Docsity
Docsity

Prepare for your exams
Prepare for your exams

Study with the several resources on Docsity


Earn points to download
Earn points to download

Earn points by helping other students or get them with a premium plan


Guidelines and tips
Guidelines and tips

Department of Defense (DoD) Cyber Awareness Challenge 2023 (1hr), Exams of Military Strategy and Training

A series of questions related to cybersecurity and the protection of classified information. It covers topics such as insider threats, telework, social media safety, Controlled Unclassified Information (CUI), Cyber Protection Condition (CPCON), and Portable Electronic Devices (PEDs) in a Sensitive Compartmented Information Facility (SCIF). likely part of a training program for DoD personnel.

Typology: Exams

2023/2024

Available from 10/09/2023

DrShirleyAurora
DrShirleyAurora 🇺🇸

4.5

(8)

4.4K documents

1 / 3

Toggle sidebar

This page cannot be seen from the preview

Don't miss anything!

bg1
Department of Defense (DoD) Cyber Awareness
Challenge 2023 (1hr)
You find information that you know to be classified on the internet. What do you do? -
Note the website's URL and report the situation to your security point of contact
Which of the following may help prevent spillage? -
Follow procedures for transferring data to and from outside agency and non-Government networks
Which of the following is good practice to protect classified information? -
Don't assume open storage in a secure facility is authorized
What level of damage to national security can you reasonably expect Top Secret information to cause if
disclosed? -
Exceptionally grave damage
Which of the following is true about telework? -
You must have your organization's permission to telework.
Which of the following is true of protecting classified data? -
Classified material must be appropriate marked
Which of the following is a potential insider threat indicator? -
Unusual interest in classified information
What is an insider threat? -
Someone who uses authorized access, wittingly or unwittingly to harm national security through
unauthorized disclosure or other actions that may cause the loss or degradation of resources or
capabilities
Based on the description that follows, how many potential insider threat indicator(s) are displayed? A
colleague abruptly becomes hostile and unpleasant after previously enjoying positive working
relationships with peers, purchases an unusually expensive new car and has unexplained absences from
work -
3 or more indicators
Which piece of information is safest to include on your social media profile? -
Photos of your pet
A trusted friend in your social network posts a link to vaccine information on a website unknown to
you. What action should you take? -
Research the source to evaluate its credibility and reliability
Which piece of information is safest to include on your social media profile? -
Your favorite movie
pf3

Partial preview of the text

Download Department of Defense (DoD) Cyber Awareness Challenge 2023 (1hr) and more Exams Military Strategy and Training in PDF only on Docsity!

Department of Defense (DoD) Cyber Awareness

Challenge 2023 (1hr)

You find information that you know to be classified on the internet. What do you do? - Note the website's URL and report the situation to your security point of contact Which of the following may help prevent spillage? - Follow procedures for transferring data to and from outside agency and non-Government networks Which of the following is good practice to protect classified information? - Don't assume open storage in a secure facility is authorized What level of damage to national security can you reasonably expect Top Secret information to cause if disclosed? - Exceptionally grave damage Which of the following is true about telework? - You must have your organization's permission to telework. Which of the following is true of protecting classified data? - Classified material must be appropriate marked Which of the following is a potential insider threat indicator? - Unusual interest in classified information What is an insider threat? - Someone who uses authorized access, wittingly or unwittingly to harm national security through unauthorized disclosure or other actions that may cause the loss or degradation of resources or capabilities Based on the description that follows, how many potential insider threat indicator(s) are displayed? A colleague abruptly becomes hostile and unpleasant after previously enjoying positive working relationships with peers, purchases an unusually expensive new car and has unexplained absences from work - 3 or more indicators Which piece of information is safest to include on your social media profile? - Photos of your pet A trusted friend in your social network posts a link to vaccine information on a website unknown to you. What action should you take? - Research the source to evaluate its credibility and reliability Which piece of information is safest to include on your social media profile? - Your favorite movie

Which is a best practice for protecting Controlled Unclassified Information (CUI)? - Store it in a locked desk drawer after working hours Which of the following is true of Controlled Classified Information (CUI)? - CUI must be handled using safeguarding or dissemination controls Which of the following is true of Unclassified Information? - -Must be cleared before being released to the public -May require application of CUI access and distribution controls -If compromised, could affect the safety of government personnel, missions, and systems -Must be clearly marked as Unclassified or CUI if included in a classified document or classified storage area -If aggregated, the classification of the information may be elevated Which of the following is NOT an example of CUI? - Press release data Which of the following is NOT a correct way to protect CUI? - CUI may be stored on any password protected system Which Cyber Protection Condition (CPCON) establishes a protection priority focus on critical functions only? - CPCON 1 Which of the following is true of using a DoD Public Key Infrastructure (PKI) token? - It offers protection from spyware and malware Which of the following is true of the Common Access Card (CAC) or Personal Identity Verification (PIV) card? - If your CAC/PIV card is lost or misplaced, report it immediately to your security POC Which of the following is true of transmitting Sensitive Compartmented Information (SCI)? - You may only transport SCI if you have been courier-briefed for SCI Which of the following is true of Security Classification Guides? - They provide guidance on reasons for and duration of classification of information Which of the following is true of Portable Electronic Devices (PEDs) in a Sensitive Compartmented Information Facility (SCIF)? - Only connect government-owned PEDs to the same level classification information system when authorized Which of the following is true of downloading apps? - For government-owned devices, use approved and authorized applications only Which of the following actions can help to protect your identity? - Shred personal documents Which of the following is true of internet hoaxes? -