Geschreven door studenten die geslaagd zijn Direct beschikbaar na je betaling Online lezen of als PDF Verkeerd document? Gratis ruilen 4,6 TrustPilot
logo-home
Tentamen (uitwerkingen)

DOD CYBER AWARENESS TRAINING EXAM QUESTIONS WITH COMPLETE ANSWERS

Beoordeling
-
Verkocht
-
Pagina's
27
Cijfer
A+
Geüpload op
18-01-2026
Geschreven in
2025/2026

DOD CYBER AWARENESS TRAINING EXAM QUESTIONS WITH COMPLETE ANSWERS

Instelling
DOD Cyber Awareness
Vak
DOD Cyber Awareness

Voorbeeld van de inhoud

DOD CYBER AWARENESS TRAINING
EXAM QUESTIONS WITH COMPLETE
ANSWERS
Telework - - ANSWER -Do not remove classified documents from your secure
workspace to work offsite! Classified documents, either in hard copy or electronic
format, are strictly prohibited. Be sure to safeguard all DoD data while teleworking.

To telework, you must:

Have permission from your organization

Follow your organization's guidance to telework

Use authorized equipment and software and follow your organization's policies

Employ cybersecurity best practices at all times, including when using a Virtual Private
Network (VPN)

Perform telework in a dedicated area when at home

Position your monitor so that it is not facing windows or easily observed by others when
in use.

Classified Data - ANSWER -Classified data are designated by the original classification
authority as information that could be reasonably be expected to cause a given level of
damage to national security if disclosed:

Confidential - damage to national security

Secret - serious damage to national security

Top Secret - exceptionally grave damage to national security

Classified data:

Must be handled and stored properly based on classification markings and handling
caveats

Can only be accessed by individuals with all of the following:
Appropriate clearance
Signed and approved non-disclosure agreement
Need-to-know

,Protecting Classified Data - ANSWER -To protect classified data:

Only use classified data in areas with security appropriate to classification level

Store classified data appropriately n a GSA-approved vault/container when not in use

Don't assume open storage in a secure facility is authorized

Weigh need-to-share against need-to-know

Ensure proper labeling:
Appropriately mark all classified material and, when required, sensitive material
Report inappropriately marked material

Never transmit classified information using an unapproved method, such as visa an
unsecure fax machine or personal mobile device

Collateral Classified Spaces - ANSWER -Follow your organization's policy on mobile
devices and peripherals within secure spaces where classified information is processed,
handled, or discussed. Mobile devices and peripherals may be hacked or infected with
malware and can be used to track, record, photograph, or videotape the environment
around them. Powering off or putting devices in airplane mode is not sufficient to
mitigate these risks and the threat these devices pose to classified information.

When using unclassified laptops and peripherals in a collateral classified environment:

Ensure that any embedded cameras, microphones, and Wi-Fi are physically disabled

Use authorized external peripherals only:
Government-issued wired headsets and microphones
Government-issued wired webcams in designated areas
Personally-owned wired headsets without a microphone

All wireless headsets, microphones, and webcams are prohibited in DoD classified
spaces, as well as all personally-owned external peripherals other than wired headsets.

In addition to avoiding the temptation of greed to betray his country, what should Alex
do differently? - ANSWER -Avoid talking about work outside of the workplace or with
people without a need-to-know

How many insider threat indicators does Alex demonstrate? - ANSWER -Three or more

What should Alex's colleagues do? - ANSWER -Report the suspicious behavior in
accordance with their organization's insider threat policy

, Insider Threat - - ANSWER -An insider threat uses authorized access, wittingly or
unwittingly, to harm national security through unauthorized disclosure, data
modification, espionage, terrorism, or kinetic actions resulting in loss or degradation of
resources or capabilities.

Insiders are able to do extraordinary damage to their organizations by exploiting their
trusted status and authorized access to government information systems.

In one report on known U.S. spies, these individuals:

• Demonstrated behaviors of security concerns: 80% of the time

• Experienced a life crisis: 25% of the time

• Volunteered: 70% of the time

Although the vast majority of people are loyal and patriotic, the insider threat is real and
we must be vigilant in our efforts to thwart it.

Deterring - - ANSWER -We defend against the damage insider threats can cause by
deterring insiders from becoming threats. DoD and Federal policies require agencies to
establish Insider Threat Programs aimed at deterring, detecting, and mitigating the risks
associated with insider threats. Their activities include:

Proactively identifying insiders who exhibit potential risk indicators through:
o User activity monitoring
o Workplace reporting

Formulating holistic mitigation responses to decrease risk while achieving positive
outcomes for the organization and the individual. For example:
o Referring individuals to counseling or other types of assistance to alleviate personal
stressors
o Requiring training on security protocols
o Developing organization-wide protocols designed to secure information, resources,
and personnel

Detecting - - ANSWER -We detect insider threats by using our powers of observation to
recognize potential insider threat indicators. These include, but are not limited to:

• Difficult life circumstances
o Divorce or death of spouse
o Alcohol or other substance misuse or dependence
o Untreated mental health issues
o Financial difficulties
• Extreme, persistent interpersonal difficulties
• Hostile or vindictive behavior

Geschreven voor

Instelling
DOD Cyber Awareness
Vak
DOD Cyber Awareness

Documentinformatie

Geüpload op
18 januari 2026
Aantal pagina's
27
Geschreven in
2025/2026
Type
Tentamen (uitwerkingen)
Bevat
Vragen en antwoorden

Onderwerpen

$21.99
Krijg toegang tot het volledige document:

Verkeerd document? Gratis ruilen Binnen 14 dagen na aankoop en voor het downloaden kun je een ander document kiezen. Je kunt het bedrag gewoon opnieuw besteden.
Geschreven door studenten die geslaagd zijn
Direct beschikbaar na je betaling
Online lezen of als PDF

Maak kennis met de verkoper

Seller avatar
De reputatie van een verkoper is gebaseerd op het aantal documenten dat iemand tegen betaling verkocht heeft en de beoordelingen die voor die items ontvangen zijn. Er zijn drie niveau’s te onderscheiden: brons, zilver en goud. Hoe beter de reputatie, hoe meer de kwaliteit van zijn of haar werk te vertrouwen is.
biggdreamer Havard School
Volgen Je moet ingelogd zijn om studenten of vakken te kunnen volgen
Verkocht
282
Lid sinds
2 jaar
Aantal volgers
67
Documenten
18355
Laatst verkocht
5 dagen geleden

4.0

45 beoordelingen

5
25
4
7
3
7
2
2
1
4

Recent door jou bekeken

Waarom studenten kiezen voor Stuvia

Gemaakt door medestudenten, geverifieerd door reviews

Kwaliteit die je kunt vertrouwen: geschreven door studenten die slaagden en beoordeeld door anderen die dit document gebruikten.

Niet tevreden? Kies een ander document

Geen zorgen! Je kunt voor hetzelfde geld direct een ander document kiezen dat beter past bij wat je zoekt.

Betaal zoals je wilt, start meteen met leren

Geen abonnement, geen verplichtingen. Betaal zoals je gewend bent via iDeal of creditcard en download je PDF-document meteen.

Student with book image

“Gekocht, gedownload en geslaagd. Zo makkelijk kan het dus zijn.”

Alisha Student

Bezig met je bronvermelding?

Maak nauwkeurige citaten in APA, MLA en Harvard met onze gratis bronnengenerator.

Bezig met je bronvermelding?

Veelgestelde vragen