Written by students who passed Immediately available after payment Read online or as PDF Wrong document? Swap it for free 4.6 TrustPilot
logo-home
Exam (elaborations)

Latest Cyber Awareness Challenge Knowledge Check 100% Pass.

Rating
-
Sold
-
Pages
3
Grade
A+
Uploaded on
07-01-2024
Written in
2023/2024

Which of the following actions is appropriate after finding classified Government information on the internet? - ANSWER Note any identifying information and the website's URL Which of the following may help to prevent inadvertent spillage? - ANSWER Label all files, removable media, and subject headers with appropriate classification markings. A colleague asks to leave a report containing protected health information (PHI) on his desk overnight so he can continue working on it the next day. How do you respond? - ANSWER tell your colleague that it needs to be secured in a cabinet or container Which of the following is NOT an example of sensitive information? - ANSWER press release data What does Personally Identifiable information (PII) include? - ANSWER Social Security Number, date and place of birth, mother's maiden name What is an indication that malicious code is running on your system? - ANSWER file corruption Which of the following is true of protecting classified data? - ANSWER Classified material must be appropriately marked. What is required for an individual to access classified data? - ANSWER Appropriate clearance; signed and approved non-disclosure agreement; and need-to-know. Which of the following should be reported as a potential security incident? - ANSWER A coworker removes sensitive information without authorization What are some potential insider threat indicators? - ANSWER difficult life circumstances such as substance abuse, divided loyalty or allegiance to the U.S., and extreme, persistent interpersonal difficulties Which of the following is not considered a potential insider threat indicator? - ANSWER treated mental health issues When is the best time to post details of your vacation activities on your social networking website? - ANSWER When your vacation is over, and you have returned home. Which of the following is a best practice to protect information about you and your organization on social networking sites and applications? - ANSWER Use only personal contact information when establishing personal social networking accounts, never use Government contact information. You have reached the office door to exit your controlled area. As a security best practice, what should you do before exiting? - ANSWER Remove your security badge, common access card (CAC), or personal identity verification (PIV) card. What certificates are contained on the Common Access Card (CAC)? - ANSWER Identification, encryption, and digital signature How should you protect your Common Access Card (CAC) or Personal Identity Verification (PIV) card? - ANSWER Store it in a shielded sleeve to avoid chip cloning. Which is it appropriate to have your security badge visible within a Sensitive Compartmented Information Facility (SCIF) - ANSWER At all times when in the facility What are the requirements to be granted access to sensitive compartmented information (SCI)? - ANSWER The proper security clearance and indoctrination into the SCI program Which is a risk associated with removable media? - ANSWER Spillage of classified information. While you are registering for a conference, you arrive at the website registration. What should you do? - ANSWER Since the URL does not start with "https," do not provide your credit card information. What helps protect from spear phishing? - ANSWER be wary of suspicious e-mails that use your name and/or appear to come from inside your organization. What is a way to prevent the download of viruses and other malicious code when checking your e-mail? - ANSWER View email in plain text and don't view email in Preview Pane. Which of the following is a practice that helps to prevent the download of viruses and other malicious code when checking your email? - ANSWER Do not access links or hyperlinked media such as buttons and graphics in email messages. What is best practice while traveling with mobile computing devices? - ANSWER Maintain possession of your laptop and other government-furnished equipment (GFE) at all times.

Show more Read less
Institution
Cyber Awareness Challenge Knowledge Check
Course
Cyber Awareness Challenge Knowledge Check








Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
Cyber Awareness Challenge Knowledge Check
Course
Cyber Awareness Challenge Knowledge Check

Document information

Uploaded on
January 7, 2024
Number of pages
3
Written in
2023/2024
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

$9.49
Get access to the full document:

Wrong document? Swap it for free Within 14 days of purchase and before downloading, you can choose a different document. You can simply spend the amount again.
Written by students who passed
Immediately available after payment
Read online or as PDF

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
contenthive76 Teachme2-tutor
Follow You need to be logged in order to follow users or courses
Sold
65
Member since
2 year
Number of followers
34
Documents
1934
Last sold
2 months ago

2.8

5 reviews

5
1
4
1
3
1
2
0
1
2

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Working on your references?

Create accurate citations in APA, MLA and Harvard with our free citation generator.

Working on your references?

Frequently asked questions