What should you do after you have ended a call from a reporter asking you to confirm potentially classified info found on the web? |
Alert your security point of contact. |
Which of the following actions is appropriate after finding classified Government information on the internet? |
Note any identifying information and the website’s URL. |
Which of these is true of unclassified data? |
Its classification level may rise when aggregated. |
What type of information includes personal, payroll, medical, and operational information? |
Sensitive. |
What is the best protection method for sharing Personally Identifiable Information (PII)? |
Digitally sign and encrypt the email. |
Which of the following is NOT a typical result from running malicious code? |
Disables cookies. |
Which of the following is a practice that helps to protect you from identity theft? |
Ordering a credit report annually. |
Which of the following describes an appropriate use of Government email? |
Molly uses a digital signature when sending attachments or hyperlinks. |
Which of the following is true of Internet hoaxes? |
They can be part of a distributed denial-of-service (DDoS) attack. |
Which of the following is a practice that helps to prevent the download of viruses and other malicious code when checking your email? |
Do not access links or hyperlinked media such as buttons and graphics in email messages. |
Upon connecting your Government-issued laptop to a public wireless connection, what should you immediately do? |
Connect to the Government Virtual Private Network (VPN). |
Under what circumstances is it acceptable to check personal email on Government-furnished equipment (GFE)? |
If your organization allows it. |
When checking in at the airline counter for a business trip… |
Decline so that you maintain physical contact of your Government-issued laptop. |
A man you do not know is trying to look at your Government-issued phone and has asked to use it. What should you do? |
Decline to lend the man your phone. |
How can you protect your information when using wireless technology? |
Avoid using non-Bluetooth-paired or unencrypted wireless computer peripherals. |
What kind of information could reasonably be expected to cause serious damage to national security in the event of unauthorized disclosure? |
Top Secret |
A colleague has visited several foreign countries recently… |
. 2 indicators |
Which of the following is NOT considered a potential insider threat indicator? |
New interest in learning a foreign language. |
When would be a good time to post your vacation location and dates on your social networking website? |
When you return from your vacation. |
Which of the following statements is TRUE about the use of DoD Public Key Infrastructure (PKI) tokens? |
Always use DoD PKI tokens within their designated classification level. |
How should you protect your Common Access Card (CAC) or Personal Identity Verification (PIV) card? |
Store it in a shielded sleeve to avoid chip cloning. |
DOD Cyber Awareness Challenge 2019- Knowledge Check
Share This
Unfinished tasks keep piling up?
Let us complete them for you. Quickly and professionally.
Check Price