Pasing Grades
  • Start Selling
  • Blog
  • Contact
  • 0

    Your cart is empty!

English

  • English
  • Spanish
  • Arabic
Create Account Sign In
  • Library
    • New Prep Guides
    • Featured Prep Guides
    • Free Exam Prep Guides
    • Best sellers
  • General
  • Nursing
    • Research Paper
    • Case Study
    • Discussion Post
    • Assignment
    • Exam
    • Practice Questions and Answers
    • Test Bank
    • solutions manual
  • Accounting
    • Case Study
    • Thesis
    • Study Guide
    • Summary
    • Research Paper
    • test bank
  • English
    • Creative Writing
    • Research Paper
    • Summary
    • Rhetorics
    • Literature
    • Journal
    • Exam
    • Grammar
    • Discussion Post
    • Essay
  • Psychology
    • Hesi
    • Presentation
    • Essay
    • Summary
    • Study Guide
    • Essay
    • Solution Manual
    • Final Exam Review
    • Class Notes
    • test bank
  • Business
    • Lecture Notes
    • Solution Manual
    • Presentation
    • Business Plan
    • Class Notes
    • Experiment
    • Summary
    • Practice Questions
    • Study Guide
    • Case Study
    • test bank
    • Exam
  • More
    • Computer Science
    • Economics
    • Statistics
    • Engineering
    • Biology
    • Religious Studies
    • Physics
    • Chemistry
    • Mathematics
    • History
    • Sociology
    • Science
    • Philosophy
    • Law
  • Pages
    • About Us
    • Selling Tips
    • Delivery Policy
    • Faq
    • Privacy Policy
  • Flash Sale
  • Home
  • Blog

DOD Cyber Awareness Challenge 2022 (NEW)

DOD Cyber Awareness Challenge 2022 (NEW)

DOD Cyber Awareness Challenge 2022 (NEW)

Last updated 17 August 2022

0

3127

 

Cyber Awareness Challenge 

PART ONE

1. *Spillage

Which of the following may help to prevent spillage?: Label all files, removable media, and subject headers with appropriate classification markings.

 

2. *Spillage

Which of the following actions is appropriate after finding classified informa- tion on the internet?: Note any identifying information and the website's Uniform Resource Locator (URL)

 

3. *Classified Data

Which of the following individuals can access classified data?: Darryl is managing a project that requires access to classified information. He has the appropriate clearance and a signed, approved, non-disclosure agreement.

 

4. *Insider Threat

Which type of behavior should you report as a potential insider threat?: Hos- tility and anger toward the United States and its policies

 

5. *Insider Threat

Which of the following practices may reduce your appeal as a target for adversaries seeking to exploit your insider status?: Remove your security badge after leaving your controlled area or office building

 

6. *Social Networking

Your cousin posted a link to an article with an incendiary headline on social media. What action should you take?: Research the source of the article to evaluate its credibility and reliability

 

7. *Social Networking

Which of the following is a security best practice when using social network- ing sites?: Use only your personal contact information when establishing your account

 

8. *Controlled Unclassified Information

Select the information on the data sheet that is personally identifiable infor- mation (PII) but not protected health information (PHI): Jane Jones

Social Security Number: 123-45-6789

 

9. *Controlled Unclassified Information

Select the information on the data sheet that is protected health information

(PHI): Interview: Dr. Nora Baker

Dr. Baker was Ms. Jones's psychiatrist for three months. Dr. Baker reports that the sessions addressed Ms. Jones's depression, which poses no national security risk

10. *Physical Security

Which Cyber Protection Condition (CPCON) establishes a protection priority focus on critical and essential functions only?: CPCON 2

 

11. *Identity Management

What certificates does the Common Access Card (CAC) or Personal Identity

Verification (PIV) card contain?: Identification, encryption, digital signature

 

12. *Identity Management

What is the best way to protect your Common Access Card (CAC) or Personal

Identity Verification (PIV) card?: Maintain possession of it at all times

 

13. *Sensitive Compartmented Information

When faxing Sensitive Compartmented Information (SCI), what actions should you take?: Mark SCI documents, appropriately and use an approved SCI fax machine

 

14. *Sensitive Compartmented Information

When is it appropriate to have your security badge visible within a Sensitive

Compartmented Information Facility (SCIF)?: At all times while in the facility

 

15. *Removable Media in a SCIF

What action should you take when using removable media in a Sensitive Compartmented Information Facility (SCIF)?: Identify and disclose it with local Configuration/Change Management Control and Property Management authori- ties

 

16. *Malicious Code

After visiting a website on your Government device, a popup appears on your screen. The popup asks if you want to run an application. Is this

safe?: No, you should only allow mobile code to run from your organization or your organization's trusted sites

 

17. *Malicious Code

Which of the following statements is true of cookies?: You should only accept cookies from reputable, trusted websites

 

18. *Website Use

What action should you take with an e-mail from a friend containing a compressed Uniform Resource Locator (URL)?: Investigate the link's actual destination using the preview feature

 

19. *Website Use

How can you protect yourself from internet hoaxes?: Use online sites to confirm or expose potential hoaxes

 

20. *Social Engineering

What is a common indicator of a phishing attempt?: A threat of dire conse- quences

 

21. *Travel

What security risk does a public Wi-Fi connection pose?: It may expose the connected device to malware

 

22. *Use of GFE

Which of the following represents an ethical use of your Government-fur- nished equipment (GFE)?: E-mailing your co-workers to let them know you are taking a sick day

 

23. *Mobile Devices

What can help to protect the data on your personal mobile device?: Secure it to the same level as Government-issued systems

 

24. *Mobile Devices

Which of the following is an example of removable media?: Flash drive

 

25. *Home Computer Security

Which of the following statements is true of using Internet of Things (IoT) devices in your home?: An unsecured IoT device can become an attack vector to any other device on your home network, including your Government laptop

 

PART TWO

 

1. (Spillage) What should you do if a reporter asks you about potentially classified information on the web?: Refer the reporter to your organization's public affairs office.

 

2. (Spillage) Which of the following is a good practice to aid in preventing spillage?: Be aware of classification markings and all handling caveats.

 

3. (Spillage) After reading an online story about a new security project being developed on the military installation where you work, your neighbor asks you to comment about the article. You know this project is classified. What should be your response?: Attempt to change the subject to something non-work related, but neither confirm nor deny the article's authenticity.

 

4. (Spillage) What should you do when you are working on an unclassified system and receive an email with a classified attachment?: Call your security point of contact immediately.

 

5. (Spillage) What is required for an individual to access classified data?-

: Appropriate clearance; signed and approved non-disclosure agreement; and need-to-know.

 

6. (Spillage) When classified data is not in use, how can you protect it?: Store classified data appropriately in a GSA-approved vault/container.

 

7. (Insider Threat) A colleague vacations at the beach every year, is married and a father of four, his work quality is sometimes poor, and he is pleasant to work with. How many potential insider threat indicators does this employee display?: 0 indicators

 

8. (Insider Threat) Based on the description that follows, how many potential insider threat indicator(s) are displayed? A colleague is playful and charm- ing, consistently wins performance awards, and is occasionally aggressive in trying to access classified information.: 1 indicators

 

9. (Spillage) What type of activity or behavior should be reported as a poten- tial insider threat?: Coworker making consistent statements indicative of hostility or anger toward the United States and its policies.

 

10. (Spillage) What advantages do "insider threats" have over others that allows them to cause damage to their organizations more easily?: Insiders are given a level of trust and have authorized access to Government information systems.

 

11. (Spillage) Which of the following is a best practice to protect information about you and your organization on social networking sites and applica-


 

tions?: Use only personal contact information when establishing personal social networking accounts, never use Government contact information.

 

12. (Spillage) When is the safest time to post details of your vacation activi- ties on your social networking website?: When your vacation is over, after you have returned home

 

13. (social networking) When is the safest time to post details of your va- cation activities on your social networking profile?: After you have returned home following the vacation

 

14. (Spillage) What level of damage can the unauthorized disclosure of infor- mation classified as confidential reasonably be expected to cause?: Damage to national security

 

15. (Spillage) Which type of information could reasonably be expected to cause serious damage to national security if disclosed without authoriza- tion?: Secret

 

16. (Spillage) Which of the following practices may reduce your appeal as a target for adversaries seeking to exploit your insider status?: Remove your security badge after leaving your controlled area or office building.

 

17. (Sensitive Information) What type of unclassified material should always be marked with a special handling caveat?: For Official Use Only (FOUO)

 

18. (Sensitive Information) Which of the following is NOT an example of sensitive information?: Press release data

 

19. (Sensitive Information) Which of the following is true about unclassified data?: When unclassified data is aggregated, its classification level may rise.

 

20. (Sensitive Information) Which of the following represents a good physical security practice?: Use your own security badge, key code, or Common Access Card (CAC)/Personal Identity Verification (PIV) card.

 

21. (Sensitive Information) What certificates are contained on the Common

Access Card (CAC)?: Identification, encryption, and digital signature

 

22. (Sensitive Information) What should you do if a commercial entity, such as a hotel reception desk, asks to make a photocopy of your Common Access Card (CAC) for proof of Federal Government employment?: Do not allow your CAC to be photocopied.

 

23. (Sensitive Compartmented Information) What describes how Sensitive Compartmented Information is marked?: Approved Security Classification Guide (SCG)


 

24. (Sensitive Compartmented Information) Which of the following best de- scribes the compromise of Sensitive Compartmented Information (SCI)?: A person who does not have the required clearance or assess caveats comes into possession of SCI in any manner.

 

25. (Sensitive Compartmented Information) What portable electronic devices (PEDs) are allow in a Secure Compartmented Information Facility (SCIF)?:   - Government-owned PEDs, if expressly authorized by your agency.

 

26. (Malicious Code) What are some examples of malicious code?: Viruses, Trojan horses, or worms

 

27. (Malicious Code) Which of the following is NOT a way that malicious code spreads?: Legitimate software updates

 

28. (Malicious Code) While you are registering for a conference, you arrive at the website http://www.dcsecurityconference.org/registration/. The website requires a credit card for registration. What should you do?: Since the URL does not start with "https," do not provide your credit card information.

 

29. (Malicious Code) Which email attachments are generally SAFE to open?-

: Attachments contained in a digitally signed email from someone known

 

30. (Malicious Code) What is a common indicator of a phishing attempt?: It includes a threat of dire circumstances.

 

31. (Malicious Code) Which of the following is true of Internet hoaxes?: They can be part of a distributed denial-of-service (DDoS) attack.

 

32. (Malicious Code) Upon connecting your Government-issued laptop to a public wireless connection, what should you immediately do?: Connect to the Government Virtual Private Network (VPN).

 

33. (Malicious Code) A coworker has asked if you want to download a pro- grammer's game to play at work. What should be your response?: I'll pass

 

34. (Malicious Code) What are some examples of removable media?: Memory sticks, flash drives, or external hard drives

 

35. (Malicious Code) Which are examples of portable electronic devices (PEDs)?: laptops, fitness bands, tablets, smartphones, electric readers, and Blue- tooth devices

 

36. (Malicious Code) What is a good practice to protect data on your home wireless systems?: Ensure that the wireless security features are properly con- figured.


 

37. (social networking) When may you be subjected to criminal, disciplinary, and/or administrative action due to online misconduct?: If you participate in or condone it at any time

 

38. (social networking) Which of the following is a security best practice when using social networking sites?: Use only personal contact information when establishing your personal account

 

39. (controlled unclassified information) Which of the following is NOT an example of CUI?: press release data

 

40. (controlled unclassified information) Which of the following is NOT cor- rect way to protect CUI?: CUI may be stored on any password-protected system.

 

41. (Physical Security) which Cyberspace Protection Condition (CPCON) establishes a protection priority focus on critical and essential functions only?: (Answer) CPCON 2 (High: Critical and Essential Functions)

-

CPCON 1 (Very High: Critical Functions)

CPCON 3 (Medium: Critical, Essential, and Support Functions) CPCON 4 (Low: All Functions)

CPCON 5 (Very Low: All Functions)

 

42. (Identity Management) What certificates are contained on the Common

Access Card (CAC)?: Identification, encryption, and digital signature

 

43. (Identity Management) Which of the following is an example of two-factor authentication?: Your password and the second commonly includes a text with a code sent to your phone

 

44. (Sensitive Information) What guidance is available from marking Sensi- tive Information information (SCI)?: Security Classification Guide (SCG)

 

45. (Sensitive Information) What must the dissemination of information re- garding intelligence sources, methods, or activities follow?: The Director of National Intelligence.

 

46. (removable media) If an incident occurs involving removable media in

a Sensitive Compartmented Information Facility (SCIF), what action should you take?: Notify your security point of contact

 

47. Which of the following actions can help to protect your identity?: Order a credit report annually

 

48. What is whaling?: Looking at your MOTHER, and screaming "THERE SHE BLOWS!!"


 

(A type of phishing targeted at senior officials) Which is still your FAT A$$ MOTHER!

 

49. Which is a best practice that can prevent viruses and other malicious code from being downloaded when checking your e-mail?: Do not access website links, buttons, or graphics in e-mail

 

50. What type of social engineering targets particular individuals, groups of people, or organizations?: Spear phishing

 

51. (Travel) Which of the following is a concern when using your Govern- ment-issued laptop in public?: Others may be able to view your screen.

 

52. (GFE) When can you check personal e-mail on your Government-fur- nished equipment (GFE)?: If allowed by organizational policy

 

53. (Mobile Devices) Which of the following statements is true?: Mobile de- vices and applications can track your location without your knowledge or consent.

 

54. (Mobile Devices) When can you use removable media on a Government system?: When operationally necessary, owned by your organization, and ap- proved by the appropriate authority

 

55. (Home computer) Which of the following is best practice for securing your home computer?: Create separate accounts for each user

PART THREE

 

1. *Spillage

After reading an online story about a new security project being developed on the military installation where you work, your neighbor asks you to com- ment about the article. You know that this project is classified. How should you respond?: Attempt to change the subject to something non-work related, but neither confirm nor deny the article's authenticity

 

2. *Spillage

Which of the following may help to prevent spillage?: Label all files, removable media, and subject headers with appropriate classification markings.

 

3. *Spillage

A user writes down details marked as Secret from a report stored on a classified system and uses those details to draft a briefing on an unclassified system without authorization. What is the best choice to describe what has occurred?: Spillage because classified data was moved to a lower classification level system without authorization.

 

4. *Spillage

What should you do when you are working on an unclassified system and receive an email with a classified attachment?: Call your security point of contact immediately

 

5. *Spillage

What should you do if a reporter asks you about potentially classified infor- mation on the web?: Ask for information about the website, including the URL.

 

6. *Spillage

.What should you do if a reporter asks you about potentially classified information on the web?: Refer the reporter to your organization's public affairs office.

 

7. *Spillage

What should you do if you suspect spillage has occurred?: Immediately notify your security point of contact

 

8. *Spillage

Which of the following is a good practice to prevent spillage?: Be aware of classification markings and all handling caveats.

 

9. *Spillage

Which of the following actions is appropriate after finding classified informa- tion on the Internet?: Note any identifying information and the website's Uniform Resource Locator (URL)

 10. **Classified Data

When classified data is not in use, how can you protect it?: Store classified data appropriately in a GSA-approved vault/container.

 

11. **Classified Data

What is required for an individual to access classified data?: Appropriate clearance, a signed and approved non-disclosure agreement, and need-to-know

 

12. **Classified Data

Which classification level is given to information that could reasonably be expected to cause serious damage to national security?: Secret

 

13. **Classified Data

Which of the following is a good practice to protect classified information?-

: Ensure proper labeling by appropriately marking all classified material and, when required, sensitive material

 

14. **Classified Data

Which of the following is true of protecting classified data?: Classified mate- rial must be appropriately marked.

 

15. **Classified Data

What level of damage can the unauthorized disclosure of information clas- sified as Confidential reasonably be expected to cause?: Damage to national security

 

16. **Classified Data

Which of the following is true of telework?: You must have permission from your organization.

 

17. **Classified Data

Which type of information could reasonably be expected to cause serious damage to national security if disclosed without authorization?: Secret

 

18. **Classified Data

How should you protect a printed classified document when it is not in use?-

: Store it in a General Services Administration (GSA)-approved vault or container

 

19. **Insider Threat

Based on the description that follows, how many potential insider threat indicator(s) are displayed? A colleague vacations at the beach every year,

is married and a father of four, sometimes has poor work quality, and works well with his team.: ~0 indicator

 

20. **Insider Threat

How many potential insider threat indicators does a coworker who often makes others uneasy by being persistent in trying to obtain information about classified projects to which he has no access, is boisterous about his wife putting them in credit card debt, and often complains about anxiety and exhaustion display?: 3 or more indicators

 

21. **Insider Threat

Based on the description that follows, how many potential insider threat indicator(s) are displayed? A colleague is playful and charming, consistently wins performance awards, and is occasionally aggressive in trying to access classified information.: 1 indicator

 

22. **Insider Threat

What advantages do "insider threats" have over others that allows them to cause damage to their organizations more easily?: Insiders are given a level of trust and have authorized access to Government information systems

 

23. **Insider Threat

What type of activity or behavior should be reported as a potential insider threat?: Coworker making consistent statements indicative of hostility or anger toward the United States in its policies.

 

24. **Insider Threat

Which of the following should be reported as a potential security incident?: A

coworker removes sensitive information without authorization

 

25. **Insider Threat

Which scenario might indicate a reportable insider threat?: A coworker uses a personal electronic device in a secure area where their use is prohibited.

 

26. **Insider Threat

Based on the description that follows, how many potential insider threat indicator(s) are displayed? A colleague often makes others uneasy with her persistent efforts to obtain information about classified project where she has no need-to-know, is vocal about her husband overspending on credit cards, and complains about anxiety and exhaustion.: 3 or more indicators

 

27. **Insider Threat

Which type of behavior should you report as a potential insider threat?: Hos- tility or anger toward the United States and its policies

 

28. **Insider Threat

Which of the following is NOT considered a potential insider threat indica- tor?: Treated mental health issues

29. **Insider Threat

What do insiders with authorized access to information or information sys- tems pose?:

 

30. **Social Networking

When is the safest time to post details of your vacation activities on your social networking profile?: After you have returned home following the vacation

 

31. **Social Networking

What should you do if you receive a game application request that includes permission to access your friends, profile information, cookies, and sites visited?: Decline the request

 

32. **Social Networking

Which of the following information is a security risk when posted publicly on your social networking profile?: Pictures of your pet

Your birthday

Your hobbies

~Your personal e-mail address

 

33. **Social Networking

Which of the following is a security best practice when using social network- ing sites?: Understanding and using the available privacy settings

 

34. **Social Networking

When may you be subject to criminal, disciplinary, and/or administrative action due to online misconduct?: If the online misconduct also occurs offline

~If you participate in or condone it at any time

If you participate in it while using DoD information systems only

If you participate in or condone it during work hours only

 

35. **Social Networking

Which of the following is a security best practice when using social network- ing sites?: Use only your personal contact information when establishing your account

 

36. **Social Networking

Which of the following information is a security risk when posted publicly on your social networking profile?: Your mother's maiden name

 

37. **Social Networking

Your cousin posted a link to an article with an incendiary headline on social media. What action should you take?: Research the source of the article to evaluate its credibility and reliability

 

 

38. **Social Networking

Which of the following best describes the sources that contribute to your online identity?: Data about you collected from all sites, apps, and devices that you use can be aggregated to form a profile of you.

 

39. **Social Networking

As someone who works with classified information, what should you do if you are contacted by a foreign national seeking information on a research project?: Inform your security point of contact

 

40. *Controlled Unclassified Information

Which of the following is NOT an example of CUI?: Press release data

 

41. *Controlled Unclassified Information

Which of the following is NOT a correct way to protect CUI?: CUI may be stored on any password-protected system.

 

42. **Physical Security

What is a good practice for physical security?: Challenge people without proper badges.

 

43. **Physical Security

At which Cyberspace Protection Condition (CPCON) is the priority focus on critical functions only?: CPCON 1

 

44. **Physical Security

Which Cyber Protection Condition (CPCON) is the priority focus on critical and essential functions only?: CPCON 2

 

45. **Physical Security

Within a secure area, you see an individual who you do not know and is not wearing a visible badge. What should you do?: Ask the individual for identification

 

46. **Identity Management

Your DoD Common Access Card (CAC) has a Public Key Infrastructure (PKI) token approved for access to the NIPRNet. In which situation below are you permitted to use your PKI token?: On a NIPRNet system while using it for a PKI-required task

 

47. **Identity Management

Which of the following is the nest description of two-factor authentication?-

: Something you possess, like a CAC, and something you know, like a PIN or password

48. **Identity management

Which is NOT a sufficient way to protect your identity?: Use a common password for all your system and application logons.

 

49. **Identity management

What is the best way to protect your Common Access Card (CAC)?: Maintain possession of it at all times.

 

50. **Identity management

Which of the following is NOT a best practice to preserve the authenticity of your identity?: Write your password down on a device that only you access (e.g., your smartphone)

 

51. **Identity management

Which of the following is an example of two-factor authentication?: Your password and a code you receive via text message

 

52. **Identity management

Which of the following is an example of a strong password?: eA1xy2!P

 

53. *Sensitive Compartmented Information

What is Sensitive Compartmented Information (SCI)?: A program that segre- gates various types of classified information into distinct compartments for added protection and dissemination or distribution control

 

54. *Sensitive Compartmented Information

Which of the following best describes the compromise of Sensitive Compart- mented Information (SCI)?: A person who does not have the required clearance or assess caveats comes into possession of SCI in any manner.

 

55. *Sensitive Compartmented Information

When should documents be marked within a Sensitive Compartmented Information Facility (SCIF): ~All documents should be appropriately marked, regardless of format, sensitivity, or classification.

Unclassified documents do not need to be marked as a SCIF.

Only paper documents that are in open storage need to be marked.

 

56. *Sensitive Compartmented Information

Which must be approved and signed by a cognizant Original Classification

Authority (OCA)?: Security Classification Guide (SCG)

 

57. *Sensitive Compartmented Information

What must the dissemination of information regarding intelligence sources, methods, or activities follow?: Directives issued by the Director of National Intelligence

58. *Sensitive Compartmented Information

When is it appropriate to have your security badge visible?: At all times when in the facility

 

59. *Sensitive Compartmented Information

What should the owner of this printed SCI do differently?: Retrieve classified documents promptly from printers

 

60. *Sensitive Compartmented Information

What should the participants in this conversation involving SCI do different- ly?: Physically assess that everyone within listening distance is cleared and has a need-to-know for the information being discussed

 

61. *Sensitive Compartmented Information

When faxing Sensitive Compartmented Information (SCI), what actions should you take?: Mark SCI documents appropriately and use an approved SCI fax machine

 

62. *Sensitive Compartmented Information

What action should you take if you become aware that Sensitive Compart- mented Information (SCI) has been compromised?: Evaluate the causes of the compromise

 

 

E-mail detailed information about the incident to your security point of contact

(Wrong)

 

 

Assess the amount of damage that could be caused by the compromise

 

 

~Contact your security point of contact to report the incident

 

63. *Sensitive Compartmented Information

What guidance is available for marking Sensitive Compartmented Informa- tion (SCI)?: Security Classification Guides (Wrong)

 

 

~Sensitive Compartmented Information Guides

 

 

Original Classification Authority

 

 

Your supervisor

 

64. **Removable Media in a SCIF

What must users ensure when using removable media such as compact disk

 (CD)?: It displays a label showing maximum classification, date of creation, point of contact, and Change Management 9CM) Control Number.

 

65. **Removable Media in a SCIF

What portable electronic devices (PEDs) are allowed in a Sensitive Compart- mented Information Facility (SCIF)?: Government-owned PEDs when expressly authorized by your agency

 

66. **Removable Media in a SCIF

What action should you take when using removable media in a Sensitive Compartmented Information Facility (SCIF)?: Identify and disclose it with local Configuration/Change Management Control and Property Management authori- ties

 

67. *Malicious Code

What are some examples of malicious code?: Viruses, Trojan horses, or worms

 

68. *Malicious Code

Which of the following is NOT a way that malicious code spreads?: Legitimate software updates

 

69. *Malicious Code

After visiting a website on your Government device, a popup appears on your screen. The popup asks if you want to run an application. Is this

safe?: No, you should only allow mobile code to run from your organization or your organization's trusted sites.

 

70. **Website Use

While you are registering for a conference, you arrive at the website http://www.dcsecurityconference.org/registration/. The website requires a credit card for registration. What should you do?: Since the URL does not start with "https," do not provide you credit card information.

 

71. **Website Use

How should you respond to the theft of your identity?: Report the crime to local law enforcement

 

72. **Website Use

Which of the following statements is true of cookies?: You should only accept cookies from reputable, trusted websites.

 

73. **Social Engineering

Which is a best practice that can prevent viruses and other malicious code from being downloaded when checking your e-mail?: Do not access website links, buttons, or graphics in e-mail

74. **Social Engineering

What is TRUE of a phishing attack?: Phishing can be an email with a hyperlink as bait.

 

75. **Social Engineering

Which of the following is a way to protect against social engineering?: Follow instructions given only by verified personnel.

 

76. **Social Engineering

What is whaling?: A type of phishing targeted at senior officials

 

77. **Social Engineering

What action should you take with an e-mail from a friend containing a compressed Uniform Resource Locator (URL)?: Investigate the link's actual destination using the preview feature

 

78. **Social Engineering

How can you protect yourself from internet hoaxes?: Use online sites to confirm or expose potential hoaxes

 

79. **Social Engineering

Which may be a security issue with compressed Uniform Resource Locators

(URLs)?: They may be used to mask malicious intent.

 

80. **Social Engineering

What is a common indicator of a phishing attempt?: A threat of dire conse- quence

 

81. **Travel

What is a best practice while traveling with mobile computing devices?:   - Maintain possession of your laptop and other government-furnished equipment (GFE) at all times.

 

82. **Travel

Which of the following is true of traveling overseas with a mobile phone?: It may be compromised as soon as you exit the plane.

 

83. **Travel

What security risk does a public Wi-Fi connection pose?: It may expose the connected device to malware.

 

84. **Travel

Which of the following is a concern when using your Government-issued laptop in public?: Others may be able to view your screen.

 

 

85. **Use of GFE

When can you check personal e-mail on your Government-furnished equip- ment (GFE)?: If allowed by organizational policy

 

86. **Use of GFE

What is a critical consideration on using cloud-based file sharing and stor- age applications on your Government-furnished equipment (GFE)?: Deter- mine if the software or service is authorized

 

87. **Mobile Devices

Which is a rule for removable media, other portable electronic devices (PEDs), and mobile computing devices to protect Government systems?: Do not use any personally owned/non-organizational removable media on your orga- nization's systems.

 

88. **Mobile Devices

What can help to protect the data on your personal mobile device?: Secure it to the same level as Government-issued systems

 

89. **Mobile Devices

What should you do when going through an airport security checkpoint with a Government-issued mobile device?: Maintain visual or physical control of the device

 

90. **Mobile Devices

When can you use removable media on a Government system?: When oper- ationally necessary, owned by your organization, and approved by the appropriate authority

 

91. **Mobile Devices

Which of the following is an example of removable media?: Flash drive

 

92. **Home Computer Security

How can you protect your information when using wireless technology?:   -

Avoid using non-Bluetooth-paired or unencrypted wireless computer peripherals.

 

93. **Home Computer Security

What should you consider when using a wireless keyboard with your home computer?: Reviewing and configuring the available security features, including encryption

 

94. **Home Computer Security

Which of the following is a best practice for securing your home computer?-

 

: Create separate accounts for each user

PART FOUR 

 

1. *SPILLAGE*

Which of the following may be helpful to prevent spillage?: Be aware of classification markings and all handling caveats.

 

2. *SPILLAGE*

Which of the following may be helpful to prevent spillage?: Label all files, removable media, and subject headers with appropriate classification markings.

 

3. * CLASSIFIED DATA*

Which type of information could reasonably be expected to cause serious damage to national security if disclosed without authorization?: Secret

 

4. *CLASSIFIED DATA*

What is a good practice to protect classified information?: Ensure proper la- beling by appropriately marking all classified material and, when required, sensitive material.

 

5. *INSIDER THREAT*

Based on the description below how many potential insider threat indicators are present? A colleague often makes others uneasy by being persistent in trying to obtain information about classified projects to which he has no access, is boisterous about his wife putting them in credit card debt, and often complains about anxiety and exhaustion display?: 3 or more indicators

 

6. *INSIDER THREAT*

What threat do insiders with authorized access to information or information systems pose?: They may wittingly or unwittingly use their authorized access to perform actions that result in the loss or degradation of resources or capabilities.

 

7. *INSIDER THREAT*

Which of the following is NOT considered a potential insider threat indica- tor?: New interest in learning a foregin language.

 

8. *SOCIAL NETWORKING*

When may you be subject to criminal, disciplinary, and/or administrative action due to online misconduct?: If you participate in or condone it at any time.

 

9. *SOCIAL NETWORKING*

When is the safest time to post details of your vacation activities on your social networking profile?: After you have returned home following the vacation.

 

10. *SOCIAL NETWORKING*

Which of the following is a security best practice when using social network- ing sites?: Understanding and using the available privacy settings.


 

11. *UNCONTROLLED CLASSIFIED INFORMATION*

Which of the following is NOT an example of CUI?: Press release data

 

12. *UNCONTROLLED CLASSIFIED INFORMATION*

Which of the following is NOT a correct way to protect CUI?: Sensitive infor- mation may be stored on any password-protected system.

 

13. Select the information on the data sheet that is personally identifiable information (PII) But not protected health information (PHI): Jane Jones Social security number: 123-45-6789

 

14. Select the information on the data sheet that is protected health informa- tion (PHI): Jane has been Dr...ect patient..ect.

 

15. *PHYSICAL SECURITY*

Within a secure area, you see an individual who you do not know and is not wearing a visible badge: Ask the individual to see an identification badge.

 

16. *IDENTITY MANAGEMENT*

What certificates does the Common Access Card (CAC) or Personal Identity

Verification (PIV) card contain?: Identification, encryption, and digital signature

 

17. *IDENTITY MANAGEMENT*

Which of the following is an example of a strong password?: eA1xy2!P

 

18. *SENSITIVE COMPARTMENTED INFORMATION*

When faxing Sensitive Compartmented Information (SCI), what actions should you take?: Mark SCI documents appropriately and use an approved SCI fax machine.

 

19. *SENSITIVE COMPARTMENTED INFORMATION*

When is it appropriate to have your security badge visible within a sensitive compartmented information facility (SCIF)?: At all times while in the facility.

 

20. *REMOVABLE MEDIA IN A SCIF*

What action should you take when using removable media in a Sensitive Compartmented Information Facility (SCIF)?: Identify and disclose it with local Configuration/Change Management Control and Property Management authori- ties

 

21. *MALICIOUS CODE*

Which of the following is NOT a way malicious code spreads?: Legitimate software updates

22. *WEBSITE USE*

Which of the following statements is true of cookies?: You should only accept cookies from reputable, trusted websites.

 

23. *SOCIAL ENGINEERING*

How can you protect yourself from internet hoaxes?: Use online sites to confirm or expose potential hoaxes

 

24. *SOCIAL ENGINEERING*

How can you protect yourself from social engineering?: Follow instructions given only by verified personnel

 

25. *SOCIAL ENGINEERING*

What action should you take with an e-mail from a friend containing a compressed Uniform Resource Locator (URL)?: Investigate the link's actual destination using the preview feature

 

26. *TRAVEL*

Which of the following is a concern when using your Government-issued laptop in public?: Others may be able to view your screen.

 

27. *USE OF GFE*

What is a critical consideration on using cloud-based file sharing and stor- age applications on your Government-furnished equipment (GFE)?: Deter- mine if the software or service is authorized

 

28. *MOBILE DEVICES*

Which of the following is an example of near field communication (NFC)?: A smartphone that transmits credit card payment information when held in proximity to a credit card reader.

 

29. *MOBILE DEVICES*

Which of the following is an example of removable media?: Flash Drive

 

30. *HOME COMPUTER SECURITY*

Which of the following is a best practice for securing your home computer?-

: Create separate accounts for each user.

 

Share this post

0 Comments

Leave A Reply

Categories

  • Study Guide 41
  • Student Knowledge Base 33
  • Assignment 38
  • Analysis 12
  • Case Study 15
  • Exam 24
  • Flashcards 38
  • Cornerstone 20
  • Essay 276
  • Research Papers 44
  • Reviews 35
  • Free Test Bank 77
  • Questions & Answers 92
  • Popular Posts
  • Latest Posts
  • The “Grandma’s Kimchi” College Essay

    The “Grandma’s Kimchi” College Essay

    11 August 2025

  • Mastery EAQ Delegation

    Mastery EAQ Delegation

    29 July 2025

  • Brunner and Suddarth 16th Edition Test Bank PDF – Medical-Surgical Nursing Practice Questions & NCLEX Prep Guide

    Brunner and Suddarth 16th Edition Test Bank PDF – Medical-Surgical Nursing Practice Questions & NCLEX Prep Guide

    29 January 2026

  • AP Exam Dates: Full Schedule, Late Testing, and Important Deadlines

    AP Exam Dates: Full Schedule, Late Testing, and Important Deadlines

    07 November 2025

  • Bontrager’s Textbook of Radiographic Positioning and Related Anatomy Sample Practice Questions + Test Bank

    Bontrager’s Textbook of Radiographic Positioning and Related Anatomy Sample Practice Questions + Test Bank

    29 December 2025

  • Local Artist Programs for Office Walls | Artesty Guide

    Local Artist Programs for Office Walls | Artesty Guide

    27 January 2026

  • ATI Proctored Exam Explained: Format, Scoring & What to Expect

    ATI Proctored Exam Explained: Format, Scoring & What to Expect

    22 January 2026

  • Sterile Processing Technician vs. Surgical Technologist: What’s the Difference?

    Sterile Processing Technician vs. Surgical Technologist: What’s the Difference?

    22 January 2026

  • Best Diamond Stud Earrings to Buy Under $800

    Best Diamond Stud Earrings to Buy Under $800

    20 January 2026

  • Hide Expert VPN: Privacy and Data Protection Online

    Hide Expert VPN: Privacy and Data Protection Online

    20 January 2026

Tags

  • DOD
  • Cyber Awareness Challenge
  • 2022

IMPORTANT LINKS

  • How To Upload Class Notes
  • Selling Tips
  • Passing Grades's Study Materials
  • Scholarships for International Students 2025

POPULAR CATEGORIES

  • Law
  • Accounting
  • English
  • Psychology
  • Business
  • Nursing
  • Computer Science
  • General

View Document

  • Blog
  • Contact
  • Delivery Policy
  • Latest Scholarships Around the World
  • How to Pass Bar Exams: Passing Grades’ Strategies
  • How to Study and Pass the CPA Exam
  • All Test Banks
  • Faq
  • Copyright Claims
  • Privacy Policy
  • Terms of Use

KNOWLEDGE BASE

  • How to Write A+ Grade Good Research Paper
  • How to Manage Stress During Exam Period
  • Best Time to Study
  • How to Pass NCLEX-RN Exam
  • How To Effectively Utilize Test Banks
  • Popular Shadow Health Exam Assessments
  • Popular HESI Case Studies
  • How to Prepare for a Nursing Career
  • The Importance Of Summaries in Exam Revisvion

© 2026 Pasing Grades. All rights reserved.