Computer Networking > QUESTIONS & ANSWERS > 95 Q&A on Cyber Awareness 2023 Knowledge Check (Answered) (All)

95 Q&A on Cyber Awareness 2023 Knowledge Check (Answered)

Document Content and Description Below

Cyber Awareness 2022-2023 Knowledge Check (Answered) 1. How many potential insider threat indicators does a person who is married with two children, vacations at the beach every year, is pleasant t... o work with, but sometimes has poor work quality display? 2. What is the best response if you find classified government data on the internet? 3. After reading an online story about a new security project being developed on the military installation where you work, your neighbor asks you to comment about the article. You know this project is classified. What should be your response? 4. What is a proper response if spillage occurs? 5. What should you do if a reporter asks you about potentially classified information on the web? 6. A user writes down details from a report stored on a classified system marked as Secret and uses those details to draft an unclassified briefing on an unclassified system without authorization. What is the best choice to describe what has occurred? 7. How many potential insider threat indicators does a coworker who often makes others uneasy by being persistent in trying to obtain information about classified projects to which he has no access, is boisterous about his wife putting them in credit card debt, and often complains about anxiety and exhaustion display? 8. Which of the following can an unauthorized disclosure of information classified as Confidential reasonably be expected to cause? 9. Which classification level is given to information that could reasonably be expected to cause serious damage to national security? 10. When classified data is not in use, how can you protect it? 11. Which is a good practice to protect classified information? 12. Which of the following is a good practice to aid in preventing spillage? 13. What is required for an individual to access classified data? 14. What type of activity or behavior should be reported as a potential insider threat? 15. Which of the following practices reduces the chance of becoming a target by adversaries seeking insider information? 16. Which scenario might indicate a reportable insider threat security incident? 17. Why might "insiders" be able to cause damage to their organizations more easily than others? 18. Which of the following is a best practice to protect information about you and your organization on social networking sites and applications? 19. What should you do if an individual asks you to let her follow you into your controlled space, stating that she left her security badge at her desk? 20. Which represents a security best practice when using social networking? 21. Which is NOT a sufficient way to protect your identity? 22. Under which circumstances may you be subject to criminal, disciplinary, and/or administrative action due to online misconduct? 23. As someone who works with classified information, what should you do if you are contacted by a foreign national seeking information on a research project? 24. Which of the following is true about unclassified data? 25. What are some potential insider threat indicators? 26. What information posted publicly on your personal social networking profile represents a security risk? 27. What is an individual's Personally Identifiable Information (PII) or Protected Health Information (PHI) considered? 28. Under what circumstances could unclassified information be considered a threat to national security? 29. What type of unclassified material should always be marked with a special handling caveat? 30. Which is true for protecting classified data? 31. Which of the following is true of protecting classified data? 32. Which of the following should be reported as a potential security incident (in accordance with your Agency's insider threat policy)? 33. How many potential insider threat indicators does a person who is playful and charming, consistently win performance awards, but is occasionally aggressive in trying to access sensitive information? 34. Which of the following terms refers to harm inflicted on national security through authorized access to information or information systems? 35. What is the best example of Personally Identifiable Information (PII)? 36. What is the best example of Protected Health Information (PHI)? 37. When is the best time to post details of your vacation activities on your social networking website? 38. What does Personally Identifiable Information (PII) include? 39. What must you ensure if you work involves the use of different types of smart card security tokens? 40. What must you ensure before transmitting Personally Identifiable Information (PII) or Protected Health Information (PHI) via e-mail? 41. What must you do when e-mailing Personally Identifiable Information (PII) or Protected Health Information (PHI)? 42. What is a good practice for physical security? 43. Is it acceptable to take a short break while a coworker monitors your computer while logged on with your CAC? 44. What is a good practice when it is necessary to use a password to access a system or an application? 45. What is the best description of two-factor authentication?. 46. What certificates are contained on the DoD Public Key Infrastructure (PKI) implemented by the Common Access Card (CAC)/Personal Identity Verification (PIV) card? 47. What are the requirements to be granted access to SCI material? 48. What is a protection against internet hoaxes? 49. What organization issues the directives concerning the dissemination of information regarding intelligence sources, methods, or activities? 50. Which term describes an event where a person who does not have the required clearance or access caveats comes into possession of Sensitive Compartmented Information (SCI) 51. What describes a Sensitive Compartmented Information (SCI) program?. 52. What describes how Sensitive Compartmented Information is marked? - 53. What must users do when using removable media within a Sensitive Compartmented Information Facility (SCIF)? 54. Which is a risk associated with removable media? 55. What is an indication that malicious code is running on your system? corruption 56. What are some actions you can take to try to protect your identity? 57. Which of the following is an appropriate use of Government e-mail? 58. What is a protection against internet hoaxes? 59. What can malicious code do? 60. Which is true of cookies? 61. What is a common method used in social engineering? 62. Which may be a security issue with compressed URLs? 63. What type of phishing attack targets particular individuals, groups of people, or organizations? 64. While on vacation, a coworker calls and asks you to access a site to review and approve a document that is hosted behind a DoD Public Key Infrastructure (PKI) protected webpage. You do not have your government-issued laptop. What action should you take? 65. Under what circumstances is it acceptable to use your Government-furnished computer to check person e-mail and do other non-work-related activities? 66. Which are examples of portable electronic devices (PEDs)? 67. What are some examples of removable media? 68. What is a valid response when identity theft occurs? 69. What is a common indicator of a phishing attempt? 70. What is whaling? 71. Upon connecting your Government-issued laptop to a public wireless connection, what should you immediately do? 72. Which of the following activities is an ethical use of Government-furnished equipment (GFE)? 73. Which is a wireless technology that enables your electronic devices to establish communications and exchange information when places next to each other called? 74. Which of the following helps protect data on your personal mobile devices? 75. What is a possible indication of a malicious code attack in progress? 76. What should you do if a commercial entity, such as a hotel reception desk, asks for Government identification so that they can make a photocopy? 77. When is conducting a private money-making venture using your Government-furnished computer permitted? 78. What is a good practice to protect data on your home wireless systems? 79. Which must be approved and signed by a cognizant Original Classification Authority (OCA)? 80. What portable electronic devices (PEDs) are allowed in a Secure Compartmented Information Facility (SCIF)? 81. What is a way to prevent the download of viruses and other malicious code when checking your e-mail? 82. What is a best practice to protect data on your mobile computing device? 83. Which of the following is NOT considered a potential insider threat indicator? - 84. What advantages do "insider threats" have over others that allows them to cause damage to their organizations more easily? 85. Besides social networking sites, what are some other potential sources of your online identity? 86. What action should you take if you receive a friend request on your social networking website from someone in Germany you met casually at a conference last year? 87. A colleague asks to leave a report containing Protected Health Information (PHI) on his desk overnight so he can continue working on it the next day. How do you respond? 88. Which of the following is the best example of Personally Identifiable Information (PII)? 89. What certificates are contained on the Common Access Card (CAC)? 90. When should documents be marked within a Sensitive Compartmented Information Facility (SCIF)? 91. Which organization issues the directives concerning the dissemination of information regarding intelligence sources, methods, or activities? 92. You receive an email from the Internal Revenue Service (IRS) demanding immediate payment of back taxes of which you were not aware. The email provides a website and a toll-free number where you can make payment. What action should you take? 93. When using your Government-issued laptop in public environments, with which of the following should you be concerned? 94. Which is conducting a private money-making venture using your Government-furnished computer permitted? 95. Which of the following is a best practice for securing your home computer? [Show More]

