DOD Cyber Awareness Challenge 2019: Knowledge Check Questions - Quizzes Studymoose (2024)

question

What should you do after you have ended a call from a reporter asking you to confirm potentially classified info found on the web?

answer

Alert your security point of contact.

question

Which of the following actions is appropriate after finding classified Government information on the internet?

answer

Note any identifying information and the website's URL.

question

Which of these is true of unclassified data?

answer

Its classification level may rise when aggregated.

question

What type of information includes personal, payroll, medical, and operational information?

answer

Sensitive

question

What is the best protection method for sharing Personally Identifiable Information (PII)?

answer

Digitally sign and encrypt the email.

question

Which of the following is NOT a typical result from running malicious code?

answer

Disables cookies.

question

Which of the following is a practice that helps to protect you from identity theft?

answer

Ordering a credit report annually.

question

Which of the following describes an appropriate use of Government email?

answer

Molly uses a digital signature when sending attachments or hyperlinks.

question

Which of the following is true of Internet hoaxes?

answer

They can be part of a distributed denial-of-service (DDoS) attack.

question

Which of the following is a practice that helps to prevent the download of viruses and other malicious code when checking your email?

answer

Do not access links or hyperlinked media such as buttons and graphics in email messages.

question

Upon connecting your Government-issued laptop to a public wireless connection, what should you immediately do?

answer

Connect to the Government Virtual Private Network (VPN).

question

Under what circ*mstances is it acceptable to check personal email on Government-furnished equipment (GFE)?

answer

If your organization allows it.

question

When checking in at the airline counter for a business trip...

answer

Decline so that you maintain physical contact of your Government-issued laptop.

question

A man you do not know is trying to look at your Government-issued phone and has asked to use it. What should you do?

answer

Decline to lend the man your phone.

question

How can you protect your information when using wireless technology?

answer

Avoid using non-Bluetooth-paired or unencrypted wireless computer peripherals.

question

What kind of information could reasonably be expected to cause serious damage to national security in the event of unauthorized disclosure?

answer

Top Secret

question

A colleague has visited several foreign countries recently...

answer

. 2 indicators

question

Which of the following is NOT considered a potential insider threat indicator?

answer

New interest in learning a foreign language.

question

When would be a good time to post your vacation location and dates on your social networking website?

answer

When you return from your vacation.

question

Which of the following statements is TRUE about the use of DoD Public Key Infrastructure (PKI) tokens?

answer

Always use DoD PKI tokens within their designated classification level.

question

How should you protect your Common Access Card (CAC) or Personal Identity Verification (PIV) card?

answer

Store it in a shielded sleeve to avoid chip cloning.

question

What do you do if spillage occurs?

answer

?

question

Which of the following does NOT constitute spillage?

answer

Classified information that should be unclassified and is downgraded

question

Which of the following is NOT an appropriate way to protect against inadvertent spillage?

answer

Use the classified network for all work, including unclassified work

question

Which of the following should you NOT do if you find classified information on the internet?

answer

Download the information

question

Which of the following is NOT true concerning a computer labeled SECRET?

answer

May be used on an unclassified network

question

What kind of information could reasonably be expected to cause serious damage to national security in the event of unauthorized disclosure?

answer

Secret

question

What advantages do "insider threats" have over others that allows them to be able to do extraordinary damage to their organizations?

answer

They are trusted and have authorized access to Government information systems.

question

Which of the following should be reported as a potential security incident?

answer

A coworker removes sensitive information without authorization.

question

A colleague complains about anxiety and exhaustion, makes coworkers uncomfortable by asking excessive questions about classified projects, and complains about the credit card bills that his wife runs up. How many potential insider threat indicators does this employee display?

answer

3 or more indicators

question

In addition to avoiding the temptation of greed to betray his country, what should Alex do differently?

answer

Avoid talking about work outside of the workplace or with people without a need-to-know

question

How many insider threat indicators does Alex demonstrate?

answer

Three or more

question

What should Alex's colleagues do?

answer

Report the suspicious behavior in accordance with their organization's insider threat policy

question

What information most likely presents a security risk on your personal social networking profile?

answer

Personal email address

question

Select all sections of the profile that contain an issue. Then select Submit. [Alex Smith]

answer

All three sections

question

Select the appropriate setting for each item. Then select Save. [Alex Smith/Social Media]

answer

Name and profile picture - Any (depends on personal preference)Biographical data - Friends Only;Status, photos, and posts - Friends Only;Family and relationships - Friends Only;Birthday - Friends Only;Photos and videos you are in - Friends Only;Check in location via GPS - Off

question

Which of the following is NOT a correct way to protect sensitive information?

answer

Sensitive information may be stored on any password-protected system.

