Pages

✅ DOD Cyber Awareness Challenge Knowledge Answers 2

Question: Which may be a security issue with compressed URLs?

which may be a security issue with compressed urls cyber awareness
A: There is no way to know where the link actually leads.
B: They may be used to mask malicious intent.

Show or Reveal the Answer

They may be used to mask malicious intent.

Question: What can you do to prevent spillage?

A: Checking all documents for classification level
B: Labeling all removable media
C: Storing classified data on her PDA when traveling
D: Ensuring all email subject headers identify classification level
E: all of the above

Show or Reveal the Answer

all of the above

Question: Which of the following is a good practice to aid in preventing spillage? brainly quizlet

Which of the following is a good practice to aid in preventing spillage 2020 cyber awareness knowledge check answer

Show or Reveal the Answer

To prevent inadvertent spillage
1. Always check to make sure you are using the CORRECT network for the level of data.
2. DO NOT use a classified network for unclassified work. Processing unclassified information on a classified network.
* Can unnecessarily consume mission-essential bandwidth.
* May illegally shield information from disclosure under the Freedom of Information Act (FOIA).
* Creates danger of spillage when attempting to remove the information to an unclassified media or hard copy.
3. Label all files, removable media and subject headers with appropriate classification markings.
4. Be aware of classification markings and all handling caveats.
5. Follow procedures for transferring data to and from outside agency and non-Government networks.

Question: What should be done if you find classified Government Data/Information Not Cleared for Public Release on the Internet?

Which of the following actions is appropriate after finding classified Government information on the internet?
What is the best response if you find classified government data on the internet?

Show or Reveal the Answer

If you find classified government data/information not cleared for public release on the internet.
1. Remember that leaked classified or controlled information is still classified/controlled even if it has already been compromised.
2. Do not download leaked classified or controlled information because you are not allowed to have classified information on your computer and downloading it mat create a new spillage.
3. Note any identifying information, such as the website's URL, and report the situation to your security point of contact(POC).
4. Refer any inquiries to your organization's public affairs office.
5. REMEMBER! ANY comment by you could be treated as official confirmation by a Government spokesperson.

Question:Spillage occurs when information is "spilled" from a higher classification or protection level to a lower classification or protection level. Spillage can be either inadvertent or intentional.

A: True
B: False

Show or Reveal the Answer

True

Question: What is required for an individual to access classified data?

Appropriate clearance; signed and approved non-disclosure agreement; and need-to-know.

Question: What should you do to protect classified data?

A: Store classified data appropriately in GSA-approved vault or container when not in use
B: Only use data in areas with security appropriate to classification level
C: When faxing data, you can use a unclassified fax since information is transmitted over a phone line, it is protected.
D: Answer A and B are correct
E: Not needed.

Show or Reveal the Answer

Answer A and B are correct

Question: Which is NOT a method of protecting classified data?

A: Assuming open storage is always authorized in a secure facility
B: Balancing need to share with need to know
C: Not transmitting classified information via an unsecure fax machine
D: Only using data in areas with security appropriate to classification level

Show or Reveal the Answer

Assuming open storage is always authorized in a secure facility

Question: Which of these is true of unclassified data?

A: Its classification level may rise when aggregated.
B: It must be released to the public immediately.
C: It does not affect the safety of Government missions.
D: It never requires classification markings.

Show or Reveal the Answer

Its classification level may rise when aggregated.

DOD Cyber Awareness Challenge, Insider threat awareness Test answers


Question: Which is true for protecting classified data? 2020

ANSWER: Classified material is stored in a GSA-approved container when not in use.

Question: When classified data is not in use, how can you protect it?

ANSWER: store classified data appropriately in a GSA- approved vault/container when not in use.

Question: A user writes down details from a report stored on a classified system marked as Secret and uses those details to draft an unclassified briefing on an unclassified system without authorization. What is the best choice to describe what has occurred?

ANSWER: Spillage because classified data was moved to a lower classification level system without authorization.

Question: Which of the following is true about unclassified data?

ANSWER: When unclassified data is aggregated, its classification level may rise.

Question: Which is an untrue statement about unclassified data?

ANSWER: If aggregated, the classification of the information may not be changed

Question: Which of the following is true of protecting classified data?

ANSWER: Classified material must be appropriately marked.

Question: Who can be permitted access to classified data?

ANSWER: Only persons with appropriate clearance, a non-disclosure agreement, and need-to-know.

Question: Which of the following is NOT a criterion used to grant an individual access to classified data?

ANSWER: Senior government personnel, military or civilian

Which scenario might indicate a reportable insider threat security incident?
ANSWER: A coworker is observed using a personal electronic device in an area where their use is prohibited.

Why might "insiders' be able to cause damage to their organizations more easily than others?
ANSWER: Insiders are given a level of trust and have authorized access to government information systems.

