Cyber Awareness Knowledge Check 2024
99 Questions
100 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What action should you take first upon receiving an email from OPM requesting personal information?

  • Delete the email.
  • Enter your personal information immediately.
  • Look for a digital signature on the email. (correct)
  • Call OPM for verification.
  • How should you respond to a call from someone at the help desk who needs assistance?

    Ask the caller, 'What's your full name and phone number?'

    Which of the following is a way to protect against social engineering?

  • Ignore suspicious requests.
  • Trust anyone who calls you.
  • Give out personal information freely.
  • Follow instructions given only by verified personnel. (correct)
  • What should you do if a man you do not know asks to use your Government-issued phone?

    <p>Decline to lend the man your phone.</p> Signup and view all the answers

    What action is appropriate after finding classified information on the internet?

    <p>Note any identifying information and the website's Resource Locator (URL).</p> Signup and view all the answers

    How should you respond to a reporter's inquiry about potentially classified information on the Internet?

    <p>Refer the reporter to your organization's public affairs office.</p> Signup and view all the answers

    Which of the following best describes the sources that contribute to your online identity?

    <p>Data about you collected from all sites, apps, and devices that you use can be aggregated to form a profile of you.</p> Signup and view all the answers

    Which of the following information is a security risk when posted publicly on your social networking profile?

    <p>Your political affiliation.</p> Signup and view all the answers

    What is a best practice for physical security?

    <p>Use your own facility access badge or key code.</p> Signup and view all the answers

    In which situation are you permitted to use your PKI token?

    <p>On a NIPRNet system while using it for a PKI-required task.</p> Signup and view all the answers

    What actions should you take when faxing Sensitive Compartmented Information (SCI)?

    <p>Mark SCI documents appropriately and use an approved SCI fax machine.</p> Signup and view all the answers

    How many potential insider threat indicators does a person who is married with two children, vacations at the beach every year, is pleasant to work with, but sometimes has poor work quality display?

    <p>0 indicators</p> Signup and view all the answers

    What is the best response if you find classified government data on the internet?

    <p>Note any identifying information, such as the website's URL, and report the situation to your security POC.</p> Signup and view all the answers

    After reading an online story about a new security project being developed on the military installation where you work, your neighbor asks you to comment about the article. You know this project is classified. What should be your response?

    <p>Attempt to change the subject to something non-work related, but neither confirm nor deny the article's authenticity.</p> Signup and view all the answers

    What is a proper response if spillage occurs?

    <p>Immediately notify your security POC.</p> Signup and view all the answers

    What should you do if a reporter asks you about potentially classified information on the web?

    <p>Ask for information about the website, including the URL.</p> Signup and view all the answers

    A user writes down details from a report stored on a classified system marked as Secret and uses those details to draft an unclassified briefing on an unclassified system without authorization. What is the best choice to describe what has occurred?

    <p>Spillage because classified data was moved to a lower classification level system without authorization.</p> Signup and view all the answers

    How many potential insider threat indicators does a coworker who often makes others uneasy by being persistent in trying to obtain information about classified projects to which he has no access, is boisterous about his wife putting them in credit card debt, and often complains about anxiety and exhaustion display?

    <p>3 or more indicators</p> Signup and view all the answers

    Which of the following can an unauthorized disclosure of information classified as Confidential reasonably be expected to cause?

    <p>Damage to national security</p> Signup and view all the answers

    Which classification level is given to information that could reasonably be expected to cause serious damage to national security?

    <p>Secret</p> Signup and view all the answers

    When classified data is not in use, how can you protect it?

    <p>Store classified data appropriately in a GSA-approved vault/container when not in use.</p> Signup and view all the answers

    Which is a good practice to protect classified information?

    <p>Ensure proper labeling by appropriately marking all classified material.</p> Signup and view all the answers

    Which of the following is a good practice to aid in preventing spillage?

    <p>Be aware of classification markings and all handling caveats.</p> Signup and view all the answers

    What is required for an individual to access classified data?

    <p>Appropriate clearance; signed and approved non-disclosure agreement; and need-to-know.</p> Signup and view all the answers

    What type of activity or behavior should be reported as a potential insider threat?

    <p>Coworker making consistent statements indicative of hostility or anger toward the United States and its policies.</p> Signup and view all the answers

    Which of the following practices reduces the chance of becoming a target by adversaries seeking insider information?

    <p>Communicate only in specifically designated public meeting environments.</p> Signup and view all the answers

    Which scenario might indicate a reportable insider threat security incident?

    <p>A coworker is observed using a personal electronic device in an area where their use is prohibited.</p> Signup and view all the answers

    Why might 'insiders' be able to cause damage to their organizations more easily than others?

