Geschreven door studenten die geslaagd zijn Direct beschikbaar na je betaling Online lezen of als PDF Verkeerd document? Gratis ruilen 4,6 TrustPilot
logo-home
Tentamen (uitwerkingen)

CYBER AWARENESS KNOWLEDGE CHECK – QUIZ QUESTIONS WITH COMPLETE ANSWERS

Beoordeling
-
Verkocht
-
Pagina's
11
Geüpload op
21-01-2026
Geschreven in
2025/2026

CYBER AWARENESS KNOWLEDGE CHECK – QUIZ QUESTIONS WITH COMPLETE ANSWERS

Instelling
DOD Cyber Awareness
Vak
DOD Cyber Awareness

Voorbeeld van de inhoud

CYBER AWARENESS KNOWLEDGE
CHECK – QUIZ QUESTIONS WITH
COMPLETE ANSWERS
Which of the following can an unauthorized disclosure of information classified as
Confidential reasonably be expected to cause? - ANSWER -Damage to national
security

Which classification level is given to information that could reasonably be expected to
cause serious damage to national security? - ANSWER -Secret

When classified data is not in use, how can you protect it? - ANSWER -Store classified
data appropriately in a GSA-approved vault/container when not in use.

Which is a good practice to protect classified information? - ANSWER -Ensure proper
labeling by appropriately marking all classified material and, when required, sensitive
material.
-OR-
Don't assume open storage in a secure facility is authorized.

Which of the following is a good practice to aid in preventing spillage? - ANSWER -Be
aware of classification markings and all handling caveats.

What is required for an individual to access classified data? - ANSWER -Appropriate
clearance; signed and approved non-disclosure agreement; and need-to-know.

What type of activity or behavior should be reported as a potential insider threat? -
ANSWER -Coworker making consistent statements indicative of hostility or anger
toward the United States and its policies.

Which of the following practices reduces the chance of becoming a target by
adversaries seeking insider information? - ANSWER -Don't talk about work outside your
workspace unless it is a specifically designated public meeting environment and is
controlled by the event planners.

Which scenario might indicate a reportable insider threat security incident? - ANSWER -
A coworker is observed using a personal electronic device in an area where their use is
prohibited.

Why might "insiders" be able to cause damage to their organizations more easily than
others? - ANSWER -Insiders are given a level of trust and have authorized access to
Government information systems.

, Which of the following is a best practice to protect information about you and your
organization on social networking sites and applications? - ANSWER -Use only
personal contact information when establishing personal social networking accounts,
never use Government contact information.


How many potential insider threat indicators does a person who is married with two
children, vacations at the beach every year, is pleasant to work with, but sometimes has
poor work quality display? - ANSWER -0 indicators

What is the best response if you find classified government data on the internet? -
ANSWER -Note any identifying information, such as the website's URL, and report the
situation to your security POC.

After reading an online story about a new security project being developed on the
military installation where you work, your neighbor asks you to comment about the
article. You know this project is classified. What should be your response? - ANSWER -
Attempt to change the subject to something non-work related, but neither confirm nor
deny the article's authenticity.

What is a proper response if spillage occurs? - ANSWER -Immediately notify your
security POC.

What should you do if a reporter asks you about potentially classified information on the
web? - ANSWER -Ask for information about the website, including the URL.

A user writes down details from a report stored on a classified system marked as Secret
and uses those details to draft an unclassified briefing on an unclassified system without
authorization. What is the best choice to describe what has occurred? - ANSWER -
Spillage because classified data was moved to a lower classification level system
without authorization.

How many potential insider threat indicators does a coworker who often makes others
uneasy by being persistent in trying to obtain information about classified projects to
which he has no access, is boisterous about his wife putting them in credit card debt,
and often complains about anxiety and exhaustion display? - ANSWER -3 or more
indicators

What should you do if an individual asks you to let her follow you into your controlled
space, stating that she left her security badge at her desk? - ANSWER -Don't allow her
access into secure areas and report suspicious activity.

Which represents a security best practice when using social networking? - ANSWER -
Understanding and using available privacy settings.

Geschreven voor

Instelling
DOD Cyber Awareness
Vak
DOD Cyber Awareness

Documentinformatie

Geüpload op
21 januari 2026
Aantal pagina's
11
Geschreven in
2025/2026
Type
Tentamen (uitwerkingen)
Bevat
Onbekend

Onderwerpen

$18.99
Krijg toegang tot het volledige document:

Verkeerd document? Gratis ruilen Binnen 14 dagen na aankoop en voor het downloaden kun je een ander document kiezen. Je kunt het bedrag gewoon opnieuw besteden.
Geschreven door studenten die geslaagd zijn
Direct beschikbaar na je betaling
Online lezen of als PDF

Maak kennis met de verkoper

Seller avatar
De reputatie van een verkoper is gebaseerd op het aantal documenten dat iemand tegen betaling verkocht heeft en de beoordelingen die voor die items ontvangen zijn. Er zijn drie niveau’s te onderscheiden: brons, zilver en goud. Hoe beter de reputatie, hoe meer de kwaliteit van zijn of haar werk te vertrouwen is.
biggdreamer Havard School
Volgen Je moet ingelogd zijn om studenten of vakken te kunnen volgen
Verkocht
282
Lid sinds
2 jaar
Aantal volgers
67
Documenten
18355
Laatst verkocht
6 dagen geleden

4.0

45 beoordelingen

5
25
4
7
3
7
2
2
1
4

Recent door jou bekeken

Waarom studenten kiezen voor Stuvia

Gemaakt door medestudenten, geverifieerd door reviews

Kwaliteit die je kunt vertrouwen: geschreven door studenten die slaagden en beoordeeld door anderen die dit document gebruikten.

Niet tevreden? Kies een ander document

Geen zorgen! Je kunt voor hetzelfde geld direct een ander document kiezen dat beter past bij wat je zoekt.

Betaal zoals je wilt, start meteen met leren

Geen abonnement, geen verplichtingen. Betaal zoals je gewend bent via iDeal of creditcard en download je PDF-document meteen.

Student with book image

“Gekocht, gedownload en geslaagd. Zo makkelijk kan het dus zijn.”

Alisha Student

Bezig met je bronvermelding?

Maak nauwkeurige citaten in APA, MLA en Harvard met onze gratis bronnengenerator.

Bezig met je bronvermelding?

Veelgestelde vragen