100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.6 TrustPilot
logo-home
Exam (elaborations)

CYBER AWARENESS CHALLENGE

Rating
-
Sold
-
Pages
7
Grade
A+
Uploaded on
01-05-2025
Written in
2024/2025

CYBER AWARENESS CHALLENGE How can you protect your home computer? - ANSWER-Turn on the password feature Carl receives an e-mail about a potential health risk... - ANSWER-Forward it Which of the following is an appropriate use of government e-mail? - ANSWER-Using a digital signature when sending attachments Sylvia commutes to work via public transportation. She often uses... - ANSWER-Yes. Eavesdroppers may be listening to Sylvia's phone calls, and shoulder surfers may be looking at her screen. Which of the following is true of transmitting or transporting SCI? - ANSWER-Printed SCI must be retrieved promptly from the printer What conditions are necessary to be granted access to SCI? - ANSWER-Top Secret clearance and indoctrination into the SCI program Terry sees a post on her social media feed that says there is smoke billowing from the Pentagon... - ANSWER-This is probably a post designed to attract Terr's attention to click on a link and steal her information Which of the following statements about PHI is false? - ANSWER-It is created or received by a healthcare provider, health plan, or employer of a business associate of these. Which of the following is NOT a best practice for protecting your home wireless network for telework? - ANSWER-Use your router's pre-set SSID and password Beth taps her phone at a payment terminal to pay for a purchase. Does this pose a security risk? - ANSWER-Yes, there is a risk that the signal could be intercepted and altered How can you prevent viruses and malicious code? - ANSWER-Scan all external files before uploading to your computer Which of the following is an example of behavior that you should report? - ANSWER-Taking sensitive information home for telework without authorization You receive a text message from a package shipper notifying you that your package delivery is delayed due to needing updated delivery instructions from you. - ANSWER-Delete the message Which of the following is an appropriate use of a DoD PKI token? - ANSWER-Do not use a token approved for NIPR on SIPR Which of the following is a best practice when browsing the internet? - ANSWER-Only accept cookies from reputable, trusted websites Where are you permitted to use classified data? - ANSWER-Only in areas with security appropriate to the classification level Which of the following contributes to your online identity? - ANSWER-All of these How can you protect your home computer? - ANSWER-Regularly back up your files Which of the following statements is true of DoD Unclassified data? - ANSWER-It may require access and distribution controls Which of the following is NOT a way that malicious code can spread? - ANSWER-Running a virus scan What is the goal of an Insider Threat Program? - ANSWER-Deter, detect, and mitigate Which of the following uses of removable media is allowed? - ANSWER-Government owned removable media that is approved as operationally necessary Which of the following is permitted when using an unclassified laptop within a collateral classified space? - ANSWER-A government-issued WIRED headset with microphone When is the safest time to post on social media about your vacation plans? - ANSWER-After the trip Which of the following is NOT an appropriate use of your CAC? - ANSWER-Using it as photo identification with a commercial entity Which of the following is NOT a best practice for traveling overseas with a mobile device? - ANSWER-**Do not travel with a mobile device if you can avoid it** wrong Which of the following is true of spillage? - ANSWER-It refers specifically to classified information that becomes publicly available. Which of the following is permitted within a Sensitive Compartmented Information Facility (SCIF)? - ANSWER-An authorized Government-owned Portable Electronic Device (PED) You receive a phone call offering you a $50 gift card if you participate in a survey. Which course of action should you take? - ANSWER-Decline to participate in the survey. This may be a social engineering attempt. How should government owned removable media be stored? - ANSWER-In a GSA-approved container according to the appropriate security classification. Which of the following is a best practice for using government email? - ANSWER-Do not send mass e-mails. Which of the following is a best practice for physical security? - ANSWER-Use your own security badge or key code for facility access. Which of the following is least likely to pose a risk to share on a social networking site? - ANSWER-Your pet's name How can you protect your home computer? - ANSWER-Regularly back up your files. Which of the following describes Sensitive Compartmented Information (SCI)? SCI is a program that ______________various types of classified information for _______________ protection and dissemination or distribution control. - ANSWER-segregates, added Which of the following is true of telework? - ANSWER-You must have permission from your organization to telework. Which of the following is true Sensitive Compartmented Information Facilities (SCIFs)? - ANSWER-Due to the physical security measures in place within a SCIF, open storage is allowed. Which of the following is NOT a best practice for teleworking in an environment where Internet of Things (IoT) devices are present? - ANSWER-Use the devices' default security settings. Based on the description provided, how many insider threat indicators are present? Elyse has worked for a DoD agency for more than 10 years. She is a diligent employee who receives excellent performance reviews and is a valued team member. She has two children and takes them on a weeklong beach vacation every summer. She spent a semester abroad in France as a teenager and plans to take her children to visit France when they are older. - ANSWER-0 Tom is working on a report that contains employees' names, home addresses, and salary. Which of the following is Tom prohibited from doing with the report? - ANSWER-E-mailing it to a colleague who needs to provide missing data Which of these is NOT a potential indicator that your device may be under a malicious code attack? - ANSWER-A notification for a system update that has been publicized. Which of the following is a best practice to protect your identity? - ANSWER-Order a credit report annually

