Docsity
Docsity

Prepare for your exams
Prepare for your exams

Study with the several resources on Docsity


Earn points to download
Earn points to download

Earn points by helping other students or get them with a premium plan


Guidelines and tips
Guidelines and tips

Cybersecurity Awareness: Questions and Answers, Exams of Cybercrime, Cybersecurity and Data Privacy

A series of questions and answers related to cybersecurity awareness, covering topics such as handling classified data, insider threats, social media security, and protecting sensitive information. It is a valuable resource for individuals seeking to enhance their understanding of cybersecurity best practices.

Typology: Exams

2024/2025

Available from 01/30/2025

NurseTakshif
NurseTakshif 🇬🇧

4

(4)

1.3K documents

1 / 14

Toggle sidebar

This page cannot be seen from the preview

Don't miss anything!

bg1
1g/g
14
Cyber Awareness
Questions and Answers
Updated Latest (Verified Answers)
1. Agvendorgconductinggagpilotgprogramgwithgyourgorganizationgcontactsgyougforgorganizati
onalgdatagtogusegingagprototype.gHowgshouldgyougrespond
ANSWERgRefergthegvendorgtogthegappropriategpersonnel.
2. Whengclassifiedgdatagisgnotginguse,ghowgcangyougprotectgitg
ANSWERgStoregclassifiedgdatagappropriatelygingagGSA-approvedgvault/container.
3. Whatgisgthegbasisgforghandlinggandgstoragegofgclassifiedgdata
ANSWERgClassificationgmarkingsgandghandlinggcaveats.
4. Whichgofgthegfollowinggmustgyougdogbeforegusinggangunclassifiedglaptopgandgperipheralsgi
ngagcollateralgclassifiedgenvironment
ANSWERgEnsuregthatganygcameras,gmicrophones,gandgWi-
Figembeddedgingtheglaptopgaregphysicallygdisabled.
5. WhatglevelgofgdamagegtognationalgsecuritygcangyougreasonablygexpectgTopgsecretginfor
mationgtogcausegifgdisclosed
ANSWERgExceptionallyggravegdamage.
6. Whichgofgthegfollowinggisgtruegaboutgtelework
pf3
pf4
pf5
pf8
pf9
pfa
pfd
pfe

Partial preview of the text

Download Cybersecurity Awareness: Questions and Answers and more Exams Cybercrime, Cybersecurity and Data Privacy in PDF only on Docsity!

114 g/g

Cyber Awareness

Questions and Answers

Updated Latest (Verified Answers)

  1. Agvendorgconductinggagpilotgprogramgwithgyourgorganizationgcontactsgyougforgorganizati onalgdatagtogusegingagprototype.gHowgshouldgyougrespond ANSWERgRefergthegvendorgtogthegappropriategpersonnel.
  2. Whengclassifiedgdatagisgnotginguse,ghowgcangyougprotectgitg ANSWERgStoregclassifiedgdatagappropriatelygingagGSA-approvedgvault/container.
  3. Whatgisgthegbasisgforghandlinggandgstoragegofgclassifiedgdata ANSWERgClassificationgmarkingsgandghandlinggcaveats.
  4. Whichgofgthegfollowinggmustgyougdogbeforegusinggangunclassifiedglaptopgandgperipheralsgi ngagcollateralgclassifiedgenvironment ANSWERgEnsuregthatganygcameras,gmicrophones,gandgWi- Figembeddedgingtheglaptopgaregphysicallygdisabled.
  5. WhatglevelgofgdamagegtognationalgsecuritygcangyougreasonablygexpectgTopgsecretginfor mationgtogcausegifgdisclosed ANSWERgExceptionallyggravegdamage.
  6. Whichgofgthegfollowinggisgtruegaboutgtelework

214 g/g

ANSWERgYougmustghavegyourgorganiza-gtion'sgpermissiongtogtelework.

