Garantie de satisfaction à 100% Disponible immédiatement après paiement En ligne et en PDF Tu n'es attaché à rien 4,6 TrustPilot
logo-home
Examen

CYBER AWARENESS CHALLENGE

Note
-
Vendu
-
Pages
7
Grade
A+
Publié le
01-05-2025
Écrit en
2024/2025

CYBER AWARENESS CHALLENGE How can you protect your home computer? - ANSWER-Turn on the password feature Carl receives an e-mail about a potential health risk... - ANSWER-Forward it Which of the following is an appropriate use of government e-mail? - ANSWER-Using a digital signature when sending attachments Sylvia commutes to work via public transportation. She often uses... - ANSWER-Yes. Eavesdroppers may be listening to Sylvia's phone calls, and shoulder surfers may be looking at her screen. Which of the following is true of transmitting or transporting SCI? - ANSWER-Printed SCI must be retrieved promptly from the printer What conditions are necessary to be granted access to SCI? - ANSWER-Top Secret clearance and indoctrination into the SCI program Terry sees a post on her social media feed that says there is smoke billowing from the Pentagon... - ANSWER-This is probably a post designed to attract Terr's attention to click on a link and steal her information Which of the following statements about PHI is false? - ANSWER-It is created or received by a healthcare provider, health plan, or employer of a business associate of these. Which of the following is NOT a best practice for protecting your home wireless network for telework? - ANSWER-Use your router's pre-set SSID and password Beth taps her phone at a payment terminal to pay for a purchase. Does this pose a security risk? - ANSWER-Yes, there is a risk that the signal could be intercepted and altered How can you prevent viruses and malicious code? - ANSWER-Scan all external files before uploading to your computer Which of the following is an example of behavior that you should report? - ANSWER-Taking sensitive information home for telework without authorization You receive a text message from a package shipper notifying you that your package delivery is delayed due to needing updated delivery instructions from you. - ANSWER-Delete the message Which of the following is an appropriate use of a DoD PKI token? - ANSWER-Do not use a token approved for NIPR on SIPR Which of the following is a best practice when browsing the internet? - ANSWER-Only accept cookies from reputable, trusted websites Where are you permitted to use classified data? - ANSWER-Only in areas with security appropriate to the classification level Which of the following contributes to your online identity? - ANSWER-All of these How can you protect your home computer? - ANSWER-Regularly back up your files Which of the following statements is true of DoD Unclassified data? - ANSWER-It may require access and distribution controls Which of the following is NOT a way that malicious code can spread? - ANSWER-Running a virus scan What is the goal of an Insider Threat Program? - ANSWER-Deter, detect, and mitigate Which of the following uses of removable media is allowed? - ANSWER-Government owned removable media that is approved as operationally necessary Which of the following is permitted when using an unclassified laptop within a collateral classified space? - ANSWER-A government-issued WIRED headset with microphone When is the safest time to post on social media about your vacation plans? - ANSWER-After the trip Which of the following is NOT an appropriate use of your CAC? - ANSWER-Using it as photo identification with a commercial entity Which of the following is NOT a best practice for traveling overseas with a mobile device? - ANSWER-**Do not travel with a mobile device if you can avoid it** wrong Which of the following is true of spillage? - ANSWER-It refers specifically to classified information that becomes publicly available. Which of the following is permitted within a Sensitive Compartmented Information Facility (SCIF)? - ANSWER-An authorized Government-owned Portable Electronic Device (PED) You receive a phone call offering you a $50 gift card if you participate in a survey. Which course of action should you take? - ANSWER-Decline to participate in the survey. This may be a social engineering attempt. How should government owned removable media be stored? - ANSWER-In a GSA-approved container according to the appropriate security classification. Which of the following is a best practice for using government email? - ANSWER-Do not send mass e-mails. Which of the following is a best practice for physical security? - ANSWER-Use your own security badge or key code for facility access. Which of the following is least likely to pose a risk to share on a social networking site? - ANSWER-Your pet's name How can you protect your home computer? - ANSWER-Regularly back up your files. Which of the following describes Sensitive Compartmented Information (SCI)? SCI is a program that ______________various types of classified information for _______________ protection and dissemination or distribution control. - ANSWER-segregates, added Which of the following is true of telework? - ANSWER-You must have permission from your organization to telework. Which of the following is true Sensitive Compartmented Information Facilities (SCIFs)? - ANSWER-Due to the physical security measures in place within a SCIF, open storage is allowed. Which of the following is NOT a best practice for teleworking in an environment where Internet of Things (IoT) devices are present? - ANSWER-Use the devices' default security settings. Based on the description provided, how many insider threat indicators are present? Elyse has worked for a DoD agency for more than 10 years. She is a diligent employee who receives excellent performance reviews and is a valued team member. She has two children and takes them on a weeklong beach vacation every summer. She spent a semester abroad in France as a teenager and plans to take her children to visit France when they are older. - ANSWER-0 Tom is working on a report that contains employees' names, home addresses, and salary. Which of the following is Tom prohibited from doing with the report? - ANSWER-E-mailing it to a colleague who needs to provide missing data Which of these is NOT a potential indicator that your device may be under a malicious code attack? - ANSWER-A notification for a system update that has been publicized. Which of the following is a best practice to protect your identity? - ANSWER-Order a credit report annually

