Cyber Awareness 2025
Which of the following is permitted within a sensitive compartmented information facility SCIF?
An authorized Government-owned Portable Electronic Device (PED)
which of the following statements is true of DoD unclassified data?
It does not have potential to damage national security
what is an insider threat
Someone who uses authorized access, wittingly or unwittingly, to harm national security
Type of data could reasonably be expected to cause damage to national security?
Top Secret
Which of the following is true of working within a sensitive compartmented information facility SCIF
badges must be worn while in the facility and removed when leaving the facility
example of removable media
compact disc
you receive a phone call from a unknown person asking for a directory name on your government furnished laptop so that a software update can be made, which course of action?
document the interaction, contact security POC
Which of the following is an allowed use of government furnished equipment
emailing your supervisor
which of the following is not an appropriate use of your cac?
exchaning for a visitor pass in another building
John receives an email about a potential shutdown of a major social service unless a petition receives enough signatures, what action should john not take
forward it
how can you protect your home computer
install spyware protection software
Which of the following is a best practice when browsing the internet
look for https in the URL name
Which of these is not a potential indicator that your device may be under malicious code attack
operating system update
how can you protect yourself from identity theft?
review your credit report annually
which of the following is true of removable media and portable electronic devices
risks associated with them may lead to loss of life
how can you prevent viruses and malicious code
scan all email attachments
how do you protect data on a mobile device
use 2 factor authentification
how can you protect your home computer?
use legitament known antivirus software
how can you protect yourself on social networking sites
validate connection requests through another source
as you scroll through your social media feed, a news headline catches your eye. What should you consider before sharing it
whether source is credible and reliable
which of the following poses a security risk while teleworking in an environemtn where IOT devides are present
all of these
which of the following is a best practice to protect your identity
ask how information will be used before giving it out
example of a strong password
bBrobr@791*p
steve occasionally runs errands during virtual meetings. He joins the meeting using his approved government device. does this pose a security concern?
yes, eavesdroppers may be listening to steves conversation
which of the following is true of transmitting or transporing SCI
you must be courier briefed for sci to transport it