Cyber Awareness Challenge 2023 Quiz
30 Questions
100 Views

Cyber Awareness Challenge 2023 Quiz

Created by
@FasterTheme

Questions and Answers

Which of the following is a good practice to prevent spillage?

  • Use VPN
  • Follow procedures for transferring data (correct)
  • Refer to PA
  • Ignore the situation
  • How should you respond to an inquiry about government information not cleared for public release?

    Refer to PA

    Which of the following is a good practice for telework?

  • Share passwords
  • Use public Wi-Fi
  • Use VPN (correct)
  • Leave devices unlocked
  • What level of damage can the unauthorized disclosure of information classified as Top Secret reasonably be expected to cause?

    <p>Exceptionally grave damage</p> Signup and view all the answers

    Which of the following is a potential insider threat indicator?

    <p>Interest in learning a foreign language</p> Signup and view all the answers

    What is an insider threat?

    <p>Someone who uses authorized access, wittingly or unwittingly, to harm.</p> Signup and view all the answers

    Based on the description, how many potential insider threat indicator(s) are displayed?

    <p>1</p> Signup and view all the answers

    Which of the following is a security best practice when using social networking sites?

    <p>Avoid posting your mother's maiden name</p> Signup and view all the answers

    Adversaries exploit social networking sites to disseminate fake news.

    <p>True</p> Signup and view all the answers

    Many apps and smart devices collect and share your personal information and contribute to your online identity.

    <p>True</p> Signup and view all the answers

    Which of the following best describes a way to safely transmit Controlled Unclassified Information (CUI)?

    <p>Secure file transfer protocols</p> Signup and view all the answers

    Protected Health Information (PHI) is not classified information.

    <p>True</p> Signup and view all the answers

    Which designation includes Personally Identifiable Information (PII) and PHI?

    <p>Sensitive information</p> Signup and view all the answers

    Which of the following best describes good physical security?

    <p>Lionel stops an individual in his secure area who is not wearing a badge.</p> Signup and view all the answers

    You should remove and take your CAC/PIV card whenever you leave your workstation.

    <p>True</p> Signup and view all the answers

    You may only transport sensitive compartmented information (SCI) if you have been courier-briefed for SCI.

    <p>True</p> Signup and view all the answers

    All personal and government-owned portable electronic devices are prohibited in a Sensitive Compartmented Information Facility (SCIF).

    <p>True</p> Signup and view all the answers

    Which of the following is NOT a type of malicious code?

    <p>Executables</p> Signup and view all the answers

    Which of the following actions can help to protect your identity?

    <p>Shred personal documents</p> Signup and view all the answers

    What action should you take with a compressed URL on a known website?

    <p>Investigate the destination using the preview feature</p> Signup and view all the answers

    How can you protect yourself from social engineering?

    <p>Verify the identity of all individuals.</p> Signup and view all the answers

    What is a common indicator of a phishing attempt?

    <p>A claim that you must update or validate information.</p> Signup and view all the answers

    What security risk does a public Wi-Fi connection pose?

    <p>It may expose the information sent to theft.</p> Signup and view all the answers

    Which of the following is NOT a permitted way to connect a personally-owned monitor to your GFE?

    <p>USB</p> Signup and view all the answers

    Which of the following best describes the conditions under which mobile devices and applications can track your location?

    <p>It may occur at any time without your knowledge or consent</p> Signup and view all the answers

    How can you protect data on your mobile computing and portable electronic devices?

    <p>Enable automatic screen locking after a period of inactivity.</p> Signup and view all the answers

    What should you do if you find classified information on the Internet?

    <p>Note the website's URL and report the situation to your security point of contact.</p> Signup and view all the answers

    How should you secure your home wireless network for teleworking?

    <p>Implement Wi-Fi Protected Access 2 (WPA2) Personal encryption at a minimum.</p> Signup and view all the answers

    Which of the following may help to prevent spillage?

    <p>Follow procedures for transferring data</p> Signup and view all the answers

    Who designates whether information is classified and its classification level?

    <p>Original classification authority</p> Signup and view all the answers

    Study Notes

    SPILLAGE

    • Good practices to prevent spillage include following procedures for transferring data to and from external agencies and non-government networks.
    • Upon discovering classified information online, immediately note the URL and report it to your security point of contact.

    CLASSIFIED DATA

    • Teleworking requires the use of a VPN to securely access classified data.
    • Unauthorized disclosure of Top Secret information can lead to exceptionally grave damage.
    • Classification levels and designations of information are determined by the original classification authority.

    INSIDER THREAT

    • Potential indicators of insider threats may include unusual interests, such as learning a foreign language.
    • An insider threat is defined as anyone utilizing their authorized access, knowingly or unknowingly, to cause harm.

    SOCIAL NETWORKING

    • To enhance security on social media, avoid sharing personally identifiable information, like your mother's maiden name.
    • Adversaries can exploit social networking sites to spread misinformation.
    • Many applications and smart devices collect personal data, impacting your online identity.

    CONTROLLED UNCLASSIFIED INFORMATION (CUI)

    • Sensitive information includes both Personally Identifiable Information (PII) and Protected Health Information (PHI).
    • Safely transmitting CUI involves adherence to specified guidelines (details not provided).

    PHYSICAL SECURITY

    • Effective physical security practices include ensuring individuals in secure areas display proper badges.

    IDENTITY MANAGEMENT

    • Always remove your Common Access Card (CAC) or Personal Identity Verification (PIV) card when leaving your workstation.
    • A DoD Public Key Infrastructure (PKI) token should only be in use during active PKI-required tasks.

    SENSITIVE COMPARTMENTED INFORMATION (SCI)

    • Transporting sensitive compartmented information requires prior courier briefing for SCI.
    • Access to SCI demands Top Secret clearance and indoctrination into the SCI program.

    REMOVABLE MEDIA IN A SCIF

    • Only government-approved portable electronic devices (PEDs) are permitted in Sensitive Compartmented Information Facilities (SCIFs).

    MALICIOUS CODE

    • Executables are not classified as malicious code.

    WEBSITE USE

    • Shredding personal documents is an effective method to protect your identity online.

    SOCIAL ENGINEERING

    • With compressed URLs, always investigate by using the preview feature to ensure the link is safe.
    • To defend against social engineering, verify the identity of all individuals before sharing any information.
    • A common phishing tactic involves prompting victims to update or validate their information.

    TRAVEL

    • Using public Wi-Fi can expose transmitted information to potential theft, as it may not allow VPN usage.

    USE OF GOVERNMENT-FURNISHED EQUIPMENT (GFE)

    • Connecting a personally-owned monitor to Government-Furnished Equipment (GFE) via USB is prohibited.

    MOBILE DEVICES

    • Location tracking by mobile devices and applications may occur without users’ knowledge or consent.
    • To secure data on mobile devices, enable automatic screen locking after a period of inactivity.

    HOME COMPUTER SECURITY

    • For secure teleworking, implement Wi-Fi Protected Access 2 (WPA2) Personal encryption on your home wireless network.

    Studying That Suits You

    Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

    Quiz Team

    Description

    Test your knowledge on cyber awareness with this quiz based on the 2023 challenge. Explore key practices for handling spillage and classified data, as well as guidelines for telework. Perfect for anyone looking to enhance their understanding of cybersecurity protocols.

    More Quizzes Like This

    Cyber Awareness Knowledge Check 2024
    99 questions
    Cyber Awareness Flashcards
    26 questions
    Cyber Awareness Best Practices Quiz
    29 questions
    Use Quizgecko on...
    Browser
    Browser