Cyber Awareness Flashcards
Spillage: Which of the following does NOT constitute spillage?
a. Classified information that is accidentally moved to a lower classification or protection level. b. Classified information that should be unclassified and is downgraded. c. Classified information that is intentionally moved to a lower protection level without authorization.
b. Classified information that should be unclassified and is downgraded.
Spillage: Which of the following is NOT an appropriate way to protect against inadvertent spillage? a. Label all files, removable media, and subject headers. b. Use the classified network for all work, including unclassified work. c. Be aware of classified markings and all handling caveats.
b. Use the classified network for all work, including unclassified work.
Spillage: Which of the following should you NOT do if you find classified information on the internet? a. Not the website’s URL. b. Download the information. c. Report it to security.
b. Download the information.
Classified Data: (Incident) What level of damage to national security can you reasonably expect Top Secret information to cause if disclosed? a. Damage b. Serious damage c. Exceptionally grave damage
Exceptionally grave damage
Classified data: (Scene) Which of the following is true about telework? a. You may use your personal computer as long as it is in a secure area in your home b. You must have your organization’s permission to telework c. You may use unauthorized software as long as your computer’s antivirus software is up to date.
You must have your organization’s permission to telework
Classified data: (Theory) Which of the following is true of protecting classified data? a. Classified material must be appropriately marked b. Secure facilities allow open storage of classified material c Classified material may be used in unsecured areas as long as it remains in the possession of an individual with the proper clearance and need-to-know.
Classified material must be appropriately marked
Insider threat: (Alex’s statement) In addition to avoiding the temptation of greed to betray his country, what should Alex do differently? a. Avoid attending professional conferences. b. Ask probing questions of potential network contacts to ascertain their true identity c. Avoid talking about work outside of the workplace or with people without need-to-know.
Avoid talking about work outside of the workplace or with people without need-to-know.
Insider threat: (Ellen’s statement) How many insider threat indicators does Alex demonstrate? 0, 1, 2, or 3+
Three or more
Insider threat: (Mark’s statement): What should Alex’s colleagues do? a. Report the suspicious behavior in accordance with their organization’s insider threat policy b. Keep an eye on his behavior to see if it escalates c. Set up a situation to establish concrete proof that Alex is taking classified information.
Report the suspicious behavior in accordance with their organization’s insider threat policy
Social Networking: Select all sections of the profile that contain an issue.
- Works at Department of Defense
- Car broke down again!!
- Family
* All three sections.
Social Networking: Privacy Settings
Name and profile picture - Any
Status, photos, and posts - Friends Only
Family and relationships - Friends Only
Birthday - Friends Only
Photos and videos you are in - Friends Only
Check in location via GPS: Off
Controlled Unclassified Information: (Incident) Which of the following is NOT an example of CUI? a. Proprietary data b. Press release data c. Financial information
Press release data
Controlled Unclassified Information: (Incident) Which of the following is NOT a correct way to protect CUI? a. CUI may be stored on any password-protected system b. CUI may be stored in a locked desk after working hours c. CUI may be emailed if encrypted.
CUI may be stored on any password-protected system
Controlled Unclassified Information: (Victim) Select the information on the data sheet that is personally identifiable information (PII) but not protected health information (PHI).
Jane Jones
Social Security Number
Controlled Unclassified Information: (Victim) Select the information on the data sheet that is protected health information (PHI).
Interview: Dr. Nora Baker
Physical Security: (Incident #1): What should the employee do differently? a. Nothing. He let his colleague know where he was going, and he was coming right back. b. Skip the coffee break and remain at his workstation. He’s on the clock after all! c. Remove his CAC and lock his workstation.
Remove his CAC and lock his workstation.
Physical Security: (Incident #2): What should the employee do differently? a. Nothing. The person looked familiar, and anyone can forget their badge from time to time. b. Decline to let the person in and redirect her to security c. Let the person in but escort her back t her workstation and verify her badge.
Decline to let the person in and redirect her to security
Identity Management Evidence (Incident): Select all violations at this unattended workstation.
Laptop (Take CAC out), PIN note (Never write your PIN.