  1. Whichgofgthegfollowinggisgtruegofgprotectinggclassifiedgdata? ANSWERClassifiedgma-gterialgmustgbegappropriatelygmarked.
  2. Whichgofgthegfollowinggisgagreportableginsidergthreatgactivity ANSWERgAttemptinggtogaccessgsensitiveginformationgwithoutgneed-to-know.
  3. Whichgscenariogmightgindicategagreportableginsidergthreat ANSWERgagcolleaguegremovesgsensitiveginformationgwithoutgseekinggauthorizationgingor dergtogperformgauthorizedgtelework.
  4. Whichgofgthegfollowinggisgagpotentialginsidergthreatgindicator ANSWERg1)gUnusualginterestgingclassifiedginformation.g2)gDifficultglifegcircumstances,gsuchg asgdeathgofgspouse.
  5. Whichgpiecegofginformationgisgsafestgtogincludegongyourgsocialgmediagprofile ANSWERgYourgfavoritegmovie.
  6. Whichgofgthegfollowinggstatementsgisgtrue ANSWERgManygappsgandgsmartgdevicesgcollectgandgsharegyourgpersonalginformationgandgc ontributegtogyourgonlinegidentity.
  7. Howgcangyougprotectgyourgorganizationgongsocialgnetworkinggsites ANSWERgEnsuregtheregaregnogidentifiableglandmarksgvisibleginganygphotosgtakengingagworkgsett

414 g/g

  1. WhichgofgthegfollowinggisgNOTgagcorrectgwaygtogprotectgCUI ANSWERgCUIgmaygbegstoredgonganygpassword-protectedgsystem.
  2. Whichgofgthegfollowinggbestgdescribesggoodgphysicalgsecurity ANSWERgLionelgstopsgangindividualginghisgsecuregareagwhogisgnotgwearinggagbadge.
  3. Whichgofgthegfollowinggisgangexamplegofgtwo-factorgauthentication ANSWERgAgCommongAccessgCardgandgPersonalgIdentificationgNumber.
  4. WhatgisgthegbestgwaygtogprotectgyourgCommongAccessgCardg(CAC)gorgPersonalgIde ntitygVerificationg(PIV)gcard ANSWERgStoregitgingagshieldedgsleeve.
  5. WhatgmustgauthorizedgpersonnelgdogbeforegpermittingganothergindividualgtogentergagS ensitivegCompartmentedgInformationgFacilityg(SCIF) ANSWERgConfirmgthegindividual'sgneed-to-knowgandgaccess.
  6. WhichgofgthegfollowinggisgtruegofgSensitivegCompartmentedgInformationg(SCI) ANSWERgAccessgrequiresgTopgSecretgclearancegandgindoctrinationgintogthegSCIgpro-ggram.
  7. WhichgofgthegfollowinggisgNOTgagpotentialgconsequencegofgusinggremovablegmediagunsaf elygingagSensitivegCompartmentedgInformationgFacilityg(SCIF) ANSWERg-gDamagegtogthegremovablegmedia.
  8. Whatgportablegelectronicgdevicesg(PEDs)garegpermittedgingagSCIF

514 g/g

ANSWERgOnlygexpresslygauthorizedggovernment-ownedgPEDs.

  1. WhatgisgthegresponsegtogangincidentgsuchgasgopeningganguncontrolledgDVDgongagcompute rgingagSCIF ANSWERgAllgofgthese.
  2. WhichgofgthegfollowinggisgNOTgagtypegofgmaliciousgcode ANSWERgExecutables.
  3. Whichgofgthegfollowinggactionsgcanghelpgtpgprotectgyourgidentity ANSWERgShredgpersonalgdocuments.
  4. Whichgisgangappropriategusegofggovernmentge-mail ANSWERgUsegagdigitalgsignaturegwhengsendinggattachmentsgorghyperlinks.
  5. Whatgtypegofgsocialgengineeringgtargetsgparticularggroupsgofgpeople ANSWERg- Speargphishing.
  6. Howgcangyougprotectgyourselfgfromgsocialgengineering ANSWERgVerifygthegidentitygofgallgindividuals.
  7. Whichgofgthegfollowinggisgtruegofgtravelinggoverseasgwithgagmobilegphone?-

ANSWERgAgpersonallygownedgdevicegapprovedgundergBringgYourgOwngApprovedgDeviceg(BYOAD

