DOD Cyber Awareness challenge 2024
1st email DOD IT 2nd email DOD software
1st- 3+ this email contains 4 phishing indicators 2nd- 3+
Select the individual who securely authenticates their identity
Alex. she is her
When e-mailing this personnel roster, which of the following should you do?
All 3- encrypt, digitally, use
Select an action to take in response to compromised sensitive compartmented information (sci)
Call your security point of contact (poc)
which of these individuals demonstrated behavior that could lead to the compromise of SCI
Col. Cockatiel
What type of information does this personnel roster represent
Controlled unclassified information (cui)
Your meeting notes are unclassified. This means that your notes
Do not have the potential to damage national security.
How can you prevent the download of malicious code
Scan external files before uploading toy your device Research apps and their vulnerabilities before downloading
which of the following may indicate a malicious code attack
a new app suddenly appears appears on the device the device slows down a new tap appears in the web browser
mobile devices
cash, approved hotspot, leave
Insider threat
yes, report Roberto
home computer security
yes-install anti virus, yes create user profile, yes enable
How can malicious code spread
all except virus scans
Social networking
delete, deny, keep scrolling
Select a clue/ laptop- waterjug- printer
laptop-yes/ waterjug-no/ printer- no
is this an appropriate use of government-furnished equipment (gfe) sending gov email selling cookies
no/ all 3 you choices
which of the following poses a physical security risk.
open office area- posting an access roster in public view collateral classified space- both choices. Disable camera,microphone,wifi/ and use gov. wired peripherals Sensitive compartmented information facility- All 3 choices
website use
research claim
Telework
secure the area, hdmi monitor and usb keyboard, yes