Have a question?
Message sent Close

Cyber Awareness Challenge Answers

Instructor
John Marsh
0
0 reviews
  • Description
  • Full Document
Blur-Preview

Cyber Awareness Challenge Answers

Dod Cyber Awareness Challenge Answers

Cyber Awareness Challenge Quizlet

Cyber Awareness Challenge Knowledge Check Answers

Cyber Awareness Challenge Spillage Answers

Which of the following is NOT an example of CUI?

After reading an online story about a new security project being developed on the military installation where you work, your neighbor asks you to com- ment about the article. You know that this project is classified. How should you respond?:

Which of the following may help to prevent spillage?:

A user writes down details marked as Secret from a report stored on a classified system and uses those details to draft a briefing on an unclassified system without authorization. What is the best choice to describe what has occurred?:

What should you do when you are working on an unclassified system and receive an email with a classified attachment?:

What should you do if a reporter asks you about potentially classified infor- mation on the web?:

.What should you do if a reporter asks you about potentially classified information on the web?:

What should you do if you suspect spillage has occurred?:

Which of the following is a good practice to prevent spillage?:

Which of the following actions is appropriate after finding classified informa- tion on the Internet?:

When classified data is not in use, how can you protect it?:

What is required for an individual to access classified data?:

Which classification level is given to information that could reasonably be expected to cause serious damage to national security?:

Which of the following is a good practice to protect classified information?-

Which of the following is true of protecting classified data?:

What level of damage can the unauthorized disclosure of information clas- sified as Confidential reasonably be expected to cause?:

Which of the following is true of telework?:

Which type of information could reasonably be expected to cause serious damage to national security if disclosed without authorization?:

How should you protect a printed classified document when it is not in use?-

Based on the description that follows, how many potential insider threat indicator(s) are displayed? A colleague vacations at the beach every year, is married and a father of four, sometimes has poor work quality, and works well with his team.

How many potential insider threat indicators does a coworker who often makes others uneasy by being persistent in trying to obtain information about classified projects to which he has no access, is boisterous about his wife putting them in credit card debt, and often complains about anxiety and exhaustion display?:

Based on the description that follows, how many potential insider threat indicator(s) are displayed? A colleague is playful and charming, consistently wins performance awards, and is occasionally aggressive in trying to access classified information.:

What advantages do “insider threats” have over others that allows them to cause damage to their organizations more easily?:

What type of activity or behavior should be reported as a potential insider threat?:

Which of the following should be reported as a potential security incident?:

Which scenario might indicate a reportable insider threat?:

Based on the description that follows, how many potential insider threat indicator(s) are displayed? A colleague often makes others uneasy with her persistent efforts to obtain information about classified project where she has no need-to-know, is vocal about her husband overspending on credit cards, and complains about anxiety and exhaustion.:

Which type of behavior should you report as a potential insider threat?:

Which of the following is NOT considered a potential insider threat indica- tor?:

When is the safest time to post details of your vacation activities on your social networking profile?:

What should you do if you receive a game application request that includes permission to access your friends, profile information, cookies, and sites visited?

Which of the following information is a security risk when posted publicly on your social networking profile?:

Which of the following is a security best practice when using social network- ing sites?:

When may you be subject to criminal, disciplinary, and/or administrative action due to online misconduct?:

Which of the following is a security best practice when using social network- ing sites?:

Which of the following information is a security risk when posted publicly on your social networking profile?:

Your cousin posted a link to an article with an incendiary headline on social media. What action should you take?:

Which of the following best describes the sources that contribute to your online identity?:

As someone who works with classified information, what should you do if you are contacted by a foreign national seeking information on a research project?
*Controlled Unclassified Information
Which of the following is NOT an example of CUI?
*Controlled Unclassified Information
Which of the following is NOT a correct way to protect CUI?

What is a good practice for physical security?

At which Cyberspace Protection Condition (CPCON) is the priority focus on critical functions only?

Within a secure area, you see an individual who you do not know and is not wearing a visible badge. What should you do?

Your DoD Common Access Card (CAC) has a Public Key Infrastructure (PKI) token approved for access to the NIPRNet. In which situation below are you permitted to use your PKI token?

Which of the following is the nest description of two-factor authentication?-

Which is NOT a sufficient way to protect your identity?

What is the best way to protect your Common Access Card (CAC)?:

Which of the following is NOT a best practice to preserve the authenticity of your identity?:

Which of the following is an example of two-factor authentication?:

Which of the following is an example of a strong password?:

What is Sensitive Compartmented Information (SCI)?:

Which of the following best describes the compromise of Sensitive Compart- mented Information (SCI)?:

When should documents be marked within a Sensitive Compartmented Information Facility (SCIF):

Which must be approved and signed by a cognizant Original Classification Authority (OCA)?:

What must the dissemination of information regarding intelligence sources, methods, or activities follow?:

When is it appropriate to have your security badge visible within a Sensitive Compartmented Information Facility (SCIF)?:

What should the owner of this printed SCI do differently?:

What should the participants in this conversation involving SCI do differently?:

When faxing Sensitive Compartmented Information (SCI), what actions should you take?:

What must users ensure when using removable media such as compact disk (CD)?:

What portable electronic devices (PEDs) are allowed in a Sensitive Compartmented Information Facility (SCIF)?:

What action should you take when using removable media in a Sensitive Compartmented Information Facility (SCIF)?:

What are some examples of malicious code?:
*
Which of the following is NOT a way that malicious code spreads?:

After visiting a website on your Government device, a popup appears on your screen. The popup asks if you want to run an application. Is this safe?:

While you are registering for a conference, you arrive at the website
http://www.dcsecurityconference.org/registration/. The website requires a credit card for registration. What should you do?:

How should you respond to the theft of your identity?:

Which of the following statements is true of cookies?:

Which is a best practice that can prevent viruses and other malicious code from being downloaded when checking your e-mail?:

What is TRUE of a phishing attack?:

Which of the following is a way to protect against social engineering?:

What is whaling?:

What action should you take with an e-mail from a friend containing a compressed Uniform Resource Locator (URL)?:

How can you protect yourself from internet hoaxes?:

Which may be a security issue with compressed Uniform Resource Locators (URLs)?:

What is a best practice while traveling with mobile computing devices?: –

Which of the following is true of traveling overseas with a mobile phone?:

What security risk does a public Wi-Fi connection pose?: **Use of GFE
When can you check personal e-mail on your Government-furnished equip- ment (GFE)?:

What is a critical consideration on using cloud-based file sharing and stor- age applications on your Government-furnished equipment (GFE)?

Which is a rule for removable media, other portable electronic devices (PEDs), and mobile computing devices to protect Government systems?

What can help to protect the data on your personal mobile device?:

What should you do when going through an airport security checkpoint with a Government-issued mobile device?:

How can you protect your information when using wireless technology?:

What should you consider when using a wireless keyboard with your home computer?:

Which of the following is a best practice for securing your home computer?

What threat do insiders with authorized access to informatin or information systems pose?:

Which of the following is a best practice for physical security?:

What actin should you take if you become aware that Sensitive Compart- mented Information (SCI) has been compromised?:

Which is an appropriate use of government e-mail?:

Which of the following is a concern when using your Government-issued laptop in public?:

 

 

PREVIEW

Cyber Awareness Challenge 2022 Answers

NOTE: Please check the details before purchasing the document.

error: