Which of the following individuals can access classified data Cyber Awareness 2022?
Who can be permitted access to classified data? Only persons with appropriate clearance, a non-disclosure agreement, and need-to-know can access classified data.
Which of the following is an example of near field communication (NFC)? -A smartphone that transmits credit card payment information when held in proximity to a credit card reader.
Which of the following may help to prevent spillage? Label all files, removable media, and subject headers with appropriate classification markings.
Which of the following is NOT considered a potential insider threat indicator? New interest in learning a foregin language.
(Spillage) Which of the following is a best practice to protect information about you and your organization on social networking sites and applications? Use only personal contact information when establishing personal social networking accounts, never use Government contact information.
1. Spelling errors: Of course, everyone makes a spelling or grammar mistake from time to time, but phishing attempts are often riddled with them. If an email in your inbox contains multiple indicators on this list and is also riddled with unusual spelling and grammatical errors, it's probably a scam.
Examples of such devices include, but are not limited to: pagers, laptops, cellular telephones, radios, compact disc and cassette players/recorders, portable digital assistant, audio devices, watches with input capability, and reminder recorders.
Which of the following actions is appropriate after finding classified Government information on the internet? Note any identifying information and the website's URL.
What are some actions you can take to try to protect your identity? Shred personal documents; never share passwords, and order a credit report annually.
Which of the following is a best practice for securing your home computer? Use antivirus software and keep it up to date.
Which of the following is a security best practice when using social networking sites quizlet?
Which of the following is a best practice to protect information about you and your organization on social networking sites and applications? Use only personal contact information when establishing personal social networking accounts, never use Government contact information.
Malicious apps, spyware, and viruses have made their way onto social media and into related apps as well. While it's not easy to pass viruses through Facebook or LinkedIn, it's easier for hackers to compromise the apps your employees may have on their smartphones that allow them to post to these sites.

Do not store sensitive or confidential data on mobile devices unless you have been authorized to do so. Avoid leaving your mobile devices and media unattended. Always use a password to protect your portable device against unauthorized use. Turn Bluetooth power off by default, and do not let it be set to discoverable.
Which of the following is NOT considered a potential insider threat indicator? Treated mental health issues. What would you do if you receive a game application request on your government computer that includes permission to access your friends, profile information, cookies, and sites visited?
Which of the following is true of protecting classified data? Classified material must be appropriately marked. In addition to avoiding the temptation of greed to betray his country, what should Alex do differently?
Personal identification numbers: social security number (SSN), passport number, driver's license number, taxpayer identification number, patient identification number, financial account number, or credit card number. Personal address information: street address, or email address. Personal telephone numbers.
- An unfamiliar tone or greeting. When reading phishing messages, look for improperly used words. ...
- Grammar and spelling errors. ...
- Inconsistencies in email addresses, links and domain names. ...
- Threats or a sense of urgency. ...
- Unusual request.
When using your government-issued laptop in public environments, with which of the following should you be concerned? The potential for unauthorized viewing of work-related information displayed on your screen.
What is a critical consideration on using cloud-based file sharing and storage applications on your Government-furnished equipment (GFE)? Determine if the software or service is authorized.
Phishing. The most common form of social engineering attack is phishing. Phishing attacks exploit human error to harvest credentials or spread malware, usually via infected email attachments or links to malicious websites.
Which of the following is an example of removable media cyber awareness?
Removable media include flash media, such as thumb drives, memory sticks, and flash drives; external hard drives; optical discs (such as CDs, DVDs, and Blu-rays); and music players (such as iPods).
Which of the following is a best practice for handling cookies? -If possible, set your browser preferences to prompt you each time a website wants to store a cookie.
Near-Field Communication: History
Perhaps near-field communication is best known as the technology that lets consumers pay retailers and each other with their cell phones. NFC drives payment services like Google Wallet (NASDAQ: GOOG) and Apple Pay (NASDAQ: AAPL), for example.
(Spillage) Which of the following is a best practice to protect information about you and your organization on social networking sites and applications? Use only personal contact information when establishing personal social networking accounts, never use Government contact information.
What is a common indicator of a phishing attempt? It includes a threat of dire circumstances.
Which of the following is a best practice for handling cookies? -If possible, set your browser preferences to prompt you each time a website wants to store a cookie.
Near Field Communication (NFC) is a set of short-range wireless technologies, typically requiring a distance of 4cm or less to initiate a connection. NFC allows you to share small payloads of data between an NFC tag and an Android-powered device, or between two Android-powered devices. Tags can range in complexity.
Near Field Communication (NFC) allows the transfer of data between devices that are a few centimeters apart, typically back-to-back. Check out this NFC video for more info.
Near-field communication (NFC) enables devices within a few centimeters of each other to exchange information wirelessly. iOS apps running on supported devices can use NFC scanning to read data from electronic tags attached to real-world objects.
Which of the following is NOT considered a potential insider threat indicator? Treated mental health issues. What would you do if you receive a game application request on your government computer that includes permission to access your friends, profile information, cookies, and sites visited?
Which of the following is appropriate after finding classified information on the Internet?
Which of the following actions is appropriate after finding classified Government information on the internet? Note any identifying information and the website's URL.
Which of the following is a best practice for securing your home computer? Use antivirus software and keep it up to date.
What is required for an individual to access classified data? Appropriate clearance; signed and approved non-disclosure agreement; and need-to-know.
- Spear Phishing.
- Whaling.
- Smishing.
- Vishing.
The unauthorized disclosure of Confidential information could reasonably be expected to cause damage to national security. The unauthorized disclosure of Secret information could reasonably be expected to cause serious damage to national security.
When classified data is not in use, how can you protect it? Store classified data appropriately in GSA-approved vault/container when not in use.
Sensitive information includes For Official Use Only (FOUO), Controlled Unclassified Information (CUI), Controlled Technical Information (CTI), Personally Identifiable Information (PII), Protected Health. Information (PHI), financial information, personal or payroll information, proprietary data, and operational.
Personal identification numbers: social security number (SSN), passport number, driver's license number, taxpayer identification number, patient identification number, financial account number, or credit card number. Personal address information: street address, or email address. Personal telephone numbers.