Department of Defense (DoD) Cyber Awareness Challenge 2024 (1 hr) (Pre Test)
Which of these is NOT a potential indicator that your device may be under a malicious code attack?
A notification of a system update that has been publicized
Which of the following is a risk associated with removable media?
All of these
Which of the following is permitted within a SCIF?
An authorized Government-owned PED
Under which Cyberspace Protection Condition (CPCON) is the priority focus limited to critical and essential functions?
CPCON 2
What does the CAC contain?
Certificates for identification, encryption and digital signature
How can an adversary use information available in public records to target you?
Combine it with info from other data sources to learn how to best bait you with a scam
You receive a text message from a package shipper notifying you that your package delivery is delayed due to needing updated delivery instructions from you. It provides a shortened link for you to provide the needed info. You are not expecting a package. What is the best course of action?
Delete the message
Which of the following is NOT a best practice for protecting data on a mobile device?
Disable auto screen locking after a period of inactivity
Which of the following is NOT a best practice for travelling overseas with a mobile device?
Do not travel with a mobile device if you can avoid it
Which of the following is a best practice when browsing the internet?
Only accept cookies from reputable, trusted websites
Where are you permitted to use classified data?
Only in areas with security appropriate to the classification level
Which of the following is a best practice to protect your identity?
Order a credit report annually
Which type of data could reasonably be expected to cause serious damage to national security?
Secret
Which of the following is an example of behavior that you should report?
Taking sensitive information home for telework without authorization
How can you protect your home computer?
Turn on password feature
How can you mitigate the potential risk associated with a compressed URL?
Use the preview function to see where the link actually leads
Tom is working on a report that contains employees names, home addresses, and salary. Which of the following is Tom prohibited from doing with the report?
Using his home computer to print the report while teleworking
Sylvia commutes to work via public transportation. She often uses the time to get a head start on work by making phone calls or responding to emails on her government approved mobile device. Does this pose a secuirty concern?
Yes, eavesdroppers may be listening to Sylvia's phone calls and shoulder surfers may be looking at her screen. Sylvia should be aware of these risks.
Which of the following is true of telework?
You must have permission from your organization.
which of the following is least likely to pose a risk to share on social networking site?
Your pets name
Which best describes an insider threat? Someone who uses __________ access, ______________, to harm national security through unauthorized disclosure, data modification, espionage, terrorism, or kinetic actions.
authorized, wittingly or unwittingly
Which of the following is an example of a strong password?
d+Uf_4RimUz
Which of the following uses of removable media is appropriate?
encrypting data stored on removable media
How can you prevent viruses and malicious code?
scan all external files before uploading to your computer
What conditions are necessary to be granted access to SCI?
special access authorization and indoctrination into the SCI program