DOD CYBER AWARENESS
CHALLENGE
KNOWLEDGE CHECK 2023
// DOD Cyber Awareness
Challenge 2019:
Knowledge Check
Which of the following may help to
... [Show More] prevent spillage? - Answer Follow procedures for
transferring data to and from outside agency and non-Government networks
A vendor conducting a pilot program... how should you respond? - Answer Refer the
vendor to the appropriate personnel
What level of damage... Top Secret be expected to cause? - Answer Exceptionally
grave
Which of the following is a good practice for telework? - Answer Position your monitor
so it is not facing others
Inquiry from a reporter...? - Answer Refer to public affairs
What does spillage refer to? - Answer Information improperly moved from higher to
lower protection level
Which of the following is a good practice to protect classified information? - Answer
Don't assume open storage is authorized
Which scenario might indicate a reportable insider threat? - Answer A colleague
removes sensitive information without seeking authorization
Which of the following is a reportable insider threat activity? - Answer Attempting to
access sensitive information without need to know
What function do Insider Threat Programs aim to fulfill? - Answer Proactively identify
potential threats and formulate yadayadayada
How can you protect your organization on social networking sites? - Answer Ensure
there are no identifiable landmarks visible in photos
What piece of information is safest to include on your social media profile? - Answer If
you don't know the answer to this one, please do the training in full. you're dumb forreal.
Which of the following is a security best practice when using social networking sites? -
Answer Avoiding posting your mother's maiden name
Which of the following statements is true? - Answer Many apps and smart devices
collect and share your personal information and contribute.....
Which of the following statements is true? - Answer Adversaries exploit social
networking sites to disseminate fake news.
A trusted friend in your social network posts vaccine information on a website unknown
to you. What action should you take? - Answer some of yall mfs need to read this twiceRESEARCH THE SOURCE TO EVALUATE ITS CREDIBILITY AND RELIABILITY
Which of the following best describes a way to safely transmit CUI - Answer Debra
ensures all recipients have requires clearance and need to know before sending via
encrypted email
Which of the following is true of PHI? - Answer It is created of received by a healthcare
provider, health plan, or employer
What designation includes PII and PHI? - Answer CUI
Which is a best practice for protecting CUI? - Answer Store in locked drawer after
working hours
Which of the following is true of CUI? - Answer CUI must be handled using
safeguarding or dissemination controls
Which of the following is NOT PII? - Answer High school attended
Which of the following describes good physical security - Answer Lionel stops an
individual in his secure area who's not wearing a badge
Which Cyber Protection Condition establishes protection priority focus on critical
functions only? - Answer CPCON 1
Which of the following is an example of a strong password? - Answer password12345,
dummy.
Which of the following is true of using a DoD PKI token? - Answer It should only be in a
system when actively using it for a PKI-required task.
Which of the following is true of the CAC or PIV card - Answer You should remove and
take your CAC/PIV when you leave your station.
Which of the following is an example of two-factor authentication? - Answer CAC and
PIN
Which of the following is true of sharing information in a SCIF? - Answer Individuals
must avoid referencing derivatively ......
A compromise of SCI occurs when a person who doesn't have required clearance or
access caveats comes into possession of SCI - Answer in any manner
Which of the following is true of transmitting SCI? - Answer You may only transport SCI
if you have been courier briefed for SCI
Which of the following is NOT a potential consequence of using removable media
unsafely in a SCIF? - Answer Damage to the removable media
How should you label removable media used in a SCIF? - Answer With the maximum
classification, date of creation, POC, and CM Control Number
Which of the following is true of downloading apps? - Answer For Government-owned
devices, use approved and authorized applications only
Which of the following statements is true of cookies? - Answer You should confirm that
a site that wants to store a cookie uses an encrypted link
How should you respond to the theft of your identity? - Answer THE ANSWER IS NOT
notify your security POC.
"to respond to identity theft if it occurs: contact credit reporting agencies, contact
financial institutions to cancel accounts, monitor credit card statements for unauthorized
purchases, report the crime to local law enforcement"
Which of the following is true of internet hoaxes? - Answer They can be part of a DDoS
attack. [Show Less]