Cyber Awareness Challenge 2024 (Knowledge Pre-Check)
Which of the following is permitted when using an unclassified laptop within a collateral classified space?
A Government-issued wired headset with microphone
Which of the following personally owned peripherals can you use with government furnished equipment (GFE)?
A USB hub
When is the safest time to post on social media about your vacation plans?
After the trip
Which of the following is a best practice for using government e-mail?
Do not send mass e-mails
Which of the following is an appropriate use of a DoD Public Key Infrastructure (PKI) token?
Do not use a token approved for NIPR on SIPR
Tom is working on a report that contains employees' names, home addresses, and salary. Which of the following is Tom prohibited from doing with the report?
Email it to a colleague like a silly goose
Where are you permitted to use classified data?
Only in areas with security appropriate to the classification level
which of the following is an authoritative source for derivative classification?
Security Classification Guide
You receive an e-mail marked important from your boss asking for data that they need immediately for a meeting starting now. The e-mail was sent from a personal e-mail address that you do not recognize, but it addresses you by name. What concern does this e-mail pose?
This may be a spear phishing attempt. Contact your boss using contact information that you know to be legitimate.
Which of the following is NOT a best practice for teleworking in an environment where Internet of Things (IoT) devices are present?
Use the devices' default security settings
Which of the following is a best practice for managing connection requests on social networking sites?
Validate connection requests through another source if possible
Which best describes an insider threat? Someone who uses ____ access, ____, to harm national security through unauthorized disclosure, data modification, espionage, terrorism, or kinetic actions.
authorized, wittingly or unwittingly
Which of the following describes Sensitive Compartmented Information (SCI)? SCI is a program that _____ various types of classified information for _____ protection and dissemination or distribution control.
segregates, added
On your home computer, how can you best establish passwords when creating separate user accounts?
Have each user create their own, strong password
How can you protect your home computer?
Regularly back up your files
Which of the following uses of removable media is allowed?
Government owned removable media that is approved as operationally necessary
How can you mitigate the potential risk associated with a compressed URL (e.g., TinyURL, goo.gl)?
Use the preview function to see where the link actually leads
Which of the following is a step you should NOT take to protect against spillage?
Purge any device's memory before connecting it to a classified network?
Beth taps her phone at a payment terminal to pay for a purchase. Does this pose a security risk?
Yes, there is a risk that the signal could be intercepted and altered
Which of the following is true about telework?
You must have your organization's permission to telework
Which of the following is an appropriate use of government e-mail?
Using a digital signature when sending attachments