Cyber Awareness 2026

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

Which of the following is an example of a Personally Identifiable Information (PII)?

Mother's maiden name

Oliver uses his phone to look up information about a jacket he might want to purchase. Later, he notices ads for the jacket appearing on websites that he views using his laptop. Why would he see this happen?

Oliver's apps and devices collect and share information about him.

Which of the following is a best practice for working offsite during official travel?

Position your monitor so that it is not easily observed by others while in use.

While at your workstation, you hear an unusual sound coming from the direction of the office door. Before you go to check on the noise, what must you do?

Remove your common Access Card (CAC) from your workstation.

You receive an e-mail with a link to verify that your account is active. It says you must click the link within 2 days. Your IT department has not sent links like this in the past. The e-mail is not digitally signed. What action should you take?

Report the e-mail to your security POC or help desk

Which of the following is an allowed use of a government-furnished smartphone?

Responding to e-mails on your government e-mail account

How can you identify the separation of Sensitive Compartmented Information (SCI) classified materials from collateral classified material?

SCI classified material and collateral classified material are in indistinguishable.

What is a risk to Government systems posed by removable media?

Their data storage and ability to connect to systems can lead to unintended transfers of information, such as introduction of malicious code or spillage.

Which of the following is a potential insider threat indicator?

Untreated alcohol use disorder

What should you do with your badge within a Sensitive Compartmented Information Facility (SCIF)

Wear is visibly and above the waist.

Which of the following personally owned peripherals can you use with government furnished equipment (GFE)?

Wired keyboards, mice, and trackballs through a USB connections

Based on the description provided, how many insider threat indicators are present? Jean is a long-term government employee who recently transferred from one agency to another to take a supervisory role. As part of her transition, Jean requires a high level of access to sensitive information.

0

Which of the following is an example of Protected Health Information (PHI)?

An individual's medical record maintained by a healthcare provider

Which of the following is an example of Protected Health Information (PHI)?

An individual's medical record maintained by a healthcare provider.

How can you take back any content you post to a social networking site if you change your mind?

Deleted the post. You can't. Once you post it, the site owns your content. Send a request to the site owner to purge your profile data. Disable your site account.

What is a best practice for user accounts on your home computer?

Each user should have their own account.

Travis is processing travel reimbursements for the past quarter and needs to share travel rosters containing passport numbers with his supervisor for approval. Which is an approved way to transmit this information?

Encrypted Government e-mail with a digital signature

Trisha receives an e-mail with a sensational rumor about a celebrity's personal life. Which of the following actions should Trisha NOT take with the e-mail?

Forward it

Delia processes healthcare claims for Service members. As part of her duties, she sometimes needs to telephone team members and partner organizations to resolve issues specific to individual claims. As she often needs to access files and take notes on these calls, she prefers to use speakerphone so that her hands are free. She works on-site at a government facility in an open office environment. Does this pose a security concern?

Yes. Even in a closed work environment, Delia should take care when discussing personally identifiable information (PII) where others without a need-to-know may overhear.

Oscar is on official Government travel with a Government-issues laptop. While at the airport, he uses the laptop to work on a report containing controlled unclassified information (CUI). For connectivity, he uses his personal phone as a mobile hotspot. Are there any security concerns here?

Yes. He should be vigilant got "shoulder surfing," where others may be able to view the information on his screen.

While picking up lunch at a cafe, Thom waits for his order at an empty table near the pickup counter. When his name is called, he gets up to retrieve his order, briefly leaving his phone setting on the table where he was waiting. Does this pose a risk?

Yes. Someone could have taken off with his phone.

Which of the following is a best practice for physical security?

Badge into your facility separately when entering with another coworker

Which of the following is an example of an individual's activity that you should report?

Changing workplace behavior abruptly

How can you prevent spillage?

Label all files with appropriate classification markings.

What consequence could you expect from modifying government equipment without authorization?

Legal repercussions Introduction of malware to the network Increasing the potential for spillage *All of these

Which of the following e-mail practices can help to prevent inadvertently downloading viruses?

Look for a digital signature on e-mails


संबंधित स्टडी सेट्स

Career development module questions

View Set

A Man for All Seasons - Thomas More Study Guide

View Set

RICCI Peds Review Exam 2 - Chapter 37 + 47

View Set

Chp 7: Long-Term Memory (Encoding, Retrieval, & Consolidation)

View Set