CYBER AWARENESS

¡Supera tus tareas y exámenes ahora con Quizwiz!

Which of the following personally owned peripherals can you use with government furnished equipment?

A Bluetooth headset

Which of the following is NOT a potential indicator that your device may be under a malicious code attack?

A notification for a system update that has been publicized

Which of the following is a risk associated with removable media?

All of these

Under which Cyberspace Protection Condition (CPCON) is the priority focus limited to critical and essential functions?

CPCON 2

How can an adversary use information available in public records to target you?

Combine it with information from other data sources to learn how best to bait you with a scam

You receive a phone call offering you a $50 gift card if you participate in a survey. Which course of action should you take?

Decline to participate in the survey. This may be a social engineering attempt.

You receive a text message from a package shipper notifying you that your package delivery is delayed due to needing updated delivery instructions from you. It provides a shortened link for you to provide the needed information. What is the best course of action?

Delete the message

Which of the following is NOT a best practice fir protecting data on a mobile device?

Disable automatic screen locking after a period of inactivity

Mabel is a government employee who needs to share a document containing contractor proprietary information with her supervisor. Which of the following describes the most appropriate way from able to do this?

Encrypt it and send it via digitally signed Government e-mail.

On your home computer, how can you best establish passwords when creating separate user accounts?

Have each user create their own, strong password

How should government owned removable media be stored?

In a GSA-approved container according to the appropriate security classification

Which of the following is true of spillage?

It refers specifically to classified information that becomes publicly available.

Which of the following is a best practice when browsing the internet?

Only accept cookies from reputable, trusted websites

Which of the following is true of Sensitive Compartmented Information Facilities (SCIFs)?

Personnel must position monitors so that they do not face windows or close the window blinds.

How can you prevent viruses and malicious code?

Scan all external files before uploading to your computer

Which of the following is an example of behavior that uou should report?

Taking sensitive information home for teleowrk without authorization

How can you mitigate the potential risk associated with a compressed URL (e.g., TinyURL, goo.gl)

Use the preview function to see where the link actually leads

Which of the following is a best practice for physical security?

Use your own security badge or key code for facility access

Beth taps her phone at a payment terminal to pay for a purchase. Does this pose a security risk?

Yes, there is a risk that the signal could be intercepted or altered.

Sylvia commutes to work via public transportation. She often uses the time to get a head start on work by making phone calls or responding to e-mails on her government approved mobile device. Does this pose a security concern?

Yes. Eavesdroppers may be listening to Sylvia's phone calls, and shoulder surfers may be looking at her screen. Sylvia should be aware of these risks.

Which of the following is true of telework?

You must have permission from your organization to telework

Which best describes an insider threat? Someone who uses _______ access, _______, to harm national security through unauthorized disclosure, data modification, espionage, terrorism, or kinetic actions.

authorized; wittingly or unwittingly

Which of the following is an example of a good password?

d+Uf_4RimUz

Which of the following describes Sensitive Compartmented Information(SCI)? SCI is a program that ______ various types of classified information for _____ protection and dissemination or distribution control.

segregates; added


Conjuntos de estudio relacionados

Microeconomics: Firms in Perfectly Competitive Markets

View Set

Chapter 14 - Lab Textbook Reading and Review Questions

View Set

ACCT 2302 MANAGERIAL ACCOUNTING CH 4

View Set

Oncology/Hematological Practice Questions

View Set

Chapter 46: Management of Patients With Gastric and Duodenal Disorders

View Set