Which of the following practices may reduce your appeal as a target for adversaries seeking to

Find out how much you know about preventing user-caused cybersecurity incidents through education in this security awareness training quiz for infosec pros.

Too often, enterprises classify cybersecurity as an IT-only activity and discuss risk management exclusively in terms of technology or tools. Yet, multiple studies continuously prove that insiders pose one of the greatest risks to an enterprise's security. Whether accidental or malicious, insider threats can cause enormous financial and reputational damage -- for example, through data loss or exfiltration or falling victim to a phishing attack.

Organizations may instinctually turn to technology as the solution to insider threat prevention. While tools such as data loss prevention, firewalls and email filters may alleviate the symptoms of insider threats, they do nothing to address the root cause. To treat the issue of user-caused incidents at its core, IT leaders need to implement comprehensive and consistent security awareness training.

This security awareness training quiz's questions and answers are designed to test and reinforce understanding of infosec fundamentals. By taking this quiz, IT professionals will be in a better position to educate employees on security best practices at their own organization.

Next Steps

Cybersecurity employee training: How to build a solid plan

10 common types of malware attacks and how to prevent them

Enterprise cybersecurity hygiene checklist for 2022

The 7 elements of an enterprise cybersecurity culture

Top 5 password hygiene tips and best practices

This was last published in April 2021

Dig Deeper on Risk management

  • insider threat

    By: Andrew Froehlich

  • Editor's picks: Top cybersecurity articles of 2021

    By: Isabella Harford

  • 6 ways to prevent insider threats every CISO should know
  • Data loss prevention quiz: Test your training on DLP features

    By: Katie Donegan

Upgrade to remove ads

Only SGD 41.99/year

  1. Social Science
  2. Sociology
  • Flashcards

  • Learn

  • Test

  • Match

  • Flashcards

  • Learn

  • Test

  • Match

KNOWLEDGE CHECK SUCKA!! FVCK YOUR REVIEWS!!! I updated it as I take it!! It's not my fault they changed the Questions and Answers!! You deserve to have your clearance taken away then!!

Terms in this set (55)

(Spillage) What should you do if a reporter asks you about potentially classified information on the web?

Refer the reporter to your organization's public affairs office.

(Spillage) Which of the following is a good practice to aid in preventing spillage?

Be aware of classification markings and all handling caveats.

(Spillage) After reading an online story about a new security project being developed on the military installation where you work, your neighbor asks you to comment about the article. You know this project is classified. What should be your response?

Attempt to change the subject to something non-work related, but neither confirm nor deny the article's authenticity.

(Spillage) What should you do when you are working on an unclassified system and receive an email with a classified attachment?

Call your security point of contact immediately.

(Spillage) What is required for an individual to access classified data?

Appropriate clearance; signed and approved non-disclosure agreement; and need-to-know.

(Spillage) When classified data is not in use, how can you protect it?

Store classified data appropriately in a GSA-approved vault/container.

(Insider Threat) A colleague vacations at the beach every year, is married and a father of four, his work quality is sometimes poor, and he is pleasant to work with. How many potential insider threat indicators does this employee display?

0 indicators

(Insider Threat) Based on the description that follows, how many potential insider threat indicator(s) are displayed? A colleague is playful and charming, consistently wins performance awards, and is occasionally aggressive in trying to access classified information.

1 indicators

(Spillage) What type of activity or behavior should be reported as a potential insider threat?

Coworker making consistent statements indicative of hostility or anger toward the United States and its policies.

(Spillage) What advantages do "insider threats" have over others that allows them to cause damage to their organizations more easily?

Insiders are given a level of trust and have authorized access to Government information systems.

(Spillage) Which of the following is a best practice to protect information about you and your organization on social networking sites and applications?

Use only personal contact information when establishing personal social networking accounts, never use Government contact information.

(Spillage) When is the safest time to post details of your vacation activities on your social networking website?

When your vacation is over, after you have returned home

(social networking) When is the safest time to post details of your vacation activities on your social networking profile?

After you have returned home following the vacation

(Spillage) What level of damage can the unauthorized disclosure of information classified as confidential reasonably be expected to cause?

Damage to national security

(Spillage) Which type of information could reasonably be expected to cause serious damage to national security if disclosed without authorization?

Secret

(Spillage) Which of the following practices may reduce your appeal as a target for adversaries seeking to exploit your insider status?

Remove your security badge after leaving your controlled area or office building.

(Sensitive Information) What type of unclassified material should always be marked with a special handling caveat?

For Official Use Only (FOUO)

(Sensitive Information) Which of the following is NOT an example of sensitive information?

Press release data

(Sensitive Information) Which of the following is true about unclassified data?

When unclassified data is aggregated, its classification level may rise.

(Sensitive Information) Which of the following represents a good physical security practice?

Use your own security badge, key code, or Common Access Card (CAC)/Personal Identity Verification (PIV) card.

(Sensitive Information) What certificates are contained on the Common Access Card (CAC)?

Identification, encryption, and digital signature

(Sensitive Information) What should you do if a commercial entity, such as a hotel reception desk, asks to make a photocopy of your Common Access Card (CAC) for proof of Federal Government employment?

Do not allow your CAC to be photocopied.

(Sensitive Compartmented Information) What describes how Sensitive Compartmented Information is marked?

Approved Security Classification Guide (SCG)

(Sensitive Compartmented Information) Which of the following best describes the compromise of Sensitive Compartmented Information (SCI)?

A person who does not have the required clearance or assess caveats comes into possession of SCI in any manner.

(Sensitive Compartmented Information) What portable electronic devices (PEDs) are allow in a Secure Compartmented Information Facility (SCIF)?

Government-owned PEDs, if expressly authorized by your agency.

(Malicious Code) What are some examples of malicious code?

Viruses, Trojan horses, or worms

(Malicious Code) Which of the following is NOT a way that malicious code spreads?

Legitimate software updates

(Malicious Code) While you are registering for a conference, you arrive at the website //www.dcsecurityconference.org/registration/. The website requires a credit card for registration. What should you do?

Since the URL does not start with "https," do not provide your credit card information.

(Malicious Code) Which email attachments are generally SAFE to open?

Attachments contained in a digitally signed email from someone known

(Malicious Code) What is a common indicator of a phishing attempt?

It includes a threat of dire circumstances.

(Malicious Code) Which of the following is true of Internet hoaxes?

They can be part of a distributed denial-of-service (DDoS) attack.

(Malicious Code) Upon connecting your Government-issued laptop to a public wireless connection, what should you immediately do?

Connect to the Government Virtual Private Network (VPN).

(Malicious Code) A coworker has asked if you want to download a programmer's game to play at work. What should be your response?

I'll pass

(Malicious Code) What are some examples of removable media?

Memory sticks, flash drives, or external hard drives

(Malicious Code) Which are examples of portable electronic devices (PEDs)?

laptops, fitness bands, tablets, smartphones, electric readers, and Bluetooth devices

(Malicious Code) What is a good practice to protect data on your home wireless systems?

Ensure that the wireless security features are properly configured.

(social networking) When may you be subjected to criminal, disciplinary, and/or administrative action due to online misconduct?

If you participate in or condone it at any time

(social networking) Which of the following is a security best practice when using social networking sites?

Use only personal contact information when establishing your personal account

(controlled unclassified information) Which of the following is NOT an example of CUI?

press release data

(controlled unclassified information) Which of the following is NOT correct way to protect CUI?

CUI may be stored on any password-protected system.

(Physical Security) which Cyberspace Protection Condition (CPCON) establishes a protection priority focus on critical and essential functions only?

(Answer) CPCON 2 (High: Critical and Essential Functions)
-
CPCON 1 (Very High: Critical Functions)
CPCON 3 (Medium: Critical, Essential, and Support Functions)
CPCON 4 (Low: All Functions)
CPCON 5 (Very Low: All Functions)

(Identity Management) What certificates are contained on the Common Access Card (CAC)?

Identification, encryption, and digital signature

(Identity Management) Which of the following is an example of two-factor authentication?

Your password and the second commonly includes a text with a code sent to your phone

(Sensitive Information) What guidance is available from marking Sensitive Information information (SCI)?

Security Classification Guide (SCG)

(Sensitive Information) What must the dissemination of information regarding intelligence sources, methods, or activities follow?