Last updated: 1 year ago

Preview 1 out of 8 pages

Reviews( 0 )

Recommended For You

 Business> QUESTIONS & ANSWERS > CLM 031 EXAM (All)

preview
CLM 031 EXAM

CLM 031 = 100% Question 1: 5b Select the statement that is correct concerning performance work statement (PWS) requirements: - All answers are correct. - PWS should describe requirements necessary...

By Book Worm, Certified , Uploaded: Nov 03, 2022

$5

 *NURSING> QUESTIONS & ANSWERS > PHIL 347 Week 6 Checkpoint Quiz. Score 100/100 (All)

preview
PHIL 347 Week 6 Checkpoint Quiz. Score 100/100

Question: What are the three fundamental reasoning strategies listed in the text? Question: What is comparative reasoning? On what skill is it based? Question: We learned four tests for evaluating...

By Amanda Rosales , Uploaded: Mar 24, 2021

$7

 Business> QUESTIONS & ANSWERS > BUSINESS 1007 (All)

preview
BUSINESS 1007

BUSINESS 1007 07 Key 1. (p. 178) Managers utilize organizational resources such as employees, information, and equipment to accomplish goals. 2. (p. 178) The main job of managers today is to w...

By Kirsch , Uploaded: Oct 19, 2019

$6

 Anthropology> QUESTIONS & ANSWERS > KOR 352 FA19 101 week 8 Quiz. Already Graded A (All)

preview
KOR 352 FA19 101 week 8 Quiz. Already Graded A

KOR 352 FA19 101: Week 8 Quiz Question 1 (0.25 points) Which of the following is not true of Kim and Finch’s observations during their field research in South Korea from 1997 to 2000? Question 1 o...

