of
Defense
(DoD)
Cyber
Awareness
Challenge
2024
(1
hr)
(Pre
Test)
How
can
an
adversary
use
information
available
in
public
records
to
target
you?
-
ANS
Combine
it
with
info
from
other
data
sources
to
learn
how
to
best
bait
you
with
a
scam
Which
of
the
following
is
an
example
of
a
strong
password?
-
ANS
d+Uf_4RimUz
Where
are
you
permitted
to
use
classified
data?
-
ANS
Only
in
areas
with
security
appropriate
to
the
classification
level
What
conditions
are
necessary
to
be
granted
access
to
SCI?
-
ANS
special
access
authorization
and
indoctrination
into
the
SCI
program
Which
of
the
following
is
NOT
a
best
practice
for
traveling
overseas
with
a
mobile
device?
-
ANS
Do
not
travel
with
a
mobile
device
if
you
can
avoid
it
Under
which
Cyberspace
Protection
Condition
(CPCON)
is
the
priority
focus
limited
to
critical
and
essential
functions?
-
ANS
CPCON
2
Tom
is
working
on
a
report
that
contains
employees
names,
home
addresses,
and
salary.
Which
of
the
following
is
Tom
prohibited
from
doing
with
the
report?
-
ANS
Using
his
home
computer
to
the
report
while
teleworking
Which
of
the
following
uses
of
removable
media
is
appropriate?
-
ANS
encrypting
data
stored
on
removable
media
Which
of
the
following
is
NOT
a
best
practice
for
protecting
data
on
a
mobile
device?
-
ANS
Disable
auto
screen
locking
after
a
period
of
inactivity
Which
of
the
following
is
a
best
practice
to
protect
your
identity?
-
ANS
Order
a
credit
report
annually
Which
of
the
following
is
permitted
within
a
SCIF?
-
ANS
An
authorized
Government-owned
PED