Cyber awareness 2024
which of the following must you do when using an unclassified laptop in a collateral classified environment
disable the embedded camera, microphone and wifi Use government-issued wired peripherals
your meeting notes are unclassified. this means that your notes
do not have the potential to damage national security
which of these personally owned computer peripherals may be used with government-furnished equipment
-HDMI monitor -USB keyboard
which of the following must you do when working in a SCIF
-Verify that all personnel in listening distance have a need-to-know -ensure the monitors do not provide unobstructed views -escort uncleared personnel and warn others in the SCIF
how can malicious code spread? select all that apply.
-email attachment -downloading files -visiting inected websites
how can you prevent the download of malicious code?
-scan external files before uploading to your device -research apps and their vulnerabilities' before downloading
this is not an appropriate use of GFE. why?
-you should not use government email to sell anything -you should use a digital signature when sending hyperlinks -you should not use unauthorized services, such as fileshare services, on GFE
Which of these individuals demonstrated behavior that could lead to the compromise of SCI
COL. Cockatiel
MR. Macaw and a colleague had a conversation about a shared project in the SCIF after verifying no one was nearby. Does this behavior represent a security concern?
No
which method of getting online poses the least risk
approved mobile hotspot
select an action to take in response to compartmented information
call your security point of contact (POC)
which payment method poses the least risk
cash
what type of information does this personnel roster represent
controlled unclassified information
when emailing this personnel roster, which of the following should you do
encrypt the PII, digitally sign the email, use your government email account
true or false? the best way to keep your passport safe is to carry it with you
false
which action will keep DoD data the safest
leave the coffee shop
DR. Dove printed a classified document and retrieved it promptly from the printer. Does this behavior represent a security concern.
no
is this an appropriate use of government-furnished equipment
no
which of the following poses a physical security risk
posting an access roster in public view
how should bob's colleagues respond
report bob
what step should be taken next to securely telework
secure the area so others cannot view your monitor
true or false? voice-activated smart devices can collect and share your personal information
true
true or false? you should monitor your credit card statements for unauthorized purchases
true
you find an unlabeled thumb drive in the parking area outside your workplace. what should you do?
turn it in to your security officer
COL. Cockatiel worked on an unmarked document on the classified network. Does this behavior represent security concern?
yes
does bob demonstrate potential insider treat indicators
yes
does this action pose potential security risk
yes