100% de satisfacción garantizada Inmediatamente disponible después del pago Tanto en línea como en PDF No estas atado a nada 4.2 TrustPilot
logo-home
Examen

CYBER AWARENESS EXAM QUESTIONS AND ANSWERS (100% CORRECT)

Puntuación
-
Vendido
-
Páginas
2
Grado
A+
Subido en
12-11-2024
Escrito en
2024/2025

CYBER AWARENESS EXAM QUESTIONS AND ANSWERS (100% CORRECT) Which of the following is true of spillage? - Answers It refers specifically to classified information that becomes publicly available. Which of the following is a risk associated with removable media? - Answers All of these How can an adversary use information available in public records to target you? - Answers Combine it with information from other data sources to learn how best to bait you with a scam Which best describes an insider threat? Someone who uses _______ access, _______, to harm national security through unauthorized disclosure, data modification, espionage, terrorism, or kinetic actions. - Answers authorized; wittingly or unwittingly Under which Cyberspace Protection Condition (CPCON) is the priority focus limited to critical and essential functions? - Answers CPCON 2 Sylvia commutes to work via public transportation. She often uses the time to get a head start on work by making phone calls or responding to e-mails on her government approved mobile device. Does this pose a security concern? - Answers Yes. Eavesdroppers may be listening to Sylvia's phone calls, and shoulder surfers may be looking at her screen. Sylvia should be aware of these risks. Which of the following is true of Sensitive Compartmented Information Facilities (SCIFs)? - Answers Personnel must position monitors so that they do not face windows or close the window blinds. Which of the following is an example of behavior that uou should report? - Answers Taking sensitive information home for teleowrk without authorization Which of the following is an example of a good password? - Answers d+Uf_4RimUz How should government owned removable media be stored? - Answers In a GSA-approved container according to the appropriate security classification On your home computer, how can you best establish passwords when creating separate user accounts? - Answers Have each user create their own, strong password Which of the following personally owned peripherals can you use with government furnished equipment? - Answers A Bluetooth headset How can you mitigate the potential risk associated with a compressed URL (e.g., TinyURL, ) - Answers Use the preview function to see where the link actually leads Beth taps her phone at a payment terminal to pay for a purchase. Does this pose a security risk? - Answers Yes, there is a risk that the signal could be intercepted or altered.

Mostrar más Leer menos
Institución
CYBER AWARENESS
Grado
CYBER AWARENESS








Ups! No podemos cargar tu documento ahora. Inténtalo de nuevo o contacta con soporte.

Escuela, estudio y materia

Institución
CYBER AWARENESS
Grado
CYBER AWARENESS

Información del documento

Subido en
12 de noviembre de 2024
Número de páginas
2
Escrito en
2024/2025
Tipo
Examen
Contiene
Preguntas y respuestas

Temas

Vista previa del contenido

CYBER AWARENESS EXAM QUESTIONS AND ANSWERS (100% CORRECT)

Which of the following is true of spillage? - Answers It refers specifically to classified information that
becomes publicly available.

Which of the following is a risk associated with removable media? - Answers All of these

How can an adversary use information available in public records to target you? - Answers Combine it
with information from other data sources to learn how best to bait you with a scam

Which best describes an insider threat? Someone who uses _______ access, _______, to harm national
security through unauthorized disclosure, data modification, espionage, terrorism, or kinetic actions. -
Answers authorized; wittingly or unwittingly

Under which Cyberspace Protection Condition (CPCON) is the priority focus limited to critical and
essential functions? - Answers CPCON 2

Sylvia commutes to work via public transportation. She often uses the time to get a head start on work
by making phone calls or responding to e-mails on her government approved mobile device. Does this
pose a security concern? - Answers Yes. Eavesdroppers may be listening to Sylvia's phone calls, and
shoulder surfers may be looking at her screen. Sylvia should be aware of these risks.

Which of the following is true of Sensitive Compartmented Information Facilities (SCIFs)? - Answers
Personnel must position monitors so that they do not face windows or close the window blinds.

Which of the following is an example of behavior that uou should report? - Answers Taking sensitive
information home for teleowrk without authorization

Which of the following is an example of a good password? - Answers d+Uf_4RimUz

How should government owned removable media be stored? - Answers In a GSA-approved container
according to the appropriate security classification

On your home computer, how can you best establish passwords when creating separate user accounts?
- Answers Have each user create their own, strong password

Which of the following personally owned peripherals can you use with government furnished
equipment? - Answers A Bluetooth headset

How can you mitigate the potential risk associated with a compressed URL (e.g., TinyURL, goo.gl) -
Answers Use the preview function to see where the link actually leads

Beth taps her phone at a payment terminal to pay for a purchase. Does this pose a security risk? -
Answers Yes, there is a risk that the signal could be intercepted or altered.

Which of the following is true of telework? - Answers You must have permission from your organization
to telework

Conoce al vendedor

Seller avatar
Los indicadores de reputación están sujetos a la cantidad de artículos vendidos por una tarifa y las reseñas que ha recibido por esos documentos. Hay tres niveles: Bronce, Plata y Oro. Cuanto mayor reputación, más podrás confiar en la calidad del trabajo del vendedor.
TutorJosh Chamberlain College Of Nursing
Ver perfil
Seguir Necesitas iniciar sesión para seguir a otros usuarios o asignaturas
Vendido
342
Miembro desde
1 año
Número de seguidores
16
Documentos
28610
Última venta
2 días hace
Tutor Joshua

Here You will find all Documents and Package Deals Offered By Tutor Joshua.

3.6

53 reseñas

5
18
4
14
3
12
2
0
1
9

Recientemente visto por ti

Por qué los estudiantes eligen Stuvia

Creado por compañeros estudiantes, verificado por reseñas

Calidad en la que puedes confiar: escrito por estudiantes que aprobaron y evaluado por otros que han usado estos resúmenes.

¿No estás satisfecho? Elige otro documento

¡No te preocupes! Puedes elegir directamente otro documento que se ajuste mejor a lo que buscas.

Paga como quieras, empieza a estudiar al instante

Sin suscripción, sin compromisos. Paga como estés acostumbrado con tarjeta de crédito y descarga tu documento PDF inmediatamente.

Student with book image

“Comprado, descargado y aprobado. Así de fácil puede ser.”

Alisha Student

Preguntas frecuentes