question

Is it permitted to share an unclassified draft document with a non-DoD professional discussion group?

answer

As long as the document is cleared for public release, you may share it outside of DoD.

question

Which type of information includes personal, payroll, medical, and operational information?

answer

Sensitive

question

After clicking on a link on a website, a box pops up and asks if you want to run an application. Is it okay to run it?

answer

No. Only allow mobile code to run from your organization or your organization's trusted sites.

question

Which of the following represents a good physical security practice?

answer

Use your own security badge, key code, or Common Access Card (CAC)/Personal Identity Verification (PIC) card.

question

Which of the following statements is TRUE about the use of DoD Public Key Infrastructure (PKI) tokens?

answer

Always use DoD PKI tokens within their designated classification level.

question

What is the best way to protect your Common Access Card (CAC) or Personal Identity Verification (PIV) card?

answer

Maintain possession of it at all times.

question

Which of the following is a best practice for handling cookies?

answer

?

question

Select all security issues. Then select Submit. [Isabel/Website Use]

answer

Top and bottom sections only

question

You receive an email at your official Government email address from an individual at the Office of Personnel Management (OPM). The email provides a link to a personnel portal where you must enter your personal information as part of an effort to standardize recordkeeping. What action should you take first?

answer

Look for a digital signature on the email.

question

You receive an email from the Internal Revenue Service (IRS) demanding immediate payment of back taxes of which you were not aware. The email provides a website and a toll-free number where you can make payment. What action should you take?

answer

Contact the IRS using their publicly available, official contact information.

question

Which email attachments are generally SAFE to open?

answer

Attachments contained in a digitally signed email from someone known

question

Which of the following is NOT true of traveling overseas with a mobile phone?

answer

?

question

What should Sara do when using publicly available Internet, such as hotel Wi-Fi?

answer

Only connect with the Government VPN

question

What is the danger of using public Wi-Fi connections?

answer

Both of these

question

A coworker has asked if you want to download a programmer's game to play at work. What should be your response?

answer

I'll pass.

question

While you are waiting for your lunch bill, a stranger picks up your Government-issued phone from your table and proceeds to exit the facility with it. What should you do?

answer

Try to observe the direction taken and any other useful information and immediately make a report to your security point of contact.

question

Mobile devices include fitness bands, tablets, smartphones, electronic readers, and Bluetooth- enabled devices.

answer

True

question

Which of the following is a best practice for securing your home computer?

answer

Use antivirus software and keep it up to date.

question

Which of the following is true of protecting classified data?

answer

Classified material must be appropriately marked

question

A colleague has won 10 high-performance awards, can be playful and charming, is not currently in a relationship, and is occasionally aggressive in trying to access sensitive information. How many potential insider threat indicators does this employee display?

answer

1 indicator

question

You receive a friend request from someone in Germany that you meet casually at a conference last year?

answer

Decline Request

question

In setting up your personal social networking service account, what email address should you use?

answer

Your personal email address

question

Which of the following is the example of Personally Identifiable Information (PII)?

answer

Date of Birth

question

Which is it appropriate to have your security badge visible within a Sensitive Compartmented Information Facility (SCIF)

answer

At all times when in the facility

question

What actions should you take upon hearing a discussion involving Sensitive Compartmented Information (SCI) while seated in a cafeteria within an SCI Facility (SCIF)?

answer

Remind those involved that such discussions should not take place in common area within a SCIF

question

What portable electronic devices (PEDs) are permitted in a Sensitive Comnpartmented Information Facility (SCIF)?

answer

Government -owned PEDs expressly authorized by your Agency

question

Which of the following is NOT a typical means for spreading malicious code?

answer

Patching from a trusted source

question

What is TRUE of a phishing attack?

answer

Phishing can be an email with a hyperlink as bait

question

You receive an unexpected email from a friend: "I think you'll like this: https://tinyurl.com/2fcbvy." What action should you take?

answer

Use TinyURL's preview feature to investigate where the link leads

question

When using your Government-issued laptop in public environments, with which of the following should you be concerned?

answer

The potential for unauthorized viewing of work-related information displayed on your screen

question

When checking in at the airline counter for a business trip, you are asked if you would like to check your laptop bag. This bag contains your Government-issued laptop. What should you do?

answer

Decline so that you maintain physical control of your Government-issued laptop

1 of 69

Unlock all answers in this set

Unlock answers (65)

question

What should you do after you have ended a call from a reporter asking you to confirm potentially classified info found on the web?

answer

Alert your security point of contact.

question

Which of the following actions is appropriate after finding classified Government information on the internet?

answer

Note any identifying information and the website's URL.

question

Which of these is true of unclassified data?

answer

Its classification level may rise when aggregated.

