FY24 Cyber Awareness Challenge

¡Supera tus tareas y exámenes ahora con Quizwiz!

When is the safest time to post on social media about your vacation plans?

After the trip

Which method of getting online poses the least risk?

Approved mobile hotspot.

Which of the following is true of working with a Sensitive Compartmented Information Facility (SCIF)?

Authorized personnel who permit another individual to enter the SCIF are responsible for confirming the individual's need-to-know and access.

Which of these is true of working within a Sensitive Compartmented Information Facility (SCIF)?

Authorized personnel who permit another individual to enter the SCIF are responsible for confirming the individual's need-to-know and access.

When linked to a specific individual, which of the following is NOT an example of Personally Identifiable Information (PII)?

Automobile make and model

Under which Cyberspace Protection Condition (CPCON) is the priority focus limited to critical and essential functions?

CPCON 2

What actions should you take in response to compromised Sensitive Compartmented Information (SCI)?

Call your security point of contact (POC)

Which payment method poses the least risk?

Cash

What does the Common Access Card (CAC) contain?

Certificates for identification, encryption, and digital signature

Which of the following is an allowed use of government furnished equipment (GFE)?

Checking personal e-mail if your organization allows it

You receive a phone call offering you a $50 gift card if you participate in a survey. Which course of action should you take?

Decline to participate in the survey. This may be a social engineering attempt.

You receive a text message from a package shipper notifying you that your package delivery is delayed due to needing updated delivery instructions from you. It provides a shortened link for you to provide the needed information. You are not expecting a package. What is the best course of action?

Delete the message.

Which of the following is NOT a best practice for protecting data on a mobile device?

Disable automatic screen locking after a period of inactivity

Which of the following must you do when using an unclassified laptop in a collateral classified environment?

Disable the embedded camera, microphone, and wifi Use government-issued wired peripherals

Your meeting notes are unclassified. This means that your notes

Do not have the potential to damage national security

Which of the following is an appropriate use of a DoD Public Key Infrastructure (PKI) token?

Do not use a token approved for NIPRNet on SIPRNet

Tom is working on a report that contains employees' names, home addresses, and salary. Which of the following is Tom prohibited from doing with the report?

E-mailing it to a colleague who needs to provide missing data

When e-mailing PII, which of the following should you do?

Encrypt the PII, Digitally sign the e-mail, Use your Government e-mail account

Which of the following uses of removeable media is appropriate?

Encrypting data stored on removable media.

Carl receives an e-mail about a potential health risk caused by a common ingredient in processed food. Which of the following actions should Carl NOT take with the e-mail?

Forward it

Which of these personally-owned computer peripherals may be used with government-furnished equipment (GFE)?

HDMI monitor, USB keyboard

How should government owned removable media be stored?

In a GSA-approved container according to the appropriate security classification

Which of the following statements is true of DoD Unclassified data?

It may require access and distribution controls

Which action will keep DoD data the safest when asked about what you are working on in public?

Leave the place

Where are you permitted to use classified data?

Only in areas within security appropriate to the classification level

Which of the following is a best practice to protect your identity?

Order a credit report annually.

Identification numbers are what type of information?

Personally Identifiable Information (PII), which is a type of CUI

Which of the following poses a physical security risk?

Posting an access roster in public view

Which of the following is true of transmitting or transporting Sensitive Compartmented Information (SCI)?

Printed SCI must be retrieved promptly from the printer.

Which of the following is a step you should NOT take to protect against spillage?

Purge any device's memory before connecting it to a classified network

How can you protect your home computer?

Regularly back up your files

You receive an e-mail with a link to schedule a time to update software on your government furnished laptop. Your IT department has not scheduled software updates like this in the past and has not announced this software update. the -mail is not digitally signed. What action should you take?

Report the e-mail to your security POC or help desk

Which of the following is NOT a way that malicious code can spread?

Running a virus scan

What step should be taken to securely telework?

Secure the area so others cannot view your monitor

Which of the following is NOT a best practice for travelling overseas with a mobile device?

Store the device in a hotel safe when sightseeing

Which of the following is an example of behavior that you should report?

Taking sensitive information home for telework without authorization

What conditions are necessary to be granted access to Sensitive Compartmented Information (SCI)?

Top Secret clearance and indoctrination into the SCI program

How can you protect your home computer?

Turn on the password feature, regularly back up your files

Which of the following personally owned peripherals can you use with government furnished equipment (GFE)?

USB Hub

How can you mitigate the potential risk associated with a compressed URL?

Use the preview function to see where the link actually leads

Which of the following is a best practice for managing connection requests on social networking sites?

Validate connection requests through another source if possible

Which of the following must you do when working in a SCIF?

Verify that all personnel in listening distance have a need-to-know. Ensure that monitors do not provide unobstructed views. Escort uncleared personnel and warn others in the SCIF.

Which behavior represents a security concern?

Working on an unmarked document on the classified network

Beth taps her phone at a payment terminal to pay for a purchase. Does this pose a security risk?

Yes, there is a risk that the signal could be intercepted and altered.

Sylvia commutes to work via public transportation. She often uses the time to get a head start on work by making phone calls or responding to e-mails on her government approved mobile device. Does this pose a security concern?

Yes. Eavesdroppers may be listening to Sylvia's phone calls, and shoulder surfers may be looking at her screen. Sylvia should be aware of these risks.

Which of the following is true of telework?

You must have permission from your organization to telework.

Which of the following is least likely to pose a risk to share on a social networking site?

Your pet's name

Which of these is NOT a potential indicator that your device may be under a malicious code attack?

a notification for a system update that has been publicized

Which best describes an insider threat? Someone who uses ___________ access, _____________, to harm national security through unauthorized disclosure, data modification, espionage, terrorism, or kinetic actions.

authorized; wittingly or unwittingly

Which of the following is an example of a strong password?

d+Uf_4RimUz

Which of the following describes Sensitive Compartmented Information (SCI)? SCI is a program that __________ various types of classified information for __________ protection and dissemination or distribution control.

segregates; added


Conjuntos de estudio relacionados

expressions pour le courriel (e-mail)

View Set

air conditioning and cabin pressurisation

View Set

Chapter 11 Part 2: Visual Identity

View Set

MEDSURG TEST #3: CH 66 - Shock, Sepsis, and MODS

View Set

Federal Tax Considerations for Life Insurance

View Set

ASE A1 (Engine Repair) Practice Test - Cumulative

View Set

MKT 230 Chapter 14, MKTG 351 CHAPTER 15, chpt 13, chapter 11marketing, MKTG CH 12 TRUE OR FALSE, Marketing Study Questions, ch 13, Chapter 11, Marketing 351 Ole Miss Cousley Chapters 13 (Shuffle to avoid repeating of the same topics), chp 6 mktg, chp...

View Set