CYBER AWARENESS CHALLENGE
FLASHCARDS
EXAM PREPARATION GUIDE | 45 ITEMS
Q:What describes how Sensitive Compartmented Information is marked?
Approved Security Classification Guide (SCG)
Q:What portable electronic devices (PEDs) are permitted in a SCIF?
Only expressly authorized government-owned PEDs
Q:Which classification level is given to information that could reasonably be
expected to cause serious damage to national security?Secret
Q:What is an indication that malicious code is running on your system?
File corruption
Q:Which of the following is NOT a correct way to protect CUI?
CUI may be stored on any password-protected system.
Q:What is a valid response when identity theft occurs?
Report the crime to local law enforcement.
Q:Which of the following is an example of a strong password?
%2ZN=Ugq Q:When is the best time to post details of your vacation activities on your social networking website?When your vacation is over, and you have returned home
Q:What type of activity or behavior should be reported as a potential insider
threat?Coworker making consistent statements indicative of hostility or anger toward the United States in its policies.
Q:Which is a risk associated with removable media?
Spillage of classified information.
Q:Which of the following is NOT an example of CUI?
Press release data Q:Who might "insiders" be able to cause damage to their organizations more easily than others?Insiders are given a level of trust and have authorized access to Government information systems.
Q:Which of the following helps protect data on your personal mobile devices?
Secure personal mobile devices to the same level as Government-issued systems.
Q:A compromise of Sensitive Compartmented Information (SCI) occurs when a
person who does not have the required clearance or access caveats comes into possession of SCI...in any manner
Q:Which of the following is a best practice for physical activity?
Report suspicious activity
Q:Which of the following is true of Security Classification Guides?
They provide guidance on reasons for and duration of classification of information.
Q:Which of the following is a potential insider threat indicator?
Unusual interest in classified information
Q:How many potential insider threat indicators does a person who is playful and
charming, consistently wins performance awards, but is occasionally aggressive in trying to access sensitive information display?
- indicator
Q:What level of damage can the unauthorized disclosure of information classified as Top Secret reasonably be expected to cause?Exceptionally grave damage to national security
Q:What is the response to an incident such as opening an uncontrolled DVD on a
computer in a SCIF?All of these
Q:What is a good practice to protect classified information?
Store classified data in a locked desk drawer when not in use
Q:What is the best example of Protected Health Information (PHI)?
Your health insurance explanation of benefits (EOB)
Q:What is a best practice to protect data on your mobile computing device?
Lock your device screen when not in use and require a password to reactivate.
Q:Which is a best practice for protecting Controlled Unclassified Information
(CUI)?
Store it in a locked desk drawer after working hours
Q:What is whaling?
A type of phishing targeted at high-level personnel such as senior officials.
Q:What is the best example of Personally Identifiable Information (PII)?
Date and place of birth
Q:Under what circumstances is it acceptable to use your Government-furnished
computer to check personal e-mail and do other non-work-related activities?If allowed by organizational policy
Q:Which of the following is true of protecting classified data?
Classified material must be appropriately marked.
Q:What is a good practice for physical security?
Challenge people without proper badges.
Q:Which of the following statements is true?
Adversaries exploit social networking sites to disseminate fake news.
Q:Which piece of information is safest to include on your social media profile?
Your favorite movie
Q:What is a best practice while traveling with mobile computing devices?
Maintain possession of your laptop and other government-furnished equipment (GFE) at all times.
Q:Which must be approved and signed by a cognizant Original Classification
Authority (OCA)?Security Classification Guide (SCG)
Q:What certificates are contained on the DoD Public Key Infrastructure (PKI)
implemented by the Common Access Card (CAC)/Personal Identity Verification (PIV) card?Identification, encryption, and digital signature
Q:What does "spillage" refer to?
Information improperly moved from a higher protection level to a lower protection level