714 g/g

  1. Howgcangyougprotectgdatagongyourgmobilegcomputinggandgportablegelectron- gicgdevicesg(PEDs) ANSWERgEnablegautomaticgscreenglockinggaftergagperiodgofginactivity.
  2. Whichgofgthegfollowinggisgangexamplegofgremovablegmedia ANSWERgExternalghardgdrive.
  3. WhichgofgthegfollowinggisgtruegofgInternetgofgThingsg(IoT)gdevices ANSWERgTheygcangbecomegangattackgvectorgtogothergdevicesgongyourghomegnetwork.
  4. Whengisgitgappropriategtoghavegyourgsecuritygbadgegvisible ANSWERgAtgallgtimesgwhengingthegfacility.
  5. WhatgshouldgthegownergofgthisgprintedgSCIgdogdifferently ANSWERgRetrievegclassifiedgdocumentsgpromptlygfromgprinters.
  6. WhatgshouldgthegparticipantsgingthisgconversationginvolvinggSCIgdogdiffer-gently ANSWERgPhysicallygassessgthatgeveryonegwithinglisteninggdistancegisgclearedgandghasgagneed- to-knowgforgtheginformationgbeinggdiscussed.
  7. Whichgofgthegfollowinggdemonstratesgpropergprotectiongofgmobilegdevices?-

ANSWERgLindagencryptsgallgofgthegsensitivegdatagongherggovernment-issuedgmobilegdevices.

  1. WhichgofgthegfollowinggdoesgNOTgconstitutegspillage

814 g/g

ANSWERgClassifiedginformationgthatgshouldgbegunclassifiedgandgisgdowngraded.

  1. WhichgofgthegfollowinggisgNOTgangappropriategwaygtogprotectgagainstgin- gadvertentgspillage ANSWERgUsegthegclassifiedgnetworkgforgallgwork,gincludinggunclassifiedgwork.
  2. WhichgofgthegfollowinggshouldgyougNOTgdogifgyougfindgclassifiedginformationgongthegintern et ANSWERgDownloadgtheginformation.
  3. Whogdesignatesgwhetherginformationgisgclassifiedgandgitsgclassificationglevel ANSWER
  4. Whichgofgthegfollowinggisgaggoodgpracticegtogprotectgclassifiedginformation?-

ANSWER

  1. Whichgofgthegfollowinggmayghelpgtogpreventgspillage ANSWERgFollowgproceduresgforgtransferringgdatagtogandgfromgoutsidegagencygandgnon- governmentgnetworks.
  2. Whogdesignatesgwhetherginformationgisgclassifiedgandgitsgclassificationglevel ANSWERgOriginalgclassificationgauthority.
  3. Ingadditiongtogavoidinggthegtemptationgofggreedgtogbetrayghisgcountry,gwhatgshouldgAlexg

(^10) / 14

  1. Whichgofgthegfollowinggbestgdescribesgthegconditionsgundergwhichgmobilegdevicesgandg applicationsgcangtrackgyourglocation ANSWERgItgisgoftengthegdefaultgbutgcangbegpreventedgbygdisablinggtheglocationgfunction.
  2. Whengisgitgokaygtogchargegagpersonalgmobilegdevicegusingggovernment-fur- gnishedgequipmentg(GFE) ANSWERgThisgisgnevergokay.
  3. WhatgsecuritygriskgdoesgagpublicgWi-Figconnectiongpose ANSWERgItgmaygprohibitgthegusegofgagvirtualgprivategnetworkg(VPN).
  4. WhichgofgthegfollowinggrepresentsgangethicalgusegofgyourgGovernment-fur- gnishedgequipmentg(GFE) ANSWERgCheckinggpersonalge-mailgwhengallowedgbygyourgorga-gnization.
  5. Whengmaygyougbegsubjectgtogcriminal,gdisciplinary,gand/orgadministrativegactiongduegt ogonlinegharassment,gbullying,gstalking,ghazing,gdiscrimination,gorgretaliation ANSWERgIfgyougparticipategingorgcondonegitgatganygtime.
  6. Howgcangyougprotectgyourselfgongsocialgnetworkinggsites ANSWERgValidategfriendgrequestsgthroughganothergsourcegthroughganothergsourcegbeforeg confirminggthem.
  7. Whichgpiecegofginformationgisgsafestgtogincludegongyourgsocialgmediagprofile

(^11) / 14

ANSWERgPhotosgofgyourgpet.

