eLearning (NEL)
*Spillage
After reading an online story about a new security project being developed on the
military installation where you work, your neighbor asks you to comment about the
article. You know that this project is classified. How should you respond? - answer
Attempt to change the subject to something non-work related, but neither confirm nor
deny the article's authenticity
*Spillage
Which of the following may help to prevent spillage? - answer Label all files,
removable media, and subject headers with appropriate classification markings.
*Spillage
A user writes down details marked as Secret from a report stored on a classified system
and uses those details to draft a briefing on an unclassified system without
authorization. What is the best choice to describe what has occurred? - answer
Spillage because classified data was moved to a lower classification level system
without authorization.
*Spillage
What should you do when you are working on an unclassified system and receive an
email with a classified attachment? - answer Call your security point of contact
immediately
*Spillage
What should you do if a reporter asks you about potentially classified information on the
web? - answer Ask for information about the website, including the URL.
*Spillage
.What should you do if a reporter asks you about potentially classified information on the
web? - answer Refer the reporter to your organization's public affairs office.
*Spillage
What should you do if you suspect spillage has occurred? - answer Immediately notify
your security point of contact
*Spillage
Which of the following is a good practice to prevent spillage? - answer Be aware of
classification markings and all handling caveats.
*Spillage
Which of the following actions is appropriate after finding classified information on the
Internet? - answer Note any identifying information and the website's Uniform
Resource Locator (URL)
**Classified Data
, DOD Cyber Awareness 2022 Knowledge Check / Navy
eLearning (NEL)
When classified data is not in use, how can you protect it? - answer Store classified
data appropriately in a GSA-approved vault/container.
**Classified Data
What is required for an individual to access classified data? - answer Appropriate
clearance, a signed and approved non-disclosure agreement, and need-to-know
**Classified Data
Which classification level is given to information that could reasonably be expected to
cause serious damage to national security? - answer Secret
**Classified Data
Which of the following is a good practice to protect classified information? - answer
Ensure proper labeling by appropriately marking all classified material and, when
required, sensitive material
**Classified Data
Which of the following is true of protecting classified data? - answer Classified
material must be appropriately marked.
**Classified Data
What level of damage can the unauthorized disclosure of information classified as
Confidential reasonably be expected to cause? - answer Damage to national security
**Classified Data
Which of the following is true of telework? - answer You must have permission from
your organization.
**Classified Data
Which type of information could reasonably be expected to cause serious damage to
national security if disclosed without authorization? - answer Secret
**Classified Data
How should you protect a printed classified document when it is not in use? - answer
Store it in a General Services Administration (GSA)-approved vault or container
**Insider Threat
Based on the description that follows, how many potential insider threat indicator(s) are
displayed? A colleague vacations at the beach every year, is married and a father of
four, sometimes has poor work quality, and works well with his team. - answer ~0
indicator
**Insider Threat
How many potential insider threat indicators does a coworker who often makes others
uneasy by being persistent in trying to obtain information about classified projects to