DOD Cyber Awareness 2021 Knowledge Check Questions And Answers 2022/2023

DOD Cyber Awareness 2021 Knowledge Check Questions And Answers 2022/2023

DOD Cyber Awareness 2021 Knowledge

Check

Spillage:

What should you do if a reporter asks you about potentially classified information on the

web? –

Refer the reporter to your organization's public affair office

What should you do when you are working on an unclassified system and receive an email

with a classified attachment? –

Call your security point of contact immediately.

Which classified level is given to information that could reasonably be expected to cause

serious damage to national security? –

Secret

Which of the following is true of protecting classified data? –

Classified material must be appropriately marked

What are some potential insider threat indicators? –

Difficult life circumstances such as substance abuse, divided loyalty or allegiance to

the U.S., and extreme, persistent interpersonal difficulties.

How many potential insider threat indicators does a person who is playful and charming,

consistently wins performance awards, but is occasionally aggressive in trying to access

sensitive information display? –

1 indicator

Which of the following is NOT considered a potential insider threat indicator? –

New interest in learning a foreign language

What should you do if you receive a game application request that includes permission to

access your friends, profile information, cookies, and sites visited? –

Decline the request.

What information posted publicly on your personal social networking profile represents a

security risk? –

Your place of birth

Sensitive Information:

Which of the following is an example of Protected Health Information (PHI)? –

Medical test results

Which of the following is the best example of Personally Identifiable Information (PII)? –

Passport number

What type of unclassified material should always be marked with a special handling

caveat? –

Official use only

Is it acceptable to take a short break while a coworker monitors your computer while

logged on with your Common Access Card (CAC)? –

No. Always remove your CAC and lock your computer before leaving your

workstation.

What is the best way to protect your common access card? –

Maintain possession of it at all times.

What is a good practice for when it is necessary to use a password to access a system or an

application? –

Avoid using the same password between systems or applications.

When is it appropriate to have your securing badge visible with a sensitive compartmented

information facility? –

At all time when is the facility.

Which of the following does a security classification guide provided? –

Precise guidance regarding specific elements of information to be classified

What portable electronic devices are allowed in a secure compartmented information

facility? –

Government owned PEDs if expressed authorized by your agency

Malicious code:

After clicking on a link on a website, a box pops up and asks if you want to run an

application. Is it ok to run it? –

No. Only use you agency trusted websites.

What are some actions you can take to try to protect you identity? –

Shred personal documents, never share passwords and order a credit history

annually.

Which of the following is a way to protect against social engineering? –

Follow the instructions given only by verified personnel.

Which may be a security issue with compressed URLs? –

There is no way to know where the link actually leads.

What is a way to prevent the download of viruses and other malicious code when checking

your email? –

View email in plain text and don't view email in Preview Pane.

Upon connecting your government-issued laptop to a public wireless connection, what

should you immediately do? –

Connect to the Government Virtual Private Network (VPN).

When is conducting a private money-making venture using your Government-furnished

computer permitted? –

It is never permitted

Which of the following is not a best practice to protect data on your mobile computing

device? -

What are some examples of removable media? –

Memory sticks, flash drives, or external hard drives.

Which of the following is a best practice for securing your home computer? –

Use antivirus software and keep it up to date.

No comments found.
Login to post a comment
This item has not received any review yet.
Login to review this item
No Questions / Answers added yet.
Version latest
Included files pdf
Authors qwivy.com
Pages 3
Language English
Tags DOD Cyber Awareness 2021 Knowledge Check Questions And Answers 2022/2023
Comments 0
Sales 0
Recently viewed items

We use cookies to understand how you use our website and to improve your experience. This includes personalizing content and advertising. To learn more, please click Here. By continuing to use our website, you accept our use of cookies, Privacy policy and terms & conditions.

Processing