Prepare for your exams
Study with the several resources on Docsity
Earn points to download
Earn points by helping other students or get them with a premium plan
Guidelines and tips
Prepare for your exams
Study with the several resources on Docsity
Search through all study resources
Earn points to download
Earn points by helping other students or get them with a premium plan
All the ways to get free points
Study Opportunities
Search for study opportunitiesNEWConnect with the world's best universities and choose your course of studyCommunity
Ask the communityAsk the community for help and clear up your study doubts University RankingsDiscover the best universities in your country according to Docsity usersFree resources
Our save-the-student-ebooks!Download our free guides on studying techniques, anxiety management strategies, and thesis advice from Docsity tutorsFrom our blog
Exams and StudyGo to the blog
A.T. Still University of Health Sciences (ATSU)Cybercrime, Cybersecurity and Data Privacy
DOD Cyber Awareness 2023/2024 Exam Solutions
Typology: Exams
2022/2023
Available from 05/15/2023
expertee 🇺🇸
3
(26)
3.4K documents
1 / 9
Often downloaded together
DOD CYBER AWARENESS CHALLENGE KNOWLEDGE CHECK 2023
DOD Cyber Awareness Challenge 2023/2024 RATED A+
Related documents
DOD Cyber Awareness 2023-2024 Exam Solutions
DOD Cyber Awareness 2023-2024 Exam Solutions
DOD Cyber Awareness 2023/2024 Exam Solutions Latest….
DOD Cyber Awareness 2023/2024 Exam Solutions Latest….
DOD Cyber Awareness 2023/2024 Exam Solutions Latest….
DOD Cyber Awareness 2023/2024 Exam Solutions Latest….
DOD Cyber Awareness 2024 Exam Questions with Answers Latest Solutions
DOD Cyber Awareness 2024 Exam Questions with Answers Latest Solutions
Cyber Awareness 2023 Graded A+Cyber Awareness 2023 Graded A+
DOD Cybersecurity Awareness Challenge Knowledge Check 2023/2024
Cyber Awareness questions and answers latest 2023-2024
Cyber Awareness 2023/2024 Graded A+
DOD CYBER AWARENESS EXAM QUESTIONS AND ANSWERS 2023/2024 BEST GRADED A+
Cyber Awareness Test Quiz Latest Update 2023/2024 GRADED A+
Cyber Awareness Challenge 228questions and answers 2023/2024 Rated A+
Cyber Awareness Challenge Latest update 2024 Rated A+ Cyber Awareness Challenge 2024
DOD Cyber Awareness Challenge 2024 DOD Cyber Awareness Challenge LATEST UPDATE 2024
Cyber Awareness Challenge 2023-2024 Version New Latest Version with All Questions
Cyber Awareness Challenge Exam Review 2024.
DOD CYBER AWARENESS CHALLENGE 2022/2023/2024 QUESTIONS AND ANSWERS ALL ANSWERS VERIFIED AN
Cyber Awareness 2023 Rated A+
Cyber Awareness 2023 Graded A+
Cyber Awareness Challenge Exam Review 2022/2023
Cyber Awareness Challenge 2024
Cybersecurity Awareness Exam Questions and Answers 2024.
Cyber Awareness Challenge 2024 Knowledge Check exam
Partial preview of the text
Download DOD Cyber Awareness 2023/2024 Exam Solutions and more Exams Cybercrime, Cybersecurity and Data Privacy in PDF only on Docsity! DOD Cyber Awareness 2023/2024 Exam Solutions 1. A vendor conducting a pilot program with your organization contacts you for organizational data to use in a prototype. How should you respond? - ✓✓✓Refer the vendor to the appropriate personnel. 2. When classified data is not in use, how can you protect it? - ✓✓✓Store classified data appropriately in a GSA-approved vault/container. 3. What is the basis for handling and storage of classified data? - ✓✓✓Classification markings and handling caveats. 4. Which of the following must you do before using an unclassified laptop and peripherals in a collateral classified environment? - ✓✓✓Ensure that any cameras, microphones, and Wi-Fi embedded in the laptop are physically disabled. 5. What level of damage to national security can you reasonably expect Top secret information to cause if disclosed? - ✓✓✓Exceptionally grave damage. 6. Which of the following is true about telework? - ✓✓✓You must have your organization's permission to telework. 7. Which of the following is true of protecting classified data? - ✓✓✓Classified material must be appropriately marked. 8. Which of the following is a reportable insider threat activity? - ✓✓✓Attempting to access sensitive information without need-to-know. 9. Which scenario might indicate a reportable insider threat? - ✓✓✓a colleague removes sensitive information without seeking authorization in order to perform authorized telework. P a g e 1 | 9 10. Which of the following is a potential insider threat indicator? - ✓✓✓1) Unusual interest in classified information. 2) Difficult life circ*mstances, such as death of spouse. 11. Which piece of information is safest to include on your social media profile? - ✓✓✓Your favorite movie. 12. Which of the following statements is true? - ✓✓✓Many apps and smart devices collect and share your personal information and contribute to your online identity. 13. How can you protect your organization on social networking sites? - ✓✓✓Ensure there are no identifiable landmarks visible in any photos taken in a work setting that you post. 14. Which is a best practice for protecting Controlled Unclassified Information (CUI)? - ✓✓✓Store it in a locked desk drawer after working hours. 