

Study with the several resources on Docsity
Earn points by helping other students or get them with a premium plan
Prepare for your exams
Study with the several resources on Docsity
Earn points to download
Earn points by helping other students or get them with a premium plan
Community
Ask the community for help and clear up your study doubts
Discover the best universities in your country according to Docsity users
Free resources
Download our free guides on studying techniques, anxiety management strategies, and thesis advice from Docsity tutors
A series of questions related to cybersecurity and the protection of classified information. It covers topics such as insider threats, telework, social media safety, Controlled Unclassified Information (CUI), Cyber Protection Condition (CPCON), and Portable Electronic Devices (PEDs) in a Sensitive Compartmented Information Facility (SCIF). likely part of a training program for DoD personnel.
Typology: Exams
1 / 3
This page cannot be seen from the preview
Don't miss anything!
You find information that you know to be classified on the internet. What do you do? - Note the website's URL and report the situation to your security point of contact Which of the following may help prevent spillage? - Follow procedures for transferring data to and from outside agency and non-Government networks Which of the following is good practice to protect classified information? - Don't assume open storage in a secure facility is authorized What level of damage to national security can you reasonably expect Top Secret information to cause if disclosed? - Exceptionally grave damage Which of the following is true about telework? - You must have your organization's permission to telework. Which of the following is true of protecting classified data? - Classified material must be appropriate marked Which of the following is a potential insider threat indicator? - Unusual interest in classified information What is an insider threat? - Someone who uses authorized access, wittingly or unwittingly to harm national security through unauthorized disclosure or other actions that may cause the loss or degradation of resources or capabilities Based on the description that follows, how many potential insider threat indicator(s) are displayed? A colleague abruptly becomes hostile and unpleasant after previously enjoying positive working relationships with peers, purchases an unusually expensive new car and has unexplained absences from work - 3 or more indicators Which piece of information is safest to include on your social media profile? - Photos of your pet A trusted friend in your social network posts a link to vaccine information on a website unknown to you. What action should you take? - Research the source to evaluate its credibility and reliability Which piece of information is safest to include on your social media profile? - Your favorite movie
Which is a best practice for protecting Controlled Unclassified Information (CUI)? - Store it in a locked desk drawer after working hours Which of the following is true of Controlled Classified Information (CUI)? - CUI must be handled using safeguarding or dissemination controls Which of the following is true of Unclassified Information? - -Must be cleared before being released to the public -May require application of CUI access and distribution controls -If compromised, could affect the safety of government personnel, missions, and systems -Must be clearly marked as Unclassified or CUI if included in a classified document or classified storage area -If aggregated, the classification of the information may be elevated Which of the following is NOT an example of CUI? - Press release data Which of the following is NOT a correct way to protect CUI? - CUI may be stored on any password protected system Which Cyber Protection Condition (CPCON) establishes a protection priority focus on critical functions only? - CPCON 1 Which of the following is true of using a DoD Public Key Infrastructure (PKI) token? - It offers protection from spyware and malware Which of the following is true of the Common Access Card (CAC) or Personal Identity Verification (PIV) card? - If your CAC/PIV card is lost or misplaced, report it immediately to your security POC Which of the following is true of transmitting Sensitive Compartmented Information (SCI)? - You may only transport SCI if you have been courier-briefed for SCI Which of the following is true of Security Classification Guides? - They provide guidance on reasons for and duration of classification of information Which of the following is true of Portable Electronic Devices (PEDs) in a Sensitive Compartmented Information Facility (SCIF)? - Only connect government-owned PEDs to the same level classification information system when authorized Which of the following is true of downloading apps? - For government-owned devices, use approved and authorized applications only Which of the following actions can help to protect your identity? - Shred personal documents Which of the following is true of internet hoaxes? -