FY24 DOD Cyber Awareness Challenge Knowledge Check With Appropriate Measures To Take
What conditions are necessary to be granted access to Sensitive Compartmented Information (SCI)? - Top Secret clearance and indoctrination into the SCI program Which of the following is permitted when using an unclassified laptop within a collateral classified space? - A Government-issued wired headset with microphone Which of the following is an authoritative source for derivative classification? - Security Classification Guide Carl receives an e-mail about a potential health risk caused by a common ingredient in processed food. Which of the following actions should Carl NOT take with the e-mail? - Forward it How can an adversary use information available in public records to target you? - Combine it with information from other data sources to learn how best to bait you with a scam Which of the following is an appropriate use of government e-mail? - Using a digital signature when sending attachments Which of the following is NOT a best practice for protecting data on a mobile device? - Disable automatic screen locking after a period of inactivity
Written for
- Institution
- FY24 DOD Cyber Awareness
- Course
- FY24 DOD Cyber Awareness
Document information
- Uploaded on
- February 28, 2024
- Number of pages
- 9
- Written in
- 2023/2024
- Type
- Exam (elaborations)
- Contains
- Questions & answers
Subjects
-
fy24 dod cyber awareness challenge knowledge check