Cyber awareness 2024-2025 test Out

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

Which of the following is a best practice for telework and remote work? Use personal equipment to avoid the risks associated with non-Government internet. Connect to your Government Virtual Private Network (VPN). Ensure others do not have access to your work area when processing classified information. Rotate the location in your home where you perform telework or remote work.

Connect to your Government Virtual Private Network (VPN).

What is a best practice for creating user accounts for your home computer? Set up a generic user account with no password for general user functions Do not share your home computer with any other users Greate separate accounts for each user and have each user create their own password Create separate accounts for each user and tailor each password to what will be easy for the individual user to remember

Create separate accounts for each user and tailor each password to what will be easy for the individual user to remember

John receives an e-mail about a potential shutdown of a major social service unless a petition receives enough signatures. Which of the following actions should John NOT take with the e-mail? Forward it Mark it as junk Research the claim Delete it

Forward it to

Which of the following is true of Controlled Unclassified Information (CUI)? It belongs to a defined category established in the DoD CUI Registry. It is another term for any Unclassified information that has not been cleared for public release. It poses no risk to Government missions or interests. It is marked as CUl at the discretion of the information owner.

It belongs to a defined category established in the DoD CUI Registry.

When allowed, which of the following is an appropriate use of removable media? Downloading data from classified networks Destroying removable media with a refrigerator magnet Labeling media that contains personally identifiable information (PII) Discarding unneeded removable media in the trash

Labeling media that contains personally identifiable information (PII)

How can you prevent viruses and malicious code? Scan all e-mail attachments Allow mobile code to run on all websites E-mail infected files to your security POC View e mail using the Preview Pane rather than opening it

Scan all e-mail attachments

When linked to a specific individual, which of the following is NOT an example of Personally Identifiable Information (PIl)? Fingerprint records Smartphone brand and model Mother's maiden name Payment for the provision of healthcare

Smartphone brand and model

Steve occasionally runs errands during virtual meetings. He joins the meetings using his approved government device. Does this pose a security concern?

Yes, Steve's actions do pose a security concern.

Steve occasionally runs errands during virtual meetings. He joins the meetings using his approved government device. Does this pose a security concern? Yes. Eavesdroppers may be listening to Steve's conversation. No, because Steve is using a government-approved device. Maybe. It depends on whether Steve uses headphones and how loudly he talks. No. No one else is going to be paying attention to what Steve is doing, as phone calls in public places are common.

Yes. Eavesdroppers may be listening to Steve's conversation.

Which of the following is an example of a strong passi 1965May31! •bRobr@791*P Password12345 Fluffy&Spot

•bRobr@791*P

You receive an e-mail with a link to run an anti-virus scan. Your IT department has not sent links like this in the past. The e-mail is not digitally signed. What action should you take? Look for a phone number in the e-mail to call for more information. Report the e-mail to your security POC or help desk. Reply to the e-mail to request more information. Select the link to run the anti-virus scan.

Report the e-mail to your security POC or help desk.

What are the requirements for access to Sensitive Compartmented Information (SCI)? The appropriate level of security clearance eligibility and a need-to-know Top Secret clearance and indoctrination into the SC program The access caveats specified by the Direct of National Intelligence Secret clearance and a signed nondisclosure agreement (NDA)

The appropriate level of security clearance eligibility and a need-to-know


Set pelajaran terkait

Unit 4: Chapter 17 - Interference

View Set

Review Test Submission: Chapter 15 Practice

View Set

Communication (Ch. 10-14) NUR 102

View Set

11.1 familiar commands - affirmativos y negativos de estos verbos y Prática 1 - Completar

View Set

Parole spagnole che iniziano per B

View Set

Exam 3 - foundations (engage fundamentals post tests)

View Set