DoD Cyber Awareness (Knowledge Check)
Study online at https://quizlet.com/_ece8au
1. (Spillage) Always check to make sure you are using the
Which of the following is a good practice to correct network for the level of data
prevent spillage?
2. (Spillage) Information improperly moved from a
What does "spillage" refer to? higher protection level to a lower protection
level
3. (Spillage) Follow procedures for transferring data to
Which of the following may help to prevent and from outside agency and non-Govern-
spillage? ment networks
4. (Spillage) Refer the vendor to the appropriate per-
A vendor conducting a pilot program with sonnel
your organization contacts you for organi-
zational data to use in a prototype. How
should you respond?
5. (Spillage) Refer to reporter to your organization's
You receive an inquiry from a reporter public affairs office
about government information not cleared
for public release. How should you re-
spond?
6. (Spillage) Note the website's URL and report the situ-
You find information that you know to be ation to your security point of contact
classified on the Internet. What should you
do?
7. (Classified Data) Original classification authority
Who designates whether information is
classification level?
1/7
, DoD Cyber Awareness (Knowledge Check)
Study online at https://quizlet.com/_ece8au
8. (Classified Data) Ensure that any cameras, microphones, and
Which of the following must you do before Wi-Fi embedded in the laptop are physical-
using an unclassified laptop and peripher- ly disabled
als in a collateral classified environment?
9. (Classified Data) Don't assume open storage in a secure fa-
Which of the following is a good practice to cility is authorized
protect classified information?
10. (Classified Data) Classification markings and handling
What is the basis for the handling and stor- caveats
age of classified data?
11. (Insider Threat) 3 or more indicators
Based on the description that follows, how
many potential insider threat indicator(s)
are displayed? A colleague abruptly be-
comes hostile and unpleasant after pre-
viously enjoying positive working relation-
ship with peers, purchases an unusually ex-
pensive new car, and has unexplained ab-
sences from work.
12. (Insider Threat) A colleague removes sensitive information
Which scenario might indicate a reportable without seeking authorization in order to
insider threat? perform authorized telework.
13. (Insider Threat) Attempting to access sensitive information
Which of the following is a reportable insid- without need-to-know
er threat activity?
14. Unusual interest in classified information
2/7
Study online at https://quizlet.com/_ece8au
1. (Spillage) Always check to make sure you are using the
Which of the following is a good practice to correct network for the level of data
prevent spillage?
2. (Spillage) Information improperly moved from a
What does "spillage" refer to? higher protection level to a lower protection
level
3. (Spillage) Follow procedures for transferring data to
Which of the following may help to prevent and from outside agency and non-Govern-
spillage? ment networks
4. (Spillage) Refer the vendor to the appropriate per-
A vendor conducting a pilot program with sonnel
your organization contacts you for organi-
zational data to use in a prototype. How
should you respond?
5. (Spillage) Refer to reporter to your organization's
You receive an inquiry from a reporter public affairs office
about government information not cleared
for public release. How should you re-
spond?
6. (Spillage) Note the website's URL and report the situ-
You find information that you know to be ation to your security point of contact
classified on the Internet. What should you
do?
7. (Classified Data) Original classification authority
Who designates whether information is
classification level?
1/7
, DoD Cyber Awareness (Knowledge Check)
Study online at https://quizlet.com/_ece8au
8. (Classified Data) Ensure that any cameras, microphones, and
Which of the following must you do before Wi-Fi embedded in the laptop are physical-
using an unclassified laptop and peripher- ly disabled
als in a collateral classified environment?
9. (Classified Data) Don't assume open storage in a secure fa-
Which of the following is a good practice to cility is authorized
protect classified information?
10. (Classified Data) Classification markings and handling
What is the basis for the handling and stor- caveats
age of classified data?
11. (Insider Threat) 3 or more indicators
Based on the description that follows, how
many potential insider threat indicator(s)
are displayed? A colleague abruptly be-
comes hostile and unpleasant after pre-
viously enjoying positive working relation-
ship with peers, purchases an unusually ex-
pensive new car, and has unexplained ab-
sences from work.
12. (Insider Threat) A colleague removes sensitive information
Which scenario might indicate a reportable without seeking authorization in order to
insider threat? perform authorized telework.
13. (Insider Threat) Attempting to access sensitive information
Which of the following is a reportable insid- without need-to-know
er threat activity?
14. Unusual interest in classified information
2/7