MCQGeeks
0 : 0 : 1
CBSE
JEE
NTSE
NEET
English
UK Quiz
Quiz
Driving Test
Practice
Games
Practice
Cyber Awareness Challenge 2020 Knowledge Check Quiz
«
Multiple Choice Questions
»
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
Which scenario might indicate a reportable insider threat security incident?
0%
Note any identifying information, such as the website's URL, and report the situation to your security POC.
0%
Ensure proper labeling by appropriately marking all classified material and, when required, sensitive material.
0%
A coworker is observed using a personal electronic device in an area where their use is prohibited.
0%
Secure personal mobile devices to the same level as Government-issued systems.
Under what circumstances could unclassified information be considered a threat to national security?
0%
If aggregated, the information could become classified.
0%
Insiders are given a level of trust and have authorized access to Government information systems.
0%
Be aware of classification markings and all handling caveats.
0%
Any time you participate in or condone misconduct, whether offline or online.
Which of the following is a good practice to aid in preventing spillage?
0%
Understanding and using available privacy settings.
0%
The proper security clearance and indoctrination into the SCI program.
0%
Secure personal mobile devices to the same level as Government-issued systems.
0%
Be aware of classification markings and all handling caveats.
What is a good practice for physical security?
0%
Ensure that the wireless security features are properly configured.
0%
It includes a threat of dire circumstances.
0%
Immediately notify your security POC.
0%
Challenge people without proper badges.
What must you do when e-mailing Personally Identifiable Information (PII) or Protected Health Information (PHI)?
0%
Encrypt the e-mail and use your Government e-mail account.
0%
Comply with Configuration/Change Management (CM) policies and procedures
0%
Avoid a potential security violation by using the appropriate token for each system.
0%
Ensure that the wireless security features are properly configured.
Which is a risk associated with removable media?
0%
Immediately notify your security POC.
0%
Challenge people without proper badges.
0%
Spillage of classified information.
0%
Use online sites to confirm or expose potential hoaxes.
What is a valid response when identity theft occurs?
0%
Your health insurance explanation of benefits (EOB)
0%
Report the crime to local law enforcement.
0%
Ensure that the wireless security features are properly configured.
0%
Approved Security Classification Guide (SCG)
What are the requirements to be granted access to SCI material?
0%
Something you possess, like a CAC, and something you know, like a PIN or password.
0%
Shred personal documents; never share passwords; and order a credit report annually.
0%
Social Security Number; date and place of birth; mother's maiden name
0%
The proper security clearance and indoctrination into the SCI program.
What is a good practice to protect data on your home wireless systems?
0%
Ensure proper labeling by appropriately marking all classified material and, when required, sensitive material.
0%
Ensure that the wireless security features are properly configured.
0%
Avoid using the same password between systems or applications.
0%
Challenge people without proper badges.
A coworker is observed using a personal electronic device in an area where their use is prohibited.
0%
Which of the following is a good practice to aid in preventing spillage?
0%
Which scenario might indicate a reportable insider threat security incident?
0%
What is the best response if you find classified government data on the internet?
0%
What is required for an individual to access classified data?
Note any identifying information, such as the website's URL, and report the situation to your security POC.
0%
What is the best response if you find classified government data on the internet?
0%
When is the best time to post details of your vacation activities on your social networking website?
0%
What is the best example of Protected Health information (PHI)?
0%
Whats is the best description of two-factor authentication?
A type of phishing targeted at high-end personnel such as senior officials.
0%
What is a good practice to protect data on your home wireless systems?
0%
What is whaling?
0%
Whats is the best description of two-factor authentication?
0%
What is required for an individual to access classified data?
Don't talk about work outside your workspace unless it is a specifically designated public meeting environment and is controlled by the event planners.
0%
Which of the following is a good practice to aid in preventing spillage?
0%
which of the following practices reduces the chance of becoming a target by adversaries seeking information?
0%
When is the best time to post details of your vacation activities on your social networking website?
0%
What is the best response if you find classified government data on the internet?
it can cause damage by corrupting files, erasing your hard drive, and/or allowing hackers access.
0%
What helps protect from spear phishing?
0%
What is whaling?
0%
When classified data is not in use, how can you protect it?
0%
What can malicious code do?
Spillage of classified information.
0%
Which may be a security issue with compressed URLs?
0%
What is a good practice for physical security?
0%
Which is a risk associated with removable media?
0%
Which of the following is a good practice to aid in preventing spillage?
Be wary of suspicious e-mails that use your name and/or appear to come from inside your organization.
0%
What is the best response if you find classified government data on the internet?
0%
What are the requirements to be granted access to SCI material?
0%
What helps protect from spear phishing?
0%
Which of the following is a good practice to aid in preventing spillage?
Ensure that the wireless security features are properly configured.
0%
What is a good practice to protect data on your home wireless systems?
0%
What is required for an individual to access classified data?
