100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

Cyber Awareness Challenge 2024 Knowledge Check Answers Question Answer

Rating
-
Sold
-
Pages
3
Grade
A+
Uploaded on
23-05-2024
Written in
2023/2024

Cyber Awareness Challenge 2024 Knowledge Check Answers Question Answer Which of the following is true of spillage? It can be either inadvertent or intentional. Spillage refers to transferring classified or sensitive information to individuals, systems, or networks that are not authorized to access such information. This transfer can occur either inadvertently or intentionally, making this statement true regarding spillage. Which of the following statements about Protected Health Information (PHI) is false? It requires more protection than Personally Identifiable Information (PII). Which of the following personally owned peripherals can you use with government furnished equipment (GFE)? A monitor connected via USB. On your home computer, how can you best establish passwords when creating separate user accounts? Have each user create their own, strong password. Which of the following statements is true of DoD Unclassified data? It may require access and distribution controls. You receive a text message from a package shipper notifying you that your package delivery is delayed due to needing updated delivery instructions from you. It provides a shortened link for you to provide the needed information. You are not expecting a package. What is the best course of action? Delete the message. It’s advisable not to engage with suspicious messages or click on any links they provide, as doing so can expose you to various security risks including identity theft or malware infection. When is the safest time to post on social media about your vacation plans? After the trip. You receive a phone call offering you a $50 gift card if you participate in a survey. Which course of action should you take? Decline to participate in the survey. This may be a social engineering attempt.

Show more Read less
Institution
Cyber Awareness Challenge 2024
Course
Cyber Awareness Challenge 2024








Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
Cyber Awareness Challenge 2024
Course
Cyber Awareness Challenge 2024

Document information

Uploaded on
May 23, 2024
Number of pages
3
Written in
2023/2024
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

Cyber Awareness Challenge 2024 Knowledge Check Answer s Question Answer Which of the following is true of spillage? It can be either inadvertent or intentional . Spillage refers to transferring classified or sensitive information to individuals, systems, or networks that are not authorized to access such information. This transfer can occur either inadvertently or intent ionally, making this statement true regarding spillage. Which of the following statements about Protected Health Information (PHI) is false? It requires more protection than Personally Identifiable Information (PII). Which of the following personally own ed peripherals can you use with governmen t furnished equipment (GFE)? A monitor connected via USB. On your home computer, how can you best establish passwords when creating separate user accounts? Have each user create their own, strong password. Which o f the following statements is true of DoD Unclassified data? It may require access and distribution controls. You receive a text message from a package shipper notifying you that your package delivery is delayed due to needing updated delivery instruction s from you. It provides a shortened link for you to provide the needed information. You are not expecting a package. What is the best course of action? Delete the message . It’s advisable not to engage with suspicious messages or click on any links they pro vide, as doing so can expose you to various security risks including identity theft or malware infection. When is the safest time to post on social media about your vacation plans? After the trip. You receive a phone call offering you a $50 gift card if you participate in a survey. Which course of action should you take? Decline to participate in the survey. This may be a social engineering attempt. Which of the following is NOT an appropriate use of your Common Access Card (CAC)? Using it as photo identification with a commercial entity. Which of the following is an example of behavior that you should report? Taking sensitive information home for telework without authorization. How should governm ent owned removable media be stored? In a GSA -approved container according to the appropriate security classification . Storing removable media in General Services Administration (GSA) -approved security containers helps ensure that the media is protected a gainst unauthorized access, loss, or damage. The storage should align with the security classification of the information contained on the media to ensure compliance with established security protocols and regulations. Which of the following is NOT a best practice for protecting your home wireless network for telework? Use your router’s pre -set Service Set Identifier (SSID) and password. ° How can you mitigate the potential risk associated with a compressed URL (e.g. , TinyURL, goo.gl)? Use the preview fun ction to see where the link actually leads. Which of the following contributes to your online identity? All of these. Which of the following is NOT a way that malicious code can spread? Running a virus scan. Which of the following is NOT a best practice for protecting data on a mobile device? Disable automatic screen locking after a period of inactivity. Beth taps her phone at a payment terminal to pay for a purchase. Does this pose a security risk? Yes, ther e is a risk that the signal could be intercepted and altered. How can you protect your home computer? Regularly back up your files. Which of the following uses of removable media is appropriate? Encrypting data stored on removable media. Which of the fo llowing is true of working within a Sensitive Compartmented Information Facility (SCIF)? Authorized personnel who permit another individual to enter the SCIF are responsible for confirming the individual’s need -to-know and access.

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
SpencerHenderson Walden University
View profile
Follow You need to be logged in order to follow users or courses
Sold
225
Member since
2 year
Number of followers
115
Documents
29843
Last sold
6 days ago
Spencer Henderson

Spencer Henderson I offer updated and 100% verified exam materials for ATI, Nursing, PMHNP, TNCC, USMLE, ACLS, WGU, and more. Success is guaranteed. You’ll find everything you need for nursing exams and test banks here. If you don’t see what you’re looking for, just contact me— I will get it for you within minutes. Shop with confidence! And please remember to leave a review after your purchase to help ensure all our customers stay satisfied.

Read more Read less
3.7

46 reviews

5
18
4
9
3
12
2
1
1
6

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions