Cyber Awareness 2022 Knowledge
Check Already Passed
Which of the following actions is appropriate after finding classified information on the internet?
✔✔Note any identifying information and the website's Uniform Reso
...
Cyber Awareness 2022 Knowledge
Check Already Passed
Which of the following actions is appropriate after finding classified information on the internet?
✔✔Note any identifying information and the website's Uniform Resource Locator (URL)
You receive an inquiry from a reporter about potentially classified information on the internet.
How do you respond? ✔✔Refer the reporter to your organization's public affairs office
What level of damage can the unauthorized disclosure of information classified as Confidential
reasonably be expected to cause? ✔✔damage to national security
Which type of information could reasonably be expected to cause serious damage to national
security if disclosed without authorization? ✔✔Secret
What level of damage to national security can you reasonably expect Top Secret information to
cause if disclosed? ✔✔Exceptionally grave damage
Which of the following is true about telework ✔✔You must have your organization's permission
to telework.
Which of the following is true of protecting classified data? ✔✔Classified material must be
appropriately marked
Which scenario might indicate a reportable insider threat? ✔✔A coworker uses a personal
electronic device in a secure area where their use is prohibited
What threat do insiders with authorized access to information or information systems pose?
✔✔They may wittingly or unwittingly use their authorized access to perform actions that result in
the loss or degradation of resources or capabilities
Which of the following practices may reduce your appeal as a target for adversaries seeking to
exploit your insider status? ✔✔Remove your security badge after leaving your controlled area or
office building
In addition to avoiding the tempation of greed to betray his country, what should Alex do
differently? ✔✔Avoid talking about work outside of the workplace or with people without a needto-know
How many insider threat indicators does Alex demonstrate? ✔✔Three or more
What should Alex's colleagues do? ✔✔Report the suspicious behavior in accordance with their
organization's insider threat policy
When may you be subject to criminal, disciplinary, and/or administrative action due to online
misconduct? ✔✔If you participate in or condone it at any time
Which of the following information is a security risk when posted publicly on your social
networking profile? ✔✔Your birthday
Which of the following best describes the sources that contribute to your online identity? ✔✔Data
about you collected from all sites, apps, and devices that you use can be aggregated to form a
profile of you.
Which of the following is NOT an example of CUI? ✔✔Press Release Data
Which of the following is NOT a correct way to protect CUI? ✔✔CUI may be stored on any
password-protected system
Select the information on the data sheet that is personally identifiable information (PII) but not
protect health information (PHI). ✔✔Jane Jones | Social Security Number 123-45-6789 (Top)
Select the information on the data sheet that is protect health information (PHI) but not personally
identifiable information (PII). ✔✔Interview: Dr. Nora Baker...security risk. (Bottom)
Within a secure area, you see an individual who you do not know and is not wearing a visible
badge. What should you do? ✔✔Ask the individual for identification
What is the best way to protect your Common Access Card (CAC) or Personal Identity Verification
(PIV) Card? ✔✔Maintain possession of it at all times
What certificates does the Common Access Card (CAC) or Personal Identity Verification (PIV)
Card contain? ✔✔Identification, encryption, and digital signature
What must the dissemination of information regarding intelligence sources, methods, or activities
follow? ✔✔Directives issued by the Director of National Intelligence
When faxing Sensitive Compartmented Information (SCI), what actions should you take?
✔✔Mark SCI documents appropriately and use an approved SCI fax machine
If an incident occurs involving removable media in a Sensitive Compartmented Information
Facility (SCIF), what action should you take? ✔✔Notify your security point of contact
What is a possible effect of malicious code? ✔✔Files may be corrupted, erased, or compromised.
Which of the following action can help to protect your identity? ✔✔Order a credit report annually
How can you protect yourself from social engineering? ✔✔Follow instructions given only by
verified personnel
What is whaling? ✔✔A type of phishing targeted at senior officials.
Which is an appropriate use of government e-mail? ✔✔Use a digital signature when sending
attachments or hyperlinks
What security risk does a public Wi-Fi connection pose? ✔✔It may expose the connected device
to malware.
When can you check personal e-mail on your Government-furnished equipment (GFE)? ✔✔If
allowed by organizational policy
Which of the following statements is true? ✔✔Mobile devices and applications can track your
location without your knowledge or consent.
When can you use removable media on a Government system? ✔✔When operationally necessary,
owned by your organization, and approved by the appropriate authority
Which of the following is a best practice for securing your home computer? ✔✔Create separate
accounts for each user
How should you protect a printed classified document when it is not in use? ✔✔Store it in a
General Services Administration (GSA)-approved vault or container
Which of the following is NOT considered a potential insider threat indicator? ✔✔Treated mental
health issues
As someone who works with classified information, what should you do if you are contacted by a
foreign national seeking information on a research project? ✔✔Inform your security point of
contact
What should you do if you suspect spillage has occurred? ✔✔Immediately notify your security
point of contact
Which of the following may help to prevent spillage? ✔✔Label all files, removable media, and
subject headers with appropriate classification markings
When may you be subject to criminal, disciplinary and/or administrative action due to online
misconduct? ✔✔If you participate in or condone it at any time
When is the safest time to post details of your vacation activities on your social networking profile?
✔✔After you have returned home following the vacation
What is an example of a strong password? ✔✔eA1xy2!P
Which of the following is NOT considered a potential insider threat indicator? ✔✔New interest in
learning a foreign language
[Show More]