Cyber Awareness 2025

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

Which of the following is permitted within a sensitive compartmented information facility SCIF?

An authorized Government-owned Portable Electronic Device (PED)

which of the following statements is true of DoD unclassified data?

It does not have potential to damage national security

what is an insider threat

Someone who uses authorized access, wittingly or unwittingly, to harm national security

Type of data could reasonably be expected to cause damage to national security?

Top Secret

Which of the following is true of working within a sensitive compartmented information facility SCIF

badges must be worn while in the facility and removed when leaving the facility

example of removable media

compact disc

you receive a phone call from a unknown person asking for a directory name on your government furnished laptop so that a software update can be made, which course of action?

document the interaction, contact security POC

Which of the following is an allowed use of government furnished equipment

emailing your supervisor

which of the following is not an appropriate use of your cac?

exchaning for a visitor pass in another building

John receives an email about a potential shutdown of a major social service unless a petition receives enough signatures, what action should john not take

forward it

how can you protect your home computer

install spyware protection software

Which of the following is a best practice when browsing the internet

look for https in the URL name

Which of these is not a potential indicator that your device may be under malicious code attack

operating system update

how can you protect yourself from identity theft?

review your credit report annually

which of the following is true of removable media and portable electronic devices

risks associated with them may lead to loss of life

how can you prevent viruses and malicious code

scan all email attachments

how do you protect data on a mobile device

use 2 factor authentification

how can you protect your home computer?

use legitament known antivirus software

how can you protect yourself on social networking sites

validate connection requests through another source

as you scroll through your social media feed, a news headline catches your eye. What should you consider before sharing it

whether source is credible and reliable

which of the following poses a security risk while teleworking in an environemtn where IOT devides are present

all of these

which of the following is a best practice to protect your identity

ask how information will be used before giving it out

example of a strong password

bBrobr@791*p

steve occasionally runs errands during virtual meetings. He joins the meeting using his approved government device. does this pose a security concern?

yes, eavesdroppers may be listening to steves conversation

which of the following is true of transmitting or transporing SCI

you must be courier briefed for sci to transport it


Ensembles d'études connexes

research methods for psychology exam #2 study set

View Set

[CYIS 2310] Ethics and Impacts RQ8

View Set

Texas State - Physical Geology - GEOL 1410 - Wernette - Final Exam Review

View Set

Reticular Activating System - stimulation and lesion

View Set

Honor's Biology Cumulative Review

View Set

E-Commerce: Internet, Web, and Mobile Platforms

View Set

HashiCorp Terraform Associate - Udemy PT 1

View Set