




Study with the several resources on Docsity
Earn points by helping other students or get them with a premium plan
Prepare for your exams
Study with the several resources on Docsity
Earn points to download
Earn points by helping other students or get them with a premium plan
Community
Ask the community for help and clear up your study doubts
Discover the best universities in your country according to Docsity users
Free resources
Download our free guides on studying techniques, anxiety management strategies, and thesis advice from Docsity tutors
Cyber Awareness Knowledge Check Graded A+ 2024
Typology: Exams
1 / 8
This page cannot be seen from the preview
Don't miss anything!
How many potential insider threat indicators does a person who is married with two children, vacations at the beach every year, is pleasant to work with, but sometimes has poor work quality display? - 0 indicators What is the best response if you find classified government data on the internet? - Note any identifying information, such as the website's URL, and report the situation to your security POC. After reading an online story about a new security project being developed on the military installation where you work, your neighbor asks you to comment about the article. You know this project is classified. What should be your response? - Attempt to change the subject to something non-work related, but neither confirm nor deny the article's authenticity. What is a proper response if spillage occurs? - Immediately notify your security POC. What should you do if a reporter asks you about potentially classified information on the web? - Ask for information about the website, including the URL. A user writes down details from a report stored on a classified system marked as Secret and uses those details to draft an unclassified briefing on an unclassified system without authorization. What is the best choice to describe what has occurred? - Spillage because classified data was moved to a lower classification level system without authorization. How many potential insider threat indicators does a coworker who often makes others uneasy by being persistent in trying to obtain information about classified projects to which he has no access, is boisterous about his wife putting them in credit card debt, and often complains about anxiety and exhaustion display? - 3 or more indicators Which of the following can an unauthorized disclosure of information classified as Confidential reasonably be expected to cause? - Damage to national security Which classification level is given to information that could reasonably be expected to cause serious damage to national security? - Secret When classified data is not in use, how can you protect it? - Store classified data appropriately in a GSA-approved vault/container when not in use. Which is a good practice to protect classified information? - Ensure proper labeling by appropriately marking all classified material and, when required, sensitive material. Which of the following is a good practice to aid in preventing spillage? - Be aware of classification markings and all handling caveats.
What is required for an individual to access classified data? - Appropriate clearance; signed and approved non-disclosure agreement; and need-to-know. What type of activity or behavior should be reported as a potential insider threat? - Coworker making consistent statements indicative of hostility or anger toward the United States and its policies. Which of the following practices reduces the chance of becoming a target by adversaries seeking insider information? - Don't talk about work outside your workspace unless it is a specifically designated public meeting environment and is controlled by the event planners. Which scenario might indicate a reportable insider threat security incident? - A coworker is observed using a personal electronic device in an area where their use is prohibited. Why might "insiders" be able to cause damage to their organizations more easily than others? - Insiders are given a level of trust and have authorized access to Government information systems. Which of the following is a best practice to protect information about you and your organization on social networking sites and applications? - Use only personal contact information when establishing personal social networking accounts, never use Government contact information. What should you do if an individual asks you to let her follow you into your controlled space, stating that she left her security badge at her desk? - Don't allow her access into secure areas and report suspicious activity. Which represents a security best practice when using social networking? - Understanding and using available privacy settings. Which is NOT a sufficient way to protect your identity? - Use a common password for all your system and application logons. Under which circumstances may you be subject to criminal, disciplinary, and/or administrative action due to online misconduct? - Any time you participate in or condone misconduct, whether offline or online. As someone who works with classified information, what should you do if you are contacted by a foreign national seeking information on a research project? - Inform your security POC of all non-professional or non-routine contacts with foreign nations, including, but not limited to, joining each other's social media sites. Which of the following is true about unclassified data? - When unclassified data is aggregated, its classification level may rise.
