Cyber awareness 2024

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

which of the following must you do when using an unclassified laptop in a collateral classified environment

disable the embedded camera, microphone and wifi Use government-issued wired peripherals

your meeting notes are unclassified. this means that your notes

do not have the potential to damage national security

which of these personally owned computer peripherals may be used with government-furnished equipment

-HDMI monitor -USB keyboard

which of the following must you do when working in a SCIF

-Verify that all personnel in listening distance have a need-to-know -ensure the monitors do not provide unobstructed views -escort uncleared personnel and warn others in the SCIF

how can malicious code spread? select all that apply.

-email attachment -downloading files -visiting inected websites

how can you prevent the download of malicious code?

-scan external files before uploading to your device -research apps and their vulnerabilities' before downloading

this is not an appropriate use of GFE. why?

-you should not use government email to sell anything -you should use a digital signature when sending hyperlinks -you should not use unauthorized services, such as fileshare services, on GFE

Which of these individuals demonstrated behavior that could lead to the compromise of SCI

COL. Cockatiel

MR. Macaw and a colleague had a conversation about a shared project in the SCIF after verifying no one was nearby. Does this behavior represent a security concern?

No

which method of getting online poses the least risk

approved mobile hotspot

select an action to take in response to compartmented information

call your security point of contact (POC)

which payment method poses the least risk

cash

what type of information does this personnel roster represent

controlled unclassified information

when emailing this personnel roster, which of the following should you do

encrypt the PII, digitally sign the email, use your government email account

true or false? the best way to keep your passport safe is to carry it with you

false

which action will keep DoD data the safest

leave the coffee shop

DR. Dove printed a classified document and retrieved it promptly from the printer. Does this behavior represent a security concern.

no

is this an appropriate use of government-furnished equipment

no

which of the following poses a physical security risk

posting an access roster in public view

how should bob's colleagues respond

report bob

what step should be taken next to securely telework

secure the area so others cannot view your monitor

true or false? voice-activated smart devices can collect and share your personal information

true

true or false? you should monitor your credit card statements for unauthorized purchases

true

you find an unlabeled thumb drive in the parking area outside your workplace. what should you do?

turn it in to your security officer

COL. Cockatiel worked on an unmarked document on the classified network. Does this behavior represent security concern?

yes

does bob demonstrate potential insider treat indicators

yes

does this action pose potential security risk

yes


Ensembles d'études connexes

Business Stats-Stats 2300-Pedram Jahangary

View Set

Differential Diagnosis final Exam Practice ?

View Set

Exam 2 Chapters 8,9,10, 19,24,27,32 prep U and TB

View Set