CYBER AWARENESS

¡Supera tus tareas y exámenes ahora con Quizwiz!

Which is true of cookies?

A cookie is a text file a web server stores on your hard drive that may track your activities on the web.

How can your protect your information when using wireless technology?

Avoid using non-Bluetooth-paired or unencrypted wireless computer peripherals.

This former U.S. Nuclear Regulatory Commission employee pled guilty to attempted spear phishing cyber-attack on Department of Energy Computers. Just for fun, guess who this person is. This is not a test!

Charles Eccleston

You receive an e-mail from the Internal Revenue Service demanding immediate payment of back taxes of which you were not aware. The email provides a website and a toll-free number where you can make payment. What action should you take?

Contact the IRS

Which of the following in NOT a best practice to protect data on your mobile computing device?

Ensure you have a strong wireless connection.

Traditional espionage activities include foreign government sponsored commercial enterprises, international trafficking organizations and terrorism. True or False

False

A coworker has asked if you want to download a programmer's game to play at work. What should be your response?

I'll pass.

This Navy Civilian Engineer shared the schematics of the USS Gerald R. Ford nuclear aircraft carrier with individuals whom he believed were representing a foreign government.

Mustafa Awwad

Which of the following in NOT true of traveling overseas with a mobile phone?

Physical security of mobile phones carried overseas is not a major issue.

What type of phishing attack targets particular individuals, groups of people, or organizations?

Spear phishing

As a DOD employee, you can be the target of a Foreign Intelligence Entity. True or False

True

As government employees, our greatest vulnerabilities are those things we take for granted. True or False

True

CI is concerned with understanding, and possibly neutralizing, all aspects of the intelligence operations of foreign nations. True or False

True

Family, friend and co-workers may be used as a means to gain information about you. True or False

True

Inadvertent actions such as using easy passwords and practicing poor computer security can provide foreign entities and avenue to penetrate DoD systems. True or False

True

To defeat our objectives and advance their interests, foreign entities attempt to collect information about our plans, technologies, activities, and operations. True

True

To defeat our objectives and advance their interests, foreign entities attempt to collect information about our plans, technologies, activities, and operations. True or False

True

While you are waiting for your lunch bill, a stranger picks up your Government-issued phone from your table and proceeds to exit the facility with it. What should you do?

Try to observe the direction taken and and any other useful information and immediately make a report to your security point of contact.

What is a way to prevent the download of viruses and other malicious code when checking your e-mail?

View e-mail in plain text and don't view e-mail in Preview Pane.


Conjuntos de estudio relacionados

Give the meaning of the following medical terms

View Set

Which of the following statements are true about mechanical energy? Include all that apply.

View Set

MT. Chapter 6 terminology matching

View Set

Unit 2 Agency relationships and disclosuresResidential real property

View Set

Property and casualty - Personal Auto Policy

View Set