DOD Cyber Awareness Challenge 2025

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

which of the following is true of spillage

It can be either inadvertent or intentional

which of the following is true of scifs

Personnel should physically assess whether everyone within listening distance has a need to know before starting convos involving classified info

when is the safest time to post on social media about your work related travel

after the trip

how can malicious code do damage

all of these

which of the following can be used to catalogue information about you

all of these

which of these is not a potential indicator that your device may be under a malicious code attack

an OS update

which of the following is true of compressed urls

can be used to mask malicious intent

which of the following is an example of removable media

compact disc

best practice for telework and remote work

connect to your government vpn

what is a best practices for creating user accounts for your home computer

create separate accounts and each user makes their own password

as you scroll through your social media feed, a news headline catches your eye. what should you consider before sharing it with your connections

credibility

Which of the following is a potential insider threat indicator

death of a spouse

you receive a text message from a vendor notifying you that your order is on hold due to needing updated payment information from you. it provides a shortened link for you to provide the needed information. what is the best course of action?

delete the message

which of the following is an allowed GFE

emailing your supervisor

how can you protect a mobile device while traveling

gov. vpn

which of the following is true of CUI

it belongs to a defined category established in the DoD CUI registry.

which of the following describes SCI

provides an overlay of security

which of the following uses of removable media is allowed

sam uses approved gov. owned removeable media to transfer files between gov. systems as authorized

how can you prevent viruses and malicious code

scan all e-mail attachments

you receive an email marked important from your agency head asking you to call them using a n umber you do not recognize. the email was sent from a personal email address that you do not recognize, but it addresses you by name. what action should you take

spear phishing attempt. report it

which of the following is an appropriate use of a DoD PKI token

use it on a system for pki required task

how can you protect yourself from social networking sites

validate the connection requests through another source

steve occasionally runs errands during virtual meetings. he joins the meetings using his approved gov. device. does this pose a security concern?

yes, the easy droppers could be listening


Ensembles d'études connexes

Fundamentals of Nursing III (Chap 38 Oxygenation & Perfusion Prep U)

View Set

Chapter 2 - Regulatory and Legal Environment

View Set

Hydrothermal Vents and their Communities

View Set

Prefix:Di- (meaning "two,twice,double)

View Set

PSYC 314 Exam 2 Cognition Chapters 3, 4, & 5

View Set

Government Unit 4 Test: The American Party System

View Set

Psychiatric Mental Health - Hesi Prep

View Set

RENAL GLOMERULAR DISEASES Path CR4

View Set