15. Which of the following best describes a way to safely transmit Controlled Unclassified Information (CUI)? - ✓✓✓Paul verifies that the information is CUI, includes a CUI marking in the subject header, and digitally signs an e-mail containing CUI. 16. Which designation includes Personally Identifiable Information (PII) and Protected Health Information (PHI)? - ✓✓✓Controlled Unclassified Information (CUI) 17. Which of the following is NOT an example of CUI? - ✓✓✓Press release data. 18. Which of the following is NOT a correct way to protect CUI? - ✓✓✓CUI may be stored on any password-protected system. 19. Which of the following best describes good physical security? - ✓✓✓Lionel stops an individual in his secure area who is not wearing a badge. P a g e 2 | 9 40. What should the owner of this printed SCI do differently? - ✓✓✓Retrieve classified documents promptly from printers. 41. What should the participants in this conversation involving SCI do differently? - ✓✓✓Physically assess that everyone within listening distance is cleared and has a need- to-know for the information being discussed. 42. Which of the following demonstrates proper protection of mobile devices? - ✓✓✓Linda encrypts all of the sensitive data on her government-issued mobile devices. 43. Which of the following does NOT constitute spillage? - ✓✓✓Classified information that should be unclassified and is downgraded. 44. Which of the following is NOT an appropriate way to protect against inadvertent spillage? - ✓✓✓Use the classified network for all work, including unclassified work. 45. Which of the following should you NOT do if you find classified information on the internet? - ✓✓✓Download the information. 46. Who designates whether information is classified and its classification level? - ✓✓✓ 47. Which of the following is a good practice to protect classified information? - ✓✓✓ 48. Which of the following may help to prevent spillage? - ✓✓✓Follow procedures for transferring data to and from outside agency and non-government networks. 49. Who designates whether information is classified and its classification level? - ✓✓✓Original classification authority. P a g e 5 | 9 50. In addition to avoiding the temptation of greed to betray his country, what should Alex do differently? - ✓✓✓Avoid talking about work outside of the workplace or with people without a need-to-know. 51. How many insider threat indicators does Alex demonstrate? - ✓✓✓Three or more. 52. What should Alex's colleagues do? - ✓✓✓Report the suspicious behave in accordance with their organization's threat policy. 53. Which of the following is true? - ✓✓✓Digitally signed e-mails are more secure. 54. Which of the following best describes the conditions under which mobile devices and applications can track your location? - ✓✓✓It is often the default but can be prevented by disabling the location function. 55. When is it okay to charge a personal mobile device using government-furnished equipment (GFE)? - ✓✓✓This is never okay. 56. Which of the following demonstrates proper protection of mobile devices? - ✓✓✓Linda encrypts all of the sensitive data on her government-issued mobile devices. 57. What security risk does a public Wi-Fi connection pose? - ✓✓✓It may prohibit the use of a virtual private network (VPN). 58. Which of the following represents an ethical use of your Government-furnished equipment (GFE)? - ✓✓✓Checking personal e-mail when allowed by your organization. 59. When may you be subject to criminal, disciplinary, and/or administrative action due to online harassment, bullying, stalking, hazing, discrimination, or retaliation? - ✓✓✓If you participate in or condone it at any time. P a g e 6 | 9 60. How can you protect yourself on social networking sites? - ✓✓✓Validate friend requests through another source through another source before confirming them. 61. Which piece of information is safest to include on your social media profile? - ✓✓✓Photos of your pet. 62. Which of the following is true of removable media and portable electronic devices (PEDs)? - ✓✓✓They have similar features, and the same rules and protections apply to both. 63. Which of the following is a security best practice for protecting Personally Identifiable Information (PII)? - ✓✓✓Only use Government-approved equipment to process PII. 64. Which of the following is true of Controlled Unclassified Information (CUI)? - ✓✓✓CUI must be handled using safeguarding or dissemination controls. 65. Which Cyber Protection Condition (CPCON) establishes a protection priority focus on critical functions only? - ✓✓✓CPCON 1. 66. Which of the following is true of the Common Access Card (CAC) or Personal Identity Verification (PIV) card? - ✓✓✓You should remove and take your CAC/PIV card whenever you leave your workstation. 67. Which of the following is an example of a strong password? - ✓✓✓%2ZN=Ugq 68. A compromise of Sensitive Compartmented Information (SCI) occurs when a person who does not have the required clearance or access caveats comes into possession of SCI________. - ✓✓✓in any manner. 69. Which of the following is a good practice to protest classified information? - ✓✓✓Don't assume open storage in a secure facility is authorized. P a g e 7 | 9
Documents
questions
University
Sell documents
Seller's Handbook
About us
Career
Contact us
Partners
How does Docsity work
Koofers
Español
Italiano
English
Srpski
Polski
Русский
Português
Français
Deutsch
United Kingdom
United States of America
India
Sitemap Resources
Sitemap Latest Documents
Sitemap Languages and Countries
Copyright © 2024 Ladybird Srl - Via Leonardo da Vinci 16, 10126, Torino, Italy - VAT 10816460017 - All rights reserved