Prepare for your exams
Get points
Guidelines and tips
Sell on Docsity
Prepare for your exams
Study with the several resources on Docsity
Earn points to download
Earn points by helping other students or get them with a premium plan
Guidelines and tips
Prepare for your exams
Study with the several resources on Docsity
Search through all study resources
Earn points to download
Earn points by helping other students or get them with a premium plan
All the ways to get free points
Study Opportunities
Search for study opportunitiesNEWConnect with the world's best universities and choose your course of studyCommunity
Ask the communityAsk the community for help and clear up your study doubts University RankingsDiscover the best universities in your country according to Docsity usersFree resources
Our save-the-student-ebooks!Download our free guides on studying techniques, anxiety management strategies, and thesis advice from Docsity tutorsFrom our blog
Exams and StudyGo to the blog
A.T. Still University of Health Sciences (ATSU)Cybercrime, Cybersecurity and Data Privacy
Summary Cyber Awareness 2022-2023 Knowledge Check (95 Answered questions_ all correct)
Typology: Exams
2022/2023
Available from 03/28/2023
expertee 🇺🇸
3.1
(24)
3.3K documents
1 / 9
Related documents
Summary Cyber Awareness 2022-2023 Knowledge Check (95 Answered questions_ all correct)
Summary Cyber Awareness 2022-2023 Knowledge Check (95 Answered questions_ all correct)
DOD CYBER AWARENESS CHALLENGE KNOWLEDGE CHECK 2023
DOD Cybersecurity Awareness Challenge Knowledge Check 2023/2024
Cyber Awareness Challenge 2024 Knowledge Check exam
Cyber Awareness Challenge 2023 Answers
DOD CYBER AWARENESS CHALLENGE KNOWLEDGE CHECK 2024 ASSESSMENT QUESTIONS WITH ANSWERS
DOD CYBER AWARENESS CHALLENGE KNOWLEDGE CHECK 2024 ASSESSMENT QUESTIONS WITH ANSWERS
Cyber Awareness Challenge 2022 rated A+
DOD CYBER AWARENESS CHALLENGE KNOWLEDGElatest exams updated 2023///
Cyber Awareness Challenge 2022 Rated A+ Assured Success
Cyber Awareness Challenge Exam Review 2022/2023
DOD Cyber Awareness Exam with All Answers 100% Verified 2023 Rated A+
NRNP 6552 Womens Modules Knowledge Check Quiz ALL ANSWERED CORRECTLY AND UPDATED
Cyber Awareness 2023 Graded A+Cyber Awareness 2023 Graded A+
Cyber Awareness Challenge 2024 Answers
DOD Cyber Awareness Challenge 2022
Cyber Awareness Test Quiz Latest Update 2023
NRNP 6566 WEEK 11 KNOWLEDGE CHECK (2022/2023 VERIFIED ANSWERS)
2023-2024 OVERALL PI Knowledge (237 Correctly Answered Terms) Latest Update.
NRNP 6566 WEEK 6 KNOWLEDGE CHECK (LATEST 2022/2023 VERIFIED ANSWERS)
NRNP 6566 WEEK 8 KNOWLEDGE CHECK WITH ANSWERS (LATETS 2022/2023 )
NRNP 6566 WEEK 3 KNOWLEDGE CHECK (LATEST 2022/2023 ALREADY GRADED A)
NRNP 6566 Week 6 Knowledge Check Latest Version Latest 2022/2023
Cyber Awareness Challenge Exams QUESTION WITH CORRECT ANSWER LATEST UPDATED 2023 With ASS
Intermediate Math latest 2022-2023 correct answered
Partial preview of the text
Download Summary Cyber Awareness 2022-2023 Knowledge Check (95 Answered questions_ all correct) and more Exams Cybercrime, Cybersecurity and Data Privacy in PDF only on Docsity! Summary Cyber Awareness 2022-2023 Knowledge Check (95 Answered questions_ all correct) How many potential insider threat indicators does a person who is married with two children, vacations at the beach every year, is pleasant to work with, but sometimes has poor work quality display? 0 indicators What is the best response if you find classified government data on the internet? Note any identifying information, such as the website's URL, and report the situation to your security POC. After reading an online story about a new security project being developed on the military installation where you work, your neighbor asks you to comment about the article. You know this project is classified. What should be your response? Attempt to change the subject to something non-work related, but neither confirm nor deny the article's authenticity. What is a proper response if spillage occurs? Immediately notify your security POC. What should you do if a reporter asks you about potentially classified information on the web? Ask for information about the website, including the URL. A user writes down details from a report stored on a classified system marked as Secret and uses those details to draft an unclassified briefing on an unclassified system without authorization. What is the best choice to describe what has occurred? Spillage because classified data was moved to a lower classification level system without authorization. How many potential insider threat indicators does a coworker who often makes others uneasy by being persistent in trying to obtain information about classified projects to which he has no access, is boisterous about his wife putting them in credit card debt, and often complains about anxiety and exhaustion display? 3 or more indicators Which of the following can an unauthorized disclosure of information classified as Confidential reasonably be expected to cause? Damage to national security P a g e 1 | 9 Which classification level is given to information that could reasonably be expected to cause serious damage to national security? Secret When classified data is not in use, how can you protect it? Store classified data appropriately in a GSA-approved vault/container when not in use. Which is a good practice to protect classified information? Ensure proper labeling by appropriately marking all classified material and, when required, sensitive material. Which of the following is a good practice to aid in preventing spillage? Be aware of classification markings and all handling caveats. What is required for an individual to access classified data? Appropriate clearance; signed and approved non-disclosure agreement; and need-toknow. What type of activity or behavior should be reported as a potential insider threat? Coworker making consistent statements indicative of hostility or anger toward the United States and its policies. Which of the following practices reduces the chance of becoming a target by adversaries seeking insider information? Don't talk about work outside your workspace unless it is a specifically designated public meeting environment and is controlled by the event planners. Which scenario might indicate a reportable insider threat security incident? A coworker is observed using a personal electronic device in an area where their use is prohibited. Why might "insiders" be able to cause damage to their organizations more easily than others? Insiders are given a level of trust and have authorized access to Government information systems. Which of the following is a best practice to protect information about you and your organization on social networking sites and