Department of Defense (DoD) Cyber Awareness Challenge 2024 (1 hr) (Pre Test) (Incomplete)

Ace your homework & exams now with Quizwiz!

Which of the following contributes to your online identity?

All of these

Which of the followng is permitted within a Sensitive Compartmented Information Facility (SCIF)?

An authorized Government-owned Portable Electronic Devic (PED)

You receive a text message from a package shipper notifying you that your package delivery is delayed due to needing updated delivery instructions from you. It provides a shortened link for you to provide the needed info. You are not expecting a package. What is the best course of action?

Delete the message

What is the goal of an Insider Threat Program?

Deter, detect, and mitigate the risks associated with insider threats

Which of the following is an appropriate use of a DoD Public Key Infrastructure (PKI) token?

Do not use a token approved for NIPRNet on SIPRNet

Which of the following uses of removable media is allowed?

Government owned removable media that is approved as operationally necessary

On your home computer, how can you best establish passwords when creating separate user accounts?

Have each user create their own, strong password

How should government owned removable media be stored?

In a GSA-approved container according to the appropriate security classification

Which of the following is true of Controlled Unclassified Information (CUI)?

It must be handled using safeguarding or dissemination controls

Which of the following is a best practice for physical security?

Only hold the door for coworkers that you know work in the facility

When are you permitted to use classified data?

Only in areas with security appropriate to the classification level

Which of the following is true of transmitting or transporting of Sensitive Compartmented Information (SCI)?

Printed SCI must be retrieved promptly from the printer.

Which of the following is NOT a way that malicious code can be spread?

Running a virus scan

Which of the following in NOT a best practice for teleworking in an environment where Internet of Things (IoT) devices are present?

Use the devices' default security settings

Which of the following is NOT a best practice for protecting your home wireless network for telework?

Use your router's pre-set Service Set Identifier (SSID) and password

Which of the following is a best practice for managing connection requests on social networking sites?

Validate connection requests through another source if possible

Beth taps her phone at a payment terminal to pay for a purchase. Does this pose a security risk?

Yes, there is a risk that the signal could be intercepted and altered.

Sylvia commutes to work via public transportation. She often uses the time to get a head start on work by making phone calls or responding to e-mails on her government approved mobile device. Does this pose a security concern?

Yes. Eavesdroppers may be listening to Sylvia's phone calls, and shoulder surfers may be looking at her screen. Sylvia should be aware of these risks.

Which best describes an insider threat? Someone who uses _____ access, _________, to harm national security through unauthorized disclosure, data modification, espionage, terrorism, or kinetic actions

unauthorized; wittingly or unwittingly


Related study sets

TestOut PC Pro: 11.4 Shared Folders

View Set

BLAW Chapter 21: forms of business organization

View Set