DOD Cyber Awareness Challenge 2019 (DOD-IAA-V16.0)

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

Which of the following is true about telework?

You must have your organization's permission to telework.

In addition to avoiding the temptation of greed to betray his country, what should Alex do differently?

Avoid talking about work outside of the workplace or with people without a need-to-know

What is the danger of using public Wi-Fi connetions?

Both of these

Select the information on the data sheet that is protected health information (PHI).

Bottom box

Which of the following does NOT constitute spillage?

Classified information that should be unclassified and is downgraded

Which of the following is true of protecting classified data?

Classified material must be appropriately marked.

Which of the following should you NOT do if you find classified information on the internet?

Download the information

Firewall disabled. Would you like to enable the firewall?

Enable

What level of damage to national security can you reasonably expect Top Secret information to cause if disclosed?

Exceptionally grave damage

A virus has been detected.

Exit

Incident Select all violations at this unattended workstation. Then select Submit.

Laptop with CAC left inserted Sticky note with Pin number

Which of the following demonstrates proper protection of mobile devices?

Linda encrypts all of the sensitive data on her government-issued mobile devices.

Select the appropriate setting for each item. Then select Save.

Name and profile picture - Any Status, photos, and posts - Friends Only Family and relationships - Friends Only Birthday - Friends Only Photos and videos you are in - Friends Only Check in location via GPS: Off

Did you earn a Cyber Security Awareness Challenge 2018 Certificate of Completion?

No

Incident What should Sara do when using publicly available Internet, such as hotel Wi-Fi?

Only connect Government VPN

Which of the following is NOT an example of sensitive information?

Press release data

Incident #1 What should the employee do differently?

Remove his CAC and lock his workstation.

From John Anderson Select an action.

Report e-mail

Mark's Statement What should Alex's colleagues do?

Report the suspicious behavior in accordance with their organization's insider threat policy

Which of the following is NOT a correct way to protect sensitive information?

Sensitive information may be stored on any password-protected system.

Prevalence Which of the following is an example of malicious code?

Software that installs itself without the user's knowledge

Damage How can malicious code cause damage?

All of these

Select all sections of the profile that contain an issue. Then select Submit.

All three sections

Incident #2 What should the employee do differently?

Decline to let the person in and redirect her to security.

From Alice Murphy Select an action.

Delete e-mail

From Pursuit Bank Select an action.

Delete e-mail

Spread How can you avoid downloading malicious code?

Do not access website links in e-mail messages

Security updates are ready to install. Install now?

Install

Incident When is it okay to charge a personal mobile device using government-furnished equipment (GFE)?

This is never okay.

Ellen's Statement How many insider threat indicators does Alex demonstrate?

Three or more

Incident Select all security issues. Then select Submit.

Top and Bottom sections

Victim Select the information on the data sheet that is personally identifiable information (PII) but not protected health information (PHI).

Top box

Evidence Your antivirus is out-of-date. Update now?

Update

Which of the following is NOT an appropriate way to protect against inadvertent spillage?

Use the classified network for all work, including unclassified work

Incident Select Yes or No for each item. Then select Submit. (Permitted Uses of Government-Furnished Equipment GFE))

Viewing or downloading pornography - No Gambling online - No Conducting a private money-making venture - No Using unauthorized software - No Illegally downloading copyrighted material - No Making unauthorized configuration changes - No


Kaugnay na mga set ng pag-aaral

Significant Figures Study Guide 1.5

View Set

Industrial revolution practice questions

View Set

Final Exam - Module 5-7 (Exam, Quiz, ATI, TestBank)

View Set

Viruses, Worms, Trojan Horses, Spoofing, Identity Theft, and Unauthorized Computer Access

View Set