• wonderlic tests
  • EXAM REVIEW
  • NCCCO Examination
  • Summary
  • Class notes
  • QUESTIONS & ANSWERS
  • NCLEX EXAM
  • Exam (elaborations)
  • Study guide
  • Latest nclex materials
  • HESI EXAMS
  • EXAMS AND CERTIFICATIONS
  • HESI ENTRANCE EXAM
  • ATI EXAM
  • NR AND NUR Exams
  • Gizmos
  • PORTAGE LEARNING
  • Ihuman Case Study
  • LETRS
  • NURS EXAM
  • NSG Exam
  • Testbanks
  • Vsim
  • Latest WGU
  • AQA PAPERS AND MARK SCHEME
  • DMV
  • WGU EXAM
  • exam bundles
  • Study Material
  • Study Notes
  • Test Prep

CYBER AWARENESS CHALLENGE 2020

Class notes Jan 8, 2026
Preview Mode - Purchase to view full document
Loading...

Loading study material viewer...

Page 0 of 0

Document Text

CYBER AWARENESS CHALLENGE 2020

FLASHCARDS

EXAM PREPARATION GUIDE | 9 ITEMS

Q:What are some potential insider threat indicators?

Difficult life circumstances such as substance abuse; divided loyalty or allegiance to the U.S.; or extreme, persistent interpersonal difficulties.Q:Which of the following terms refers to harm inflicted on national security through authorized access to information or information systems?Insider Threat

Q:What is a proper response if spillage occurs?

Immediately notify your security POC.Q:As someone who works with classified information, what should you do if you are contacted by a foreign national seeking information on research project?Inform your security POC of all non-professional or non-routine contacts with foreign nationals, including, but not limited to, joining each other's social media sites.

Q:Which is a good practice to protect classified information

Ensure proper labeling by appropriately making all classified material and, when required, sensitive material.

Q:Which of the following is true of protecting classified data?

Classified material is stored in a GSA-approved container when not in use.Q:A user writes down details from a report stored on a classified system marked as Secret and uses those details to draft an unclassified briefing on an unclassified system without authorization. What is the best choice to describe what has occurred?Spillage because classified data was moved to a lower classification level system without authorization.

Q:What type of activity or be reported as a potential insider threat?

Coworker making consistent statements indicative of hostility or anger toward the United States and its policies.

Q:What information posted publicly on your personal social networking profile

represents a security risk?Your place of birth

CONFIDENTIAL EXAM MATERIAL | Page 2

Download Study Material

Buy This Study Material

$11.99
Buy Now
  • Immediate download after payment
  • Available in the pdf format
  • 100% satisfaction guarantee

Study Material Information

Category: Class notes
Description:

CYBER AWARENESS CHALLENGE 2020 FLASHCARDS EXAM PREPARATION GUIDE | 9 ITEMS Q:What are some potential insider threat indicators? Difficult life circumstances such as substance abuse; divided loyalty...

UNLOCK ACCESS $11.99