Cyber Security Quiz 1
Which of the following must you do before using an unclassified laptop and peripherals in a collateral classified environment?
Ensure you physically disable any cameras, microphones, and Wi-Fi embedded in the laptop before using it in a collateral classified environment.
Which of the following is true of protecting classified data?
A) Classified material must be appropriately marked
B) Secure facilities allow open storage of classified materials
C) Classified material may be used in unsecured areas as long as it remains in the possession of an individual with the proper clearance
A) Classified material must be appropriately marked
B) Secure facilities allow open storage of classified materials
C) Classified material may be used in unsecured areas as long as it remains in the possession of an individual with the proper clearance
A) Classified material must be appropriately marked
Which of the following is true of protecting classified data cyber awareness?
A) Classified data is freely accessible to all employees.
B) Cyber awareness is not relevant to classified data protection.
C) Protecting classified data requires strict cybersecurity measures.
A) Classified data is freely accessible to all employees.
B) Cyber awareness is not relevant to classified data protection.
C) Protecting classified data requires strict cybersecurity measures.
C) Protecting classified data requires strict cybersecurity measures.
Which of the following is NOT an appropriate way to protect against inadvertent spillage?
A) Label all files, removable media, and subject headers.
B) Use the classified network for all work, including unclassified work.
C) be aware of classified markings and all handling caveats.
A) Label all files, removable media, and subject headers.
B) Use the classified network for all work, including unclassified work.
C) be aware of classified markings and all handling caveats.
B) Use the classified network for all work, including unclassified work.
Which of the following is true about telework?
A) you may use your personal computer as long as it is in a secure area in your home
B) you must have your organization’s permission to telework
C) you may use unauthorized software as long as your computer’s antivirus software is up-to-date
A) you may use your personal computer as long as it is in a secure area in your home
B) you must have your organization’s permission to telework
C) you may use unauthorized software as long as your computer’s antivirus software is up-to-date
B) you must have your organization’s permission to telework.
How can you protect your organization on social networking sites?
To protect your organization on social networking sites, ensure there are no identifiable landmarks visible in any photos taken in a work setting that you post.
Which of the following is NOT an example of CUI?
Press release data is NOT an example of CUI.
Which of the following best describes good physical security?
Lionel stops someone without a badge in his secure area.
Which of the following is an example of two-factor authentication?
A Common Access Card and Personal Identification Number.
Which of the following is true of Sensitive Compartmented Information (SCI)?
Access requires Top Secret clearance and indoctrination into the SCI program.
Which of the following is NOT a potential consequence of using removable media unsafely in a Sensitive Compartmented Information Facility (SCIF)?
The removable media getting damaged.
What portable electronic devices (PEDs) are permitted in a SCIF?
Only expressly authorized government-owned portable electronic devices (PEDs).
What is the response to an incident such as opening an uncontrolled DVD on a computer in a SCIF?
A) Analyze the other workstations in the SCIF for viruses or malicious code.
B) Analyze the media for viruses or malicious code.
C) Notify your security point of contact.
A) Analyze the other workstations in the SCIF for viruses or malicious code.
B) Analyze the media for viruses or malicious code.
C) Notify your security point of contact.
All of these
Which of the following is NOT a type of malicious code?
Executables are not a type of malicious code.
Which of the following personally-owned computer peripherals is permitted for use with Government-furnished equipment?
A USB headset with a microphone.
Which of the following is an example of removable media?
An external hard drive is an example of removable media.
Which of the following is NOT an appropriate way to protect against inadvertent spillage?
Using the classified network for all work, including unclassified work.
A vendor conducting a pilot program with your organization contacts you for organizational data to use in a prototype. How should you respond?
Direct the vendor to the appropriate contact person within the organization.
What is the basis for handling and storage of classified data?
Handling and storing classified data relies on classification markings and specific handling instructions.
When classified data is not in use, how can you protect it?
To protect classified data when it’s not in use, store it in a GSA-approved vault or container.
How should you secure your home wireless network for teleworking?
To secure your home wireless network for teleworking, make sure to use Wi-Fi Protected Access 2 (WPA2) Personal encryption at a minimum. This encryption helps keep your network safe from unauthorized access.
Which is a best practice for protecting Controlled Unclassified Information (CUI)?
To protect Controlled Unclassified Information (CUI), store it in a locked desk drawer when you’re not working.
Total no. of questions and answers: 22
Leave a comment