Department of Defense (DoD) Cyber Awareness Challenge 2024 (1 hr)

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

Which of the following is permitted when using an unclassified laptop within a collateral classified space?

A government-issued WIRED headset with microphone

UNDER WHICH CYBERSPACE PROTECTION CONDITION (CPCON) IS THE PRIORITY FOCUS LIMITED TO CRITICAL AND ESSENTIAL FUNCTIONS?

CPCON 2

WHAT IS THE GOAL OF AN INSIDER THREAT PROGRAM?

DETER, DETECTS, AND MITIGATE THE RISKS ASSOCIATED WITH INSIDER THREATS.

Which of the following is an appropriate use of government e-mail?

DO NOT SEND MASS E-MAILS

You receive a phone call offering you a $50 gift card if you participate in a survey. Which course of action should you take?

Decline to participate in the survey. This may be a social engineering attempt.

WHICH OF THE FOLLOWING IS TRUE OF CONTROLLED UNCLASSIFIED INFORMATION (CUI)?

It must be handled using safeguarding or dissemination controls.

Which of the following is a best practice when browsing the internet?

Only accept cookies from reputable, trusted websites

Which of the following is NOT a way that malicious code can spread?

Running a virus scan

WHICH OF THE FOLLOWING IS AN AUTHORITATIVE SOURCE FOR DERIVATIVE CLASSIFICATION

SECURITY CLASSIFICATION GUIDE

You receive an e-mail marked important from your boss asking for data that they need immediately for a meeting starting now. The e-mail was sent from a personal e-mail address that you do not recognize, but it addresses you by name. What concern does this e-mail pose?

This may be a spear phishing attempt. Contact your boss using contact information that you know to be legitimate.

How can you protect your home computer?

Turn on the password feature

Which of the following is a best practice for physical security?

Use your own security badge or key code for facility access.

WHICH OF THE FOLLOWING IS NOT AN APPROPRIATE USE OF YOUR COMMON ACCESS CARD (CAC)?

Using it as photo identification with a commercial entity

which of the following is a best practice to protect your identity

order a credit report annually.

How can an adversary use information available in public records to target you?

Combine it with information from other data sources to learn how best to bait you with a scam

Annabeth becomes aware that a conversation with a co-worker that involved Sensitive Compartmented Information (SCI) may have been overheard by someone who does not have the required clearance. What action should Annabeth take?

Contact her security POC to report the incident.

Which of the following is NOT a best practice for protecting data on a mobile device?

Disable automatic screen locking after a period of inactivity

Which of the following uses of removable media is allowed?

Government owned removable media that is approved as operationally necessary

Which of the following is true of spillage?

It can be either inadvertent or intentional

Which of the following is a step you should not take to protect against spillage?

Purge any devices memory before connecting it to a classified network

You receive an e-mail with a link to schedule a time to update software on your government furnished laptop. Your IT department has not scheduled software updates like this in the past and has not announced this software update. The e-mail is not digitally signed. What action should you take?

Report the e-mail to your security POC or help desk

Which of the following is an appropriate use of government e-mail?

Using a digital signature when sending attachments

Which of the following is a best practice for managing connection requests on social networking sites?

Validate connection requests through another source if possible


Kaugnay na mga set ng pag-aaral

Investment & Portfolio Analysis Test 2 Study Guide

View Set

Micro Assessment #4 (Practice Questions)

View Set

Nursing fundamentals: pharmacology

View Set

Chapter 31 - More Practice Questions

View Set

Artery, Vein & Capillary Structure

View Set