Cyber Awareness Challenge 2024 - MCQs Answer (PART - 2)
37. When is the safest time to post details of your vacation activities on your social networking website?
→ When your vacation is over, after you have returned home
38. What level of damage can the unauthorized disclosure of information classified as confidential reasonably be expected to cause?
→ Damage to national security
39. Which is a best practice that can prevent viruses and other malicious code from being downloaded when checking your e-mail?
→ Do not access website links, buttons, or graphics in e-mail
40. What type of social engineering targets particular individuals, groups of people, or organizations?
→ Spear phishing
41. What should you do after you have ended a call from a reporter asking you to confirm potentially classified information found on the web?
→ Alert your security point of contact.
42. Which of the following practices may reduce your appeal as a target for adversaries seeking to exploit your insider status?
→ Remove your security badge after leaving your controlled area or office building.
43. What type of unclassified material should always be marked with a special handling caveat?
→ For Official Use Only (FOUO)
44. Which of the following represents a good physical security practice?
→ Use your own security badge, key code, or Common Access Card (CAC)/Personal Identity Verification (PIV) card.
45. What certificates are contained on the Common Access Card (CAC)?
→ Identification, encryption, and digital signature
46. What describes how Sensitive Compartmented Information is marked?
→ Approved Security Classification Guide (SCG)
47. What should you do if a commercial entity, such as a hotel reception desk, asks to make a photocopy of your Common Access Card (CAC) for proof of Federal Government employment?
→ Do not allow your CAC to be photocopied.
48. Which of the following best describes the compromise of Sensitive Compartmented Information (SCI)?
→ A person who does not have the required clearance or assess caveats comes into possession of SCI in any manner.
49. What portable electronic devices (PEDs) are allow in a Secure Compartmented Information Facility (SCIF)?
→ Government-owned PEDs, if expressly authorized by your agency.
50. Which of the following is NOT a way that malicious code spreads?
→ Legitimate software updates
51. When can you check personal e-mail on your Government-furnished equipment (GFE)?
→ If allowed by organizational policy
52. When can you use removable media on a Government system?
→ When operationally necessary, owned by your organization, and approved by the appropriate authority
53. Upon connecting your Government-issued laptop to a public wireless connection, what should you immediately do?
→ Connect to the Government Virtual Private Network (VPN).
54. A coworker has asked if you want to download a programmer's game to play at work. What should be your response?
→ I'll pass
55. What is a good practice to protect data on your home wireless systems?
→ Ensure that the wireless security features are properly configured.
56. When may you be subjected to criminal, disciplinary, and/or administrative action due to online misconduct?
→ If you participate in or condone it at any time
57. Which Cyberspace Protection Condition (CPCON) establishes a protection priority focus on critical and essential functions only?
→ CPCON 2 (High: Critical and Essential Functions)
58. What certificates are contained on the Common Access Card (CAC)?
→ Identification, encryption, and digital signature
59. What guidance is available from marking Sensitive Information information (SCI)?
→ Security Classification Guide (SCG)
60. What must the dissemination of information regarding intelligence sources, methods, or activities follow?
→ The Director of National Intelligence.
61. If an incident occurs involving removable media in a Sensitive Compartmented Information Facility (SCIF), what action should you take?
→ Notify your security point of contact
62. Which of the following is a practice that helps to prevent the download of viruses and other malicious code when checking your email?
→ Do not access links or hyperlinked media such as buttons and graphics in email messages.
63. Which of the following is a best practice to protect information about you and your organization on social networking sites and applications?
→ Use only personal contact information when establishing personal social networking accounts, never use Government contact information.
64. You receive an email from the Internal Revenue Service (IRS) demanding immediate payment of back taxes of which you were not aware. The email provides a website and a toll-free number where you can make payment. What action should you take?
→ Contact the IRS
65. A colleague vacations at the beach every year, is married and a father of four, his work quality is sometimes poor, and he is pleasant to work with. How many potential insider threat indicators does this employee display?
→ 0 indicators
66. A colleague has won 10 high-performance awards, can be playful and charming, is not currently in a relationship, and is occasionally aggressive in trying to access sensitive information. How many potential insiders threat indicators does this employee display?
→ 1 indicator
67. A colleague has visited several foreign countries recently, has adequate work quality, speaks openly of unhappiness with U.S. foreign policy, and recently had his car repossessed. How many potential insiders threat indicators does this employee display?
→ 3 or more indicators
68. A colleague complains about anxiety and exhaustion, makes coworkers uncomfortable by asking excessive questions about classified projects, and complains about the credit card bills that his wife runs up. How many potential insiders threat indicators does this employee display?
→ 3 or more indicators
69. Based on the description that follows, how many potential insider threat indicator(s) are displayed? A colleague is playful and charming, consistently wins performance awards, and is occasionally aggressive in trying to access classified information.
→ 1 indicators
70. Based on the description below how many potential insider threat indicators are present? A colleague often makes others uneasy by being persistent in trying to obtain information about classified projects to which he has no access, is boisterous about his wife putting them in credit card debt, and often complains about anxiety and exhaustion display?
→ 3 or more indicators