Cyber Awareness Answers.docx
Cyber Awareness 1. In addition to avoiding the temptation of greed to betray his country, what should Alex do differently? Avoid talking about work outside of the workplace or with people without a need to know 2. Which represents a security best practice when using social networking? Understanding and using available privacy settings. 3. As someone who works with classified information, what should you do if you are contacted by a foreign national seeking information on a research project? Inform your security POC of all non-professional or non-routine contacts with foreign nationals, including, but not limited to, joining each other’s social media sites. 4. What should you do if an individual asks you to let her follow you into your controlled space, stating tht she left her security badge at her desk? Don’t allow her access into secure areas and report suspicious activity. 5. What is the best description of two factor authentications? A primary and secondary password to log into a system. 6. What organization issues the directives concerning the dissemination of information regarding intelligence sources, methods, or activities? Department of defense 7. Which must be approved and signed by a cognizant original classification authority (OCA)? SCI 8. What must users do when using removable media within a sensitive compartmented information facility (SCIF)? Comply with site 9. What are some actions you can take to try to protect your identity? Shred personal documents, never share passwords, and order a credit report annually. 10. What is whaling? A type of phishing designed to interrupt computer access for personnel at all levels. 11. What is a way to prevent the download of viruses and other malicious code when checking your email? Forward any suspect e-mail to your supervisor and your security POC immediately. 12. Which may be a security issue with compressed URLs? May be used to mask malicious intent 13. Upon connecting your government issued laptop to a public wireless connection, what should you immediately do? Connect to VPN 14. Under what circumstances is it acceptable to use your government furnished compute to check personal e-mail and do other non-work related activities? If allowed by organization policy This study source was downloaded by from CourseH on :21:51 GMT -06:00
Escuela, estudio y materia
- Institución
- University Of Nevada-Las Vegas
- Grado
- CIS MISC
Información del documento
- Subido en
- 19 de noviembre de 2022
- Número de páginas
- 2
- Escrito en
- 2022/2023
- Tipo
- Examen
- Contiene
- Respuestas
Temas
-
cis misc
-
cyber awareness answers