    <p>Insiders are given a level of trust and have authorized access to Government information systems.</p> Signup and view all the answers

    Which of the following is a best practice to protect information about you and your organization on social networking sites and applications?

    <p>Use only personal contact information when establishing personal social networking accounts, never use Government contact information.</p> Signup and view all the answers

    What should you do if an individual asks you to let her follow you into your controlled space, stating that she left her security badge at her desk?

    <p>Don't allow her access into secure areas and report suspicious activity.</p> Signup and view all the answers

    Which represents a security best practice when using social networking?

    <p>Understanding and using available privacy settings.</p> Signup and view all the answers

    Which is NOT sufficient to protect your identity?

    <p>Using a common password for all system and application logons.</p> Signup and view all the answers

    Under which circumstances may you be subject to criminal, disciplinary, and/or administrative action due to online misconduct?

    <p>Any time you participate in or condone misconduct, whether offline or online.</p> Signup and view all the answers

    As someone who works with classified information, what should you do if you are contacted by a foreign national seeking information on a research project?

    <p>Inform your security POC of all non-professional or non-routine contacts with foreign nations.</p> Signup and view all the answers

    Which of the following is true about unclassified data?

    <p>When unclassified data is aggregated, its classification level may rise.</p> Signup and view all the answers

    What are some potential insider threat indicators?

    <p>Difficult life circumstances such as substance abuse; divided loyalty or allegiance to the U.S.; or extreme, persistent interpersonal difficulties.</p> Signup and view all the answers

    What information posted publicly on your personal social networking profile represents a security risk?

    <p>Your place of birth</p> Signup and view all the answers

    What is an individual's Personally Identifiable Information (PII) or Protected Health Information (PHI) considered?

    <p>Sensitive information.</p> Signup and view all the answers

    Under what circumstances could unclassified information be considered a threat to national security?

    <p>If aggregated, the information could become classified.</p> Signup and view all the answers

    What type of unclassified material should always be marked with a special handling caveat?

    <p>For Official Use Only (FOUO)</p> Signup and view all the answers

    Which is true for protecting classified data?

    <p>Classified material is stored in a GSA-approved container when not in use.</p> Signup and view all the answers

    How many potential insider threat indicators does a person who is playful and charming, consistently wins performance awards, but is occasionally aggressive in trying to access sensitive information display?

    <p>1 Indicator</p> Signup and view all the answers

    Which of the following terms refers to harm inflicted on national security through authorized access to information or information systems?

    <p>Insider Threat</p> Signup and view all the answers

    What is the best example of Personally Identifiable Information (PII)?

    <p>Date and place of birth</p> Signup and view all the answers

    What is the best example of Protected Health Information (PHI)?

    <p>Your health insurance explanation of benefits (EOB)</p> Signup and view all the answers

    When is the best time to post details of your vacation activities on your social networking website?

    <p>When your vacation is over, and you have returned home.</p> Signup and view all the answers

    What does Personally Identifiable Information (PII) include?

    <p>Social Security Number; date and place of birth; mother's maiden name.</p> Signup and view all the answers

    What must you ensure if your work involves the use of different types of smart card security tokens?

    <p>Avoid a potential security violation by using the appropriate token for each system.</p> Signup and view all the answers

    What must you ensure before transmitting Personally Identifiable Information (PII) or Protected Health Information (PHI) via e-mail?

    <p>Transmissions must be between Government e-mail accounts and must be encrypted and digitally signed when possible.</p> Signup and view all the answers

    What must you do when e-mailing Personally Identifiable Information (PII) or Protected Health Information (PHI)?

    <p>Encrypt the e-mail and use your Government e-mail account.</p> Signup and view all the answers

    What is a good practice for physical security?

    <p>Challenge people without proper badges.</p> Signup and view all the answers

    Is it acceptable to take a short break while a coworker monitors your computer while logged on with your CAC?

    <p>False</p> Signup and view all the answers

    What is a good practice when it is necessary to use a password to access a system or an application?

    <p>Avoid using the same password between systems or applications.</p> Signup and view all the answers

    What is the best description of two-factor authentication?

    <p>Something you possess, like a CAC, and something you know, like a PIN or password.</p> Signup and view all the answers

    What certificates are contained on the DoD Public Key Infrastructure (PKI) implemented by the Common Access Card (CAC)/Personal Identity Verification (PIV) card?

    <p>Identification, encryption, and digital signature.</p> Signup and view all the answers

    What are the requirements to be granted access to SCI material?

    <p>The proper security clearance and indoctrination into the SCI program.</p> Signup and view all the answers

    What is a protection against internet hoaxes?

