Written by students who passed Immediately available after payment Read online or as PDF Wrong document? Swap it for free 4.6 TrustPilot
logo-home
Exam (elaborations)

DOD Cyber Awareness 2022 Knowledge Check

Rating
-
Sold
-
Pages
10
Grade
A+
Uploaded on
24-06-2022
Written in
2021/2022

How many potential insider threat indicators does a person who is married with two children, vacations at the beach every year, is pleasant to work with, but sometimes has poor work quality display? 0 indicators What is the best response if you find classified government data on the internet? Note any identifying information, such as the website's URL, and report the situation to your security POC.

Show more Read less
Institution
Course

Content preview

DOD Cyber Awareness 2022 Knowledge
Check
How many potential insider threat indicators does a person who is married with two
children, vacations at the beach every year, is pleasant to work with, but sometimes has
poor work quality display? - ANSWER 0 indicators

What is the best response if you find classified government data on the internet? -
ANSWER Note any identifying information, such as the website's URL, and report the
situation to your security POC.

After reading an online story about a new security project being developed on the
military installation where you work, your neighbor asks you to comment about the
article. You know this project is classified. What should be your response? - ANSWER
Attempt to change the subject to something non-work related, but neither confirm nor
deny the article's authenticity.

What is a proper response if spillage occurs? - ANSWER Immediately notify your
security POC.

What should you do if a reporter asks you about potentially classified information on the
web? - ANSWER Ask for information about the website, including the URL.

A user writes down details from a report stored on a classified system marked as Secret
and uses those details to draft an unclassified briefing on an unclassified system without
authorization. What is the best choice to describe what has occurred? - ANSWER
Spillage because classified data was moved to a lower classification level system
without authorization.

How many potential insider threat indicators does a coworker who often makes others
uneasy by being persistent in trying to obtain information about classified projects to
which he has no access, is boisterous about his wife putting them in credit card debt,
and often complains about anxiety and exhaustion display? - ANSWER 3 or more
indicators

Which of the following can an unauthorized disclosure of information classified as
Confidential reasonably be expected to cause? - ANSWER Damage to national security

Which classification level is given to information that could reasonably be expected to
cause serious damage to national security? - ANSWER Secret

, When classified data is not in use, how can you protect it? - ANSWER Store classified
data appropriately in a GSA-approved vault/container when not in use.

Which is a good practice to protect classified information? - ANSWER Ensure proper
labeling by appropriately marking all classified material and, when required, sensitive
material.

Which of the following is a good practice to aid in preventing spillage? - ANSWER Be
aware of classification markings and all handling caveats.

What is required for an individual to access classified data? - ANSWER Appropriate
clearance; signed and approved non-disclosure agreement; and need-to-know.

What type of activity or behavior should be reported as a potential insider threat? -
ANSWER Coworker making consistent statements indicative of hostility or anger toward
the United States and its policies.

Which of the following practices reduces the chance of becoming a target by
adversaries seeking insider information? - ANSWER Don't talk about work outside your
workspace unless it is a specifically designated public meeting environment and is
controlled by the event planners.

Which scenario might indicate a reportable insider threat security incident? - ANSWER
A coworker is observed using a personal electronic device in an area where their use is
prohibited.

Why might "insiders" be able to cause damage to their organizations more easily than
others? - ANSWER Insiders are given a level of trust and have authorized access to
Government information systems.

Which of the following is a best practice to protect information about you and your
organization on social networking sites and applications? - ANSWER Use only personal
contact information when establishing personal social networking accounts, never use
Government contact information.

What should you do if an individual asks you to let her follow you into your controlled
space, stating that she left her security badge at her desk? - ANSWER Don't allow her
access into secure areas and report suspicious activity.

Which represents a security best practice when using social networking? - ANSWER
Understanding and using available privacy settings.

Which is NOT a sufficient way to protect your identity? - ANSWER Use a common
password for all your system and application logons.

Written for

Course

Document information

Uploaded on
June 24, 2022
Number of pages
10
Written in
2021/2022
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

$11.49
Get access to the full document:

Wrong document? Swap it for free Within 14 days of purchase and before downloading, you can choose a different document. You can simply spend the amount again.
Written by students who passed
Immediately available after payment
Read online or as PDF

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
millyphilip West Virginia University
Follow You need to be logged in order to follow users or courses
Sold
2921
Member since
4 year
Number of followers
1958
Documents
44266
Last sold
2 hours ago
white orchid store

EXCELLENCY IN ACCADEMIC MATERIALS ie exams, study guides, testbanks ,case, case study etc

3.6

551 reviews

5
239
4
87
3
104
2
32
1
89

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Working on your references?

Create accurate citations in APA, MLA and Harvard with our free citation generator.

Working on your references?

Frequently asked questions