By Kirsch , Uploaded: Oct 17, 2019

$9

 E-Commerce> QUESTIONS & ANSWERS > ESOC 316 Digital Commerce - University Of Arizona. Midterm Quiz. 20 Q&A. 100% Score (All)

preview
ESOC 316 Digital Commerce - University Of Arizona. Midterm Quiz. 20 Q&A. 100% Score

ESOC 316 Digital Commerce - University Of Arizona. Midterm Quiz. 20 Q&A. 100% Score ESOC316 MIDTERM QUIZQuestion 6 (1 point) Saved Information has several properties that make information goods...

By Kirsch , Uploaded: Oct 15, 2019

$9.5

 Marketing> QUESTIONS & ANSWERS > Marketing Management Chapter 2 to Chapter 10 Q&A (All)

preview
Marketing Management Chapter 2 to Chapter 10 Q&A

Chapter 2 to Chapter 10 Chapter 2: Developing Marketing Strategies and Plans GENERAL CONCEPT QUESTIONS Multiple Choice 66 Chapter 1: Marketing: Managing Profitable Customer Relationships...

By Kirsch , Uploaded: Oct 14, 2019

$10

 Marketing> QUESTIONS & ANSWERS > MKT 530 Customer Relationship Management. 155 Questions and Answers (All)

preview
MKT 530 Customer Relationship Management. 155 Questions and Answers

MKT 530 All Questions and Answers MULTIPLE CHOICE. Choose the one alternative that best completes the statement or answers the question. 1) As the manager of an organization that is att...

By Kirsch , Uploaded: Oct 14, 2019

$10

 Art> QUESTIONS & ANSWERS > MAS 337 Exam 1. Graded A (All)

preview
MAS 337 Exam 1. Graded A

MAS 337 Exam 1 Match the son with its corresponding region. 1.Oaxaca 2.Veracruz 3.Michoacan 4.Jalisco 5.Hidalgo 1. Son istemeno 2. Son Jarocho 3. Son Abajeno 4. Son Jalisciense 5. Son Huast...

By Kirsch , Uploaded: Oct 14, 2019

$6

 Art> QUESTIONS & ANSWERS > MUS 337 Final Exam Graded 100%. (All)

preview
MUS 337 Final Exam Graded 100%.

MUS 337 Final Daisy Moreno-Cota Fri Dec 11 12:59:42 PST 2015 Tone or aural color Volume and articulation of sounds Frequency of the tone Phonic structure or relationships between the sounds Dura...

By Kirsch , Uploaded: Oct 12, 2019

$9

 Art> QUESTIONS & ANSWERS > MUS 337 Final. Graded 100%. (All)

preview
MUS 337 Final. Graded 100%.

MUS 337 Final Daisy Moreno-Cota Fri Dec 11 12:59:42 PST 2015 Tone or aural color Volume and articulation of sounds Frequency of the tone Phonic structure or relationships between the sounds Dura...

By Kirsch , Uploaded: Oct 12, 2019

$9

$15.00

Add to cart

Instant download

Can't find what you want? Try our AI powered Search

OR

GET ASSIGNMENT HELP
242
1

Document information


Connected school, study & course



About the document


Uploaded On

Oct 17, 2022

Number of pages

8

Written in

Seller


seller-icon
CoursesExams

Member since 3 years

316 Documents Sold


Additional information

This document has been written for:

Uploaded

Oct 17, 2022

Downloads

 1

Views

 242

Document Keyword Tags

THE BEST STUDY GUIDES

Avoid resits and achieve higher grades with the best study guides, textbook notes, and class notes written by your fellow students

custom preview

Avoid examination resits

Your fellow students know the appropriate material to use to deliver high quality content. With this great service and assistance from fellow students, you can become well prepared and avoid having to resits exams.

custom preview

Get the best grades

Your fellow student knows the best materials to research on and use. This guarantee you the best grades in your examination. Your fellow students use high quality materials, textbooks and notes to ensure high quality

custom preview

Earn from your notes

Get paid by selling your notes and study materials to other students. Earn alot of cash and help other students in study by providing them with appropriate and high quality study materials.


$15.00

WHAT STUDENTS SAY ABOUT US


What is Browsegrades

In Browsegrades, a student can earn by offering help to other student. Students can help other students with materials by upploading their notes and earn money.

We are here to help

We're available through e-mail, Twitter, Facebook, and live chat.
 FAQ
 Questions? Leave a message!

Follow us on
 Twitter

Copyright © Browsegrades · High quality services·