Pages

✅ DOD Cyber Awareness Challenge Knowledge Answers 2

Which may be a security issue with compressed URLs?

which may be a security issue with compressed urls cyber awareness
A: There is no way to know where the link actually leads.
B: They may be used to mask malicious intent.

Show or Reveal the Answer

They may be used to mask malicious intent.


What can you do to prevent spillage?

A: Checking all documents for classification level
B: Labeling all removable media
C: Storing classified data on her PDA when traveling
D: Ensuring all email subject headers identify classification level
E: all of the above

Show or Reveal the Answer

all of the above


Which of the following is a good practice to aid in preventing spillage? brainly quizlet

Which of the following is a good practice to aid in preventing spillage 2020 cyber awareness knowledge check answer

Show or Reveal the Answer

To prevent inadvertent spillage
1. Always check to make sure you are using the CORRECT network for the level of data.
2. DO NOT use a classified network for unclassified work. Processing unclassified information on a classified network.
* Can unnecessarily consume mission-essential bandwidth.
* May illegally shield information from disclosure under the Freedom of Information Act (FOIA).
* Creates danger of spillage when attempting to remove the information to an unclassified media or hard copy.
3. Label all files, removable media and subject headers with appropriate classification markings.
4. Be aware of classification markings and all handling caveats.
5. Follow procedures for transferring data to and from outside agency and non-Government networks.


What should be done if you find classified Government Data/Information Not Cleared for Public Release on the Internet?

Which of the following actions is appropriate after finding classified Government information on the internet?
What is the best response if you find classified government data on the internet?
You find information that you know to be classified on the internet. what should you do?

Show or Reveal the Answer

If you find classified government data/information not cleared for public release on the internet.
1. Remember that leaked classified or controlled information is still classified/controlled even if it has already been compromised.
2. Do not download leaked classified or controlled information because you are not allowed to have classified information on your computer and downloading it mat create a new spillage.
3. Note any identifying information, such as the website's URL, and report the situation to your security point of contact(POC).
4. Refer any inquiries to your organization's public affairs office.
5. REMEMBER! ANY comment by you could be treated as official confirmation by a Government spokesperson.


Which of the following actions is appropriate after finding classified information on the Internet?

ANSWER: Note any identifying information and the website's Uniform Resource Locator (URL)


Spillage occurs when information is "spilled" from a higher classification or protection level to a lower classification or protection level. Spillage can be either inadvertent or intentional.

A: True
B: False

Show or Reveal the Answer

True


What does spillage refer to cyber awareness 2023

What does spillage refer to quizlet
ANSWER: Spillage refers when information is "spilled" from a higher classification or protection level to a lower classification or protection level. Spillage can be either inadvertent or intentional. Spillage always requires an investigation to determine the extent of the compromise of classified information.


What is a proper response if spillage occurs?

What do you do if a spillage occurs?
ANSWER: Immediately notify your security point of contact (POC.).


Which of the following is a good practice to prevent spillage?

Which of the following is a good practice to aid in preventing spillage?
ANSWER: Be aware of classification markings and all handling caveats.


What is required for an individual to access classified data?

ANSWER: Appropriate clearance, a signed and approved non-disclosure agreement, and need-to-know.


What is the basis for the handling and storage of classified data?

What is the basis for handling and storage of classified data?
ANSWER: Classified information is restricted to authorized personnel with approved security clearances that require an extensive background check in the handling and storage of classified data. There are specific requirements regarding the security of sensitive and secret information that is for authorized use only. Training regarding the safeguarding of classified information to reinforce tight security measures for the storage and access of organizational data.


What should you do to protect classified data?

A: Store classified data appropriately in GSA-approved vault or container when not in use
B: Only use data in areas with security appropriate to classification level
C: When faxing data, you can use a unclassified fax since information is transmitted over a phone line, it is protected.
D: Answer A and B are correct
E: Not needed.

Show or Reveal the Answer

Answer A and B are correct


Which is NOT a method of protecting classified data?

A: Assuming open storage is always authorized in a secure facility
B: Balancing need to share with need to know
C: Not transmitting classified information via an unsecure fax machine
D: Only using data in areas with security appropriate to classification level

Show or Reveal the Answer

Assuming open storage is always authorized in a secure facility


Which of these is true of unclassified data?

A: Its classification level may rise when aggregated.
B: It must be released to the public immediately.
C: It does not affect the safety of Government missions.
D: It never requires classification markings.

Show or Reveal the Answer

Its classification level may rise when aggregated.


DOD Cyber Awareness Challenge, Insider threat awareness Test answers

Which is true for protecting classified data? 2020

ANSWER: Classified material is stored in a GSA-approved container when not in use.


When classified data is not in use, how can you protect it?

When classified data is not in use how can you protect it
ANSWER: store classified data appropriately in a GSA-approved vault/container when not in use.


A user writes down details from a report stored on a classified system marked as Secret and uses those details to draft an unclassified briefing on an unclassified system without authorization. What is the best choice to describe what has occurred?

ANSWER: Spillage because classified data was moved to a lower classification level system without authorization.


Which of the following is true about unclassified data?

ANSWER: When unclassified data is aggregated, its classification level may rise.


Which is an untrue statement about unclassified data?

ANSWER: If aggregated, the classification of the information may not be changed


Which of the following is true of protecting classified data?

ANSWER: Classified material must be appropriately marked.


Which of the following is a good practice to protect classified information?

ANSWER: Ensure proper labeling by appropriately marking all classified material and when required, sensitive material.


Who can be permitted access to classified data?

ANSWER: Only persons with appropriate clearance, a non-disclosure agreement, and need-to-know.


Which of the following is NOT a criterion used to grant an individual access to classified data?

ANSWER: Senior government personnel, military or civilian


Which scenario might indicate a reportable insider threat security incident?

ANSWER: A coworker is observed using a personal electronic device in a secure area where their use is prohibited.


Why might "insiders' be able to cause damage to their organizations more easily than others?

Why might ?insiders? be able to cause damage to theirorganizations more easily than others?
What advantages do "insider threats" have over others that allows them to cause damage to their organizations more easily?
A: Insider activities on Government information systems are exempt from monitoring
B: Insiders are all professionally trained and have technical certifications
C: Insiders are given a level of trust and have authorized access to government information systems
D: Insiders all have full system administrator access and can cover their steps

Show or Reveal the Answer

Insiders are given a level of trust and have authorized access to government information systems.


What type of activity or behavior should be reported as a potential insider threat?

ANSWER: Coworker making consistent statements indicative of hostility or anger toward the United States and its policies.


Which type of behavior should you report as a potential insider threat?

ANSWER: Hostility or anger toward the United States and its policies


Which of the following practices may reduce your appeal as a target for adversaries seeking to exploit your insider status?

ANSWER: Remove your security badge after leaving your controlled area or office building


What are some potential insider threat indicators?

What are some potential insider threat indicators quizlet
ANSWER: Difficult life circumstances such as substance abuse; divided loyalty or allegiance to the U.S.; or extreme, persistent interpersonal difficulties.


Which of the following is NOT a potential insider threat?

ANSWER: Member of a religion or faith


Which of the following terms refers to harm inflicted on national security through authorized access to information or information systems?

ANSWER: Insider Threat


What should be done to protect against insider threats?

ANSWER: Report any suspicious behavior


What advantages do "insider threats" have over others that allows them to be able to do extraordinary damage to their organizations?

ANSWER: They are trusted and have authorized access to Government information systems.


What should Alex's colleagues do?

ANSWER: Report the suspicious behavior in accordance with their organization's insider threat policy

How many insider threat indicators does Alex demonstrate?

ANSWER: Three or more


Which of the following should be reported as a potential security incident?

ANSWER: A coworker removes sensitive information without authorization


Which of the following should be reported as a potential security incident (in accordance with your Agency's insider threat policy)?

ANSWER: A coworker brings a personal electronic device into prohibited areas.


Which of the following practices reduces the chance of becoming a target by adversaries seeking insider information?

Which of the following practices reduces the chance of becoming a target by adversaries seeking information?
ANSWER: Don't talk about work outside your work space unless it is a specifically designated public meeting environment and is controlled by the event planners.


What information should you avoid posting on social networking sites?

A: Personally Identifiable Information (PII)
B: Pictures from your GPS enabled phone
C: Hobby links
D: All of the above

Show or Reveal the Answer

All of the above


Which represents a security best practice when using social networking?

ANSWER: Understanding and using all available privacy settings.


Which of the following is a security best practice when using social networking sites?

A: Geotagging posts using Global Positioning System (GPS) or location links
B: Accepting all information posted by your network as true
C: Understanding and using the available privacy settings
D: Connecting with people who share mutual connections with you, even if you don't know them
E: Use only your personal contact information when establishing your personal account


Show or Reveal the Answer

Understanding and using the available privacy settings
Use only your personal contact information when establishing your personal account


When is the best time to post details of your vacation activities on your social networking website?

ANSWER: When your vacation is over, and you have returned home.


When is the safest time to post details of your vacation activities on your social networking website?

ANSWER: When your vacation is over, after you have returned home


When is the safest time to post details of your vacation activities on your social networking profile?

ANSWER: After you have returned home following the vacation


What should you do if you receive a game application request that includes permission to access your friends, profile information, cookies, and sites visited?

ANSWER: Decline the request


Which of the following information is a security risk when posted publicly on your social networking profile?

A: Pictures of your pet
B: Your birthday
C: Your hobbies
D: Your personal e-mail address
E: Your mother's maiden name

Show or Reveal the Answer

* Your birthday
* Your mother's maiden name


What information posted publicly on your personal social networking profile represents a security risk?

ANSWER: Your place of birth


What information most likely presents a security risk on your personal social networking profile?

ANSWER: Your birthday


In setting up your personal social networking service account, what email address should you use?

ANSWER: Your personal email address


Which of the following is a best practice to protect information about you and your organization on social networking sites and applications?

ANSWER: Use only personal contact information when establishing personal social networking accounts, never use Government contact information.


Your cousin posted a link to an article with an incendiary headline on social media. What action should you take?

ANSWER: Research the source of the article to evaluate its credibility and reliability


Which of the following best describes the sources that contribute to your online identity?

ANSWER: Data about you collected from all sites, apps, and devices that you use can be aggregated to form a profile of you.


As someone who works with classified information, what should you do if you are contacted by a foreign national seeking information on a research project?

ANSWER: Inform your security point of contact


As someone who works with classified information, what should you do if you are contacted by a foreign national seeking information on a research project?

ANSWER: Inform your security POC of all non-professional or non-routine contacts with foreign nations, including, but not limited to, joining each other's social media sites.


What should you do to protect yourself while on social networks?

ANSWER: Validate all friend requests through another source before confirming them


What action should you take if you receive a friend request on your social networking website from someone in Germany you met casually at a conference last year?

You receive a friend request from someone in Germany that you meet casually at a conference last year?
ANSWER: Decline the request


When would be a good time to post your vacation location and dates on your social networking website?

ANSWER: When you return from your vacation.


Which of the following can an unauthorized disclosure of information classified as Confidential reasonably be expected to cause?

ANSWER: Damage to national security


Which of the following definitions is true about disclosure of confidential information?

A: Damage to national security
B: Exceptionally grave damage to national security
C: Serious damage to national security
D: Limited damage to national security

Show or Reveal the Answer

Damage to national security


A vendor conducting a pilot program with your organization contacts you for organizational data to use in a prototype. how should you respond?

ANSWER: assessment should be conducted before the pilot-test agreement is signed


cyber awareness 2019, 2020, 2021, 2022, 2023 answers
DOD Cyber Awareness Challenge Answers 1

DOD Cyber Awareness Challenge Knowledge Answers 2

DOD Initial Orientation and Awareness Training Answers

DoD Introduction to Information Security TEST ANSWERS

army cyber awareness training
cyber awareness 2023 answers
cyber awareness 2023 quizlet
cyber awareness challenge
cyber awareness challenge 2019 answers
cyber awareness challenge 2022
cyber awareness challenge 2023 answers
cyber awareness challenge 2023 quizlet
cyber awareness challenge answers
cyber awareness quizlet
dod cyber awareness challenge 2023 quizlet
insider threat awareness quiz answers
insider threat awareness quizlet

as someone who works with classified information
based on the description that follows how many potential insider
classified information can be safeguarded by using
how can you protect your information when using wireless technology
how many potential insider threat indicators
in which situation below are you permitted to use your pki token
is anxiety and exhaustion a potential insider threat indicator
protecting classified and sensitive information quizlet
technological advances impact the insider threat by quizlet
the unauthorized disclosure of secret information causes what type of damage
what does spillage mean in government
what does spillage refer to cyber awareness
what does spillage refer to cyber awareness 2023
what function do insider threat programs aim to fulfill
what is an indication that malicious code is running on your system
what is an insider threat
what is an insider threat quizlet
what is cui
what is required for an individual to access classified data
what is spillage
what is the best response if you find classified government data on the internet
what level of damage can the unauthorized
what level of damage can the unauthorized disclosure of information classified as confidential
what level of damage to national security can you reasonably expect top secret
what must you do when emailing pii or phi
what must you ensure before transmitting personally identifiable information
what should alex's colleagues do
what should you do if an individual asks you to let her follow you into your controlled space
what type of activity or behavior should be reported as a potential insider threat
when using your government-issued laptop
which designation marks information that does not have potential to damage national security
which is a best practice for protecting controlled unclassified information
which level of classified information could cause damage to national security if compromised
which may be a security issue with compressed urls cyber awareness challenge
which must be approved and signed by a cognizant original classification authority
which of the following best describes a way to safely transmit controlled unclassified information
which of the following does not constitute spillage
which of the following is a best practice for handling cookies
which of the following is a best practice to protect information about you and your organization
which of the following is a good practice for telework
which of the following is a good practice to prevent spillage
which of the following is a good practice to protect classified information
which of the following is a security best practice for protecting personally identifiable information
which of the following is a way to prevent the spread of malicious code
which of the following is an example of malicious code quizlet
which of the following is not a best practice to protect data on your mobile computing device
which of the following is not a good way to protect your identity
which of the following is not a requirement for telework
which of the following is not a type of malicious code
which of the following is not a typical means for spreading malicious code
which of the following is not an example of cui
which of the following is not the correct way to protect cui
which of the following is not true concerning a computer labeled secret
which of the following is the best example of personally identifiable information
which of the following is true about telework
which of the following is true of controlled unclassified information
which of the following is true of internet hoaxes
which of the following is true of protected health information
which of the following is true of unclassified information
which of the following may help prevent spillage
which of the following may help to prevent inadvertent spillage
which of the following may help to prevent spillage 2023
which of the following must you do before using an unclassified laptop and peripherals in a collateral classified environment
which of the following practices reduces the chance of becoming a target by adversaries seeking
which of the following should be reported as a potential security incident
which of these is true of unclassified data
which represents a security best practice when using social networking
who can be permitted access to classified data
why might insiders be able to cause damage
why might insiders be able to cause damage to their organizations more easily than others
within a secure area you see an individual
you receive an inquiry from a reporter about potentially classified information on the internet

No comments:

Post a Comment