What type of information could reasonably be expected to cause serious damage to national security if disclosed without authorization quizlet?

Upgrade to remove ads

Only SGD 41.99/year

How do you want to study today?

  • Flashcards

    Review terms and definitions

  • Learn

    Focus your studying with a path

  • Test

    Take a practice test

  • Match

    Get faster at matching terms

Cyber Awareness 2022 Knowledge Check (Note: This set does not contain all answers)

Terms in this set (45)

Which of the following actions is appropriate after finding classified information on the internet?

Note any identifying information and the website's Uniform Resource Locator (URL)

You receive an inquiry from a reporter about potentially classified information on the internet. How do you respond?

Refer the reporter to your organization's public affairs office

What level of damage can the unauthorized disclosure of information classified as Confidential reasonably be expected to cause?

damage to national security

Which type of information could reasonably be expected to cause serious damage to national security if disclosed without authorization?

Secret

What level of damage to national security can you reasonably expect Top Secret information to cause if disclosed?

Exceptionally grave damage

Which of the following is true about telework

You must have your organization's permission to telework.

Which of the following is true of protecting classified data?

Classified material must be appropriately marked

Which scenario might indicate a reportable insider threat?

A coworker uses a personal electronic device in a secure area where their use is prohibited

What threat do insiders with authorized access to information or information systems pose?

They may wittingly or unwittingly use their authorized access to perform actions that result in the loss or degradation of resources or capabilities

Which of the following practices may reduce your appeal as a target for adversaries seeking to exploit your insider status?

Remove your security badge after leaving your controlled area or office building

In addition to avoiding the tempation of greed to betray his country, what should Alex do differently?

Avoid talking about work outside of the workplace or with people without a need-to-know

How many insider threat indicators does Alex demonstrate?

Three or more

What should Alex's colleagues do?

Report the suspicious behavior in accordance with their organization's insider threat policy

When may you be subject to criminal, disciplinary, and/or administrative action due to online misconduct?

If you participate in or condone it at any time

Which of the following information is a security risk when posted publicly on your social networking profile?

Your birthday

Which of the following best describes the sources that contribute to your online identity?

Data about you collected from all sites, apps, and devices that you use can be aggregated to form a profile of you.

Which of the following is NOT an example of CUI?

Press Release Data

Which of the following is NOT a correct way to protect CUI?

CUI may be stored on any password-protected system

Select the information on the data sheet that is personally identifiable information (PII) but not protect health information (PHI).

Jane Jones | Social Security Number 123-45-6789 (Top)

Select the information on the data sheet that is protect health information (PHI) but not personally identifiable information (PII).

Interview: Dr. Nora Baker...security risk. (Bottom)

Within a secure area, you see an individual who you do not know and is not wearing a visible badge. What should you do?

Ask the individual for identification

What is the best way to protect your Common Access Card (CAC) or Personal Identity Verification (PIV) Card?

Maintain possession of it at all times

What certificates does the Common Access Card (CAC) or Personal Identity Verification (PIV) Card contain?

Identification, encryption, and digital signature

What must the dissemination of information regarding intelligence sources, methods, or activities follow?

Directives issued by the Director of National Intelligence

When faxing Sensitive Compartmented Information (SCI), what actions should you take?

Mark SCI documents appropriately and use an approved SCI fax machine

If an incident occurs involving removable media in a Sensitive Compartmented Information Facility (SCIF), what action should you take?

Notify your security point of contact

What is a possible effect of malicious code?

Files may be corrupted, erased, or compromised.

Which of the following action can help to protect your identity?

Order a credit report annually

How can you protect yourself from social engineering?

Follow instructions given only by verified personnel

What is whaling?

A type of phishing targeted at senior officials.

Which is an appropriate use of government e-mail?

Use a digital signature when sending attachments or hyperlinks

What security risk does a public Wi-Fi connection pose?

It may expose the connected device to malware.

When can you check personal e-mail on your Government-furnished equipment (GFE)?

If allowed by organizational policy

Which of the following statements is true?

Mobile devices and applications can track your location without your knowledge or consent.

When can you use removable media on a Government system?

When operationally necessary, owned by your organization, and approved by the appropriate authority

Which of the following is a best practice for securing your home computer?

Create separate accounts for each user

How should you protect a printed classified document when it is not in use?

Store it in a General Services Administration (GSA)-approved vault or container

Which of the following is NOT considered a potential insider threat indicator?

Treated mental health issues

As someone who works with classified information, what should you do if you are contacted by a foreign national seeking information on a research project?

Inform your security point of contact

What should you do if you suspect spillage has occurred?

Immediately notify your security point of contact

Which of the following may help to prevent spillage?

Label all files, removable media, and subject headers with appropriate classification markings

When may you be subject to criminal, disciplinary and/or administrative action due to online misconduct?

If you participate in or condone it at any time

When is the safest time to post details of your vacation activities on your social networking profile?

After you have returned home following the vacation

What is an example of a strong password?

eA1xy2!P

Which of the following is NOT considered a potential insider threat indicator?

New interest in learning a foreign language

Sets found in the same folder

Cyber Awareness Challenge 2022 (Incomplete)

94 terms

BuhayNiKamatayan

DOD Cyber Awareness 2022 Knowledge Check

121 terms

staycalmandloveblue

Cyber Awareness 2022 Knowledge Check

55 terms

jk9bb

Cyber Awareness Challenge 2022

49 terms

mcmc1212

Other sets by this creator

Biology Major Field Test Study Set

193 terms

Vauron

Joints

6 terms

Vauron

AHS - MAIN

8 terms

Vauron

Medical Functions

5 terms

Vauron

Other Quizlet sets

HPR 100 Practice Questions

42 terms

jasmine_cheema109

Chapter 4, 5, 6 and 8 of Nursing Principles

41 terms

madililes18

Ch.23 Sec.2 True or False

34 terms

Ella6474

bio 121 exam 1

45 terms

Taylor_Gojdics66

Which type of information could reasonably be expected to cause serious damage to national security if disclosed quizlet?

Unauthorized disclosure of information could reasonably be expected to cause SERIOUS DAMAGE to our national security. Unauthorized disclosure of information could reasonably be expected to cause DAMAGE to our national security.

What information could reasonably be expected to cause serious damage to national security if disclosed?

Answer: Unauthorized disclosure of Secret information could reasonably be expected to cause serious damage to our national security. Unauthorized disclosure of Top Secret information could reasonably be expected to cause exceptionally grave damage to our national security.

Which of the following levels of classified information could cause serious damage to national security if compromised quizlet?

The Secret classification level "shall be applied to information, the unauthorized disclosure of which reasonably could be expected to cause serious damage to the national security."

What level of damage can the unauthorized disclosure of information classified as confidential be expected to cause?

be classified “Secret” its unauthorized disclosure could reasonably be expected to cause serious damage to the national security. This classification should be used sparingly. Examples of “ serious damage” include disruption of foreign relations significantly.