CYBER AWARENESS CHALLENGE 2023
CYBER AWARENESS CHALLENGE 2023 How can you protect your home computer? - ANS Turn on the password feature Carl receives an e-mail about a potential health risk... - ANS Forward it Which of the following is an appropriate use of government e-mail? - ANS Using a digital signature when sending attachments Sylvia commutes to work via public transportation. She often uses... - ANS Yes. Eavesdroppers may be listening to Sylvia's phone calls, and shoulder surfers may be looking at her screen. Which of the following is true of transmitting or transporting SCI? - ANS Printed SCI must be retrieved promptly from the printer What conditions are necessary to be granted access to SCI? - ANS Top Secret clearance and indoctrination into the SCI program Terry sees a post on her social media feed that says there is smoke billowing from the Pentagon... - ANS This is probably a post designed to attract Terr's attention to click on a link and steal her information Which of the following statements about PHI is false? - ANS It is created or received by a healthcare provider, health plan, or employer of a business associate of these. Which of the following is NOT a best practice for protecting your home wireless network for telework? - ANS Use your router's pre-set SSID and password Beth taps her phone at a payment terminal to pay for a purchase. Does this pose a security risk? - ANS Yes, there is a risk that the signal could be intercepted and altered How can you prevent viruses and malicious code? - ANS Scan all external files before uploading to your computer Which of the following is an example of behavior that you should report? - ANS Taking sensitive information home for telework without authorization You receive a text message from a package shipper notifying you that your package delivery is delayed due to needing updated delivery instructions from you. - ANS Delete the message Which of the following is an appropriate use of a DoD PKI token? - ANS Do not use a token approved for NIPR on SIPR Which of the following is a best practice when browsing the internet? - ANS Only accept cookies from reputable, trusted websites Where are you permitted to use classified data? - ANS Only in areas with security appropriate to the classification level Which of the following contributes to your online identity? - ANS All of these How can you protect your home computer? - ANS Regularly back up your files Which of the following statements is true of DoD Unclassified data? - ANS It may require access and distribution controls Which of the following is NOT a way that malicious code can spread? - ANS Running a virus scan What is the goal of an Insider Threat Program? - ANS Deter, detect, and mitigate Which of the following uses of removable media is allowed? - ANS Government owned removable media that is approved as operationally necessary Which of the following is permitted when using an unclassified laptop within a collateral classified space? - ANS A government-issued WIRED headset with microphone When is the safest time to post on social media about your vacation plans? - ANS After the trip Which of the following is NOT an appropriate use of your CAC? - ANS Using it as photo identification with a commercial entity
Written for
- Institution
-
Ashford University
- Course
- Unknown
Document information
- Uploaded on
- December 4, 2023
- Number of pages
- 2
- Written in
- 2023/2024
- Type
- Exam (elaborations)
- Contains
- Questions & answers
Subjects
-
cyber awareness challenge 2023
Also available in package deal