DOD Cyber Awareness Challenge 2019: Knowledge Check
What should you do after you have ended a call from a reporter asking you to confirm potentially classified info found on the web? - Alert your security point of contact. Which of the following actions is appropriate after finding classified Government information on the internet? - Note any identifying information and the website's URL. Which of these is true of unclassified data? - Its classification level may rise when aggregated. What type of information includes personal, payroll, medical, and operational information? - Sensitive. What is the best protection method for sharing Personally Identifiable Information (PII)? - Digitally sign and encrypt the email. Which of the following is NOT a typical result from running malicious code? - Disables cookies. Which of the following is a practice that helps to protect you from identity theft? - Ordering a credit report annually. Which of the following describes an appropriate use of Government email? - Molly uses a digital signature when sending attachments or hyperlinks. Which of the following is true of Internet hoaxes? - They can be part of a distributed denial-of-service (DDoS) attack.
Written for
- Institution
- DOD Cyber Awareness Challenge 2019
- Course
- DOD Cyber Awareness Challenge 2019
Document information
- Uploaded on
- November 19, 2022
- Number of pages
- 3
- Written in
- 2022/2023
- Type
- Exam (elaborations)
- Contains
- Answers
Subjects
-
what should you do after you have ended a call from a reporter asking you to confirm potentially classified info found on the web alert your security point of contact
-
which of the following actio
Also available in package deal