CYBER AWARENESS CHALLENGE 2023
(ARMY FIRE) (FORT GORDON) FLASHCARDS
EXAM PREPARATION GUIDE | 31 ITEMS
Q:Uncontrolled Unclassified Information/ Identity Management - What is true
about a Common Access Card (CAC)?You should remove and take your CAC/PIV card whenever you leave your workstation.(verified)
Q:Uncontrolled Unclassified Information/ Sensitive Compartmented Information -
What must authorized personnel do before permitting another individual to enter a Sensitive Compartmented Information Facility (SCIF)?Confirm the individual's need-to-know and access. (verified)
Q:Spillage - Which of the following may help prevent spillage?
Follow procedures for transferring data to...
Q:Uncontrolled Unclassified Information/ identity Management - Which of the
following is true of using a DoD Public Key Infrastructure (PKI) token?It should only be in a system while actively using it for a PKI-required task. (verified)
Q:Malicious Code - Which of the following is a way to prevent the spread of
malicious code?Scan all external files before uploading to your computer. (verified)
Q:Uncontrolled Unclassified Information/ Removable media - Which of the
following is true of portable electronic devices (PEDs) in a Sensitive Compartmented Information Facility (SCIF)?only connect government-owned PEDs to the same level classification information system when authorized. (verified)
Q:Malicious Code/ home computer security - Which is best practice for securing
your home computer?
- install system security patches. 2. Create separate accounts for each user. (verified)
Q:Uncontrolled Unclassified Information/ Sensitive Compartmented Information -
Which of the following is true of Sensitive Compartmented Information (SCI)?Access requires Top Secret clearance and indoctrination into the SCI program. (verified) Q:Spillage/social media - Which of the following is a security best practice when using social networking sites?Avoid posting your mother's maiden name. (verified) Q:Malicious Code/ websites - Which of the following statements is true of cookies?By accepting cookies..... (incorrect) Q:Uncontrolled Unclassified Information - Which of the following is true of CUI?CUI must be handled using safeguarding or dissemination controls? (verified) Q:Spillage/Insider threat - Which of the following is a potential insider threat indicator?Difficult circumstances; death of a spouse. (verified)
Q:Spillage/Insider threat - How many potential insider threat indicators are
displayed? VIDEO GAMES, SOCIAL MEDIA and forget to secure smartphone?
- indicator (verified)
Q:Spillage/Classified Data - Which of the following is a good practice to protect classified information?Store classified data appropriately in a GSA-approved vault/container.
Q:Spillage/social media - How can you protect your organization on social
networking sites?Ensure there are no identifiable landmarks visible in any photos....(verified)
Q:Uncontrolled Unclassified Information/ Physical Security - Which of the following best describes good physical security?Lionel stops an individual in his secure area....(verified) Q:Spillage - You find information that you know to be classified on the internet.What should you do?Note the website's URL and report the situation to your security point of contact.Q:Malicious Code/ Mobile Devices - Which of the following is a best practice for using removable media?Avoid inserting removable media with unknown content into your computer. (verified)
Q:Malicious Code/ Mobile devices Which is an example of removable media?
external hard drive (verified) Q:Spillage/Classified Data - What level of damage can the unauthorized disclosure of information classified as TOP SECURITY reasonably be expect to cause?Exceptionally grave... (verified)
Q:Uncontrolled Unclassified Information - Which designation includes PII and
PHI?CUI (verified)
Q:Spillage - Which of the following is a good practice to prevent spillage?
Always check to make sure you are using the correct network for the level of data.Q:Spillage/Insider threat -Which of the following is a reportable insider threat activity?Attempting to access sensitive info without a need-to-know. (verified)
Q:Malicious Code/ social engineering - How can you protect yourself form social
engineering?Verify the identity of all individuals. (verified)
Q:Malicious Code/ social engineering - Which of the following describes an
appropriate use of Government email?Use digital signature when sending attachments of hyperlinks. (verified)
Q:Malicious Code/ travel - What risk does a public Wi-Fi connection pose?
It may expose the information sent to theft. (verified)
Q:Malicious Code/ use of GFE - Which of the following personally-owned computer
peripherals is permitted for use with Government-furnished equipment?A headset with a microphone through a Universal Serial Bus (USB) port. (verified) Q:Spillage/social media - A trusted friend in your social network post a link to vaccine info on a website unknown to you. What action should you take?Research the source to evaluate its credibility and reliability. (verified)
Q:Uncontrolled Unclassified Information - Which of the following is true of
Protected Health Information (PHI)?It is created or received by a healthcare provider, health plan or employer. (verified)
Q:Malicious Code/ social engineering -
A claim that you must update or validate information. (verified)
Q:Spillage/Classified Data - What is the basis for the handling and storage of
classified data?Classification markings and handling caveats.