0%
What is a good practice when it is necessary to use a password to access a system or an application?
0%
What is the best example of Protected Health information (PHI)?
The proper security clearance and indoctrination into the SCI program.
0%
Whats is the best description of two-factor authentication?
0%
What is required for an individual to access classified data?
0%
What is the best example of Protected Health information (PHI)?
0%
What are the requirements to be granted access to SCI material?
Near field communication (NFC).
0%
Which is a wireless technology that enables your electronic devices to establish communications and exchange information when placed next to each other called?
0%
What is a good practice when it is necessary to use a password to access a system or an application?
0%
Under what circumstances is it acceptable to use your Government-furnished computer to check personal e-mail and do other non-work related activities?
0%
Which is a risk associated with removable media?
When your vacation is over, and you have returned home.
0%
What is the best response if you find classified government data on the internet?
0%
What are the requirements to be granted access to SCI material?
0%
What is the best example of Protected Health information (PHI)?
0%
When is the best time to post details of your vacation activities on your social networking website?
Connect to the Government Virtual Private Network (VPN).
0%
What must you do when e-mailing Personally Identifiable Information (PII) or Protected Health Information (PHI)?
0%
Upon connecting your Government-issued laptop to a public wireless connection, what should you immediately do?
0%
Under what circumstances could unclassified information be considered a threat to national security?
0%
What is a good practice when it is necessary to use a password to access a system or an application?
Insiders are given a level of trust and have authorized access to government information systems.
0%
What is a good practice when it is necessary to use a password to access a system or an application?
0%
What is the best response if you find classified government data on the internet?
0%
Why might "insiders' be able to cause damage to their organizations more easily than others?
0%
Which scenario might indicate a reportable insider threat security incident?
If aggregated, the information could become classified.
0%
Upon connecting your Government-issued laptop to a public wireless connection, what should you immediately do?
0%
Under what circumstances is it acceptable to use your Government-furnished computer to check personal e-mail and do other non-work related activities?
0%
When is the best time to post details of your vacation activities on your social networking website?
0%
Under what circumstances could unclassified information be considered a threat to national security?
If allowed by organizational policy.
0%
Which is a wireless technology that enables your electronic devices to establish communications and exchange information when placed next to each other called?
0%
Which is a risk associated with removable media?
0%
Under what circumstances could unclassified information be considered a threat to national security?
0%
Under what circumstances is it acceptable to use your Government-furnished computer to check personal e-mail and do other non-work related activities?
Encrypt the e-mail and use your Government e-mail account.
0%
Upon connecting your Government-issued laptop to a public wireless connection, what should you immediately do?
0%
What must you do when e-mailing Personally Identifiable Information (PII) or Protected Health Information (PHI)?
0%
What is a good practice when it is necessary to use a password to access a system or an application?
0%
What is a good practice to protect data on your home wireless systems?
The Director of National Intelligence.
0%
What can malicious code do?
0%
What is a valid response when identity theft occurs?
0%
Which is a rule for removable media, other portable electronic devices (PEDs), and mobile computing devices to protect Government systems?
0%
What organization issues the directives concerning the dissemination of information regarding intelligence sources, methods, or activities?
Challenge people without proper badges.
0%
What is a good practice when it is necessary to use a password to access a system or an application?
0%
Which is a risk associated with removable media?
0%
What is a good practice to protect data on your home wireless systems?
0%
What is a good practice for physical security?
Your health insurance explanation of benefits (EOB).
0%
What is the best response if you find classified government data on the internet?
0%
When is the best time to post details of your vacation activities on your social networking website?
0%
What is the best example of Protected Health information (PHI)?
0%
Whats is the best description of two-factor authentication?
Report the crime to local law enforcement.
0%
What is a valid response when identity theft occurs?
0%
What is a good practice to protect data on your home wireless systems?
0%
What is a good practice for physical security?
0%
What is the best example of Protected Health information (PHI)?
Something you possess, like a CAC, and something you know, like a PIN or password.
0%
What is the best response if you find classified government data on the internet?
0%
What is the best example of Protected Health information (PHI)?
0%
Whats is the best description of two-factor authentication?
0%
What are the requirements to be granted access to SCI material?
Be aware of classification markings and all handling caveats.
0%
Which is a risk associated with removable media?
0%
Which of the following is a good practice to aid in preventing spillage?
0%
What are the requirements to be granted access to SCI material?
0%
which represents a security best practice when using social networking?
0 h : 0 m : 1 s
«
Multiple Choice Questions
»
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
0
Answered
0
Not Answered
0
Not Visited
Correct : 0
Incorrect : 0
Report Question
×
What's an issue?
Question is wrong
Answer is wrong
Other Reason
Want to elaborate a bit more? (optional)
Support mcqgeeks.com by disabling your adblocker.
×
Please disable the adBlock and continue.
Thank you.
Reload page