Upgrade to remove ads
Only SGD 41.99/year
Review terms and definitions
Focus your studying with a path
Take a practice test
Get faster at matching termsHow do you want to study today?
Flashcards
Learn
Test
Match
Cyber Awareness 2022 Knowledge Check (Note: This set does not contain all answers)
Terms in this set (45)
Which of the following actions is appropriate after finding classified information on the internet?
Note any identifying information and the website's Uniform Resource Locator (URL)
You receive an inquiry from a reporter about potentially classified information on the internet. How do you respond?
Refer the reporter to your organization's public affairs office
What level of damage can the unauthorized disclosure of information classified as Confidential reasonably be expected to cause?
damage to national security
Which type of information could reasonably be expected to cause serious damage to national security if disclosed without authorization?
Secret
What level of damage to national security can you reasonably expect Top Secret information to cause if disclosed?
Exceptionally grave damage
Which of the following is true about telework
You must have your organization's permission to telework.
Which of the following is true of protecting classified data?
Classified material must be appropriately marked
Which scenario might indicate a reportable insider threat?
A coworker uses a personal electronic device in a secure area where their use is prohibited
What threat do insiders with authorized access to information or information systems pose?
They may wittingly or unwittingly use their authorized access to perform actions that result in the loss or degradation of resources or capabilities
Which of the following practices may reduce your appeal as a target for adversaries seeking to exploit your insider status?
Remove your security badge after leaving your controlled area or office building
In addition to avoiding the tempation of greed to betray his country, what should Alex do differently?
Avoid talking about work outside of the workplace or with people without a need-to-know
How many insider threat indicators does Alex demonstrate?
Three or more
What should Alex's colleagues do?
Report the suspicious behavior in accordance with their organization's insider threat policy
When may you be subject to criminal, disciplinary, and/or administrative action due to online misconduct?
If you participate in or condone it at any time
Which of the following information is a security risk when posted publicly on your social networking profile?
Your birthday
Which of the following best describes the sources that contribute to your online identity?
Data about you collected from all sites, apps, and devices that you use can be aggregated to form a profile of you.
Which of the following is NOT an example of CUI?
Press Release Data
Which of the following is NOT a correct way to protect CUI?
CUI may be stored on any password-protected system
Select the information on the data sheet that is personally identifiable information (PII) but not protect health information (PHI).
Jane Jones | Social Security Number 123-45-6789 (Top)
Select the information on the data sheet that is protect health information (PHI) but not personally identifiable information (PII).
Interview: Dr. Nora Baker...security risk. (Bottom)
Within a secure area, you see an individual who you do not know and is not wearing a visible badge. What should you do?
Ask the individual for identification
What is the best way to protect your Common Access Card (CAC) or Personal Identity Verification (PIV) Card?
Maintain possession of it at all times
What certificates does the Common Access Card (CAC) or Personal Identity Verification (PIV) Card contain?
Identification, encryption, and digital signature
What must the dissemination of information regarding intelligence sources, methods, or activities follow?
Directives issued by the Director of National Intelligence
When faxing Sensitive Compartmented Information (SCI), what actions should you take?
Mark SCI documents appropriately and use an approved SCI fax machine
If an incident occurs involving removable media in a Sensitive Compartmented Information Facility (SCIF), what action should you take?
Notify your security point of contact
What is a possible effect of malicious code?
Files may be corrupted, erased, or compromised.
Which of the following action can help to protect your identity?
Order a credit report annually
How can you protect yourself from social engineering?
Follow instructions given only by verified personnel
What is whaling?
A type of phishing targeted at senior officials.
Which is an appropriate use of government e-mail?
Use a digital signature when sending attachments or hyperlinks
What security risk does a public Wi-Fi connection pose?
It may expose the connected device to malware.
When can you check personal e-mail on your Government-furnished equipment (GFE)?
If allowed by organizational policy
Which of the following statements is true?
Mobile devices and applications can track your location without your knowledge or consent.
When can you use removable media on a Government system?
When operationally necessary, owned by your organization, and approved by the appropriate authority
Which of the following is a best practice for securing your home computer?
Create separate accounts for each user
How should you protect a printed classified document when it is not in use?
Store it in a General Services Administration (GSA)-approved vault or container
Which of the following is NOT considered a potential insider threat indicator?
Treated mental health issues
As someone who works with classified information, what should you do if you are contacted by a foreign national seeking information on a research project?
Inform your security point of contact
What should you do if you suspect spillage has occurred?
Immediately notify your security point of contact
Which of the following may help to prevent spillage?
Label all files, removable media, and subject headers with appropriate classification markings
When may you be subject to criminal, disciplinary and/or administrative action due to online misconduct?
If you participate in or condone it at any time
When is the safest time to post details of your vacation activities on your social networking profile?
After you have returned home following the vacation
What is an example of a strong password?
eA1xy2!P
Which of the following is NOT considered a potential insider threat indicator?
New interest in learning a foreign language
Sets found in the same folderCyber Awareness Challenge 2022 (Incomplete)
94 terms
BuhayNiKamatayan
DOD Cyber Awareness 2022 Knowledge Check
121 terms
staycalmandloveblue
Cyber Awareness 2022 Knowledge Check
55 terms
jk9bb
Cyber Awareness Challenge 2022
49 terms
mcmc1212
Other sets by this creatorBiology Major Field Test Study Set
193 terms
Vauron
Joints
6 terms
Vauron
AHS - MAIN
8 terms
Vauron
Medical Functions
5 terms
Vauron
Other Quizlet setsHPR 100 Practice Questions
42 terms
jasmine_cheema109
Chapter 4, 5, 6 and 8 of Nursing Principles
41 terms
madililes18
Ch.23 Sec.2 True or False
34 terms
Ella6474
bio 121 exam 1
45 terms
Taylor_Gojdics66