DoD Cyber Awareness FY24

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

Under which Cyberspace Protection Condition (CPCON) is the priority focus limited to critical and essential functions?

CPCON 3

Which of the following is an appropriate use of a DoD Public Key Infrastructure (PKI) token?

Do not use a token approved for NIPRNet on SIPRNet

Which of the following is true of spillage?

It can be either inadvertent or intentional

Which of the following statements is true of DoD Unclassified data?

It poses no risk to the safety of government personnel, missions, or systems.

Which of the following is a best practice when browsing the internet?

Only accept cookies from reputable, trusted websites

Which of the following is true of Sensitive Compartmented Information Facilities (SCIFs)?

Personnel with access to a SCIF have a need-to-know for all information processed within the SCIF.

You receive an e-mail with a link to schedule a time to update software on your government furnished laptop. Your IT department has not schedule software updates like this in the past and has not announced this software update. The e-mail is not digitally signed. What action should you take?

Report the e-mail to your security POC or help desk.

Which of the following is NOT a way that malicious code can spread?

Running a virus scan

Terry sees a post on her social media feed that says there is smoke billowing from the Pentagon. The post includes a video that shows smoke billowing from a building that is not readily identifiable as the Pentagon. Terry is not familiar with the source of the post. Which of the following escribes what Terry has likely seen?

This is probably disinformation unless Terry can verify it on a legitimate news site.

Which of the following is true of transmitting or transporting Sensitive Compartmented Information (SCI)?

Top Secret and able to hand deliver it

Which of the following is least likely to pose a risk to share on a social network site?

Your pet's name

Which of these is NOT a potential indicator that your device may be under a malicious code attack?

a notification for a system update that has been publicized

Which of the following describes Sensitive Compartmented Information (SCI)? SCI is a program that _______ various types of classified information for _____ protection and dissemination or distribution control.

segregates; added

How can you protect your home computer?

Turn on the password feature

which of the following is a best for physical security

Use your own security badge or key code for facility access


संबंधित स्टडी सेट्स

Vision and light energy (AP psych)

View Set

Survey of Economics Midterm Questions

View Set

Negligence & Malpractice Professional Nursing

View Set

Glomerular Filtration Rate and Renal Blood Flow

View Set

Glückwünsche, Gute Nachrichten---Good news and congratulations

View Set

Chapter 13 - Foreign Exchange Risk

View Set