Montrer plus Lire moins
Établissement
ICT CYBER CRIME
Cours
ICT CYBER CRIME









Oups ! Impossible de charger votre document. Réessayez ou contactez le support.

École, étude et sujet

Établissement
ICT CYBER CRIME
Cours
ICT CYBER CRIME

Infos sur le Document

Publié le
1 mai 2025
Nombre de pages
7
Écrit en
2024/2025
Type
Examen
Contient
Questions et réponses

Sujets

Aperçu du contenu

CYBER AWARENESS CHALLENGE
How can you protect your home computer? - ANSWER-Turn on the
password feature



Carl receives an e-mail about a potential health risk... -
ANSWER-Forward it



Which of the following is an appropriate use of government e-mail?
- ANSWER-Using a digital signature when sending attachments



Sylvia commutes to work via public transportation. She often
uses... - ANSWER-Yes. Eavesdroppers may be listening to Sylvia's
phone calls, and shoulder surfers may be looking at her screen.



Which of the following is true of transmitting or transporting SCI? -
ANSWER-Printed SCI must be retrieved promptly from the printer



What conditions are necessary to be granted access to SCI? -
ANSWER-Top Secret clearance and indoctrination into the SCI
program



Terry sees a post on her social media feed that says there is
smoke billowing from the Pentagon... - ANSWER-This is probably a
post designed to attract Terr's attention to click on a link and steal
her information

, Which of the following statements about PHI is false? - ANSWER-It
is created or received by a healthcare provider, health plan, or
employer of a business associate of these.



Which of the following is NOT a best practice for protecting your
home wireless network for telework? - ANSWER-Use your router's
pre-set SSID and password



Beth taps her phone at a payment terminal to pay for a purchase.
Does this pose a security risk? - ANSWER-Yes, there is a risk that
the signal could be intercepted and altered



How can you prevent viruses and malicious code? - ANSWER-Scan
all external files before uploading to your computer



Which of the following is an example of behavior that you should
report? - ANSWER-Taking sensitive information home for telework
without authorization



You receive a text message from a package shipper notifying you
that your package delivery is delayed due to needing updated
delivery instructions from you. - ANSWER-Delete the message



Which of the following is an appropriate use of a DoD PKI token? -
ANSWER-Do not use a token approved for NIPR on SIPR
€5,98
Accéder à l'intégralité du document:

Garantie de satisfaction à 100%
Disponible immédiatement après paiement
En ligne et en PDF
Tu n'es attaché à rien

Faites connaissance avec le vendeur
Seller avatar
PERFECTSCHOOLERS
1,0
(1)

Faites connaissance avec le vendeur

Seller avatar
PERFECTSCHOOLERS Harvard University
S'abonner Vous devez être connecté afin de suivre les étudiants ou les cours
Vendu
4
Membre depuis
1 année
Nombre de followers
0
Documents
156
Dernière vente
6 mois de cela
PERFECTSCHOOLERS

"Dedicated to providing high-quality study materials to help students succeed. In order to facilitate and expedite learning, we distribute notes, guides, and resources on a range of topics. Join us for study tips and content designed to boost your grades!"

1,0

1 revues

5
0
4
0
3
0
2
0
1
1

Récemment consulté par vous

Pourquoi les étudiants choisissent Stuvia

Créé par d'autres étudiants, vérifié par les avis

Une qualité sur laquelle compter : rédigé par des étudiants qui ont réussi et évalué par d'autres qui ont utilisé ce document.

Le document ne convient pas ? Choisis un autre document

Aucun souci ! Tu peux sélectionner directement un autre document qui correspond mieux à ce que tu cherches.

Paye comme tu veux, apprends aussitôt

Aucun abonnement, aucun engagement. Paye selon tes habitudes par carte de crédit et télécharge ton document PDF instantanément.

Student with book image

“Acheté, téléchargé et réussi. C'est aussi simple que ça.”

Alisha Student

Foire aux questions