CYBER AWARENESS KNOWLEDGE CHECK -
2024 FLASHCARDS
EXAM PREPARATION GUIDE | 99 ITEMS
Q:What describes how Sensitive Compartmented Information is marked?
Approved Security Classification Guide (SCG) Q:Which is a wireless technology that enables your electronic devices to establish communications and exchange information when places next to each other called?Near field communication (NFC) Q:Under what circumstances is it permitted to share an unclassified draft document with a non-DoD professional discussion group?As long as the document is cleared for public release, you may share it outside of DoD.
Q:Which is true of cookies?
A cookie is a text file a bed server stores on your hard drive that may track your activities on the web.
Q:Which is a risk associated with removable media?
Spillage of classified information.
Q:When faxing Sensitive Compartmented Information (SCI), what actions should
you take?Mark SCI documents appropriately and use an approved SCI fax machine
Q:Which of the following helps protect data on your personal mobile devices?
Secure personal mobile devices to the same level as Government-issued systems.
Q:What advantages do "insider threats" have over others that allows them to cause damage to their organizations more easily?Insiders are given a level of trust and have authorized access to Government information systems.Q:Which of the following terms refers to harm inflicted on national security through authorized access to information or information systems?Insider Threat
Q:Which is a good practice to protect classified information?
Ensure proper labeling by appropriately marking all classified material and, when required, sensitive material.-OR-Don't assume open storage in a secure facility is authorized.
Q:What is a best practice to protect data on your mobile computing device?
Lock your device screen when not in use and require a password to reactivate.
Q:Which of the following is a good practice to aid in preventing spillage?
Be aware of classification markings and all handling caveats.
Q:What is whaling?
A type of phishing targeted at high-level personnel such as senior officials.
Q:When is conducting a private money-making venture using your
Government-furnished computer permitted?It is never permitted.Q:How many potential insider threat indicators does a person who is married with two children, vacations at the beach every year, is pleasant to work with, but sometimes has poor work quality display?
- indicators
Q:What is a good practice to protect data on your home wireless systems?
Ensure that the wireless security features are properly configured.
Q:What certificates are contained on the DoD Public Key Infrastructure (PKI)
implemented by the Common Access Card (CAC)/Personal Identity Verification (PIV) card?Identification, encryption, and digital signature Q:After reading an online story about a new security project being developed on the military installation where you work, your neighbor asks you to comment about the article. You know this project is classified. What should be your response?Attempt to change the subject to something non-work related, but neither confirm nor deny the article's authenticity.Q:What is a good practice when it is necessary to use a password to access a system or an application?Avoid using the same password between systems or applications.
Q:What is a common indicator of a phishing attempt?
It includes a threat of dire circumstances.
Q:What portable electronic devices (PEDs) are allow in a Secure Compartmented
Information Facility (SCIF)?Government-owned PEDs, if expressly authorized by your agency.Q:Upon connecting your Government-issued laptop to a public wireless connection, what should you immediately do?Connect to the Government Virtual Private Network (VPN).Q:Which of the following can an unauthorized disclosure of information classified as Confidential reasonably be expected to cause?Damage to national security
Q:Which of the following practices reduces the chance of becoming a target by
adversaries seeking insider information?Don't talk about work outside your workspace unless it is a specifically designated public meeting environment and is controlled by the event planners.Q:Which of the following is a best practice to protect information about you and your organization on social networking sites and applications?Use only personal contact information when establishing personal social networking accounts, never use Government contact information.
Q:Which of the following is NOT an example of sensitive information?
Press release data Q:Under which circumstances may you be subject to criminal, disciplinary, and/or administrative action due to online misconduct?Any time you participate in or condone misconduct, whether offline or online.
Q:What can malicious code do?
It can cause damage by corrupting files, erasing your hard drive, and/or allowing hackers access.
Q:Which of the following is a way to protect against social engineering?
Follow instructions given only by verified personnel.
Q:Which represents a security best practice when using social networking?
Understanding and using available privacy settings.
Q:What is required for an individual to access classified data?
Appropriate clearance; signed and approved non-disclosure agreement; and need-to-know.Q:While on vacation, a coworker calls and asks you to access a site to review and approve a document that is hosted behind a DoD Public Key Infrastructure (PKI) protected webpage. You do not have your government-issued laptop. What action should you take?Wait until you have access to your government-issued laptop.