DOD Cyber Awareness Challenge 2025

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

Based on the description provided, how many insider threat indicators are present? Edward has worked for a DoD agency for 2 years. He is an analyst who takes a great deal of interest in his work. he occasionally takes a somewhat aggressive interest in others' work as well, including asking for classified details of their projects. he otherwise gets along well with his colleagues.

1

How can malicious code do damage?

All of these

Which of the following can be used to catalogue information about you?

All of these

Which of the following is permitted within a Sensitive Compartmented Information Facility (SCIF)?

An authorized Government-owned Portable Electronic Device (PED)

Which of these is NOT a potential indicator that your device may be under a malicious code attack?

An operating system update

Under which Cyberspace Protection Condition (CPCON) is the priority focus limited to critical functions?

CPCON 1

How can you protect a mobile device while traveling?

Connect with a Government VPN

What is a best practice for creating user accounts for your home computer?

Create separate accounts for each user and have each user create their own password.

You receive a text message from a vendor notifying you that your order is on hold due to needing updated payment information from you. It provides a shortened link for you to provide the needed information. What is the best course of action?

Delete the message

Which of the following statements is true of DoD Unclassified data?

Do not have the potential to damage national security.

You receive a phone call from an unknown person asking for a directory name on your government furnished laptop so that a software update can be made. Which course of action should you take?

Document the interaction and contact your security POC or help desk.

Which of the following is an allowed use of government furnished equipment (GFE)?

E-mailing your supervisor

Which of the following is NOT an appropriate use of your Common Access Card (CAC)?

Exchanging it for a visitor pass in another building

Which of the following is true of spillage?

It can be either inadvertent or intentional

When allowed, which of the following is an appropriate use of removable media?

Labeling media that contains personally identifiable information (PII)

Which of the following provides precise, comprehensive guidance regarding specific program, system, operation, or weapon system elements of information to be classified?

Security Classification Guide

Which of the following is true of removable media and portable electronic devices (PEDs)?

They cannot be adequately secured, so they are prohibited by the DoD.

Which of the following is true of compressed URLs (e.g., TinyURL, goo.gl)?

They may be used to mask malicious intent.

You receive an e-mail marked important from your agency head asking you to call them using a number you do not recognize. The e-mail was sent from a personal e-mail address that you do not recognize, but it addresses you by name. What action should you take?

This may be a spear phishing attempt. Report it to your security POC or help desk.

How can you protect your home computer?

Use legitimate, known antivirus software

Tessa is processing payroll data that includes employees' names, home addresses, and salary. Which of the following is Tessa prohibited from doing with the data?

Using her home computer to print the data while working remotely

As you scroll through your social media feed, a news headline catches your eye. What should you consider before sharing it with your connections?

Whether the source is credible and reliable

Which of the following is an example of a strong password?

bRobr@791*P

Which of the following is a best practice for protecting your home wireless network for telework or remote work?

Implement, as a minimum, Wi-FI Protected Access 2 (WPA2) Personal encryption

As you browse a social media site, you come across photos of information with classification markings. What should you do?

Notify your security point of contact


Set pelajaran terkait

Introduction to sociology - chapter 12 questions

View Set

Lesson 1: Needs, Motivation, and Attitude

View Set

PHYS 1114 Chapter 6 Misconceptual Questions

View Set

BUSINESS ETHICS; 3: Core Principles of Fairness, Accountability, and Transparency

View Set

Health : 4. Preventive Health Care and First Aid (EXTREME TEMPERATURE)

View Set