Cyber Awareness Challenge 2024 (Knowledge Pre-Check)
Which of the following is a best practice for managing connection requests on social networking sites? Validate connection requests through another source if possible which of the following is an authoritative source for derivative classification? Security Classification Guide Brainpower Read More Previous Play Next Rewind 10 seconds Move forward 10 seconds Unmute 0:00 / 0:15 Full screen Which of the following is a step you should NOT take to protect against spillage? Purge any device's memory before connecting it to a classified network? Which best describes an insider threat? Someone who uses ____ access, ____, to harm national security through unauthorized disclosure, data modification, espionage, terrorism, or kinetic actions. authorized, wittingly or unwittingly Which of the following is NOT a best practice for teleworking in an environment where Internet of Things (IoT) devices are present? Use the devices' default security settings Which of the following is a best practice for using government e-mail? Do not send mass e-mails How can you mitigate the potential risk associated with a compressed URL (e.g., TinyURL, )? Use the preview function to see where the link actually leads Where are you permitted to use classified data? Only in areas with security appropriate to the classification level Tom is working on a report that contains employees' names, home addresses, and salary. Which of the following is Tom prohibited from doing with the report? Email it to a colleague like a silly goose Beth taps her phone at a payment terminal to pay for a purchase. Does this pose a security risk? Yes, there is a risk that the signal could be intercepted and altered When is the safest time to post on social media about your vacation plans? After the trip Which of the following is permitted when using an unclassified laptop within a collateral classified space? A Government-issued wired headset with microphone Which of the following uses of removable media is allowed? Government owned removable media that is approved as operationally necessary On your home computer, how can you best establish passwords when creating separate user accounts? Have each user create their own, strong password You receive an e-mail marked important from your boss asking for data that they need immediately for a meeting starting now. The e-mail was sent from a personal e-mail address that you do not recognize, but it addresses you by name. What concern does this e-mail pose? This may be a spear phishing attempt. Contact your boss using contact information that you know to be legitimate. How can you protect your home computer? Regularly back up your files Which of the following is an appropriate use of a DoD Public Key Infrastructure (PKI) token? Do not use a token approved for NIPR on SIPR Which of the following describes Sensitive Compartmented Information (SCI)? SCI is a program that _____ various types of classified information for _____ protection and dissemination or distribution control. segregates, added
Written for
- Institution
- Cyber Awareness Challenge 2024
- Course
- Cyber Awareness Challenge 2024
Document information
- Uploaded on
- February 13, 2024
- Number of pages
- 3
- Written in
- 2023/2024
- Type
- Exam (elaborations)
- Contains
- Unknown
Subjects
-
cyber awareness challenge 2025