Cyber Awareness Challenge 2024 (Knowledge Pre-Check)

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

Which of the following is permitted when using an unclassified laptop within a collateral classified space?

A Government-issued wired headset with microphone

Which of the following personally owned peripherals can you use with government furnished equipment (GFE)?

A USB hub

When is the safest time to post on social media about your vacation plans?

After the trip

Which of the following is a best practice for using government e-mail?

Do not send mass e-mails

Which of the following is an appropriate use of a DoD Public Key Infrastructure (PKI) token?

Do not use a token approved for NIPR on SIPR

Tom is working on a report that contains employees' names, home addresses, and salary. Which of the following is Tom prohibited from doing with the report?

Email it to a colleague like a silly goose

Where are you permitted to use classified data?

Only in areas with security appropriate to the classification level

which of the following is an authoritative source for derivative classification?

Security Classification Guide

You receive an e-mail marked important from your boss asking for data that they need immediately for a meeting starting now. The e-mail was sent from a personal e-mail address that you do not recognize, but it addresses you by name. What concern does this e-mail pose?

This may be a spear phishing attempt. Contact your boss using contact information that you know to be legitimate.

Which of the following is NOT a best practice for teleworking in an environment where Internet of Things (IoT) devices are present?

Use the devices' default security settings

Which of the following is a best practice for managing connection requests on social networking sites?

Validate connection requests through another source if possible

Which best describes an insider threat? Someone who uses ____ access, ____, to harm national security through unauthorized disclosure, data modification, espionage, terrorism, or kinetic actions.

authorized, wittingly or unwittingly

Which of the following describes Sensitive Compartmented Information (SCI)? SCI is a program that _____ various types of classified information for _____ protection and dissemination or distribution control.

segregates, added

On your home computer, how can you best establish passwords when creating separate user accounts?

Have each user create their own, strong password

How can you protect your home computer?

Regularly back up your files

Which of the following uses of removable media is allowed?

Government owned removable media that is approved as operationally necessary

How can you mitigate the potential risk associated with a compressed URL (e.g., TinyURL, goo.gl)?

Use the preview function to see where the link actually leads

Which of the following is a step you should NOT take to protect against spillage?

Purge any device's memory before connecting it to a classified network?

Beth taps her phone at a payment terminal to pay for a purchase. Does this pose a security risk?

Yes, there is a risk that the signal could be intercepted and altered

Which of the following is true about telework?

You must have your organization's permission to telework

Which of the following is an appropriate use of government e-mail?

Using a digital signature when sending attachments


संबंधित स्टडी सेट्स

Cultural Anthropology Chapter 10; Kinship and Descent

View Set

the day before ap psychology exam review

View Set

Chapter 18: Creating competitive advantage

View Set

BUS1B Managerial Accounting Chapter 6

View Set

PHYSICS 4.07 First Law of Thermodynamics

View Set

Chapter 14- Flexibility Training Concepts

View Set