Cyber Awareness Challenge 2024

Ace your homework & exams now with Quizwiz!

Based on the description provided, how many insider threat indicators are present? Elyse has worked for a DoD agency for more than 10 years. She is a diligent employee who receives excellent performance reviews and is a valued team member. She has two children and takes them on a weeklong beach vacation every summer. She spent a semester abroad in France as a teenager and plans to take her children to visit France when they are older.

0

Which of the following is permitted when using an unclassified laptop within a collateral classified space?

A government-issued WIRED headset with microphone

Which of the following is permitted within a Sensitive Compartmented Information Facility (SCIF)?

An authorized Government-owned Portable Electronic Device (PED)

What does the Common Access Card (CAC) contain?

Certificates for identification, encryption, and digital signature

You receive a text message from a package shipper notifying you that your package delivery is delayed due to needing updated delivery instructions from you. It provides a shortened link for you to provide the needed information. You are not expecting a package. What is the best course of action?

Delete the message

Which of the following is NOT a best practice for protecting data on a mobile device?

Disable automatic screen locking after a period of inactivity

Mabel is a government employee who needs to share a document containing contractor proprietary information with her supervisor. Which of the following describes the most appropriate way for Mabel to do this?

Encrypt it and send it via digitally signed Government e-mail.

Which of the following uses of removeable media is appropriate?

Encrypting data stored on removable media

Carl receives an e-mail about a potential health risk caused by a common ingredient in processed food. Which of the following actions should Carl NOT take with the e-mail?

Forward it

Where are you permitted to use classified data?

Only in areas with security appropriate to the classification level

Which of the following is a best practice to protect your identity?

Order a credit report annually

Which of the following is a step you should NOT take to protect against spillage?

Purge any device's memory before connecting it to a classified network

You receive an e-mail with a link to schedule a time to update software on your government furnished laptop. Your IT department has not scheduled software updates like this in the past and has not announced this software update. The e-mail is not digitally signed. What action should you take?

Report the e-mail to your security POC or help desk

Which type of data could reasonably be expected to cause serious damage to national security?

Secret

Which of the following is an authoritative source for derivative classification?

Security Classification Guide

What conditions are necessary to be granted access to Sensitive Compartmented Information (SCI)?

Top Secret clearance and indoctrination into the SCI program

How can you protect your home computer?

Turn on the password feature

Which of the following is an appropriate use of government e-mail?

Using a digital signature when sending attachments

Tom is working on a report that contains employees' names, home addresses, and salary. Which of the following is Tom prohibited from doing with the report?

Using his home computer to print the report while teleworking

Which of the following is NOT an appropriate use of your Common Access Card (CAC)?

Using it as photo identification with a commercial entity

Which of the following is a best practice for managing connection requests on social networking sites?

Validate connection requests through another source if possible

Which of the following is true of telework?

You must have permission from your organization to telework

Which of the following is NOT a best practice for teleworking in an environment where Internet of Things (IoT) devices are present?

Use the devices' default security settings


Related study sets

chap 19 + 24 bio 2 part 1 final exam

View Set

Ch 12: Network Configuration (Practice)

View Set

Quantitative and Economic CFA Questions

View Set

Sexual Harassment Prevention (810000)

View Set

Chapter 6 - The Creation of the Roman Empire 44 B.C.E.-284 C.E. - The Making of The West - HIST 1111

View Set

International Business exam 4 chapter 17

View Set