What type of activity or behavior should be reported as a potential insider threat?
ANSWER: Coworker making consistent statements indicative of hostility or anger toward the United States and its policies.

What are some potential insider threat indicators?
ANSWER: Difficult life circumstances such as substance abuse; divided loyalty or allegiance to the U.S.; or extreme, persistent interpersonal difficulties. Which of the following is NOT a potential insider threat? ANSWER: Member of a religion or faith

Which of the following terms refers to harm inflicted on national security through authorized access to information or information systems?
ANSWER: Insider Threat

What should be done to protect against insider threats?
ANSWER: Report any suspicious behavior

What advantages do "insider threats" have over others that allows them to be able to do extraordinary damage to their organizations?
ANSWER: They are trusted and have authorized access to Government information systems.

What should Alex's colleagues do?
ANSWER: Report the suspicious behavior in accordance with their organization's insider threat policy

How many insider threat indicators does Alex demonstrate?
ANSWER: Three or more

Which of the following should be reported as a potential security incident (in accordance with your Agency's insider threat policy)?
ANSWER: A coworker brings a personal electronic device into prohibited areas.

Which of the following practices reduces the chance of becoming a target by adversaries seeking insider information?
which of the following practices reduces the chance of becoming a target by adversaries seeking information?
ANSWER: Don't talk about work outside your work space unless it is a specifically designated public meeting environment and is controlled by the event planners.

Question: What information should you avoid posting on social networking sites?

A: Personally Identifiable Information (PII)
B: Pictures from your GPS enabled phone
C: Hobby links
D: All of the above

Show or Reveal the Answer

All of the above

Which represents a security best practice when using social networking?
ANSWER: Understanding and using all available privacy settings.

When is the best time to post details of your vacation activities on your social networking website?
ANSWER: When your vacation is over, and you have returned home.

What information posted publicly on your personal social networking profile represents a security risk?
ANSWER: Your place of birth

What information most likely presents a security risk on your personal social networking profile?
ANSWER: Personal email address

In setting up your personal social networking service account, what email address should you use?
ANSWER: Your personal email address

Which of the following is a best practice to protect information about you and your organization on social networking sites and applications?
ANSWER: Use only personal contact information when establishing personal social networking accounts, never use Government contact information.

What should you do to protect yourself while on social networks?
ANSWER: Validate all friend requests through another source before confirming them

What action should you take if you receive a friend request on your social networking website from someone in Germany you met casually at a conference last year?
You receive a friend request from someone in Germany that you meet casually at a conference last year?
ANSWER: Decline the request

When would be a good time to post your vacation location and dates on your social networking website?
ANSWER: When you return from your vacation.

classified information can be safeguarded by using
how can you protect your information when using wireless technology
how many potential insider threat indicators
insider threat awareness quiz answers
insider threat awareness quizlet
the unauthorized disclosure of secret information causes what type of damage
unauthorized disclosure of information classified as confidential reasonably be expected to cause
what are some potential insider threat indicators
what are some potential insider threat indicators quizlet
what is required for an individual to access classified data
what is the best response if you find classified government data on the internet
what must you do when emailing pii or phi
what should alex's colleagues do
what type of activity or behavior should be reported as a potential insider threat
when classified data is not in use how can you protect it
which level of classified information could cause damage to national security if compromised
which of the following can an unauthorized disclosure of information classified as confidential
which of the following is a best practice for handling cookies
which of the following is not a best practice to protect data on your mobile computing device
which of the following is not a correct way to protect sensitive information
which of the following is not a good way to protect your identity
which of the following is not a requirement for telework
which of the following is not an example of sensitive information
which of the following is not a typical means for spreading malicious code
which of the following is the best example of personally identifiable information
which of the following is true about telework
which of the following is true of internet hoaxes
which of the following should be reported as a potential security incident
which of these is true of unclassified data
is anxiety and exhaustion a potential insider threat indicator
in which situation below are you permitted to use your pki token
protecting classified and sensitive information quizlet
cyber awareness challenge 2019 answers
within a secure area you see an individual
which may be a security issue with compressed urls cyber awareness challenge
when using your government-issued laptop
which of the following is an example of malicious code quizlet
as someone who works with classified information
technological advances impact the insider threat by quizlet
which of the following is a best practice to protect information about you and your organization
which of the following practices reduces the chance of becoming a target by adversaries
which represents a security best practice when using social networking
why might insiders be able to cause damage
why might insiders be able to cause damage to their organizations more easily than others
what should you do if an individual asks you to let her follow you into your controlled space
which of the following practices reduces the chance of becoming a target by adversaries seeking
what is required for an individual to access classified data
which represents a security best practice when using social networking
what is an indication that malicious code is running on your system
what must you ensure before transmitting personally identifiable information
what should you do if a commercial entity such as a hotel reception desk asks for government
which must be approved and signed by a cognizant original classification authority

No comments:

Post a Comment