    <p>Use online sites to confirm or expose potential hoaxes.</p> Signup and view all the answers

    What organization issues the directives concerning the dissemination of information regarding intelligence sources, methods, or activities?

    <p>Department of Defense.</p> Signup and view all the answers

    Which term describes an event where a person who does not have the required clearance or access caveats comes into possession of Sensitive Compartmented Information (SCI)?

    <p>Compromise</p> Signup and view all the answers

    What describes a Sensitive Compartmented Information (SCI) program?

    <p>A program that segregates various types of classified information into distinct compartments for added protection and dissemination for distribution control.</p> Signup and view all the answers

    What describes how Sensitive Compartmented Information is marked?

    <p>Approved Security Classification Guide (SCG)</p> Signup and view all the answers

    What must users do when using removable media within a Sensitive Compartmented Information Facility (SCIF)?

    <p>Comply with Configuration/Change Management (CM) policies and procedures.</p> Signup and view all the answers

    Which is a risk associated with removable media?

    <p>Spillage of classified information.</p> Signup and view all the answers

    What is an indication that malicious code is running on your system?

    <p>File corruption</p> Signup and view all the answers

    What are some actions you can take to try to protect your identity?

    <p>Shred personal documents; never share passwords; and order a credit report annually.</p> Signup and view all the answers

    Which of the following is an appropriate use of Government e-mail?

    <p>Digitally signing e-mails that contain attachments or hyperlinks.</p> Signup and view all the answers

    What can malicious code do?

    <p>It can cause damage by corrupting files, erasing your hard drive, and/or allowing hackers access.</p> Signup and view all the answers

    Which is true of cookies?

    <p>A cookie is a text file a web server stores on your hard drive that may track your activities on the web.</p> Signup and view all the answers

    What is a common method used in social engineering?

    <p>Telephone surveys</p> Signup and view all the answers

    Which may be a security issue with compressed URLs?

    <p>There is no way to know where the link actually leads.</p> Signup and view all the answers

    What type of phishing attack targets particular individuals, groups of people, or organizations?

    <p>Spear phishing</p> Signup and view all the answers

    While on vacation, a coworker calls and asks you to access a site to review and approve a document that is hosted behind a DoD Public Key Infrastructure (PKI) protected webpage. You do not have your government-issued laptop. What action should you take?

    <p>Wait until you have access to your government-issued laptop.</p> Signup and view all the answers

    Under what circumstances is it acceptable to use your Government-furnished computer to check personal e-mail and do other non-work-related activities?

    <p>If allowed by organization policy.</p> Signup and view all the answers

    Which are examples of portable electronic devices (PEDs)?

    <p>All of the above</p> Signup and view all the answers

    What are some examples of removable media?

    <p>All of the above</p> Signup and view all the answers

    What is a valid response when identity theft occurs?

    <p>Report the crime to local law enforcement.</p> Signup and view all the answers

    What is a common indicator of a phishing attempt?

    <p>It includes a threat of dire circumstances.</p> Signup and view all the answers

    What is whaling?

    <p>A type of phishing targeted at high-level personnel such as senior officials.</p> Signup and view all the answers

    Upon connecting your Government-issued laptop to a public wireless connection, what should you immediately do?

    <p>Connect to the Government Virtual Private Network (VPN).</p> Signup and view all the answers

    Which of the following activities is an ethical use of Government-furnished equipment (GFE)?

    <p>Completing your expense report for your government travel.</p> Signup and view all the answers

    Which is a wireless technology that enables your electronic devices to establish communications and exchange information when placed next to each other called?

    <p>Near field communication (NFC)</p> Signup and view all the answers

    Which of the following helps protect data on your personal mobile devices?

    <p>Secure personal mobile devices to the same level as Government-issued systems.</p> Signup and view all the answers

    What is a possible indication of a malicious code attack in progress?

    <p>A pop-up window that flashes and warns that your computer is infected with a virus.</p> Signup and view all the answers

    What should you do if a commercial entity, such as a hotel reception desk, asks for Government identification so that they can make a photocopy?

    <p>Do not allow your Common Access Card (CAC) to be photocopied.</p> Signup and view all the answers

    When is conducting a private money-making venture using your Government-furnished computer permitted?

    <p>It is never permitted.</p> Signup and view all the answers

    What is a good practice to protect data on your home wireless systems?

    <p>Ensure that the wireless security features are properly configured.</p> Signup and view all the answers

    Which must be approved and signed by a cognizant Original Classification Authority (OCA)?

    <p>Security Classification Guide (SCG)</p> Signup and view all the answers

    What portable electronic devices (PEDs) are allowed in a Secure Compartmented Information Facility (SCIF)?