question

What type of information includes personal, payroll, medical, and operational information?

answer

Sensitive

question

What is the best protection method for sharing Personally Identifiable Information (PII)?

answer

Digitally sign and encrypt the email.

question

Which of the following is NOT a typical result from running malicious code?

answer

Disables cookies.

question

Which of the following is a practice that helps to protect you from identity theft?

answer

Ordering a credit report annually.

question

Which of the following describes an appropriate use of Government email?

answer

Molly uses a digital signature when sending attachments or hyperlinks.

question

Which of the following is true of Internet hoaxes?

answer

They can be part of a distributed denial-of-service (DDoS) attack.

question

Which of the following is a practice that helps to prevent the download of viruses and other malicious code when checking your email?

answer

Do not access links or hyperlinked media such as buttons and graphics in email messages.

question

Upon connecting your Government-issued laptop to a public wireless connection, what should you immediately do?

answer

Connect to the Government Virtual Private Network (VPN).

question

Under what circ*mstances is it acceptable to check personal email on Government-furnished equipment (GFE)?

answer

If your organization allows it.

question

When checking in at the airline counter for a business trip...

answer

Decline so that you maintain physical contact of your Government-issued laptop.

question

A man you do not know is trying to look at your Government-issued phone and has asked to use it. What should you do?

answer

Decline to lend the man your phone.

question

How can you protect your information when using wireless technology?

answer

Avoid using non-Bluetooth-paired or unencrypted wireless computer peripherals.

question

What kind of information could reasonably be expected to cause serious damage to national security in the event of unauthorized disclosure?

answer

Top Secret

question

A colleague has visited several foreign countries recently...

answer

. 2 indicators

question

Which of the following is NOT considered a potential insider threat indicator?

answer

New interest in learning a foreign language.

question

When would be a good time to post your vacation location and dates on your social networking website?

answer

When you return from your vacation.

question

Which of the following statements is TRUE about the use of DoD Public Key Infrastructure (PKI) tokens?

answer

Always use DoD PKI tokens within their designated classification level.

question

How should you protect your Common Access Card (CAC) or Personal Identity Verification (PIV) card?

answer

Store it in a shielded sleeve to avoid chip cloning.

question

What do you do if spillage occurs?

answer

?

question

Which of the following does NOT constitute spillage?

answer

Classified information that should be unclassified and is downgraded

question

Which of the following is NOT an appropriate way to protect against inadvertent spillage?

answer

Use the classified network for all work, including unclassified work

question

Which of the following should you NOT do if you find classified information on the internet?

answer

Download the information

question

Which of the following is NOT true concerning a computer labeled SECRET?

answer

May be used on an unclassified network

question

What kind of information could reasonably be expected to cause serious damage to national security in the event of unauthorized disclosure?

answer

Secret

question

What advantages do "insider threats" have over others that allows them to be able to do extraordinary damage to their organizations?

answer

They are trusted and have authorized access to Government information systems.

question

Which of the following should be reported as a potential security incident?

answer

A coworker removes sensitive information without authorization.

question

A colleague complains about anxiety and exhaustion, makes coworkers uncomfortable by asking excessive questions about classified projects, and complains about the credit card bills that his wife runs up. How many potential insider threat indicators does this employee display?

answer

3 or more indicators

question

In addition to avoiding the temptation of greed to betray his country, what should Alex do differently?

answer

Avoid talking about work outside of the workplace or with people without a need-to-know

question

How many insider threat indicators does Alex demonstrate?

answer

Three or more

question

What should Alex's colleagues do?

answer

Report the suspicious behavior in accordance with their organization's insider threat policy

question

What information most likely presents a security risk on your personal social networking profile?

answer

Personal email address

question

What information most likely presents a security risk on your personal social networking profile?

answer

?

question

Select all sections of the profile that contain an issue. Then select Submit. [Alex Smith]

answer

All three sections

question

Select the appropriate setting for each item. Then select Save. [Alex Smith/Social Media]

answer

Name and profile picture - Any (depends on personal preference)Biographical data - Friends Only;Status, photos, and posts - Friends Only;Family and relationships - Friends Only;Birthday - Friends Only;Photos and videos you are in - Friends Only;Check in location via GPS - Off

question

Which of the following is NOT a correct way to protect sensitive information?

answer

Sensitive information may be stored on any password-protected system.

question

Is it permitted to share an unclassified draft document with a non-DoD professional discussion group?

answer

As long as the document is cleared for public release, you may share it outside of DoD.

question

Which type of information includes personal, payroll, medical, and operational information?

answer

Sensitive

question

After clicking on a link on a website, a box pops up and asks if you want to run an application. Is it okay to run it?

answer

No. Only allow mobile code to run from your organization or your organization's trusted sites.

