Cyber Awareness 2022-2023 Knowledge Check (Answered)
1. How many potential insider threat indicators does a person who is married with
two children,
... [Show More] vacations at the beach every year, is pleasant to work with, but
sometimes has poor work quality display?
2. What is the best response if you find classified government data on the internet?
3. After reading an online story about a new security project being developed on the
military installation where you work, your neighbor asks you to comment about
the article. You know this project is classified. What should be your response?
4. What is a proper response if spillage occurs?
5. What should you do if a reporter asks you about potentially classified information
on the web?
6. A user writes down details from a report stored on a classified system marked as
Secret and uses those details to draft an unclassified briefing on an unclassified
system without authorization. What is the best choice to describe what has
occurred?
7. How many potential insider threat indicators does a coworker who often makes
others uneasy by being persistent in trying to obtain information about classified
projects to which he has no access, is boisterous about his wife putting them in
credit card debt, and often complains about anxiety and exhaustion display?
8. Which of the following can an unauthorized disclosure of information classified as
Confidential reasonably be expected to cause?
9. Which classification level is given to information that could reasonably be
expected to cause serious damage to national security?
10. When classified data is not in use, how can you protect it?
11. Which is a good practice to protect classified information?
12. Which of the following is a good practice to aid in preventing spillage?
13. What is required for an individual to access classified data?
14. What type of activity or behavior should be reported as a potential insider threat?
15. Which of the following practices reduces the chance of becoming a target by
adversaries seeking insider information?
16. Which scenario might indicate a reportable insider threat security incident?
This study source was downloaded by 100000836267798 from CourseHero.com on 11-23-2022 22:49:33 GMT -06:00
https://www.coursehero.com/file/172803601/Cyber-Awareness-2022-2023-Knowledge-Check-Answeredpdf/
17. Why might "insiders" be able to cause damage to their organizations more easily
than others?
18. Which of the following is a best practice to protect information about you and
your organization on social networking sites and applications?
19. What should you do if an individual asks you to let her follow you into your
controlled space, stating that she left her security badge at her desk?
20. Which represents a security best practice when using social networking?
21. Which is NOT a sufficient way to protect your identity?
22. Under which circumstances may you be subject to criminal, disciplinary, and/or
administrative action due to online misconduct?
23. As someone who works with classified information, what should you do if you are
contacted by a foreign national seeking information on a research project?
24. Which of the following is true about unclassified data?
25. What are some potential insider threat indicators?
26. What information posted publicly on your personal social networking profile
represents a security risk?
Solutions @: https://www.stuvia.com/doc/2035940/cyber-awareness-2022-2023-
knowledge-check-95-answered-questions_-all-correct [Show Less]