CYBER AWARENESS
Which is true of cookies?
A cookie is a text file a web server stores on your hard drive that may track your activities on the web.
How can your protect your information when using wireless technology?
Avoid using non-Bluetooth-paired or unencrypted wireless computer peripherals.
This former U.S. Nuclear Regulatory Commission employee pled guilty to attempted spear phishing cyber-attack on Department of Energy Computers. Just for fun, guess who this person is. This is not a test!
Charles Eccleston
You receive an e-mail from the Internal Revenue Service demanding immediate payment of back taxes of which you were not aware. The email provides a website and a toll-free number where you can make payment. What action should you take?
Contact the IRS
Which of the following in NOT a best practice to protect data on your mobile computing device?
Ensure you have a strong wireless connection.
Traditional espionage activities include foreign government sponsored commercial enterprises, international trafficking organizations and terrorism. True or False
False
A coworker has asked if you want to download a programmer's game to play at work. What should be your response?
I'll pass.
This Navy Civilian Engineer shared the schematics of the USS Gerald R. Ford nuclear aircraft carrier with individuals whom he believed were representing a foreign government.
Mustafa Awwad
Which of the following in NOT true of traveling overseas with a mobile phone?
Physical security of mobile phones carried overseas is not a major issue.
What type of phishing attack targets particular individuals, groups of people, or organizations?
Spear phishing
As a DOD employee, you can be the target of a Foreign Intelligence Entity. True or False
True
As government employees, our greatest vulnerabilities are those things we take for granted. True or False
True
CI is concerned with understanding, and possibly neutralizing, all aspects of the intelligence operations of foreign nations. True or False
True
Family, friend and co-workers may be used as a means to gain information about you. True or False
True
Inadvertent actions such as using easy passwords and practicing poor computer security can provide foreign entities and avenue to penetrate DoD systems. True or False
True
To defeat our objectives and advance their interests, foreign entities attempt to collect information about our plans, technologies, activities, and operations. True
True
To defeat our objectives and advance their interests, foreign entities attempt to collect information about our plans, technologies, activities, and operations. True or False
True
While you are waiting for your lunch bill, a stranger picks up your Government-issued phone from your table and proceeds to exit the facility with it. What should you do?
Try to observe the direction taken and and any other useful information and immediately make a report to your security point of contact.
What is a way to prevent the download of viruses and other malicious code when checking your e-mail?
View e-mail in plain text and don't view e-mail in Preview Pane.