CYBER AWARENESS CHALLENGE 2022 NEW EXAM GUIDE UPDATE COMPLETE ACTUAL QUESTIONS AND ANSWERS
What do you do if spillage occurs?answerImmediately notify
... [Show More] your security point of contact.
What should you do after you have ended a call from a reporter asking you to confirm potentially classified information found on the web?answerAlert your security point of contact.
Which of the following is NOT a requirement for telework?answerYou must possess security clearance eligibility to telework.
Who can be permitted access to classified data?answerOnly persons with appropriate clearance, a non-disclosure agreement, and need-to-know can access classified data.
A colleague has won 10 high-performance awards, can be playful and charming, is not currently in a relationship, and is occasionally aggressive in trying to access sensitive information. How many potential insiders threat indicators does this employee display?answer1 indicator
A colleague has visited several foreign countries recently, has adequate work quality, speaks openly of unhappiness with U.S. foreign policy, and recently had his car repossessed. How many potential insiders threat indicators does this employee display?answer3 or more indicators
A colleague complains about anxiety and exhaustion, makes coworkers uncomfortable by asking excessive questions about classified projects, and complains about the credit card bills that his wife runs up. How many potential insiders threat indicators does this employee display?answer3 or more indicators
In setting up your personal social networking service account, what email address should you use?answerYour personal email address
What information most likely presents a security risk on your personal social networking profile?answerYour place of birth
Which of the following is NOT an example of sensitive information?answerPress release data
Is it permitted to share an unclassified draft document with a non-DoD professional discussion group?answerAs long as the document is cleared for public release, you may release it outside of DoD
Which of the following is an example of Protected Health Information (PHI)?answerI've tried all the answers and it still tells me off. Examples are: Patient names, Social Security numbers, Driver's license numbers, insurance details, and birth dates
Which of the following represents a good physical security practice?answerUse your own security badge, key code, or Common Access Card (CAC)/Personal Identity Verification (PIC) card.
Which of the following is NOT a good way to protect your identity?answerUse a single, complex password for your system and application logons.
Which of the following statements is TRUE about the use of DoD Public Key Infrastructure (PKI) tokens?answerAlways use DoD PKI tokens within their designated classification level.
Which of the following is NOT a typical means for spreading malicious code?answerPatching from a trusted source
Which of the following is a practice that helps to protect you from identity theft?answerOrdering a credit report annually
Which of the following is a practice that helps to prevent the download of viruses and other malicious code when checking your email?answerDo not access links or hyperlinked media such as buttons and graphics in email messages. [Show Less]