    <p>Government-owned PEDs, if expressly authorized by your agency.</p> Signup and view all the answers

    What is a way to prevent the download of viruses and other malicious code when checking your e-mail?

    <p>View e-mail in plain text and don't view e-mail in Preview Pane.</p> Signup and view all the answers

    What is a best practice to protect data on your mobile computing device?

    <p>Lock your device screen when not in use and require a password to reactivate.</p> Signup and view all the answers

    Which of the following is NOT an example of sensitive information?

    <p>Press release data</p> Signup and view all the answers

    Under what circumstances is it permitted to share an unclassified draft document with a non-DoD professional discussion group?

    <p>As long as the document is cleared for public release, you may share it outside of DoD.</p> Signup and view all the answers

    Which of the following is true of protecting classified data?

    <p>True</p> Signup and view all the answers

    What advantages do 'insider threats' have over others that allow them to cause damage to their organizations more easily?

    <p>Insiders are given a level of trust and have authorized access to Government information systems.</p> Signup and view all the answers

    Which of the following should be reported as a potential security threat?

    <p>A coworker removes sensitive information without authorization.</p> Signup and view all the answers

    Which of the following does Cyberspace Protection Conditions (CPCON) establish during significant cyberspace events?

    <p>Protection priorities.</p> Signup and view all the answers

    What is the best way to protect your Common Access Card (CAC)?

    <p>Maintain possession of it at all times.</p> Signup and view all the answers

    When should documents be marked within a Sensitive Compartmented Information Facility (SCIF)?

    <p>False</p> Signup and view all the answers

    Which of the following is a best practice for handling cookies?

    <p>If possible, set your browser preferences to prompt you each time a website wants to store a cookie.</p> Signup and view all the answers

    Study Notes

    Insider Threats

    • Individuals in difficult life circumstances, such as substance abuse or divided loyalty, can display potential insider threat indicators.
    • A coworker exhibiting persistent attempts to access classified information, financial difficulties, and signs of stress typically displays multiple threat indicators.

    Handling Classified Information

    • If classified information is found online, note the website’s URL and report to security personnel.
    • Classified data must be stored securely when not in use, preferably in GSA-approved containers.

    Responses to Information Requests

    • If asked about classified projects, do not confirm or deny the information; change the subject to something non-work-related.
    • When approached by a reporter about classified information, refer them to your organization’s public affairs office.

    Security Protocols

    • Immediately notify the security point of contact (POC) if spillage of classified information occurs.
    • Maintain possession and secure storage of the Common Access Card (CAC) at all times.

    Classification Levels

    • Information that may cause serious damage to national security is classified as "Secret."
    • Unauthorized disclosure of "Confidential" information could still damage national security.

    Email and Digital Security

    • When emailing Personally Identifiable Information (PII) or Protected Health Information (PHI), use encryption and government email accounts.
    • Be cautious of phishing attempts that threaten dire consequences; legitimate emails should have digital signatures.

    Physical and Cybersecurity Best Practices

    • Always challenge individuals without proper identification in secure areas.
    • Use privacy settings on social networking sites and avoid sharing sensitive personal information.

    Handling Removable Media

    • Removable media pose risks such as spillage and should comply with strict regulations when used in sensitive environments.
    • Report any unauthorized access or attempts to remove sensitive information by coworkers.

    Social Media Awareness

    • Post vacation details only after returning home to avoid compromising security.
    • Be aware that cookies can track online activity; adjust browser settings to maintain control over cookies.

    Security Breaches and Misconduct

    • Notify authorities if identity theft occurs and report any suspected misconduct or security threats observed.
    • Recognize that engaging with foreign individuals seeking sensitive information requires reporting to security personnel.

    Additional Security Measures

    • Enforce the usage of unique passwords for different systems to avoid security breaches.
    • Always encrypt sensitive emails and use secure methods to share documents, especially outside the Department of Defense (DoD).

    Conclusion

    • Adhering to established protocols and being vigilant about information security can significantly reduce risks associated with insider threats and cybersecurity incidents.
    • Continuous education on best practices in cybersecurity helps protect personal and classified information alike.

    Studying That Suits You

    Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

    Quiz Team

    Description

    Test your understanding of insider threat indicators and the appropriate actions when encountering classified data online. This quiz features flashcards designed to enhance your cyber awareness skills. Perfect for anyone needing to refresh their knowledge in cybersecurity.

    More Like This

    Cybersecurity: Insider Threats
    6 questions
    Operational Security and Insider Threats
    8 questions
    Cybersecurity Threats Overview
    37 questions

    Cybersecurity Threats Overview

    FaithfulWildflowerMeadow2737 avatar
    FaithfulWildflowerMeadow2737
    Use Quizgecko on...
    Browser
    Browser