Department of Defense (DoD) Cyber Awareness Challenge 2024 (1 hr)
Which of the following statements is true of DoD Unclassified data?
It may require access and distribution controls
How can you protect your home computer?
Regularly back up your files
How can you prevent viruses and malicious code?
Scan all external files before uploading to your computer
Which type of data could reasonably be expected to cause serious damage to national security?
Secret
Which of the following is NOT a best practice for teleworking in an environment where Internet of Things (IoT) devices are present?
Use the devices' default security settings
How can you mitigate the potential risk associated with a compressed URL?
Use the preview function to see where the link actually leads
Beth taps her phone at a payment terminal to pay for a purchase. Does this pose a security risk?
Yes, there is a risk that the signal could be intercepted and altered
After a classified document is leaked online, it makes national headlines. Which of the following statements is true of the leaked information that is now accessible by the public?
You should still treat it as classified even though it has been compromised.
Which of the following is least likely to pose a risk to share on a social networking site?
Your pet's name
Which best describes an insider threat? Someone who uses __________ access, ______________, to harm national security through unauthorized disclosure, data modification, espionage, terrorism, or kinetic actions.
authorized, wittingly or unwittingly
Which of the following is a best practice when browsing the internet?
Only accept cookies from reputable, trusted websites
Which of the following is a best practice to protect your identity?
Order a credit report annually
Which of the following describes Sensitive Compartmented Information (SCI)? SCI is a program that ____________ various types of classified information into distinct compartments for ________ protection and dissemination or distribution control.
segregates; added
Which of the following uses of removeable media is allowed?
Government owned removable media that is approved as operationally necessary
Which of the following is permitted when using an unclassified laptop within a collateral classified space?
A government issued wired headset with microphone.
Which of the following contributes to your online identity?
All of these
Which of the following is permitted within a Sensitive Compartmented Information (SCIF)?
An authorized Government-owned Portable Electronic Device (PED)
How can an adversary use information available in public records to target you?
Combine it with info from other data sources to learn how to best bait you with a scam
Which of the following is not a best practice for traveling overseas with a mobile device?
Do not travel with a mobile device if you can avoid it
Which of the following is true of transmitting or transporting Sensitive Compartmented Information (SCI)?
Printed SCI must be retrieved promptly from the printer.
Which of the following is an example of a strong password?
d+Uf_4RimUz
Under which Cyberspace Protection Condition (CPCON) is the priority focus limited to critical and essential functions?
CPCON 2
You receive a phone call offering you a $50 gift card if you participate in a survey. Which course of action should you take?
Decline to participate in the survey. This may be a social engineering attempt.
Which of the following is an appropriate use of a DoD Public Key Infrastructure (PKI) token?
Do not use a token approved for NIPR on SIPR
Which of the following uses of removeable media is appropriate?
Encrypting data stored on removeable media