100% de satisfacción garantizada Inmediatamente disponible después del pago Tanto en línea como en PDF No estas atado a nada 4,6 TrustPilot
logo-home
Examen

Cyber Awareness Answers.docx

Puntuación
-
Vendido
-
Páginas
2
Grado
A+
Subido en
19-11-2022
Escrito en
2022/2023

Cyber Awareness 1. In addition to avoiding the temptation of greed to betray his country, what should Alex do differently? Avoid talking about work outside of the workplace or with people without a need to know 2. Which represents a security best practice when using social networking? Understanding and using available privacy settings. 3. As someone who works with classified information, what should you do if you are contacted by a foreign national seeking information on a research project? Inform your security POC of all non-professional or non-routine contacts with foreign nationals, including, but not limited to, joining each other’s social media sites. 4. What should you do if an individual asks you to let her follow you into your controlled space, stating tht she left her security badge at her desk? Don’t allow her access into secure areas and report suspicious activity. 5. What is the best description of two factor authentications? A primary and secondary password to log into a system. 6. What organization issues the directives concerning the dissemination of information regarding intelligence sources, methods, or activities? Department of defense 7. Which must be approved and signed by a cognizant original classification authority (OCA)? SCI 8. What must users do when using removable media within a sensitive compartmented information facility (SCIF)? Comply with site 9. What are some actions you can take to try to protect your identity? Shred personal documents, never share passwords, and order a credit report annually. 10. What is whaling? A type of phishing designed to interrupt computer access for personnel at all levels. 11. What is a way to prevent the download of viruses and other malicious code when checking your email? Forward any suspect e-mail to your supervisor and your security POC immediately. 12. Which may be a security issue with compressed URLs? May be used to mask malicious intent 13. Upon connecting your government issued laptop to a public wireless connection, what should you immediately do? Connect to VPN 14. Under what circumstances is it acceptable to use your government furnished compute to check personal e-mail and do other non-work related activities? If allowed by organization policy This study source was downloaded by from CourseH on :21:51 GMT -06:00

Mostrar más Leer menos
Institución
Grado








Ups! No podemos cargar tu documento ahora. Inténtalo de nuevo o contacta con soporte.

Escuela, estudio y materia

Institución
Grado

Información del documento

Subido en
19 de noviembre de 2022
Número de páginas
2
Escrito en
2022/2023
Tipo
Examen
Contiene
Respuestas

Temas

$10.89
Accede al documento completo:

100% de satisfacción garantizada
Inmediatamente disponible después del pago
Tanto en línea como en PDF
No estas atado a nada

Conoce al vendedor
Seller avatar
Dylan47

Conoce al vendedor

Seller avatar
Dylan47 Harvard College
Seguir Necesitas iniciar sesión para seguir a otros usuarios o asignaturas
Vendido
0
Miembro desde
3 año
Número de seguidores
0
Documentos
10
Última venta
-
ELECTRICAL ENGINNERING STUDY GUIDES.

0.0

0 reseñas

5
0
4
0
3
0
2
0
1
0

Por qué los estudiantes eligen Stuvia

Creado por compañeros estudiantes, verificado por reseñas

Calidad en la que puedes confiar: escrito por estudiantes que aprobaron y evaluado por otros que han usado estos resúmenes.

¿No estás satisfecho? Elige otro documento

¡No te preocupes! Puedes elegir directamente otro documento que se ajuste mejor a lo que buscas.

Paga como quieras, empieza a estudiar al instante

Sin suscripción, sin compromisos. Paga como estés acostumbrado con tarjeta de crédito y descarga tu documento PDF inmediatamente.

Student with book image

“Comprado, descargado y aprobado. Así de fácil puede ser.”

Alisha Student

Preguntas frecuentes