applications? Use only personal contact information when establishing personal social networking accounts, never use Government contact information. What should you do if an individual asks you to let her follow you into your controlled space, stating that she left her security badge at her desk? Don't allow her access into secure areas and report suspicious activity. P a g e 2 | 9 What is the best description of two-factor authentication? Something you possess, like a CAC, and something you know, like a PIN or password. What certificates are contained on the DoD Public Key Infrastructure (PKI) implemented by the Common Access Card (CAC)/Personal Identity Verification (PIV) card? Identification, encryption, and digital signature What are the requirements to be granted access to SCI material? The proper security clearance and indoctrination into the SCI program. What is a protection against internet hoaxes? Use online sites to confirm or expose potential hoaxes. What organization issues the directives concerning the dissemination of information regarding intelligence sources, methods, or activities? Department of Defense. Which term describes an event where a person who does not have the required clearance or access caveats comes into possession of Sensitive Compartmented Information (SCI) Compromise What describes a Sensitive Compartmented Information (SCI) program? A program that segregates various type of classified information into distinct compartments for added protection and dissemination for distribution control. What describes how Sensitive Compartmented Information is marked? Approved Security Classification Guide (SCG) What must users do when using removable media within a Sensitive Compartmented Information Facility (SCIF)? Comply with Configuration/Change Management (CM) policies and procedures Which is a risk associated with removable media? Spillage of classified information. What is an indication that malicious code is running on your system? File corruption What are some actions you can take to try to protect your identity? Shred personal documents; never share passwords, and order a credit report annually. Which of the following is an appropriate use of Government e-mail? Digitally signing e-mails that contain attachments or hyperlinks. What is a protection against internet hoaxes? P a g e 5 | 9 Use online sites to confirm or expose potential hoaxes. What can malicious code do? It can cause damage by corrupting files, erasing your hard drive, and/or allowing hackers access. Which is true of cookies? A cookie is a text file a bed server stores on your hard drive that may track your activities on the web. What is a common method used in social engineering? Telephone surveys Which may be a security issue with compressed URLs? There is no way to know where the link actually leads. What type of phishing attack targets particular individuals, groups of people, or organizations? Spear phishing While on vacation, a coworker calls and asks you to access a site to review and approve a document that is hosted behind a DoD Public Key Infrastructure (PKI) protected webpage. You do not have your government-issued laptop. What action should you take? Wait until you have access to your government-issued laptop. Under what circ*mstances is it acceptable to use your Government-furnished computer to check person e-mail and do other non-work-related activities? If allowed by organization policy. Which are examples of portable electronic devices (PEDs)? Thumb drives, memory sticks, and optical disks What are some examples of removable media? Memory sticks, flash drives, or external hard drives What is a valid response when identity theft occurs? Report the crime to local law enforcement. What is a common indicator of a phishing attempt? It includes a threat of dire circ*mstances. What is whaling? A type of phishing targeted at high-level personnel such as senior officials. Upon connecting your Government-issued laptop to a public wireless connection, what should you immediately do? P a g e 6 | 9 Connect to the Government Virtual Private Network (VPN). Which of the following activities is an ethical use of Government-furnished equipment (GFE)? Completing your expense report for your government travel. Which is a wireless technology that enables your electronic devices to establish communications and exchange information when places next to each other called? Near field communication (NFC) Which of the following helps protect data on your personal mobile devices? Secure personal mobile devices to the same level as Government-issued systems. What is a possible indication of a malicious code attack in progress? A pop-up window that flashes and warns that your computer is infected with a virus. What should you do if a commercial entity, such as a hotel reception desk, asks for Government identification so that they can make a photocopy? Do not allow you Common Access Card (CAC) to be photocopied. When is conducting a private money-making venture using your Government-furnished computer permitted? It is never permitted. What is a good practice to protect data on your home wireless systems? Ensure that the wireless security features are properly configured. Which must be approved and signed by a cognizant Original Classification Authority (OCA)? Security Classification Guide (SCG) What portable electronic devices (PEDs) are allowed in a Secure Compartmented Information Facility (SCIF)? Government-owned PEDs, if expressly authorized by your agency. What is a way to prevent the download of viruses and other malicious code when checking your e-mail? View e-mail in plain text and don't view e-mail in Preview Pane. What is a best practice to protect data on your mobile computing device? Lock your device screen when not in use and require a password to reactivate. Which of the following is NOT considered a potential insider threat indicator? New interest in learning a foreign language What advantages do "insider threats" have over others that allows them to cause damage to their organizations more easily? P a g e 7 | 9
Documents
Summaries
Exercises
Exam
Lecture notes
Thesis
Study notes
Schemes
Document Store
View all
questions
Latest questions
Biology and Chemistry
Psychology and Sociology
Management
Physics
University
United States of America (USA)
United Kingdom
India
Sell documents
Seller's Handbook
About us
Career
Contact us
Partners
How does Docsity work
Koofers
Español
Italiano
English
Srpski
Polski
Русский
Português
Français
Deutsch
United Kingdom
United States of America
India
Sitemap Resources
Sitemap Latest Documents
Sitemap Languages and Countries
Copyright © 2024 Ladybird Srl - Via Leonardo da Vinci 16, 10126, Torino, Italy - VAT 10816460017 - All rights reserved