The Director of National Intelligence.

(removable media) If an incident occurs involving removable media in a Sensitive Compartmented Information Facility (SCIF), what action should you take?

Notify your security point of contact

Which of the following actions can help to protect your identity?

Order a credit report annually

What is whaling?

Looking at your MOTHER, and screaming "THERE SHE BLOWS!!"
(A type of phishing targeted at senior officials)
Which is still your FAT A$$ MOTHER!

Which is a best practice that can prevent viruses and other malicious code from being downloaded when checking your e-mail?

Do not access website links, buttons, or graphics in e-mail

What type of social engineering targets particular individuals, groups of people, or organizations?

Spear phishing

(Travel) Which of the following is a concern when using your Government-issued laptop in public?

Others may be able to view your screen.

(GFE) When can you check personal e-mail on your Government-furnished equipment (GFE)?

If allowed by organizational policy

(Mobile Devices) Which of the following statements is true?

Mobile devices and applications can track your location without your knowledge or consent.

(Mobile Devices) When can you use removable media on a Government system?

When operationally necessary, owned by your organization, and approved by the appropriate authority

(Home computer) Which of the following is best practice for securing your home computer?

Create separate accounts for each user

Sets found in the same folder

Cyber Awareness Challenge 2022 (Incomplete)

94 terms

BuhayNiKamatayan

DoD Mandatory Controlled Unclassified Information…

20 terms

chloezendt12

Cyber Awareness Challenge 2022

92 terms

joemama1995

Cyber Awareness Challenge 2022 Knowledge Check

30 terms

obnoxiousguru

Verified questions

SOCIOLOGY

Match the situation below with the key term (a-e) it illustrates. A corporate chief executive officer is economically forced to terminate employees who are her friends. a. role b. role conflict c. role performance d. role strain e. social interaction.

Verified answer

SOCIOLOGY

One of the themes of sociology is the differences between perception and reality. Write down five perceptions that you have heard people say about others based on their social class. Next to each, describe the reality based on additional research. If not sure, write “unknown-needs further research.”

Verified answer

SOCIOLOGY

What can older Americans do to increase their impact on government policy and legislation?

Verified answer

SOCIOLOGY

Complete the sentence using each term once. a. monogamy b. polyandry c. polygyny d. exogamy e. endogamy f. homogamy g. patrilineal h. blended family i. dual-employed marriage j. boomerang kids. are young adults who live with their parents

Verified answer

Other Quizlet sets

BUS 2201 Principles of Marketing

32 terms

Studystuff8888

AR 2143 FMLA 2018

15 terms

Paidoffhouse

Exam 2

94 terms

cmhartley

Physics Semester 2 Final

83 terms

jfishman7

What is phishing quizlet?

phishing. a technique to gain personal information for the purpose of identity theft, usually by means of fraudulent e-mail.

What is phishing in cyber?

Phishing is the most common type of social engineering, which is a general term describing attempts to manipulate or trick computer users.

What is a phishing short answer?

Phishing is a form of fraud in which an attacker masquerades as a reputable entity or person in email or other forms of communication. Attackers will commonly use phishing emails to distribute malicious links or attachments that can perform a variety of functions.

What is spear phishing quizlet cyber awareness?

Spear phishing. an email-spoofing attack that targets a specific organization or individual, seeking unauthorized access to sensitive information.

Which of the following practices reduces the chance of becoming a target by adversaries seeking?

Which of the following practices reduces the chance of becoming a target by adversaries seeking insider information? Don't talk about work outside your workspace unless it is a specifically designated public meeting environment and is controlled by the event planners.

Which of the following is a good practice to prevent spillage quizlet 2022?

Which of the following is a good practice to prevent spillage? Be aware of classification markings and all handling caveats.

What type of behavior should you report as a potential insider threat?

An insider threat uses authorized access, wittingly or unwittingly, to harm national security through unauthorized disclosure, data modification, espionage, terrorism, or kinetic actions resulting in loss or degradation of resources or capabilities.

Which of the following is a good practice to prevent spillage cyber awareness?

Which of the following is a good practice to aid in preventing spillage? Be aware of classification markings and all handling caveats.

Toplist

Neuester Beitrag

Stichworte