Processing
DOD Cyber Awareness 2021 Knowledge Check Questions And Answers 2022/2023
DOD Cyber Awareness 2021 Knowledge
Check
Spillage:
What should you do if a reporter asks you about potentially classified information on the
web? –
Refer the reporter to your organization's public affair office
What should you do when you are working on an unclassified system and receive an email
with a classified attachment? –
Call your security point of contact immediately.
Which classified level is given to information that could reasonably be expected to cause
serious damage to national security? –
Secret
Which of the following is true of protecting classified data? –
Classified material must be appropriately marked
What are some potential insider threat indicators? –
Difficult life circumstances such as substance abuse, divided loyalty or allegiance to
the U.S., and extreme, persistent interpersonal difficulties.
How many potential insider threat indicators does a person who is playful and charming,
consistently wins performance awards, but is occasionally aggressive in trying to access
sensitive information display? –
1 indicator
Which of the following is NOT considered a potential insider threat indicator? –
New interest in learning a foreign language
What should you do if you receive a game application request that includes permission to
access your friends, profile information, cookies, and sites visited? –
Decline the request.
What information posted publicly on your personal social networking profile represents a
security risk? –
Your place of birth
Sensitive Information:
Which of the following is an example of Protected Health Information (PHI)? –
Medical test results
Which of the following is the best example of Personally Identifiable Information (PII)? –
Passport number
What type of unclassified material should always be marked with a special handling
caveat? –
Official use only
Is it acceptable to take a short break while a coworker monitors your computer while
logged on with your Common Access Card (CAC)? –
No. Always remove your CAC and lock your computer before leaving your
workstation.
What is the best way to protect your common access card? –
Maintain possession of it at all times.
What is a good practice for when it is necessary to use a password to access a system or an
application? –
Avoid using the same password between systems or applications.
When is it appropriate to have your securing badge visible with a sensitive compartmented
information facility? –
At all time when is the facility.
Which of the following does a security classification guide provided? –
Precise guidance regarding specific elements of information to be classified
What portable electronic devices are allowed in a secure compartmented information
facility? –
Government owned PEDs if expressed authorized by your agency
Malicious code:
After clicking on a link on a website, a box pops up and asks if you want to run an
application. Is it ok to run it? –
No. Only use you agency trusted websites.
What are some actions you can take to try to protect you identity? –
Shred personal documents, never share passwords and order a credit history
annually.
Which of the following is a way to protect against social engineering? –
Follow the instructions given only by verified personnel.
Which may be a security issue with compressed URLs? –
There is no way to know where the link actually leads.
What is a way to prevent the download of viruses and other malicious code when checking
your email? –
View email in plain text and don't view email in Preview Pane.
Upon connecting your government-issued laptop to a public wireless connection, what
should you immediately do? –
Connect to the Government Virtual Private Network (VPN).
When is conducting a private money-making venture using your Government-furnished
computer permitted? –
It is never permitted
Which of the following is not a best practice to protect data on your mobile computing
device? -
What are some examples of removable media? –
Memory sticks, flash drives, or external hard drives.
Which of the following is a best practice for securing your home computer? –
Use antivirus software and keep it up to date.
Version | latest |
Included files | |
Authors | qwivy.com |
Pages | 3 |
Language | English |
Tags | DOD Cyber Awareness 2021 Knowledge Check Questions And Answers 2022/2023 |
Comments | 0 |
Sales | 0 |
{{ userMessage }}