DOD Cyber Awareness Challenge 2023
Which of the following is an example of two-factor authentication?
A Common Access Card and Personal Identification Number
What is the response to an incident such as opening an uncontrolled DVD on a computer in a SCIF?
All of these
Which Cyber Protection Condition (CPCON) establishes a protection priority focus on critical functions only?
CPCON 1
Which of the following is true of protecting classified data?
Classified material must be appropriately marked
What must authorized personnel do before permitting another individual to enter a Sensitive Compartmented Information Facility (SCIF)?
Confirm the individual's need-to-know and access
Which of the following is a good practice to protect classified information?
Don't assume open storage in a secure facility is authorized
Which of the following must you do before using an unclassified laptop and peripherals in a collateral classified environment?
Ensure that any embedded cameras, microphones, and Wi-Fi are physically disabled
What level of damage to national security can you reasonably expect Top Secret information to cause if disclosed?
Exceptionally grave damage
Which of the following is true of the Common Access Card (CAC)?
It contains certificates for identification, encryption, and digital signature.
Which of the following is true of portable electronic devices (PEDs) in a Sensitive Compartmented Information Facility (SCIF)?
Only connect government-owned PEDs to the same level classification information system when authorized
What portable electronic devices (PEDs) are permitted in a SCIF?
Only expressly authorized government-owned PEDs
Which of the following is true about telework?
You must have your organization's permission to telework
A compromise of Sensitive Compartmented Information (SCI) occurs when a person who does not have the required clearance or access caveats comes into possession of SCI
in any manner