100% tevredenheidsgarantie Direct beschikbaar na je betaling Lees online óf als PDF Geen vaste maandelijkse kosten 4.2 TrustPilot
logo-home
Tentamen (uitwerkingen)

CYBER AWARENESS EXAM QUESTIONS AND ANSWERS (100% CORRECT)

Beoordeling
-
Verkocht
-
Pagina's
2
Cijfer
A+
Geüpload op
12-11-2024
Geschreven in
2024/2025

CYBER AWARENESS EXAM QUESTIONS AND ANSWERS (100% CORRECT) Which of the following is true of spillage? - Answers It refers specifically to classified information that becomes publicly available. Which of the following is a risk associated with removable media? - Answers All of these How can an adversary use information available in public records to target you? - Answers Combine it with information from other data sources to learn how best to bait you with a scam Which best describes an insider threat? Someone who uses _______ access, _______, to harm national security through unauthorized disclosure, data modification, espionage, terrorism, or kinetic actions. - Answers authorized; wittingly or unwittingly Under which Cyberspace Protection Condition (CPCON) is the priority focus limited to critical and essential functions? - Answers CPCON 2 Sylvia commutes to work via public transportation. She often uses the time to get a head start on work by making phone calls or responding to e-mails on her government approved mobile device. Does this pose a security concern? - Answers Yes. Eavesdroppers may be listening to Sylvia's phone calls, and shoulder surfers may be looking at her screen. Sylvia should be aware of these risks. Which of the following is true of Sensitive Compartmented Information Facilities (SCIFs)? - Answers Personnel must position monitors so that they do not face windows or close the window blinds. Which of the following is an example of behavior that uou should report? - Answers Taking sensitive information home for teleowrk without authorization Which of the following is an example of a good password? - Answers d+Uf_4RimUz How should government owned removable media be stored? - Answers In a GSA-approved container according to the appropriate security classification On your home computer, how can you best establish passwords when creating separate user accounts? - Answers Have each user create their own, strong password Which of the following personally owned peripherals can you use with government furnished equipment? - Answers A Bluetooth headset How can you mitigate the potential risk associated with a compressed URL (e.g., TinyURL, ) - Answers Use the preview function to see where the link actually leads Beth taps her phone at a payment terminal to pay for a purchase. Does this pose a security risk? - Answers Yes, there is a risk that the signal could be intercepted or altered.

Meer zien Lees minder
Instelling
CYBER AWARENESS
Vak
CYBER AWARENESS








Oeps! We kunnen je document nu niet laden. Probeer het nog eens of neem contact op met support.

Geschreven voor

Instelling
CYBER AWARENESS
Vak
CYBER AWARENESS

Documentinformatie

Geüpload op
12 november 2024
Aantal pagina's
2
Geschreven in
2024/2025
Type
Tentamen (uitwerkingen)
Bevat
Vragen en antwoorden

Onderwerpen

Voorbeeld van de inhoud

CYBER AWARENESS EXAM QUESTIONS AND ANSWERS (100% CORRECT)

Which of the following is true of spillage? - Answers It refers specifically to classified information that
becomes publicly available.

Which of the following is a risk associated with removable media? - Answers All of these

How can an adversary use information available in public records to target you? - Answers Combine it
with information from other data sources to learn how best to bait you with a scam

Which best describes an insider threat? Someone who uses _______ access, _______, to harm national
security through unauthorized disclosure, data modification, espionage, terrorism, or kinetic actions. -
Answers authorized; wittingly or unwittingly

Under which Cyberspace Protection Condition (CPCON) is the priority focus limited to critical and
essential functions? - Answers CPCON 2

Sylvia commutes to work via public transportation. She often uses the time to get a head start on work
by making phone calls or responding to e-mails on her government approved mobile device. Does this
pose a security concern? - Answers Yes. Eavesdroppers may be listening to Sylvia's phone calls, and
shoulder surfers may be looking at her screen. Sylvia should be aware of these risks.

Which of the following is true of Sensitive Compartmented Information Facilities (SCIFs)? - Answers
Personnel must position monitors so that they do not face windows or close the window blinds.

Which of the following is an example of behavior that uou should report? - Answers Taking sensitive
information home for teleowrk without authorization

Which of the following is an example of a good password? - Answers d+Uf_4RimUz

How should government owned removable media be stored? - Answers In a GSA-approved container
according to the appropriate security classification

On your home computer, how can you best establish passwords when creating separate user accounts?
- Answers Have each user create their own, strong password

Which of the following personally owned peripherals can you use with government furnished
equipment? - Answers A Bluetooth headset

How can you mitigate the potential risk associated with a compressed URL (e.g., TinyURL, goo.gl) -
Answers Use the preview function to see where the link actually leads

Beth taps her phone at a payment terminal to pay for a purchase. Does this pose a security risk? -
Answers Yes, there is a risk that the signal could be intercepted or altered.

Which of the following is true of telework? - Answers You must have permission from your organization
to telework
€7,29
Krijg toegang tot het volledige document:

100% tevredenheidsgarantie
Direct beschikbaar na je betaling
Lees online óf als PDF
Geen vaste maandelijkse kosten


Ook beschikbaar in voordeelbundel

Maak kennis met de verkoper

Seller avatar
De reputatie van een verkoper is gebaseerd op het aantal documenten dat iemand tegen betaling verkocht heeft en de beoordelingen die voor die items ontvangen zijn. Er zijn drie niveau’s te onderscheiden: brons, zilver en goud. Hoe beter de reputatie, hoe meer de kwaliteit van zijn of haar werk te vertrouwen is.
TutorJosh Chamberlain College Of Nursing
Volgen Je moet ingelogd zijn om studenten of vakken te kunnen volgen
Verkocht
342
Lid sinds
1 jaar
Aantal volgers
16
Documenten
28610
Laatst verkocht
2 dagen geleden
Tutor Joshua

Here You will find all Documents and Package Deals Offered By Tutor Joshua.

3,6

53 beoordelingen

5
18
4
14
3
12
2
0
1
9

Recent door jou bekeken

Waarom studenten kiezen voor Stuvia

Gemaakt door medestudenten, geverifieerd door reviews

Kwaliteit die je kunt vertrouwen: geschreven door studenten die slaagden en beoordeeld door anderen die dit document gebruikten.

Niet tevreden? Kies een ander document

Geen zorgen! Je kunt voor hetzelfde geld direct een ander document kiezen dat beter past bij wat je zoekt.

Betaal zoals je wilt, start meteen met leren

Geen abonnement, geen verplichtingen. Betaal zoals je gewend bent via Bancontact, iDeal of creditcard en download je PDF-document meteen.

Student with book image

“Gekocht, gedownload en geslaagd. Zo eenvoudig kan het zijn.”

Alisha Student

Veelgestelde vragen