What level of damage to national security can you reasonably expect top secret to cause of disclosed

Scheduled maintenance: Saturday, September 10 from 11PM to 12AM PDT

Home

Subjects

Expert solutions

Create

Log in

Sign up

Upgrade to remove ads

Only ₩37,125/year

  • Flashcards

  • Learn

  • Test

  • Match

  • Flashcards

  • Learn

  • Test

  • Match

Terms in this set (35)

Did you earn a Cyber Security Awareness Challenge 2018 Certificate of Completion?

No

Which of the following does NOT constitute spillage?

Classified information that should be unclassified and is downgraded

Which of the following is NOT an appropriate way to protect against inadvertent spillage?

Use the classified network for all work, including unclassified work

Which of the following should you NOT do if you find classified information on the internet?

Download the information

What level of damage to national security can you reasonably expect Top Secret information to cause if disclosed?

Exceptionally grave damage

Which of the following is true about telework?

You must have your organization's permission to telework.

Which of the following is true of protecting classified data?

Classified material must be appropriately marked.

In addition to avoiding the temptation of greed to betray his country, what should Alex do differently?

Avoid talking about work outside of the workplace or with people without a need-to-know

Ellen's Statement

How many insider threat indicators does Alex demonstrate?

Three or more

Mark's Statement

What should Alex's colleagues do?

Report the suspicious behavior in accordance with their organization's insider threat policy

Select all sections of the profile that contain an issue. Then select Submit.

All three sections

Select the appropriate setting for each item. Then select Save.

Name and profile picture - Any

Status, photos, and posts - Friends Only

Family and relationships - Friends Only

Birthday - Friends Only

Photos and videos you are in - Friends Only

Check in location via GPS: Off

Which of the following is NOT an example of sensitive information?

Press release data

Which of the following is NOT a correct way to protect sensitive information?

Sensitive information may be stored on any password-protected system.

Victim

Select the information on the data sheet that is personally identifiable information (PII) but not protected health information (PHI).

Top box

Select the information on the data sheet that is protected health information (PHI).

Bottom box

Incident #1

What should the employee do differently?

Remove his CAC and lock his workstation.

Incident #2

What should the employee do differently?

Decline to let the person in and redirect her to security.

Incident

Select all violations at this unattended workstation. Then select Submit.

Laptop with CAC left inserted

Sticky note with Pin number

Prevalence

Which of the following is an example of malicious code?

Software that installs itself without the user's knowledge

Damage
How can malicious code cause damage?

All of these

Spread

How can you avoid downloading malicious code?

Do not access website links in e-mail messages

Incident

Select all security issues. Then select Submit.

Top and Bottom sections

From Alice Murphy

Select an action.

Delete e-mail

From Pursuit Bank

Select an action.

Delete e-mail

From John Anderson

Select an action.

Report e-mail

Incident

What should Sara do when using publicly available Internet, such as hotel Wi-Fi?

Only connect Government VPN

What is the danger of using public Wi-Fi connetions?

Both of these

Incident

Select Yes or No for each item. Then select Submit. (Permitted Uses of Government-Furnished Equipment GFE))

Viewing or downloading pornography - No

Gambling online - No

Conducting a private money-making venture - No

Using unauthorized software - No

Illegally downloading copyrighted material - No

Making unauthorized configuration changes - No

Incident

When is it okay to charge a personal mobile device using government-furnished equipment (GFE)?

This is never okay.

Which of the following demonstrates proper protection of mobile devices?

Linda encrypts all of the sensitive data on her government-issued mobile devices.

Evidence

Your antivirus is out-of-date. Update now?

Update

Security updates are ready to install. Install now?

Install

Firewall disabled. Would you like to enable the firewall?

Enable

A virus has been detected.

Exit

Sets with similar terms

DoD Cyber Awareness 2019

38 terms

kyle_terry4

DoD Cyber Awareness 2019

38 terms

wolff4780PLUS

DOD Cyber Awareness Challenge 2019: Knowledge Chec…

69 terms

ewizzy58

AWARENESS19w

15 terms

mountainhigh22

Sets found in the same folder

Annual DoD Cyber Awareness Challenge Training - 20…

35 terms

sms8818

Cyber Awareness 2020 Knowledge Check

95 terms

Lilwhiteshark97

Cyber Awareness 2020 Knowledge Check

78 terms

Luis_Marino

DOD Cyber Awareness Challenge 2019

24 terms

Jamie_Lancaster

Other sets by this creator

Military Requirements for Petty Officers Third and…

30 terms

navyEOD55

Military Requirements for Petty Officers Third and…

10 terms

navyEOD55

Military Requirements for Petty Officers Third and…

53 terms

navyEOD55

EPRC Operator Course JKO (8 hour) Pretest Answers

90 terms

navyEOD55

Other Quizlet sets

Chapter 22: Signal Transduction Mechanisms: I. Ele…

75 terms

lizbet_fischer

Bio

29 terms

Jaimie_Frake

Social Studies Chapter 15

22 terms

catievan

Business Continuation and Succession Planning

13 terms

Heather_Orvis

Related questions

QUESTION

What were the three additional variables that the case studies suggested were important to the success of nonviolent campaigns?

3 answers

QUESTION

A security analyst is investigating a potential breach. upon gathering, documenting, and securing the evidence. What is the NEXT step to minimize the business impact?

3 answers

QUESTION

Which political reform gave people the power to approve or reject laws passed by a legislature?

3 answers

QUESTION

Misconfiguration is commonly seen in accounts that are set up for a user that provide more access then is necessary, such as providing total access over the entire device when the access should be more limited.

3 answers

What level of damage to national security can you reasonably expect top secret information to cause if disclosed?

The unauthorized disclosure of Top Secret information could reasonably be expected to cause exceptionally grave damage to national security.

Which of the following can be unauthorized disclosure of information classified as confidential reasonably be expected to cause?

Unauthorized disclosure of Top Secret information could reasonably be expected to cause exceptionally grave damage to our national security. Unauthorized disclosure of Confidential information could reasonably be expected to cause damage to our national security.

What information is a security risk when posted publicly on your social networking profile?

What security risk does a public Wi-Fi connection pose? It may expose the connected device to malware.

When should a security badge be visible?

When is it appropriate to have your securing badge visible with a sensitive compartmented information facility? At all time when is the facility.