Social Sciences > QUESTIONS & ANSWERS > DOD Cyber Awareness 2021/2022 (DODIAA-V18.0) Knowledge Check Already Passed (All)
DOD Cyber Awareness 2021/2022 (DODIAA-V18.0) Knowledge Check Already Passed Spillage: What should you do if a reporter asks you about potentially classified information on the web? ✔✔Refer the ... reporter to your organization's public affair office What should you do when you are working on an unclassified system and receive an email with a classified attachment? ✔✔Call your security point of contact immediately. Which classified level is given to information that could reasonably be expected to cause serious damage to national security? ✔✔Secret Which of the following is true of protecting classified data? ✔✔Classified material must be appropriately marked What are some potential insider threat indicators? ✔✔Difficult life circumstances such as substance abuse, divided loyalty or allegiance to the U.S., and extreme, persistent interpersonal difficulties. How many potential insider threat indicators does a person who is playful and charming, consistently wins performance awards, but is occasionally aggressive in trying to access sensitive information display? ✔✔1 indicator Which of the following is NOT considered a potential insider threat indicator? ✔✔New interest in learning a foreign language What should you do if you receive a game application request that includes permission to access your friends, profile information, cookies, and sites visited? ✔✔Decline the request. What information posted publicly on your personal social networking profile represents a security risk? ✔✔Your place of birth Sensitive Information: Which of the following is an example of Protected Health Information (PHI)? ✔✔Medical test results Which of the following is the best example of Personally Identifiable Information (PII)? ✔✔Passport number What type of unclassified material should always be marked with a special handling caveat? ✔✔Official use only Is it acceptable to take a short break while a coworker monitors your computer while logged on with your Common Access Card (CAC)? ✔✔No. Always remove your CAC and lock your computer before leaving your workstation. What is the best way to protect your common access card? ✔✔Maintain possession of it at all times. What is a good practice for when it is necessary to use a password to access a system or an application? ✔✔Avoid using the same password between systems or applications. When is it appropriate to have your securing badge visible with a sensitive compartmented information facility? ✔✔At all time when is the facility. Which of the following does a security classification guide provided? ✔✔Precise guidance regarding specific elements of information to be classified What portable electronic devices are allowed in a secure compartmented information facility? ✔✔Government owned PEDs if expressed authorized by your agency Malicious code: After clicking on a link on a website, a box pops up and asks if you want to run an application. Is it ok to run it? ✔✔No. Only use you agency trusted websites. What are some actions you can take to try to protect you identity? ✔✔Shred personal documents, never share passwords and order a credit history annually. Which of the following is a way to protect against social engineering? ✔✔Follow the instructions given only by verified personnel. Which may be a security issue with compressed URLs? ✔✔There is no way to know where the link actually leads. What is a way to prevent the download of viruses and other malicious code when checking your email? ✔✔View email in plain text and don't view email in Preview Pane. Upon connecting your government-issued laptop to a public wireless connection, what should you immediately do? ✔✔Connect to the Government Virtual Private Network (VPN). When is conducting a private money-making venture using your Government-furnished computer permitted? ✔✔It is never permitted Which of the following is not a best practice to protect data on your mobile computing device? ✔✔ What are some examples of removable media? ✔✔Memory sticks, flash drives, or external hard drives. Which of the following is a best practice for securing your home computer? ✔✔Use antivirus software and keep it up to date. [Show More]
Last updated: 3 years ago
Preview 1 out of 4 pages
Buy this document to get the full access instantly
Instant Download Access after purchase
Buy NowInstant download
We Accept:
(Solved) Cyber Awareness Challenge Bundled Exams Questions and Answers All Rated A+
By Nutmegs 3 years ago
$17
12
Can't find what you want? Try our AI powered Search
Connected school, study & course
About the document
Uploaded On
Sep 24, 2022
Number of pages
4
Written in
All
This document has been written for:
Uploaded
Sep 24, 2022
Downloads
0
Views
116
Scholarfriends.com Online Platform by Browsegrades Inc. 651N South Broad St, Middletown DE. United States.
We're available through e-mail, Twitter, Facebook, and live chat.
FAQ
Questions? Leave a message!
Copyright © Scholarfriends · High quality services·