURITY* Which of the following is a best practice for securing your home computer?
Escuela, estudio y materia
- Institución
- Ashford University
- Grado
- Cyber Awareness Challenge 2022 DoD JKO
Información del documento
- Subido en
- 28 de diciembre de 2023
- Número de páginas
- 9
- Escrito en
- 2023/2024
- Tipo
- Resumen
Temas
-
dod cyber awareness challenge 2022 knowledge