CYBER AWARENESS
Which of the following personally owned peripherals can you use with government furnished equipment?
A Bluetooth headset
Which of the following is NOT a potential indicator that your device may be under a malicious code attack?
A notification for a system update that has been publicized
Which of the following is a risk associated with removable media?
All of these
Under which Cyberspace Protection Condition (CPCON) is the priority focus limited to critical and essential functions?
CPCON 2
How can an adversary use information available in public records to target you?
Combine it with information from other data sources to learn how best to bait you with a scam
You receive a phone call offering you a $50 gift card if you participate in a survey. Which course of action should you take?
Decline to participate in the survey. This may be a social engineering attempt.
You receive a text message from a package shipper notifying you that your package delivery is delayed due to needing updated delivery instructions from you. It provides a shortened link for you to provide the needed information. What is the best course of action?
Delete the message
Which of the following is NOT a best practice fir protecting data on a mobile device?
Disable automatic screen locking after a period of inactivity
Mabel is a government employee who needs to share a document containing contractor proprietary information with her supervisor. Which of the following describes the most appropriate way from able to do this?
Encrypt it and send it via digitally signed Government e-mail.
On your home computer, how can you best establish passwords when creating separate user accounts?
Have each user create their own, strong password
How should government owned removable media be stored?
In a GSA-approved container according to the appropriate security classification
Which of the following is true of spillage?
It refers specifically to classified information that becomes publicly available.
Which of the following is a best practice when browsing the internet?
Only accept cookies from reputable, trusted websites
Which of the following is true of Sensitive Compartmented Information Facilities (SCIFs)?
Personnel must position monitors so that they do not face windows or close the window blinds.
How can you prevent viruses and malicious code?
Scan all external files before uploading to your computer
Which of the following is an example of behavior that uou should report?
Taking sensitive information home for teleowrk without authorization
How can you mitigate the potential risk associated with a compressed URL (e.g., TinyURL, goo.gl)
Use the preview function to see where the link actually leads
Which of the following is a best practice for physical security?
Use your own security badge or key code for facility access
Beth taps her phone at a payment terminal to pay for a purchase. Does this pose a security risk?
Yes, there is a risk that the signal could be intercepted or altered.
Sylvia commutes to work via public transportation. She often uses the time to get a head start on work by making phone calls or responding to e-mails on her government approved mobile device. Does this pose a security concern?
Yes. Eavesdroppers may be listening to Sylvia's phone calls, and shoulder surfers may be looking at her screen. Sylvia should be aware of these risks.
Which of the following is true of telework?
You must have permission from your organization to telework
Which best describes an insider threat? Someone who uses _______ access, _______, to harm national security through unauthorized disclosure, data modification, espionage, terrorism, or kinetic actions.
authorized; wittingly or unwittingly
Which of the following is an example of a good password?
d+Uf_4RimUz
Which of the following describes Sensitive Compartmented Information(SCI)? SCI is a program that ______ various types of classified information for _____ protection and dissemination or distribution control.
segregates; added