• wonderlic tests
  • EXAM REVIEW
  • NCCCO Examination
  • Summary
  • Class notes
  • QUESTIONS & ANSWERS
  • NCLEX EXAM
  • Exam (elaborations)
  • Study guide
  • Latest nclex materials
  • HESI EXAMS
  • EXAMS AND CERTIFICATIONS
  • HESI ENTRANCE EXAM
  • ATI EXAM
  • NR AND NUR Exams
  • Gizmos
  • PORTAGE LEARNING
  • Ihuman Case Study
  • LETRS
  • NURS EXAM
  • NSG Exam
  • Testbanks
  • Vsim
  • Latest WGU
  • AQA PAPERS AND MARK SCHEME
  • DMV
  • WGU EXAM
  • exam bundles
  • Study Material
  • Study Notes
  • Test Prep

CYBER AWARENESS CHALLENGE 2022

Class notes Jan 8, 2026
Preview Mode - Purchase to view full document
Loading...

Loading study material viewer...

Page 0 of 0

Document Text

CYBER AWARENESS CHALLENGE 2022

FLASHCARDS

EXAM PREPARATION GUIDE | 92 ITEMS

Q:**Sensitive Compartmented InformationWhat actin should you take if you

become aware that Sensitive Compartmented Information (SCI) has been compromised?Contact your security point of contact to report the incident Q:**Classified DataWhich of the following is a good practice to protect classified information?Ensure proper labeling by appropriately marking all classified material and, when required, sensitive material

Q:**Classified DataWhich type of information could reasonably be expected to

cause serious damage to national security if disclosed without authorization?Secret

Q:**Home Computer SecurityWhat should you consider when using a wireless

keyboard with your home computer?Reviewing and configuring the available security features, including encryption

Q:**Malicious CodeWhich of the following is NOT a way that malicious code

spreads?Legitimate software updates Q:*SpillageWhat should you do if a reporter asks you about potentially classified information on the web?Ask for information about the website, including the URL.

Q:**Home Computer SecurityHow can you protect your information when using

wireless technology?Avoid using non-Bluetooth-paired or unencrypted wireless computer peripherals.

Q:**Social EngineeringWhat is TRUE of a phishing attack?

Phishing can be an email with a hyperlink as bait.Q:**Social EngineeringWhich is a best practice that can prevent viruses and other malicious code from being downloaded when checking your e-mail?Do not access website links, buttons, or graphics in e-mail Q:**Mobile DevicesWhich is a rule for removable media, other portable electronic devices (PEDs), and mobile computing devices to protect Government systems?Do not use any personally owned/non-organizational removable media on your organization's systems.

Q:**Social NetworkingWhich of the following best describes the sources that

contribute to your online identity?Data about you collected from all sites, apps, and devices that you use can be aggregated to form a profile of you.Q:*Spillage.What should you do if a reporter asks you about potentially classified information on the web?Refer the reporter to your organization's public affairs office.

Q:**Classified DataWhen classified data is not in use, how can you protect it?

Store classified data appropriately in a GSA-approved vault/container.

Q:*Sensitive Compartmented InformationWhich must be approved and signed by a

cognizant Original Classification Authority (OCA)?Security Classification Guide (SCG)

Q:**Identity managementWhat is the best way to protect your Common Access

Card (CAC)?Maintain possession of it at all times.

Q:*Sensitive Compartmented InformationWhen faxing Sensitive Compartmented

Information (SCI), what actions should you take?Mark SCI documents appropriately and use an approved SCI fax machine

Q:**Social EngineeringHow can you protect yourself from internet hoaxes?

Use online sites to confirm or expose potential hoaxes

Q:**Insider ThreatWhat type of activity or behavior should be reported as a

potential insider threat?Coworker making consistent statements indicative of hostility or anger toward the United States in its policies.

Q:*SpillageWhat should you do when you are working on an unclassified system

and receive an email with a classified attachment?Call your security point of contact immediately

Q:**Classified DataWhat level of damage can the unauthorized disclosure of

information classified as Confidential reasonably be expected to cause?Damage to national security Q:**Classified DataHow should you protect a printed classified document when it is not in use?Store it in a General Services Administration (GSA)-approved vault or container

Q:**Social EngineeringWhich is an appropriate use of government e-mail?

Use a digital signature when sending attachments or hyperlinks

Q:**TRAVELWhich of the following is a concern when using your

Government-issued laptop in public?Others may be able to view your screen

Q:**TravelWhat security risk does a public Wi-Fi connection pose?

It may expose the connected device to malware.

Q:**Social NetworkingAs someone who works with classified information, what

should you do if you are contacted by a foreign national seeking information on a research project?Inform your security point of contact

Q:*Malicious CodeWhat are some examples of malicious code?

Viruses, Trojan horses, or worms

Q:**Mobile DevicesWhat should you do when going through an airport security

checkpoint with a Government-issued mobile device?Maintain visual or physical control of the device

Q:**Website UseWhich of the following statements is true of cookies?

You should only accept cookies from reputable, trusted websites.

Q:**Website UseHow should you respond to the theft of your identity?

Report the crime to local law enforcement

Q:*Sensitive Compartmented InformationWhat should the owner of this printed

SCI do differently?Retrieve classified documents promptly from printers

Q:**Identity ManagementYour DoD Common Access Card (CAC) has a Public Key

Infrastructure (PKI) token approved for access to the NIPRNet. In which situation below are you permitted to use your PKI token?On a NIPRNet system while using it for a PKI-required task

Download Study Material

Buy This Study Material

$11.99
Buy Now
  • Immediate download after payment
  • Available in the pdf format
  • 100% satisfaction guarantee

Study Material Information

Category: Class notes
Description:

CYBER AWARENESS CHALLENGE 2022 FLASHCARDS EXAM PREPARATION GUIDE | 92 ITEMS Q:**Sensitive Compartmented InformationWhat actin should you take if you become aware that Sensitive Compartmented Inform...

UNLOCK ACCESS $11.99