Back to AI Flashcard MakerInformation Technology /Cyber Awareness Knowledge Check - 2024 Part 4
Cyber Awareness Knowledge Check - 2024 Part 4
This deck covers key concepts and practices for maintaining cyber awareness and security, including handling sensitive information, protecting devices, and recognizing potential threats.
Which must be approved and signed by a cognizant Original Classification Authority (OCA)?
Security Classification Guide (SCG)
Tap or swipe ↕ to flip
Swipe ←→Navigate
1/25
Key Terms
Term
Definition
Which must be approved and signed by a cognizant Original Classification Authority (OCA)?
Security Classification Guide (SCG)
What portable electronic devices (PEDs) are allowed in a Secure Compartmented Information Facility (SCIF)?
Government-owned PEDs, if expressly authorized by your agency.
What is a way to prevent the download of viruses and other malicious code when checking your e-mail?
View e-mail in plain text and don't view e-mail in Preview Pane.
What is a best practice to protect data on your mobile computing device?
Lock your device screen when not in use and require a password to reactivate.
Which of the following is NOT an example of sensitive information?
Press release data
Under what circumstances is it permitted to share an unclassified draft document with a non-DoD professional discussion group?
As long as the document is cleared for public release, you may share it outside of DoD.
Related Flashcard Decks
Study Tips
- Press F to enter focus mode for distraction-free studying
- Review cards regularly to improve retention
- Try to recall the answer before flipping the card
- Share this deck with friends to study together
| Term | Definition |
|---|---|
Which must be approved and signed by a cognizant Original Classification Authority (OCA)? | Security Classification Guide (SCG) |
What portable electronic devices (PEDs) are allowed in a Secure Compartmented Information Facility (SCIF)? | Government-owned PEDs, if expressly authorized by your agency. |
What is a way to prevent the download of viruses and other malicious code when checking your e-mail? | View e-mail in plain text and don't view e-mail in Preview Pane. |
What is a best practice to protect data on your mobile computing device? | Lock your device screen when not in use and require a password to reactivate. |
Which of the following is NOT an example of sensitive information? | Press release data |
Under what circumstances is it permitted to share an unclassified draft document with a non-DoD professional discussion group? | As long as the document is cleared for public release, you may share it outside of DoD. |
Which of the following is true of protecting classified data? | Classified material must be appropriately marked. |
What advantages do 'insider threats' have over others that allows them to cause damage to their organizations more easily? | Insiders are given a level of trust and have authorized access to Government information systems. |
Which of the following should be reported as a potential security threat? | A coworker removes sensitive information without authorization. |
Which of the following does Cyberspace Protection Conditions (CPCON) establish during significant cyberspace events? | Protection priorities |
What is the best way to protect your Common Access Card (CAC)? | Maintain possession of it at all times. |
When should documents be marked within a Sensitive Compartmented Information Facility (SCIF)? | Unclassified documents do not need to be marked in a SCIF. -NOT |
Which of the following is a best practice for handling cookies? | If possible, set your browser preferences to prompt you each time a website wants to store a cookie. |
You receive an email at your official Government email address from an individual at the Office of Personnel Management (OPM). The email provides a link to a personnel portal where you must enter your personal information as part of an effort to standardize recordkeeping. What action should you take first? | Look for a digital signature on the email. |
You receive a call from someone from the help desk who needs your assistance with a problem on your computer. How should you respond? | Ask the caller, 'What's your full name and phone number?' |
Which of the following is a way to protect against social engineering? | Follow instructions given only by verified personnel. |
A man you do not know is trying to look at your Government-issued phone and has asked to use it. What should you do? | Decline to lend the man your phone. |
Which of the following actions is appropriate after finding classified information on the internet? | Note any identifying information and the website's Resource Locator (URL) |
You receive an inquiry from a reporter about potentially classified information on the Internet. How should you respond? | Refer the reporter to your organization's public affairs office |
Which of the following best describes the sources that contribute to your online identity? | Data about you collected from all sites, apps, and devices that you use can be aggregated to form a profile of you. |
Which of the following information is a security risk when posted publicly on your social networking profile? | Your political affiliation - NOT |
Which of following is a best practice for physical security? | Use your own facility access badge or key code |
In which situation are you permitted to use your PKI token? | On a NIPRNet system while using it for a PKI-required task |
When faxing Sensitive Compartmented Information (SCI), what actions should you take? | Mark SCI documents appropriately and use an approved SCI fax machine |
If an incident occurs involving removable media in a Sensitive Compartmented Information Facility (SCIF), what action should you take? | Notify your security point of contact |