Back to AI Flashcard MakerInformation Technology /Cyber Awareness Knowledge Check - 2024 Part 2

Cyber Awareness Knowledge Check - 2024 Part 2

Information Technology29 CardsCreated 4 months ago

This deck covers key concepts related to cyber awareness, including the handling of sensitive information, insider threats, and security practices.

What information posted publicly on your personal social networking profile represents a security risk?

Your place of birth

Tap or swipe ↕ to flip
Swipe ←→Navigate
1/29

Key Terms

Term
Definition

What information posted publicly on your personal social networking profile represents a security risk?

Your place of birth

Under what circumstances could unclassified information be considered a threat to national security?
If aggregated, the information could become classified.
What type of unclassified material should always be marked with a special handling caveat?
For Official Use Only (FOUO)
Which is true for protecting classified data?
Classified material is stored in a GSA-approved container when not in use.
How many potential insider threat indicators does a person who is playful and charming, consistently win performance awards, but is occasionally aggressive in trying to access sensitive information?
1 Indicator
Which of the following terms refers to harm inflicted on national security through authorized access to information or information systems?
Insider Threat

Related Flashcard Decks

Study Tips

  • Press F to enter focus mode for distraction-free studying
  • Review cards regularly to improve retention
  • Try to recall the answer before flipping the card
  • Share this deck with friends to study together
TermDefinition

What information posted publicly on your personal social networking profile represents a security risk?

Your place of birth

Under what circumstances could unclassified information be considered a threat to national security?
If aggregated, the information could become classified.
What type of unclassified material should always be marked with a special handling caveat?
For Official Use Only (FOUO)
Which is true for protecting classified data?
Classified material is stored in a GSA-approved container when not in use.
How many potential insider threat indicators does a person who is playful and charming, consistently win performance awards, but is occasionally aggressive in trying to access sensitive information?
1 Indicator
Which of the following terms refers to harm inflicted on national security through authorized access to information or information systems?
Insider Threat
What is the best example of Personally Identifiable Information (PII)?
Date and place of birth
What is the best example of Protected Health Information (PHI)?
Your health insurance explanation of benefits (EOB)
When is the best time to post details of your vacation activities on your social networking website?
When your vacation is over, and you have returned home
What does Personally Identifiable Information (PII) include?
Social Security Number; date and place of birth; mother's maiden name
What must you ensure if you work involves the use of different types of smart card security tokens?
Avoid a potential security violation by using the appropriate token for each system.
What must you ensure before transmitting Personally Identifiable Information (PII) or Protected Health Information (PHI) via e-mail?
Transmissions must be between Government e-mail accounts and must be encrypted and digitally signed when possible.
What must you do when e-mailing Personally Identifiable Information (PII) or Protected Health Information (PHI)?
Encrypt the e-mail and use your Government e-mail account.
What is a good practice for physical security?
Challenge people without proper badges.
Is it acceptable to take a short break while a coworker monitors your computer while logged on with your CAC?
No. Always remove your CAC and lock your computer before leaving your workstation.
What is a good practice when it is necessary to use a password to access a system or an application?
Avoid using the same password between systems or applications.
What is the best description of two-factor authentication?
Something you possess, like a CAC, and something you know, like a PIN or password.
What certificates are contained on the DoD Public Key Infrastructure (PKI) implemented by the Common Access Card (CAC)/Personal Identity Verification (PIV) card?
Identification, encryption, and digital signature
What are the requirements to be granted access to SCI material?
The proper security clearance and indoctrination into the SCI program.
What is a protection against internet hoaxes?
Use online sites to confirm or expose potential hoaxes.
What organization issues the directives concerning the dissemination of information regarding intelligence sources, methods, or activities?
Department of Defense.
Which term describes an event where a person who does not have the required clearance or access caveats comes into possession of Sensitive Compartmented Information (SCI)
Compromise
What describes a Sensitive Compartmented Information (SCI) program?
A program that segregates various type of classified information into distinct compartments for added protection and dissemination for distribution control.
What describes how Sensitive Compartmented Information is marked?
Approved Security Classification Guide (SCG)
What must users do when using removable media within a Sensitive Compartmented Information Facility (SCIF)?
Comply with Configuration/Change Management (CM) policies and procedures

What is an individual's Personally Identifiable Information (PII) or Protected Health Information (PHI) considered?

Sensitive information.