Department of Defense (DoD) Cyber Awareness Challenge 2024 (1 hr) (Pre Test)

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

Which of these is NOT a potential indicator that your device may be under a malicious code attack?

A notification of a system update that has been publicized

Which of the following is a risk associated with removable media?

All of these

Which of the following is permitted within a SCIF?

An authorized Government-owned PED

Under which Cyberspace Protection Condition (CPCON) is the priority focus limited to critical and essential functions?

CPCON 2

What does the CAC contain?

Certificates for identification, encryption and digital signature

How can an adversary use information available in public records to target you?

Combine it with info from other data sources to learn how to best bait you with a scam

You receive a text message from a package shipper notifying you that your package delivery is delayed due to needing updated delivery instructions from you. It provides a shortened link for you to provide the needed info. You are not expecting a package. What is the best course of action?

Delete the message

Which of the following is NOT a best practice for protecting data on a mobile device?

Disable auto screen locking after a period of inactivity

Which of the following is NOT a best practice for travelling overseas with a mobile device?

Do not travel with a mobile device if you can avoid it

Which of the following is a best practice when browsing the internet?

Only accept cookies from reputable, trusted websites

Where are you permitted to use classified data?

Only in areas with security appropriate to the classification level

Which of the following is a best practice to protect your identity?

Order a credit report annually

Which type of data could reasonably be expected to cause serious damage to national security?

Secret

Which of the following is an example of behavior that you should report?

Taking sensitive information home for telework without authorization

How can you protect your home computer?

Turn on password feature

How can you mitigate the potential risk associated with a compressed URL?

Use the preview function to see where the link actually leads

Tom is working on a report that contains employees names, home addresses, and salary. Which of the following is Tom prohibited from doing with the report?

Using his home computer to print the report while teleworking

Sylvia commutes to work via public transportation. She often uses the time to get a head start on work by making phone calls or responding to emails on her government approved mobile device. Does this pose a secuirty concern?

Yes, eavesdroppers may be listening to Sylvia's phone calls and shoulder surfers may be looking at her screen. Sylvia should be aware of these risks.

Which of the following is true of telework?

You must have permission from your organization.

which of the following is least likely to pose a risk to share on social networking site?

Your pets name

Which best describes an insider threat? Someone who uses __________ access, ______________, to harm national security through unauthorized disclosure, data modification, espionage, terrorism, or kinetic actions.

authorized, wittingly or unwittingly

Which of the following is an example of a strong password?

d+Uf_4RimUz

Which of the following uses of removable media is appropriate?

encrypting data stored on removable media

How can you prevent viruses and malicious code?

scan all external files before uploading to your computer

What conditions are necessary to be granted access to SCI?

special access authorization and indoctrination into the SCI program


Ensembles d'études connexes

26. Residential and Commercial Financing

View Set

ATI Fundamentals Proctored Exam Study Guide

View Set

Classic Mythology (Powell) Final Practice Questions Chapters 19-24

View Set

Economics, Unit 2: Rational Decision-Making and Cost-Benefit Analysis

View Set