CYBER AWARENESS CHALLENGE 2023
(KNOWLEDGE CHECK) FLASHCARDS
EXAM PREPARATION GUIDE | 32 ITEMS
Q:IDENTITY MANAGEMENT: Which of the following is true of using a DoD PKI token?It should only be in a system while actively using it for a PKI-required task Q:WEBSITE USE: Which of the following actions can help to protect your identity?Shred personal documents Q:MALICIOUS CODE: Which of the following is NOT a type of malicious code?Executables Q:INSIDER THREAT: Which of the following is a potential insider threat indicator?Interest in learning a foreign language (maybe) Q:CLASSIFIED DATA: What level of damage can the unauthorized disclosure of information classified as Top Secret reasonably be expected to cause?exceptionally grave damage Q:MOBILE DEVICES: Which of the following best describes the conditions under which mobile devices and applications can track your location?It may occur at any time without your knowledge or consent.Q:PHYSICAL SECURITY: Which of the following best describes good physical security?Lionel stops an individual in his secure area who is not wearing a badge
Q:**Insider ThreatBased on the description that follows, how many potential
insider threat indicator(s) are displayed? A colleague saves money for an overseas vacation every year, is a single father, and occasionally consumes alcohol.
- (maybe)
Q:SENSITIVE COMPARTMENTED INFORMATION: Which of the following is true of transmitting sensitive compartmented information (SCI)?You many only transport SCI if you have been courier-briefed for SCI.Q:SOCIAL ENGINEERING: How can you protect yourself from social engineering?Verify the identity of all individuals.Q:CLASSIFIED DATA: Which of the following is a good practice for telework?use VPN Q:CUI: Which of the following best describes a way to safely transmit Controlled Unclassified Information (CUI)?
TBD Q:USE OF GFE: Which of the following is NOT a permitted way to connect a personally-owned monitor to your GFE?
USB Q:SPILLAGE: Which of the following may help to prevent spillage?Follow procedures for transferring data to and from outside agency and non-government networks.Q:SOCIAL NETWORKING: Which of the following statements is true?Many apps and smart devices collect and share your personal information and contribute to your online identity
Q:SOCIAL NETWORKING: Which of the following is a security best practice when using social networking sites?Avoiding posting your mother's maiden name Q:TRAVEL: What security risk does a public Wi-Fi connection pose?It may prohibit the use of a VPN (NOPE), It may expose the information sent to theft (??), Q:SOCIAL NETWORKING: Which of the following statements is true?Adversaries exploit social networking sites to disseminate fake news.Q:HOME COMPUTER SECURITY: How should you secure your home wireless network for teleworking?Implement Wi-Fi Protected Access 2 (WPA2) Personal encryption at a minimum.Q:SPILLAGE: Which of the following is a good practice to prevent spillage?
TBD Q:SPILLAGE: You receive an inquiry from a reporter about government information not cleared for public release. How should you respond?Refer to PA Q:REMOVABLE MEDIA IN A SCIF: Which of the following is true of portable electronic devices (PEDs) in a Sensitive Compartmented Information Facility
(SCIF)?
All personal and government-owned PEDs are prohibited in a SCIF (NOPE), only authorized govt PEDS (??) Q:SOCIAL ENGINEERING: What action should you take with a compressed Uniform Resource Locator (URL) on a website known to you?investigate the destination by using the preview feature to see where the link goes
Q:CLASSIFIED DATA: Who designates whether information is classified and its classification level?Original classification authority (??) Q:MOBILE DEVICES: How can you protect data on your mobile computing and portable electronic devices (PEDs)?Enable automatic screen locking after a period of inactivity.Q:INSIDER THREAT: What is an insider threat?Someone who uses authorized access, wittingly or unwittingly, to harm...... (maybe) Q:CUI: Which of the following is true of Protected Health Information (PHI)?
TBD Q:CUI: Which designation includes PII and PHI?Sensitive information Q:IDENTITY MANAGEMENT: Which of the following is true of the CAC or PIV card?You should remove and take your CAC/PIV card whenever you leave your workstation Q:SPILLAGE: You find information that you know to be classified on the Internet.What should you do?Note the website's URL and report the situation to your security point of contact Q:SOCIAL ENGINEERING: what is a common indicator of a phishing attempt?a claim that you must update or validate information Q:SENSITIVE COMPARTMENTED INFORMATION: Which of the following is true of Sensitive Compartmented Information (SCI)?Access requires Top Secret clearance and indoctrination into the SCI program.