Show more Read less
Institution
ICT CYBER CRIME
Course
ICT CYBER CRIME









Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
ICT CYBER CRIME
Course
ICT CYBER CRIME

Document information

Uploaded on
May 1, 2025
Number of pages
7
Written in
2024/2025
Type
Exam (elaborations)
Contains
Questions & answers

Content preview

CYBER AWARENESS CHALLENGE
How can you protect your home computer? - ANSWER-Turn on the
password feature



Carl receives an e-mail about a potential health risk... -
ANSWER-Forward it



Which of the following is an appropriate use of government e-mail?
- ANSWER-Using a digital signature when sending attachments



Sylvia commutes to work via public transportation. She often
uses... - ANSWER-Yes. Eavesdroppers may be listening to Sylvia's
phone calls, and shoulder surfers may be looking at her screen.



Which of the following is true of transmitting or transporting SCI? -
ANSWER-Printed SCI must be retrieved promptly from the printer



What conditions are necessary to be granted access to SCI? -
ANSWER-Top Secret clearance and indoctrination into the SCI
program



Terry sees a post on her social media feed that says there is
smoke billowing from the Pentagon... - ANSWER-This is probably a
post designed to attract Terr's attention to click on a link and steal
her information

, Which of the following statements about PHI is false? - ANSWER-It
is created or received by a healthcare provider, health plan, or
employer of a business associate of these.



Which of the following is NOT a best practice for protecting your
home wireless network for telework? - ANSWER-Use your router's
pre-set SSID and password



Beth taps her phone at a payment terminal to pay for a purchase.
Does this pose a security risk? - ANSWER-Yes, there is a risk that
the signal could be intercepted and altered



How can you prevent viruses and malicious code? - ANSWER-Scan
all external files before uploading to your computer



Which of the following is an example of behavior that you should
report? - ANSWER-Taking sensitive information home for telework
without authorization



You receive a text message from a package shipper notifying you
that your package delivery is delayed due to needing updated
delivery instructions from you. - ANSWER-Delete the message



Which of the following is an appropriate use of a DoD PKI token? -
ANSWER-Do not use a token approved for NIPR on SIPR
$6.89
Get access to the full document:

100% satisfaction guarantee
Immediately available after payment
Both online and in PDF
No strings attached

Get to know the seller
Seller avatar
PERFECTSCHOOLERS
1.0
(1)

Get to know the seller

Seller avatar
PERFECTSCHOOLERS Harvard University
View profile
Follow You need to be logged in order to follow users or courses
Sold
4
Member since
1 year
Number of followers
0
Documents
156
Last sold
6 months ago
PERFECTSCHOOLERS

"Dedicated to providing high-quality study materials to help students succeed. In order to facilitate and expedite learning, we distribute notes, guides, and resources on a range of topics. Join us for study tips and content designed to boost your grades!"

1.0

1 reviews

5
0
4
0
3
0
2
0
1
1

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions