Cyber Awareness Challenge 2023 Flashcards
20 Questions
100 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What should you do if a neighbor asks you about a classified project?

Attempt to change the subject to something non-work related, but neither confirm nor deny the article's authenticity.

Which of the following may help to prevent spillage? (Select all that apply)

  • Label all files with appropriate classification markings. (correct)
  • Label removable media with appropriate classification markings. (correct)
  • Use subject headers without classification markings.
  • Use removable media without labels.
  • What is the best description of moving classified data to an unclassified system without authorization?

    Spillage because classified data was moved to a lower classification level system without authorization.

    What should you do when you receive an email with a classified attachment on an unclassified system?

    <p>Call your security point of contact immediately.</p> Signup and view all the answers

    What should you do if a reporter asks about potentially classified information on the web?

    <p>Ask for information about the website, including the URL.</p> Signup and view all the answers

    What should you do if you suspect spillage has occurred?

    <p>Immediately notify your security point of contact.</p> Signup and view all the answers

    Which of the following is a good practice to prevent spillage? (Select all that apply)

    <p>Be aware of classification markings.</p> Signup and view all the answers

    What action is appropriate after finding classified information on the Internet?

    <p>Note any identifying information and the website's Uniform Resource Locator (URL).</p> Signup and view all the answers

    How can classified data be protected when not in use?

    <p>Store classified data appropriately in a GSA-approved vault/container.</p> Signup and view all the answers

    What is required for access to classified data?

    <p>Appropriate clearance, a signed and approved non-disclosure agreement, and need-to-know.</p> Signup and view all the answers

    Which classification level is for information that could cause serious damage to national security?

    <p>Secret.</p> Signup and view all the answers

    Which of the following is a good practice to protect classified information? (Select all that apply)

    <p>Properly mark all classified material.</p> Signup and view all the answers

    Classified material must not be marked appropriately.

    <p>False</p> Signup and view all the answers

    What level of damage can unauthorized disclosure of Confidential information reasonably be expected to cause?

    <p>Damage to national security.</p> Signup and view all the answers

    You must have permission from your organization to telework.

    <p>True</p> Signup and view all the answers

    Which type of information could cause serious damage to national security if disclosed without authorization?

    <p>Secret.</p> Signup and view all the answers

    How should you protect a printed classified document when it is not in use?

    <p>Store it in a General Services Administration (GSA)-approved vault or container.</p> Signup and view all the answers

    What level of damage to national security could be expected from unauthorized disclosure of Top Secret information?

    <p>Exceptionally grave damage.</p> Signup and view all the answers

    How many potential insider threat indicators are displayed by a colleague who vacations at the beach every year, is married, and sometimes has poor work quality?

    <p>~0 indicator.</p> Signup and view all the answers

    How many potential insider threat indicators does a coworker exhibit if they are persistent in obtaining information about classified projects, in credit card debt, and complain about anxiety?

    <p>3 or more indicators.</p> Signup and view all the answers

    Study Notes

    Spillage

    • Respond to inquiries about classified projects by changing the subject without confirming or denying authenticity.
    • Prevent spillage by properly labeling files and removable media with classification markings.
    • Unauthorized transfer of Secret details to unclassified systems constitutes spillage.
    • Immediately contact your security point of contact upon receiving classified attachments on unclassified systems.
    • Gather information, including the URL, if a reporter inquires about classified information.
    • Refer reporters regarding potentially classified information to your organization's public affairs office.
    • Notify your security contact promptly if you suspect any spillage has occurred.
    • Stay aware of classification markings and handling caveats to avoid spillage.
    • Document identifying information and URLs when encountering classified material online.

    Classified Data

    • Store classified data securely in GSA-approved vaults or containers when not in use.
    • Access to classified data requires appropriate clearance, signed non-disclosure agreements, and need-to-know.
    • Information classified as Secret is expected to cause serious damage to national security if disclosed.
    • Proper labeling is essential for protecting classified and sensitive information.
    • Classified materials must always be appropriately marked to safeguard them.
    • Confidential information's unauthorized disclosure may cause damage to national security.
    • Telework with classified data requires explicit permission from your organization.
    • Secret information poses a significant risk of serious damage to national security if released.
    • Printed classified documents should be kept secure in GSA-approved storage when not actively used.
    • Top Secret information's unauthorized disclosure risks exceptionally grave damage to national security.

    Insider Threat

    • A colleague with stable personal life and generally acceptable behavior shows negligible indicators of insider threat.
    • A coworker exhibiting persistent behaviors to obtain unauthorized information and expressing personal stress displays three or more insider threat indicators.

    Studying That Suits You

    Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

    Quiz Team

    Description

    Test your knowledge with the Cyber Awareness Challenge 2023 flashcards. This set includes key concepts and terms related to cybersecurity and the importance of handling classified information appropriately. Perfect for anyone looking to enhance their awareness in a security-conscious environment.

    More Like This

    Cybersecurity Awareness
    18 questions

    Cybersecurity Awareness

    AwestruckRetinalite avatar
    AwestruckRetinalite
    Cyber Awareness Flashcards
    26 questions
    Cybersecurity Awareness Quiz
    53 questions

    Cybersecurity Awareness Quiz

    ExceptionalCamellia avatar
    ExceptionalCamellia
    Use Quizgecko on...
    Browser
    Browser