• wonderlic tests
  • EXAM REVIEW
  • NCCCO Examination
  • Summary
  • Class notes
  • QUESTIONS & ANSWERS
  • NCLEX EXAM
  • Exam (elaborations)
  • Study guide
  • Latest nclex materials
  • HESI EXAMS
  • EXAMS AND CERTIFICATIONS
  • HESI ENTRANCE EXAM
  • ATI EXAM
  • NR AND NUR Exams
  • Gizmos
  • PORTAGE LEARNING
  • Ihuman Case Study
  • LETRS
  • NURS EXAM
  • NSG Exam
  • Testbanks
  • Vsim
  • Latest WGU
  • AQA PAPERS AND MARK SCHEME
  • DMV
  • WGU EXAM
  • exam bundles
  • Study Material
  • Study Notes
  • Test Prep

CYBER AWARENESS CHALLENGE 2023

Summary Jan 8, 2026
Preview Mode - Purchase to view full document
Loading...

Loading study material viewer...

Page 0 of 0

Document Text

CYBER AWARENESS CHALLENGE 2023

(INCOMPLETE) FLASHCARDS

EXAM PREPARATION GUIDE | 100 ITEMS

Q:**Classified DataWhich of the following is a good practice to protect classified information?Ensure proper labeling by appropriately marking all classified material and, when required, sensitive material

Q:*Sensitive Compartmented InformationWhich of the following is true of sharing

information in a Sensitive Compartmented Information Facility (SCIF)-SCIFs universally permit open storage.-Individuals must avoid referencing derivatively classified reports classified higher than the recipient.-All individuals in a SCIF are properly cleared and have need-to-know.-Classified material stored in a SCIF does not require classification markings.Individuals must avoid referencing derivatively classified reports classified higher than the recipient.

Q:**Classified DataWhich type of information could reasonably be expected to

cause serious damage to national security if disclosed without authorization?Secret

Q:**Classified DataWhat is the basis for handling and storage of classified

data?-Organizational policy-Security Classification Guides (SCGs)-Classification markings and handling caveats-General Services Administration (GSA) approval Classification markings and handling caveats

Q:**Physical SecurityWhich of the following best describes good physical

security?-Sharon follows her colleague into a secure area without badging in after they have lunch together.-Brenda borrows an access badge from her co-worker when she forgets hers.-Lionel stops an individual in his secure area who is not wearing a badge.-Eal takes home a copy of his secure area's access roster in preparation for telework.Lionel stops an individual in his secure area who is not wearing a badge.

Q:*Sensitive Compartmented InformationWhich of the following is true of

transmitting Sensitive Compartmented Information (SCI)?~You must never transmit SCI via fax machine (Wrong) Q:*SpillageWhat should you do if a reporter asks you about potentially classified information on the web?Ask for information about the website, including the URL.

Q:**Social NetworkingWhich of the following best describes the sources that

contribute to your online identity?Data about you collected from all sites, apps, and devices that you use can be aggregated to form a profile of you.Q:*Spillage.What should you do if a reporter asks you about potentially classified information on the web?Refer the reporter to your organization's public affairs office.

Q:**Social NetworkingWhich of the following statements is true?

Adversaries exploit social networking sites to disseminate fake news

Q:*SpillageYou find information that you know to be classified on the Internet.

What should you do?~Note the website's URL and report the situation to your security point of contact

Q:**Identity managementWhich of the following is an example of two-factor

authentication.-A Common Access Card and Personal Identification Number-Photo identification and proof of residence-Physical access and system access-Facial recognition and a fingerprint A Common Access Card and Personal Identification Number

Q:**Classified DataWhen classified data is not in use, how can you protect it?

Store classified data appropriately in a GSA-approved vault/container.

Q:*Sensitive Compartmented InformationWhich must be approved and signed by a

cognizant Original Classification Authority (OCA)?Security Classification Guide (SCG)

Q:**Identity managementWhat is the best way to protect your Common Access

Card (CAC)?Maintain possession of it at all times.

Q:*Sensitive Compartmented InformationWhen faxing Sensitive Compartmented

Information (SCI), what actions should you take?Mark SCI documents appropriately and use an approved SCI fax machine

Q:**Insider ThreatWhat type of activity or behavior should be reported as a

potential insider threat?Coworker making consistent statements indicative of hostility or anger toward the United States in its policies.

Q:*SpillageWhat should you do when you are working on an unclassified system

and receive an email with a classified attachment?Call your security point of contact immediately

Q:**Classified DataWhat level of damage can the unauthorized disclosure of

information classified as Confidential reasonably be expected to cause?Damage to national security Q:**Classified DataHow should you protect a printed classified document when it is not in use?Store it in a General Services Administration (GSA)-approved vault or container

Q:**Removable Media in a SCIFWhich of the following is NOT a potential

consequence of using removable media unsafely in a Sensitive Compartmented Information Facility (SCIF)?-Loss of mission-Loss of life-Damage to the removable media-Compromise of information, systems, programs, and/or assets Damage to the removable media

Q:**Social NetworkingAs someone who works with classified information, what

should you do if you are contacted by a foreign national seeking information on a research project?Inform your security point of contact Q:**Social NetworkingWhich of the following is a security best practice when using social networking sites?Understanding and using the available privacy settings

Q:*Sensitive Compartmented InformationWhat should the owner of this printed

SCI do differently?Retrieve classified documents promptly from printers

Q:**Identity ManagementYour DoD Common Access Card (CAC) has a Public Key

Infrastructure (PKI) token approved for access to the NIPRNet. In which situation below are you permitted to use your PKI token?On a NIPRNet system while using it for a PKI-required task

Q:*Sensitive Compartmented InformationA compromise of Sensitive

Comparmented Information (SCI) occurs when a person who does not have the required clearance or assess caveats comes into possession of SCI _____.-in any manner-verbally-electronically-physically in any manner

Q:*Sensitive Compartmented InformationWhat should the participants in this

conversation involving SCI do differently?Physically assess that everyone within listening distance is cleared and has a need-to-know for the information being discussed

Q:**Removable Media in a SCIFWhat portable electronic devices (PEDs) are

allowed in a Sensitive Compartmented Information Facility (SCIF)?Government-owned PEDs when expressly authorized by your agency

Download Study Material

Buy This Study Material

$11.99
Buy Now
  • Immediate download after payment
  • Available in the pdf format
  • 100% satisfaction guarantee

Study Material Information

Category: Summary
Description:

CYBER AWARENESS CHALLENGE 2023 (INCOMPLETE) FLASHCARDS EXAM PREPARATION GUIDE | 100 ITEMS Q:**Classified DataWhich of the following is a good practice to protect classified information? Ensure prop...

UNLOCK ACCESS $11.99