question

Which of the following represents a good physical security practice?

answer

Use your own security badge, key code, or Common Access Card (CAC)/Personal Identity Verification (PIC) card.

question

Which of the following statements is TRUE about the use of DoD Public Key Infrastructure (PKI) tokens?

answer

Always use DoD PKI tokens within their designated classification level.

question

What is the best way to protect your Common Access Card (CAC) or Personal Identity Verification (PIV) card?

answer

Maintain possession of it at all times.

question

Which of the following is a best practice for handling cookies?

answer

?

question

Select all security issues. Then select Submit. [Isabel/Website Use]

answer

Top and bottom sections only

question

You receive an email at your official Government email address from an individual at the Office of Personnel Management (OPM). The email provides a link to a personnel portal where you must enter your personal information as part of an effort to standardize recordkeeping. What action should you take first?

answer

Look for a digital signature on the email.

question

You receive an email from the Internal Revenue Service (IRS) demanding immediate payment of back taxes of which you were not aware. The email provides a website and a toll-free number where you can make payment. What action should you take?

answer

Contact the IRS using their publicly available, official contact information.

question

Which email attachments are generally SAFE to open?

answer

Attachments contained in a digitally signed email from someone known

question

Which of the following is NOT true of traveling overseas with a mobile phone?

answer

?

question

What should Sara do when using publicly available Internet, such as hotel Wi-Fi?

answer

Only connect with the Government VPN

question

What is the danger of using public Wi-Fi connections?

answer

Both of these

question

A coworker has asked if you want to download a programmer's game to play at work. What should be your response?

answer

I'll pass.

question

While you are waiting for your lunch bill, a stranger picks up your Government-issued phone from your table and proceeds to exit the facility with it. What should you do?

answer

Try to observe the direction taken and any other useful information and immediately make a report to your security point of contact.

question

Mobile devices include fitness bands, tablets, smartphones, electronic readers, and Bluetooth- enabled devices.

answer

True

question

Which of the following is a best practice for securing your home computer?

answer

Use antivirus software and keep it up to date.

question

Which of the following is true of protecting classified data?

answer

Classified material must be appropriately marked

question

A colleague has won 10 high-performance awards, can be playful and charming, is not currently in a relationship, and is occasionally aggressive in trying to access sensitive information. How many potential insider threat indicators does this employee display?

answer

1 indicator

question

You receive a friend request from someone in Germany that you meet casually at a conference last year?

answer

Decline Request

question

In setting up your personal social networking service account, what email address should you use?

answer

Your personal email address

question

Which of the following is the example of Personally Identifiable Information (PII)?

answer

Date of Birth

question

Which is it appropriate to have your security badge visible within a Sensitive Compartmented Information Facility (SCIF)

answer

At all times when in the facility

question

What actions should you take upon hearing a discussion involving Sensitive Compartmented Information (SCI) while seated in a cafeteria within an SCI Facility (SCIF)?

answer

Remind those involved that such discussions should not take place in common area within a SCIF

question

What portable electronic devices (PEDs) are permitted in a Sensitive Comnpartmented Information Facility (SCIF)?

answer

Government -owned PEDs expressly authorized by your Agency

question

Which of the following is NOT a typical means for spreading malicious code?

answer

Patching from a trusted source

question

What is TRUE of a phishing attack?

answer

Phishing can be an email with a hyperlink as bait

question

You receive an unexpected email from a friend: "I think you'll like this: https://tinyurl.com/2fcbvy." What action should you take?

answer

Use TinyURL's preview feature to investigate where the link leads

question

When using your Government-issued laptop in public environments, with which of the following should you be concerned?

answer

The potential for unauthorized viewing of work-related information displayed on your screen

question

When checking in at the airline counter for a business trip, you are asked if you would like to check your laptop bag. This bag contains your Government-issued laptop. What should you do?

answer

Decline so that you maintain physical control of your Government-issued laptop

DOD Cyber Awareness Challenge 2019: Knowledge Check Questions - Quizzes Studymoose (2024)

References

Top Articles
Latest Posts
Article information

Author: Edwin Metz

Last Updated:

Views: 5839

Rating: 4.8 / 5 (58 voted)

Reviews: 81% of readers found this page helpful

Author information

Name: Edwin Metz

Birthday: 1997-04-16

Address: 51593 Leanne Light, Kuphalmouth, DE 50012-5183

Phone: +639107620957

Job: Corporate Banking Technician

Hobby: Reading, scrapbook, role-playing games, Fishing, Fishing, Scuba diving, Beekeeping

Introduction: My name is Edwin Metz, I am a fair, energetic, helpful, brave, outstanding, nice, helpful person who loves writing and wants to share my knowledge and understanding with you.