Cyber Awareness 2022-2023 Knowledge Check (95 Answered questions_ all correct)

Cyber Awareness 2022-2023 Knowledge Check (95 Answered questions_ all correct)

Summary Cyber Awareness 2022-2023 Knowledge Check

(95 Answered questions_ all correct)

How many potential insider threat indicators does a person who is married with two

children, vacations at the beach every year, is pleasant to work with, but sometimes has

poor work quality display?Answer= 0 indicators

What is the best response if you find classified government data on the

internet?Answer= Note any identifying information, such as the website's URL, and

report the situation to your security POC.

After reading an online story about a new security project being developed on the

military installation where you work, your neighbor asks you to comment about the

article. You know this project is classified. What should be your response?Answer=

Attempt to change the subject to something non-work related, but neither confirm nor

deny the article's authenticity.

What is a proper response if spillage occurs?Answer= Immediately notify your security

POC.

What should you do if a reporter asks you about potentially classified information on the

web?Answer= Ask for information about the website, including the URL.

A user writes down details from a report stored on a classified system marked as Secret

and uses those details to draft an unclassified briefing on an unclassified system without

authorization. What is the best choice to describe what has occurred?Answer= Spillage

because classified data was moved to a lower classification level system without

authorization.

How many potential insider threat indicators does a coworker who often makes others

uneasy by being persistent in trying to obtain information about classified projects to

which he has no access, is boisterous about his wife putting them in credit card debt,

and often complains about anxiety and exhaustion display?Answer= 3 or more

indicators

Which of the following can an unauthorized disclosure of information classified as

Confidential reasonably be expected to cause?Answer= Damage to national security

Which classification level is given to information that could reasonably be expected to

cause serious damage to national security?Answer= Secret

When classified data is not in use, how can you protect it?Answer= Store classified data

appropriately in a GSA-approved vault/container when not in use.

Which is a good practice to protect classified information?Answer= Ensure proper

labeling by appropriately marking all classified material and, when required, sensitive

material.

Which of the following is a good practice to aid in preventing spillage?Answer= Be

aware of classification markings and all handling caveats.

What is required for an individual to access classified data?Answer= Appropriate

clearance; signed and approved non-disclosure agreement; and need-to-know.

What type of activity or behavior should be reported as a potential insider

threat?Answer= Coworker making consistent statements indicative of hostility or anger

toward the United States and its policies.

Which of the following practices reduces the chance of becoming a target by

adversaries seeking insider information?Answer= Don't talk about work outside your

workspace unless it is a specifically designated public meeting environment and is

controlled by the event planners.

Which scenario might indicate a reportable insider threat security incident?Answer= A

coworker is observed using a personal electronic device in an area where their use is

prohibited.

Why might "insiders" be able to cause damage to their organizations more easily than

others?Answer= Insiders are given a level of trust and have authorized access to

Government information systems.

Which of the following is a best practice to protect information about you and your

organization on social networking sites and applications?Answer= Use only personal

contact information when establishing personal social networking accounts, never use

Government contact information.

What should you do if an individual asks you to let her follow you into your controlled

space, stating that she left her security badge at her desk?Answer= Don't allow her

access into secure areas and report suspicious activity.

Which represents a security best practice when using social networking?Answer=

Understanding and using available privacy settings.

Which is NOT a sufficient way to protect your identity?Answer= Use a common

password for all your system and application logons.

Under which circumstances may you be subject to criminal, disciplinary, and/or

administrative action due to online misconduct?Answer= Any time you participate in or

condone misconduct, whether offline or online.

No comments found.
Login to post a comment
This item has not received any review yet.
Login to review this item
No Questions / Answers added yet.
Version latest
Category Exam (elaborations)
Included files pdf
Authors qwivy.com
Pages 8
Language English
Tags Cyber Awareness 2022-2023 Knowledge Check (95 Answered questions_ all correct)
Comments 0
Sales 0
Recently viewed items

We use cookies to understand how you use our website and to improve your experience. This includes personalizing content and advertising. To learn more, please click Here. By continuing to use our website, you accept our use of cookies, Privacy policy and terms & conditions.

Processing