Social Sciences > QUESTIONS & ANSWERS > Cyber Awareness 2022 Knowledge Check Already Passed (All)

Cyber Awareness 2022 Knowledge Check Already Passed

Document Content and Description Below

Cyber Awareness 2022 Knowledge Check Already Passed Which of the following actions is appropriate after finding classified information on the internet? ✔✔Note any identifying information and th... e website's Uniform Resource Locator (URL) You receive an inquiry from a reporter about potentially classified information on the internet. How do you respond? ✔✔Refer the reporter to your organization's public affairs office What level of damage can the unauthorized disclosure of information classified as Confidential reasonably be expected to cause? ✔✔damage to national security Which type of information could reasonably be expected to cause serious damage to national security if disclosed without authorization? ✔✔Secret What level of damage to national security can you reasonably expect Top Secret information to cause if disclosed? ✔✔Exceptionally grave damage Which of the following is true about telework ✔✔You must have your organization's permission to telework. Which of the following is true of protecting classified data? ✔✔Classified material must be appropriately marked Which scenario might indicate a reportable insider threat? ✔✔A coworker uses a personal electronic device in a secure area where their use is prohibited What threat do insiders with authorized access to information or information systems pose? ✔✔They may wittingly or unwittingly use their authorized access to perform actions that result in the loss or degradation of resources or capabilities Which of the following practices may reduce your appeal as a target for adversaries seeking to exploit your insider status? ✔✔Remove your security badge after leaving your controlled area or office building In addition to avoiding the tempation of greed to betray his country, what should Alex do differently? ✔✔Avoid talking about work outside of the workplace or with people without a needto-know How many insider threat indicators does Alex demonstrate? ✔✔Three or more What should Alex's colleagues do? ✔✔Report the suspicious behavior in accordance with their organization's insider threat policy When may you be subject to criminal, disciplinary, and/or administrative action due to online misconduct? ✔✔If you participate in or condone it at any time Which of the following information is a security risk when posted publicly on your social networking profile? ✔✔Your birthday Which of the following best describes the sources that contribute to your online identity? ✔✔Data about you collected from all sites, apps, and devices that you use can be aggregated to form a profile of you. Which of the following is NOT an example of CUI? ✔✔Press Release Data Which of the following is NOT a correct way to protect CUI? ✔✔CUI may be stored on any password-protected system Select the information on the data sheet that is personally identifiable information (PII) but not protect health information (PHI). ✔✔Jane Jones | Social Security Number 123-45-6789 (Top) Select the information on the data sheet that is protect health information (PHI) but not personally identifiable information (PII). ✔✔Interview: Dr. Nora Baker...security risk. (Bottom) Within a secure area, you see an individual who you do not know and is not wearing a visible badge. What should you do? ✔✔Ask the individual for identification What is the best way to protect your Common Access Card (CAC) or Personal Identity Verification (PIV) Card? ✔✔Maintain possession of it at all times What certificates does the Common Access Card (CAC) or Personal Identity Verification (PIV) Card contain? ✔✔Identification, encryption, and digital signature What must the dissemination of information regarding intelligence sources, methods, or activities follow? ✔✔Directives issued by the Director of National Intelligence When faxing Sensitive Compartmented Information (SCI), what actions should you take? ✔✔Mark SCI documents appropriately and use an approved SCI fax machine If an incident occurs involving removable media in a Sensitive Compartmented Information Facility (SCIF), what action should you take? ✔✔Notify your security point of contact What is a possible effect of malicious code? ✔✔Files may be corrupted, erased, or compromised. Which of the following action can help to protect your identity? ✔✔Order a credit report annually How can you protect yourself from social engineering? ✔✔Follow instructions given only by verified personnel What is whaling? ✔✔A type of phishing targeted at senior officials. Which is an appropriate use of government e-mail? ✔✔Use a digital signature when sending attachments or hyperlinks What security risk does a public Wi-Fi connection pose? ✔✔It may expose the connected device to malware. When can you check personal e-mail on your Government-furnished equipment (GFE)? ✔✔If allowed by organizational policy Which of the following statements is true? ✔✔Mobile devices and applications can track your location without your knowledge or consent. When can you use removable media on a Government system? ✔✔When operationally necessary, owned by your organization, and approved by the appropriate authority Which of the following is a best practice for securing your home computer? ✔✔Create separate accounts for each user How should you protect a printed classified document when it is not in use? ✔✔Store it in a General Services Administration (GSA)-approved vault or container Which of the following is NOT considered a potential insider threat indicator? ✔✔Treated mental health issues As someone who works with classified information, what should you do if you are contacted by a foreign national seeking information on a research project? ✔✔Inform your security point of contact What should you do if you suspect spillage has occurred? ✔✔Immediately notify your security point of contact Which of the following may help to prevent spillage? ✔✔Label all files, removable media, and subject headers with appropriate classification markings When may you be subject to criminal, disciplinary and/or administrative action due to online misconduct? ✔✔If you participate in or condone it at any time When is the safest time to post details of your vacation activities on your social networking profile? ✔✔After you have returned home following the vacation What is an example of a strong password? ✔✔eA1xy2!P Which of the following is NOT considered a potential insider threat indicator? ✔✔New interest in learning a foreign language [Show More]

Last updated: 1 year ago

Preview 1 out of 5 pages

Also available in bundle (1)

(Solved) Cyber Awareness Challenge Bundled Exams Questions and Answers All Rated A+

(Solved) Cyber Awareness Challenge Bundled Exams Questions and Answers All Rated A+

By Nutmegs 1 year ago

$17

12  

Reviews( 0 )

$7.00

Add to cart

Instant download

Can't find what you want? Try our AI powered Search

OR

GET ASSIGNMENT HELP
73
0

Document information


Connected school, study & course


About the document


Uploaded On

Sep 24, 2022

Number of pages

5

Written in

Seller


seller-icon
Nutmegs

Member since 2 years

572 Documents Sold


Additional information

This document has been written for:

Uploaded

Sep 24, 2022

Downloads

 0

Views

 73

Document Keyword Tags

Recommended For You

What is Browsegrades

In Browsegrades, a student can earn by offering help to other student. Students can help other students with materials by upploading their notes and earn money.

We are here to help

We're available through e-mail, Twitter, Facebook, and live chat.
 FAQ
 Questions? Leave a message!

Follow us on
 Twitter

Copyright © Browsegrades · High quality services·