What must you ensure if you work involves the use of different types of smart card security tokens? - Avoid a potential security violation by using the appropriate token for each system. What must you ensure before transmitting Personally Identifiable Information (PII) or Protected Health Information (PHI) via e-mail? - Transmissions must be between Government e-mail accounts and must be encrypted and digitally signed when possible. What must you do when e-mailing Personally Identifiable Information (PII) or Protected Health Information (PHI)? - Encrypt the e-mail and use your Government e-mail account. What is a good practice for physical security? - Challenge people without proper badges. Is it acceptable to take a short break while a coworker monitors your computer while logged on with your CAC? - No. Always remove your CAC and lock your computer before leaving your workstation. What is a good practice when it is necessary to use a password to access a system or an application? - Avoid using the same password between systems or applications. What is the best description of two-factor authentication? - Something you possess, like a CAC, and something you know, like a PIN or password. What certificates are contained on the DoD Public Key Infrastructure (PKI) implemented by the Common Access Card (CAC)/Personal Identity Verification (PIV) card? - Identification, encryption, and digital signature What are the requirements to be granted access to SCI material? - The proper security clearance and indoctrination into the SCI program. What is a protection against internet hoaxes? - Use online sites to confirm or expose potential hoaxes. What organization issues the directives concerning the dissemination of information regarding intelligence sources, methods, or activities? - Department of Defense. Which term describes an event where a person who does not have the required clearance or access caveats comes into possession of Sensitive Compartmented Information (SCI) - Compromise What describes a Sensitive Compartmented Information (SCI) program? - A program that segregates various type of classified information into distinct compartments for added protection and dissemination for distribution control.
What describes how Sensitive Compartmented Information is marked? - Approved Security Classification Guide (SCG) What must users do when using removable media within a Sensitive Compartmented Information Facility (SCIF)? - Comply with Configuration/Change Management (CM) policies and procedures Which is a risk associated with removable media? - Spillage of classified information. What is an indication that malicious code is running on your system? - File corruption What are some actions you can take to try to protect your identity? - Shred personal documents; never share passwords, and order a credit report annually. Which of the following is an appropriate use of Government e-mail? - Digitally signing e- mails that contain attachments or hyperlinks. What is a protection against internet hoaxes? - Use online sites to confirm or expose potential hoaxes. What can malicious code do? - It can cause damage by corrupting files, erasing your hard drive, and/or allowing hackers access. Which is true of cookies? - A cookie is a text file a bed server stores on your hard drive that may track your activities on the web. What is a common method used in social engineering? - Telephone surveys Which may be a security issue with compressed URLs? - There is no way to know where the link actually leads. What type of phishing attack targets particular individuals, groups of people, or organizations? - Spear phishing While on vacation, a coworker calls and asks you to access a site to review and approve a document that is hosted behind a DoD Public Key Infrastructure (PKI) protected webpage. You do not have your government-issued laptop. What action should you take? - Wait until you have access to your government-issued laptop. Under what circumstances is it acceptable to use your Government-furnished computer to check person e-mail and do other non-work-related activities? - If allowed by organization policy. Which are examples of portable electronic devices (PEDs)? - Thumb drives, memory sticks, and optical disks
What is a way to prevent the download of viruses and other malicious code when checking your e-mail? - View e-mail in plain text and don't view e-mail in Preview Pane. What is a best practice to protect data on your mobile computing device? - Lock your device screen when not in use and require a password to reactivate. Which of the following is NOT considered a potential insider threat indicator? - New interest in learning a foreign language What advantages do "insider threats" have over others that allows them to cause damage to their organizations more easily? - Insiders are given a level of trust and have authorized access to Government information systems. Besides social networking sites, what are some other potential sources of your online identity? - All of the above What action should you take if you receive a friend request on your social networking website from someone in Germany you met casually at a conference last year? - Decline the request. A colleague asks to leave a report containing Protected Health Information (PHI) on his desk overnight so he can continue working on it the next day. How do you respond? - Tell your colleague that it needs to be secured in a cabinet or container. Which of the following is the best example of Personally Identifiable Information (PII)? - Passport number What certificates are contained on the Common Access Card (CAC)? - Identification, encryption, and digital signature When should documents be marked within a Sensitive Compartmented Information Facility (SCIF)? - All documents should be appropriately marked, regardless of format, sensitivity, or classification. Which organization issues the directives concerning the dissemination of information regarding intelligence sources, methods, or activities? - The Director of National Intelligence You receive an email from the Internal Revenue Service (IRS) demanding immediate payment of back taxes of which you were not aware. The email provides a website and a toll-free number where you can make payment. What action should you take? - Contact the IRS using their publicly available, official contact information. When using your Government-issued laptop in public environments, with which of the following should you be concerned? - The potential for unauthorized viewing of work- related information displayed on your screen.
Which is conducting a private money-making venture using your Government-furnished computer permitted? - It is never permitted. Which of the following is a best practice for securing your home computer? - Use antivirus software and keep it up to date.