Department of Defense (DoD) Cyber Awareness Challenge 2024 (1 hr) (Pre Test) (Incomplete)
Which of the following contributes to your online identity?
All of these
Which of the followng is permitted within a Sensitive Compartmented Information Facility (SCIF)?
An authorized Government-owned Portable Electronic Devic (PED)
You receive a text message from a package shipper notifying you that your package delivery is delayed due to needing updated delivery instructions from you. It provides a shortened link for you to provide the needed info. You are not expecting a package. What is the best course of action?
Delete the message
What is the goal of an Insider Threat Program?
Deter, detect, and mitigate the risks associated with insider threats
Which of the following is an appropriate use of a DoD Public Key Infrastructure (PKI) token?
Do not use a token approved for NIPRNet on SIPRNet
Which of the following uses of removable media is allowed?
Government owned removable media that is approved as operationally necessary
On your home computer, how can you best establish passwords when creating separate user accounts?
Have each user create their own, strong password
How should government owned removable media be stored?
In a GSA-approved container according to the appropriate security classification
Which of the following is true of Controlled Unclassified Information (CUI)?
It must be handled using safeguarding or dissemination controls
Which of the following is a best practice for physical security?
Only hold the door for coworkers that you know work in the facility
When are you permitted to use classified data?
Only in areas with security appropriate to the classification level
Which of the following is true of transmitting or transporting of Sensitive Compartmented Information (SCI)?
Printed SCI must be retrieved promptly from the printer.
Which of the following is NOT a way that malicious code can be spread?
Running a virus scan
Which of the following in NOT a best practice for teleworking in an environment where Internet of Things (IoT) devices are present?
Use the devices' default security settings
Which of the following is NOT a best practice for protecting your home wireless network for telework?
Use your router's pre-set Service Set Identifier (SSID) and password
Which of the following is a best practice for managing connection requests on social networking sites?
Validate connection requests through another source if possible
Beth taps her phone at a payment terminal to pay for a purchase. Does this pose a security risk?
Yes, there is a risk that the signal could be intercepted and altered.
Sylvia commutes to work via public transportation. She often uses the time to get a head start on work by making phone calls or responding to e-mails on her government approved mobile device. Does this pose a security concern?
Yes. Eavesdroppers may be listening to Sylvia's phone calls, and shoulder surfers may be looking at her screen. Sylvia should be aware of these risks.
Which best describes an insider threat? Someone who uses _____ access, _________, to harm national security through unauthorized disclosure, data modification, espionage, terrorism, or kinetic actions
unauthorized; wittingly or unwittingly