Geschreven door studenten die geslaagd zijn Direct beschikbaar na je betaling Online lezen of als PDF Verkeerd document? Gratis ruilen 4,6 TrustPilot
logo-home
Tentamen (uitwerkingen)

DOD CYBER AWARENESS (KNOWLEDGE CHECK) EXAM Q&A

Beoordeling
-
Verkocht
-
Pagina's
5
Cijfer
A+
Geüpload op
18-01-2026
Geschreven in
2025/2026

DOD CYBER AWARENESS (KNOWLEDGE CHECK) EXAM Q&A

Instelling
DOD Cyber Awareness
Vak
DOD Cyber Awareness

Voorbeeld van de inhoud

DOD CYBER AWARENESS
(KNOWLEDGE CHECK) EXAM Q&A
(Classified Data)
Who designates whether information is classification level? - ANSWER -Original
classification authority

(Classified Data)
Which of the following must you do before using an unclassified laptop and peripherals
in a collateral classified environment? - ANSWER -Ensure that any cameras,
microphones, and Wi-Fi embedded in the laptop are physically disabled

(Classified Data)
Which of the following is a good practice to protect classified information? - ANSWER -
Don't assume open storage in a secure facility is authorized

(Classified Data)
What is the basis for the handling and storage of classified data? - ANSWER -
Classification markings and handling caveats

(Insider Threat)
Based on the description that follows, how many potential insider threat indicator(s) are
displayed? A colleague abruptly becomes hostile and unpleasant after previously
enjoying positive working relationship with peers, purchases an unusually expensive
new car, and has unexplained absences from work. - ANSWER -3 or more indicators

(Insider Threat)
Which scenario might indicate a reportable insider threat? - ANSWER -A colleague
removes sensitive information without seeking authorization in order to perform
authorized telework.

(Insider Threat)
Which of the following is a reportable insider threat activity? - ANSWER -Attempting to
access sensitive information without need-to-know

(Insider Threat)
Which of the following is a potential insider threat indicator? - ANSWER -Unusual
interest in classified information

(Insider Threat)
What is an insider threat? - ANSWER -Someone who uses authorized access, wittingly
or unwittingly, to harm national security through unauthorized disclosure or other actions
that may cause the loss or degradation of resources or capabilities.

, (Social Networking)
How can you protect your organization on social networking sites? - ANSWER -Ensure
there are no identifiable landmarks visible in any photos taken in a work setting that you
post

(Social Networking)
Which of the following statements is true? - ANSWER -Adversaries exploit social
networking sites to disseminate fake news.

(Social Networking)
When may you be subject to criminal, disciplinary, and/or administrative action due to
online harassment, bullying, stalking, hazing, discrimination, or retaliation? - ANSWER -
If you participate in or condone it at any time

(Controlled Unclassified Information)
Which of the following is true of Protected Health Information (PHI)? - ANSWER -It is
created or received by a healthcare provider, health plan, or employer.

(Controlled Unclassified Information)
Which is a best practice for protecting Controlled Unclassified Information (CUI)? -
ANSWER -Store it in a locked desk drawer after working hours

(Controlled Unclassified Information)
Which designation marks information that does not have potential to damage national
security? - ANSWER -Unclassified

(Controlled Unclassified Information)
Which of the following is NOT an example of Personally Identifiable Information (PII)? -
ANSWER -High school attended

(Controlled Unclassified Information)
Which of the following is true of Controlled Unclassified Information (CUI)? - ANSWER -
CUI must be handled using safeguarding or dissemination controls.

(Controlled Unclassified Information)
Which designation includes Personally Identifiable Information (PlI) and Protected
Health Information (PHI)? - ANSWER -Controlled Unclassified Information (CUI)

(Controlled Unclassified Information)
Which of the following is a security best practice for protecting Personally Identifiable
Information (PII)? - ANSWER -Only use Government-furnished or Government-
approved equipment to process
PIl.

(Spillage)

Geschreven voor

Instelling
DOD Cyber Awareness
Vak
DOD Cyber Awareness

Documentinformatie

Geüpload op
18 januari 2026
Aantal pagina's
5
Geschreven in
2025/2026
Type
Tentamen (uitwerkingen)
Bevat
Vragen en antwoorden

Onderwerpen

$16.99
Krijg toegang tot het volledige document:

Verkeerd document? Gratis ruilen Binnen 14 dagen na aankoop en voor het downloaden kun je een ander document kiezen. Je kunt het bedrag gewoon opnieuw besteden.
Geschreven door studenten die geslaagd zijn
Direct beschikbaar na je betaling
Online lezen of als PDF

Maak kennis met de verkoper

Seller avatar
De reputatie van een verkoper is gebaseerd op het aantal documenten dat iemand tegen betaling verkocht heeft en de beoordelingen die voor die items ontvangen zijn. Er zijn drie niveau’s te onderscheiden: brons, zilver en goud. Hoe beter de reputatie, hoe meer de kwaliteit van zijn of haar werk te vertrouwen is.
biggdreamer Havard School
Volgen Je moet ingelogd zijn om studenten of vakken te kunnen volgen
Verkocht
282
Lid sinds
2 jaar
Aantal volgers
67
Documenten
18358
Laatst verkocht
18 uur geleden

4.0

45 beoordelingen

5
25
4
7
3
7
2
2
1
4

Recent door jou bekeken

Waarom studenten kiezen voor Stuvia

Gemaakt door medestudenten, geverifieerd door reviews

Kwaliteit die je kunt vertrouwen: geschreven door studenten die slaagden en beoordeeld door anderen die dit document gebruikten.

Niet tevreden? Kies een ander document

Geen zorgen! Je kunt voor hetzelfde geld direct een ander document kiezen dat beter past bij wat je zoekt.

Betaal zoals je wilt, start meteen met leren

Geen abonnement, geen verplichtingen. Betaal zoals je gewend bent via iDeal of creditcard en download je PDF-document meteen.

Student with book image

“Gekocht, gedownload en geslaagd. Zo makkelijk kan het dus zijn.”

Alisha Student

Bezig met je bronvermelding?

Maak nauwkeurige citaten in APA, MLA en Harvard met onze gratis bronnengenerator.

Bezig met je bronvermelding?

Veelgestelde vragen