Back to AI Flashcard MakerInformation Technology /Cyber Awareness Knowledge Check - 2024 Part 4

Cyber Awareness Knowledge Check - 2024 Part 4

Information Technology25 CardsCreated 4 months ago

This deck covers key concepts and practices for maintaining cyber awareness and security, including handling sensitive information, protecting devices, and recognizing potential threats.

Which must be approved and signed by a cognizant Original Classification Authority (OCA)?

Security Classification Guide (SCG)
Tap or swipe ↕ to flip
Swipe ←→Navigate
1/25

Key Terms

Term
Definition
Which must be approved and signed by a cognizant Original Classification Authority (OCA)?
Security Classification Guide (SCG)
What portable electronic devices (PEDs) are allowed in a Secure Compartmented Information Facility (SCIF)?
Government-owned PEDs, if expressly authorized by your agency.
What is a way to prevent the download of viruses and other malicious code when checking your e-mail?
View e-mail in plain text and don't view e-mail in Preview Pane.
What is a best practice to protect data on your mobile computing device?
Lock your device screen when not in use and require a password to reactivate.
Which of the following is NOT an example of sensitive information?
Press release data
Under what circumstances is it permitted to share an unclassified draft document with a non-DoD professional discussion group?
As long as the document is cleared for public release, you may share it outside of DoD.

Related Flashcard Decks

Study Tips

  • Press F to enter focus mode for distraction-free studying
  • Review cards regularly to improve retention
  • Try to recall the answer before flipping the card
  • Share this deck with friends to study together
TermDefinition
Which must be approved and signed by a cognizant Original Classification Authority (OCA)?
Security Classification Guide (SCG)
What portable electronic devices (PEDs) are allowed in a Secure Compartmented Information Facility (SCIF)?
Government-owned PEDs, if expressly authorized by your agency.
What is a way to prevent the download of viruses and other malicious code when checking your e-mail?
View e-mail in plain text and don't view e-mail in Preview Pane.
What is a best practice to protect data on your mobile computing device?
Lock your device screen when not in use and require a password to reactivate.
Which of the following is NOT an example of sensitive information?
Press release data
Under what circumstances is it permitted to share an unclassified draft document with a non-DoD professional discussion group?
As long as the document is cleared for public release, you may share it outside of DoD.
Which of the following is true of protecting classified data?
Classified material must be appropriately marked.
What advantages do 'insider threats' have over others that allows them to cause damage to their organizations more easily?
Insiders are given a level of trust and have authorized access to Government information systems.
Which of the following should be reported as a potential security threat?
A coworker removes sensitive information without authorization.
Which of the following does Cyberspace Protection Conditions (CPCON) establish during significant cyberspace events?
Protection priorities
What is the best way to protect your Common Access Card (CAC)?
Maintain possession of it at all times.
When should documents be marked within a Sensitive Compartmented Information Facility (SCIF)?
Unclassified documents do not need to be marked in a SCIF. -NOT
Which of the following is a best practice for handling cookies?
If possible, set your browser preferences to prompt you each time a website wants to store a cookie.
You receive an email at your official Government email address from an individual at the Office of Personnel Management (OPM). The email provides a link to a personnel portal where you must enter your personal information as part of an effort to standardize recordkeeping. What action should you take first?
Look for a digital signature on the email.
You receive a call from someone from the help desk who needs your assistance with a problem on your computer. How should you respond?
Ask the caller, 'What's your full name and phone number?'
Which of the following is a way to protect against social engineering?
Follow instructions given only by verified personnel.
A man you do not know is trying to look at your Government-issued phone and has asked to use it. What should you do?
Decline to lend the man your phone.
Which of the following actions is appropriate after finding classified information on the internet?
Note any identifying information and the website's Resource Locator (URL)
You receive an inquiry from a reporter about potentially classified information on the Internet. How should you respond?
Refer the reporter to your organization's public affairs office
Which of the following best describes the sources that contribute to your online identity?
Data about you collected from all sites, apps, and devices that you use can be aggregated to form a profile of you.
Which of the following information is a security risk when posted publicly on your social networking profile?
Your political affiliation - NOT
Which of following is a best practice for physical security?
Use your own facility access badge or key code
In which situation are you permitted to use your PKI token?
On a NIPRNet system while using it for a PKI-required task
When faxing Sensitive Compartmented Information (SCI), what actions should you take?
Mark SCI documents appropriately and use an approved SCI fax machine
If an incident occurs involving removable media in a Sensitive Compartmented Information Facility (SCIF), what action should you take?
Notify your security point of contact