CYBER AWARENESS CHALLENGE 2022
FLASHCARDS
EXAM PREPARATION GUIDE | 92 ITEMS
Q:**Sensitive Compartmented InformationWhat actin should you take if you
become aware that Sensitive Compartmented Information (SCI) has been compromised?Contact your security point of contact to report the incident Q:**Classified DataWhich of the following is a good practice to protect classified information?Ensure proper labeling by appropriately marking all classified material and, when required, sensitive material
Q:**Classified DataWhich type of information could reasonably be expected to
cause serious damage to national security if disclosed without authorization?Secret
Q:**Home Computer SecurityWhat should you consider when using a wireless
keyboard with your home computer?Reviewing and configuring the available security features, including encryption
Q:**Malicious CodeWhich of the following is NOT a way that malicious code
spreads?Legitimate software updates Q:*SpillageWhat should you do if a reporter asks you about potentially classified information on the web?Ask for information about the website, including the URL.
Q:**Home Computer SecurityHow can you protect your information when using
wireless technology?Avoid using non-Bluetooth-paired or unencrypted wireless computer peripherals.
Q:**Social EngineeringWhat is TRUE of a phishing attack?
Phishing can be an email with a hyperlink as bait.Q:**Social EngineeringWhich is a best practice that can prevent viruses and other malicious code from being downloaded when checking your e-mail?Do not access website links, buttons, or graphics in e-mail Q:**Mobile DevicesWhich is a rule for removable media, other portable electronic devices (PEDs), and mobile computing devices to protect Government systems?Do not use any personally owned/non-organizational removable media on your organization's systems.
Q:**Social NetworkingWhich of the following best describes the sources that
contribute to your online identity?Data about you collected from all sites, apps, and devices that you use can be aggregated to form a profile of you.Q:*Spillage.What should you do if a reporter asks you about potentially classified information on the web?Refer the reporter to your organization's public affairs office.
Q:**Classified DataWhen classified data is not in use, how can you protect it?
Store classified data appropriately in a GSA-approved vault/container.
Q:*Sensitive Compartmented InformationWhich must be approved and signed by a
cognizant Original Classification Authority (OCA)?Security Classification Guide (SCG)
Q:**Identity managementWhat is the best way to protect your Common Access
Card (CAC)?Maintain possession of it at all times.
Q:*Sensitive Compartmented InformationWhen faxing Sensitive Compartmented
Information (SCI), what actions should you take?Mark SCI documents appropriately and use an approved SCI fax machine
Q:**Social EngineeringHow can you protect yourself from internet hoaxes?
Use online sites to confirm or expose potential hoaxes
Q:**Insider ThreatWhat type of activity or behavior should be reported as a
potential insider threat?Coworker making consistent statements indicative of hostility or anger toward the United States in its policies.
Q:*SpillageWhat should you do when you are working on an unclassified system
and receive an email with a classified attachment?Call your security point of contact immediately
Q:**Classified DataWhat level of damage can the unauthorized disclosure of
information classified as Confidential reasonably be expected to cause?Damage to national security Q:**Classified DataHow should you protect a printed classified document when it is not in use?Store it in a General Services Administration (GSA)-approved vault or container
Q:**Social EngineeringWhich is an appropriate use of government e-mail?
Use a digital signature when sending attachments or hyperlinks
Q:**TRAVELWhich of the following is a concern when using your
Government-issued laptop in public?Others may be able to view your screen
Q:**TravelWhat security risk does a public Wi-Fi connection pose?
It may expose the connected device to malware.
Q:**Social NetworkingAs someone who works with classified information, what
should you do if you are contacted by a foreign national seeking information on a research project?Inform your security point of contact
Q:*Malicious CodeWhat are some examples of malicious code?
Viruses, Trojan horses, or worms
Q:**Mobile DevicesWhat should you do when going through an airport security
checkpoint with a Government-issued mobile device?Maintain visual or physical control of the device
Q:**Website UseWhich of the following statements is true of cookies?
You should only accept cookies from reputable, trusted websites.
Q:**Website UseHow should you respond to the theft of your identity?
Report the crime to local law enforcement
Q:*Sensitive Compartmented InformationWhat should the owner of this printed
SCI do differently?Retrieve classified documents promptly from printers
Q:**Identity ManagementYour DoD Common Access Card (CAC) has a Public Key
Infrastructure (PKI) token approved for access to the NIPRNet. In which situation below are you permitted to use your PKI token?On a NIPRNet system while using it for a PKI-required task