USDA Information Security Awareness Training

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

One easy way to protect your Government computer from internet threats is to:

A. Avoid casual or unnecessary internet browsing.

Within the context of information systems, an insider threat is any person without legitimate physical or administrative access to an information system who can misuse or exploit its weaknesses.

A. FALSE

Maria has been issued a USDA laptop. She should do all of the following to ensure that she complies with USDA policy EXCEPT:

A. Have someone watch her laptop at all times when traveling.

Which term refers to a secure systems ability to protect against the unauthorized modification or destruction of information?

A. Integrity

For Official Use Only (FOUO) and Controlled Unclassified Information (CUI) may include all of the following EXCEPT:

A. Secret information

Ken received an unencrypted email from a colleague named Barbie that contained a driver's license image of an individual requesting assistance. Is this considered PII?

A. Yes

All of the following are principles essential to a secure information system EXCEPT:

B. Accountability

All of the following are examples of our nation's critical infrastructure, EXCEPT:

B. Colleges and universities

Edna wants to create a strong password. She should avoid all of the following EXCEPT:

B. Special characters

Agnes wants to make sure she knows which steps to take to avoid spillage. You advise Agnes to do all of the following EXCEPT:

B. Store classified data on her Smart Phone when traveling.

Unlocking your smart phone removes security protections that protect your mobile device from malicious applications.

B. TRUE

What is NOT PII?

B. Zip code

Which of the following will help reduce your risk of identity theft when engaging in e-commerce?

C. Confirm the site you are using uses an encrypted link.

All of the following are examples of malicious code EXCEPT:

C. Cookies

Wanda is at work, on the clock, and is working on her private commercial business. She receives a reprimand from her supervisor. What should Wanda have known?

C. Her organization is permitted to monitor her computer for possible misuse.

What represents the greatest threat to federal information systems?

C. Internal Human Threats

Jacob collects movies. He found a way to get movies at no cost using a service where he shares his computer's content with other users. He sets up his work computer to use this service. This is an example of the following vulnerability:

C. Peer-to-peer technology

Spyware can result in all of the following EXCEPT:

C. You receive e-mails that solicit personal information.

A file with which of the following file extensions is most likely to contain malicious code?

D. .bat

The Privacy Act requires that Federal agencies and its employees do the following: A. Collect minimal, necessary information on individuals. B. Safeguard the information. C. Allow individuals to inspect and correct erroneous information. D. All of the above.

D. All of the above.

The Federal Information Security Management Act (FISMA): A. Defines national security systems. B. Mandates a computer security program at all federal agencies. C. Requires a greater level of protection for Government information systems that contain Privacy Act information. D. All of the answers are correct.

D. All of the answers are correct.

Cookies contain information about you. This information, if not encrypted, could be viewed by a third party. The best practice to prevent this from happening is:

D. Ensure your browser is set to not accept cookies.

Which of the following vulnerabilities is most likely to be exploited by an external threat to the infrastructure?

D. Software flaws

What is a way you can protect yourself against internal threats? A. Keep an inventory of all equipment assigned to you B. Do not install or use unauthorized software or hardware on the network C. When possible, use physical locking devices for computing resources D. Contact your supervisor or security personnel if you observe suspicious activity E. All of the above

E. All of the above

Henry is working from a USDA office. He has several tasks to perform today: 1) he logs onto his USDA computer to get started; 2) he faxes a sensitive document to his supervisor using a fax machine with the appropriate clearance; 3) he confirms some appointments and project due dates and enters them into his smart phone; and 4) he calls his supervisor on his cell phone to review the document he just faxed over. Which of Henry's actions was a mistake?

Using a cell phone to discuss sensitive information.


Kaugnay na mga set ng pag-aaral

Private Insurance Plans for Seniors

View Set

Forecasting & Inventory Management Exam #1

View Set

CSE 598 • 6. Social Insects & Collective Computation

View Set

Chapter 41: Oxygenation (Oxygenation and the Nursing Process)

View Set

Chapter 4 Evaluating a Company's Resources, Capabilities, and Competitiveness

View Set

Chapter 7 & 8 D1&2 8, 9, 13, 17, 19, 27

View Set