  1. Whichgofgthegfollowinggisgtruegofgremovablegmediagandgportablegelectronicgdevicesg(PE Ds) ANSWERgTheyghavegsimilargfeatures,gandgthegsamegrulesgandgprotectionsgapplygtogboth.
  2. WhichgofgthegfollowinggisgagsecuritygbestgpracticegforgprotectinggPersonal- glygIdentifiablegInformationg(PII) ANSWERgOnlygusegGovernment-approvedgequipmentgtogprocessgPII.
  3. WhichgofgthegfollowinggisgtruegofgControlledgUnclassifiedgInformationg(CUI) ANSWERgCUIgmustgbeghandledgusinggsafeguardinggorgdisseminationgcontrols.
  4. WhichgCybergProtectiongConditiong(CPCON)gestablishesgagprotectiongpri- goritygfocusgongcriticalgfunctionsgonly ANSWERgCPCONg1.
  5. WhichgofgthegfollowinggisgtruegofgthegCommongAccessgCardg(CAC)gorgPer- gsonalgIdentitygVerificationg(PIV)gcard ANSWERgYougshouldgremovegandgtakegyourgCAC/PIVgcardgwhenevergyougleavegyourgworkstati on.
  6. Whichgofgthegfollowinggisgangexamplegofgagstronggpassword ANSWERg%2ZN=Ugq

(^13) / 14

  1. Whichgofgthegfollowinggstatementsgisgtrue ANSWERgAdversariesgexploitgsocialgnet-gworkinggsitesgtogdisseminategfakegnews.
  2. WhichgofgthegfollowinggisgtruegaboutgURLs ANSWERgMaygbegusedgtogmaskgmaliciousgintent.
  3. Whatgdoesg"spillagegrefergto ANSWERgInformationgimproperlygmovedgfromgaghighergprotectionglevelgtogaglowergprotect ionglevel.
  4. Basedgongthegdescriptiongthatgfollows,ghawgmanygpotentialginsidergthreatgindicator(s)ga regdisplayed?gagcolleaguegenjoysgplayinggvideosggames,gregularlygusesgsocialgmedia,gandgfrequ entlygforgetsgtogsecureghergsmartphonegelsewheregbeforegenteringgareasgwheregitgisgprohibit ed. ANSWERg 1 gindicator
  5. Agtrustedgfriendgingyourgsocialgnetworkgpostsgaglinkgtogvaccineginformationgongagwebsiteg unknowngtogyou.gWhatgactiongshouldgyougtake ANSWERgResearchgthegsourcegtogevaluategitsgcredibilitygandgreliability.
  6. WhichgofgthegfollowinggisgtruegofgthegCommongAccessgCardg(CAC) ANSWERgItgcontainsgcertificatesgforgidentification,gencryption,gandgdigitalgsignature.
  7. Whichgofgthegfollowinggisgtruegofgportablegelectronicgdevicesg(PEDs)gingagSensitivegC

(^14) / 14

ompartmentedgInformationgFacilityg(SCIF) ANSWERgonlygconnectggov-gernment- ownedgPEDsgtogthegsameglevelgclassificationginformationgsystemgwhengauthorized.

  1. Whichgofgthegfollowinggisgtruegofgdownloadinggapps ANSWERgForgGovern-gment- ownedgdevices,gusegapprovedgandgauthorizedgapplicationsgonly.
  2. Whichgofgthegfollowinggstatementsgisgtruegofgcookies ANSWERgYougshouldgconfirmgthatgagsitegthatgwantsgtogstoregagcookiegusesgangencryptedglink.
  3. WhatgactiongshouldgyougtakegwithgagcompressedgUniformgResourcegLocatorg(URL)gongagw ebsitegknowngtogyou ANSWERgSearchgforginstructionsgonghowgtogpreviewgwheregtheglinkgactuallygleads.
  4. Whichgofgthegfollowinggisgagbestgpracticegforgusinggremovablegmedia ANSWERgAvoidginsertinggremovablegmediagwithgunknowngcontentgintogyourgcomputer.
  5. Howgshouldgyougsecuregyourghomegwirelessgnetworkgforgteleworking ANSWERgIm-gplementgWi-FigProtectedgAccessg 2 g(WPA2)gPersonalgencryptiongatgagminimum.
  6. Whatgtypegofgsocialgengineeringgtargetsgseniorgofficials ANSWERgWhaling