• wonderlic tests
  • EXAM REVIEW
  • NCCCO Examination
  • Summary
  • Class notes
  • QUESTIONS & ANSWERS
  • NCLEX EXAM
  • Exam (elaborations)
  • Study guide
  • Latest nclex materials
  • HESI EXAMS
  • EXAMS AND CERTIFICATIONS
  • HESI ENTRANCE EXAM
  • ATI EXAM
  • NR AND NUR Exams
  • Gizmos
  • PORTAGE LEARNING
  • Ihuman Case Study
  • LETRS
  • NURS EXAM
  • NSG Exam
  • Testbanks
  • Vsim
  • Latest WGU
  • AQA PAPERS AND MARK SCHEME
  • DMV
  • WGU EXAM
  • exam bundles
  • Study Material
  • Study Notes
  • Test Prep

CYBER AWARENESS CHALLENGE

Class notes Jan 8, 2026
Preview Mode - Purchase to view full document
Loading...

Loading study material viewer...

Page 0 of 0

Document Text

CYBER AWARENESS CHALLENGE

FLASHCARDS

EXAM PREPARATION GUIDE | 45 ITEMS

Q:What describes how Sensitive Compartmented Information is marked?

Approved Security Classification Guide (SCG)

Q:What portable electronic devices (PEDs) are permitted in a SCIF?

Only expressly authorized government-owned PEDs

Q:Which classification level is given to information that could reasonably be

expected to cause serious damage to national security?Secret

Q:What is an indication that malicious code is running on your system?

File corruption

Q:Which of the following is NOT a correct way to protect CUI?

CUI may be stored on any password-protected system.

Q:What is a valid response when identity theft occurs?

Report the crime to local law enforcement.

Q:Which of the following is an example of a strong password?

%2ZN=Ugq Q:When is the best time to post details of your vacation activities on your social networking website?When your vacation is over, and you have returned home

Q:What type of activity or behavior should be reported as a potential insider

threat?Coworker making consistent statements indicative of hostility or anger toward the United States in its policies.

Q:Which is a risk associated with removable media?

Spillage of classified information.

Q:Which of the following is NOT an example of CUI?

Press release data Q:Who might "insiders" be able to cause damage to their organizations more easily than others?Insiders are given a level of trust and have authorized access to Government information systems.

Q:Which of the following helps protect data on your personal mobile devices?

Secure personal mobile devices to the same level as Government-issued systems.

Q:A compromise of Sensitive Compartmented Information (SCI) occurs when a

person who does not have the required clearance or access caveats comes into possession of SCI...in any manner

Q:Which of the following is a best practice for physical activity?

Report suspicious activity

Q:Which of the following is true of Security Classification Guides?

They provide guidance on reasons for and duration of classification of information.

Q:Which of the following is a potential insider threat indicator?

Unusual interest in classified information

Q:How many potential insider threat indicators does a person who is playful and

charming, consistently wins performance awards, but is occasionally aggressive in trying to access sensitive information display?

  • indicator
  • Q:What level of damage can the unauthorized disclosure of information classified as Top Secret reasonably be expected to cause?Exceptionally grave damage to national security

Q:What is the response to an incident such as opening an uncontrolled DVD on a

computer in a SCIF?All of these

Q:What is a good practice to protect classified information?

Store classified data in a locked desk drawer when not in use

Q:What is the best example of Protected Health Information (PHI)?

Your health insurance explanation of benefits (EOB)

Q:What is a best practice to protect data on your mobile computing device?

Lock your device screen when not in use and require a password to reactivate.

Q:Which is a best practice for protecting Controlled Unclassified Information

(CUI)?

Store it in a locked desk drawer after working hours

Q:What is whaling?

A type of phishing targeted at high-level personnel such as senior officials.

Q:What is the best example of Personally Identifiable Information (PII)?

Date and place of birth

Q:Under what circumstances is it acceptable to use your Government-furnished

computer to check personal e-mail and do other non-work-related activities?If allowed by organizational policy

Q:Which of the following is true of protecting classified data?

Classified material must be appropriately marked.

Q:What is a good practice for physical security?

Challenge people without proper badges.

Q:Which of the following statements is true?

Adversaries exploit social networking sites to disseminate fake news.

Q:Which piece of information is safest to include on your social media profile?

Your favorite movie

Q:What is a best practice while traveling with mobile computing devices?

Maintain possession of your laptop and other government-furnished equipment (GFE) at all times.

Q:Which must be approved and signed by a cognizant Original Classification

Authority (OCA)?Security Classification Guide (SCG)

Q:What certificates are contained on the DoD Public Key Infrastructure (PKI)

implemented by the Common Access Card (CAC)/Personal Identity Verification (PIV) card?Identification, encryption, and digital signature

Q:What does "spillage" refer to?

Information improperly moved from a higher protection level to a lower protection level

Download Study Material

Buy This Study Material

$11.99
Buy Now
  • Immediate download after payment
  • Available in the pdf format
  • 100% satisfaction guarantee

Study Material Information

Category: Class notes
Description:

CYBER AWARENESS CHALLENGE FLASHCARDS EXAM PREPARATION GUIDE | 45 ITEMS Q:What describes how Sensitive Compartmented Information is marked? Approved Security Classification Guide (SCG) Q:What portab...

UNLOCK ACCESS $11.99