Cyber Awareness Challenge

0.0(0)
Studied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/28

encourage image

There's no tags or description

Looks like no tags are added yet.

Last updated 3:43 PM on 4/23/26
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

29 Terms

1
New cards

Which of the following is a good practice to aid in preventing spillage?

Be aware of classification markings and all handling caveats.

2
New cards

What is the best response if you find classified government data on the internet?

Note any identifying information, such as the website's URL, and report the situation to your security POC.

3
New cards

What is required for an individual to access classified data?

Appropriate clearance; signed and approved non-disclosure agreement; and need-to-know

4
New cards
5
New cards

When classified data is not in use, how can you protect it?

store classified data appropriately in a GSA- approved vault/container when not in use.

6
New cards

which of the following practices reduces the chance of becoming a target by adversaries seeking information?

Don't talk about work outside your workspace unless it is a specifically designated public meeting environment and is controlled by the event planners

7
New cards

Why might "insiders' be able to cause damage to their organizations more easily than others?

Insiders are given a level of trust and have authorized access to government information systems.

8
New cards

Which scenario might indicate a reportable insider threat security incident?

A coworker is observed using a personal electronic device in an area where their use is prohibited.

9
New cards

which represents a security best practice when using social networking?

Understanding and using all available privacy settings.

10
New cards

When is the best time to post details of your vacation activities on your social networking website?

When your vacation is over, and you have returned home.

11
New cards

What must you do when e-mailing Personally Identifiable Information (PII) or Protected Health Information (PHI)?

Encrypt the e-mail and use your Government e-mail account.

12
New cards

What is the best example of Protected Health information (PHI)?

Your health insurance explanation of benefits (EOB).

13
New cards

Under what circumstances could unclassified information be considered a threat to national security?

If aggregated, the information could become classified.

14
New cards

What is a good practice for physical security?

Challenge people without proper badges.

15
New cards

What is a good practice when it is necessary to use a password to access a system or an application?

Avoid using the same password between systems or applications.

16
New cards

Whats is the best description of two-factor authentication?

Something you possess, like a CAC, and something you know, like a PIN or password.

17
New cards

What are the requirements to be granted access to SCI material?

The proper security clearance and indoctrination into the SCI program.

18
New cards

What organization issues the directives concerning the dissemination of information regarding intelligence sources, methods, or activities?

The Director of National Intelligence.

19
New cards

Which is a risk associated with removable media?

Spillage of classified information.

20
New cards

What can malicious code do?

it can cause damage by corrupting files, erasing your hard drive, and/or allowing hackers access.


21
New cards

What is a valid response when identity theft occurs?

Report the crime to local law enforcement.

22
New cards

Which may be a security issue with compressed URLs?

They may be used to mask malicious intent.

23
New cards

What helps protect from spear phishing?

Be wary of suspicious e-mails that use your name and/or appear to come from inside your organization.

24
New cards

What is whaling?

A type of phishing targeted at high-end personnel such as senior officials.

25
New cards

Upon connecting your Government-issued laptop to a public wireless connection, what should you immediately do?

Connect to the Government Virtual Private Network (VPN).

26
New cards

Under what circumstances is it acceptable to use your Government-furnished computer to check personal e-mail and do other non-work related activities?

If allowed by organizational policy.

27
New cards

Which is a wireless technology that enables your electronic devices to establish communications and exchange information when placed next to each other called?

Near field communication (NFC).

28
New cards

Which is a rule for removable media, other portable electronic devices (PEDs), and mobile computing devices to protect Government systems?

Do not use any personally owned/non-organizational removable media on your organization's systems.

29
New cards

What is a good practice to protect data on your home wireless systems?

Ensure that the wireless security features are properly configured.