DOD Cyber Awareness Challenge 2019: Knowledge Check

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

A colleague has visited several foreign countries recently...

. 2 indicators

Which of the following may indicate a malicious code attack?

A flashing pop-up that warns you your computer is infected with a virus.

What should you do after you have ended a call from a reporter asking you to confirm potentially classified info found on the web?

Alert your security point of contact.

Which of the following statements is TRUE about the use of DoD Public Key Infrastructure (PKI) tokens?

Always use DoD PKI tokens within their designated classification level.

How can you protect your information when using wireless technology?

Avoid using non-Bluetooth-paired or unencrypted wireless computer peripherals.

Upon connecting your Government-issued laptop to a public wireless connection, what should you immediately do?

Connect to the Government Virtual Private Network (VPN).

When checking in at the airline counter for a business trip...

Decline so that you maintain physical contact of your Government-issued laptop.

A man you do not know is trying to look at your Government-issued phone and has asked to use it. What should you do?

Decline to lend the man your phone.

What is the best protection method for sharing Personally Identifiable Information (PII)?

Digitally sign and encrypt the email.

Which of the following is NOT a typical result from running malicious code?

Disables cookies.

Which of the following is a practice that helps to prevent the download of viruses and other malicious code when checking your email?

Do not access links or hyperlinked media such as buttons and graphics in email messages.

Under what circumstances is it acceptable to check personal email on Government-furnished equipment (GFE)?

If your organization allows it.

Which of these is true of unclassified data?

Its classification level may rise when aggregated.

Which of the following describes an appropriate use of Government email?

Molly uses a digital signature when sending attachments or hyperlinks.

A coworker wants to send you a sensitive document to review while you are at lunch and you only have your personal tablet. What should you do?

Never allow sensitive data on a non-Government-issued mobile devices.

Which of the following is NOT considered a potential insider threat indicator?

New interest in learning a foreign language.

Which of the following actions is appropriate after finding classified Government information on the internet?

Note any identifying information and the website's URL.

Which of the following is a practice that helps to protect you from identity theft?

Ordering a credit report annually.

What type of information includes personal, payroll, medical, and operational information?

Sensitive.

How should you protect your Common Access Card (CAC) or Personal Identity Verification (PIV) card?

Store it in a shielded sleeve to avoid chip cloning.

Which of the following is true of Internet hoaxes?

They can be part of a distributed denial-of-service (DDoS) attack.

What kind of information could reasonably be expected to cause serious damage to national security in the event of unauthorized disclosure?

Top Secret

While you are waiting for your lunch bill, a stranger picks up your Government-issued phone from your table and proceeds to exit the facility with it. What should you do?

Try to observe the direction taken and any other useful information and immediately make a report to your security point of contact.

When would be a good time to post your vacation location and dates on your social networking website?

When you return from your vacation.


Set pelajaran terkait

CEE 4394 Urban Water Sustainability - Final Exam Quiz Questions

View Set

CHAPTER 8-Political Participation and Voting

View Set

Week 4 OB Content Chapters 6,7,8

View Set

Aceable Level 1, Chapter 5: Let My Traffic Flow

View Set

All quizzes questions and the final exam

View Set