Docsity
Docsity

Prepare for your exams
Prepare for your exams

Study with the several resources on Docsity


Earn points to download
Earn points to download

Earn points by helping other students or get them with a premium plan


Guidelines and tips
Guidelines and tips

DOD Cyber Awareness Challenge 2024: Questions and Answers, Exams of Nursing

DOD CYBER AWARENESS CHALLENGE 2024

Typology: Exams

2023/2024

Available from 08/13/2024

clevelsky
clevelsky 🇺🇸

22 documents

1 / 4

Toggle sidebar

This page cannot be seen from the preview

Don't miss anything!

bg1
DOD CYBER AWARENESS CHALLENGE
2024
What conditions are necessary to be granted access to Sensitive
Compartmented Information (SCI)? - Precise Answer ✔✔Top Secret
clearance and indoctrination into the SCI program
Which of the following is permitted when using an unclassified laptop
within a collateral classified space? - Precise Answer ✔✔A
Government-issued wired headset with microphone
Which of the following is an authoritative source for derivative
classification? - Precise Answer ✔✔Security Classification Guide
Carl receives an e-mail about a potential health risk caused by a
common ingredient in processed food. Which of the following actions
should Carl NOT take with the e-mail? - Precise Answer ✔✔Forward it
How can an adversary use information available in public records to
target you? - Precise Answer ✔✔Combine it with information from
other data sources to learn how best to bait you with a scam
Which of the following is an appropriate use of government e-mail? -
Precise Answer ✔✔Using a digital signature when sending attachments
pf3
pf4

Partial preview of the text

Download DOD Cyber Awareness Challenge 2024: Questions and Answers and more Exams Nursing in PDF only on Docsity!

DOD CYBER AWARENESS CHALLENGE

What conditions are necessary to be granted access to Sensitive Compartmented Information (SCI)? - Precise Answer ✔✔Top Secret clearance and indoctrination into the SCI program Which of the following is permitted when using an unclassified laptop within a collateral classified space? - Precise Answer ✔✔A Government-issued wired headset with microphone Which of the following is an authoritative source for derivative classification? - Precise Answer ✔✔Security Classification Guide Carl receives an e-mail about a potential health risk caused by a common ingredient in processed food. Which of the following actions should Carl NOT take with the e-mail? - Precise Answer ✔✔Forward it How can an adversary use information available in public records to target you? - Precise Answer ✔✔Combine it with information from other data sources to learn how best to bait you with a scam Which of the following is an appropriate use of government e-mail? - Precise Answer ✔✔Using a digital signature when sending attachments

Which of the following is NOT a best practice for protecting data on a mobile device? - Precise Answer ✔✔Disable automatic screen locking after a period of inactivity Annabeth becomes aware that a conversation with a co-worker that involved Sensitive Compartmented Information (SCI) may have been overheard by someone who does not have the required clearance. What action should Annabeth take? - Precise Answer ✔✔Contact her security POC to report the incident. On your home computer, how can you best establish passwords when creating separate user accounts? - Precise Answer ✔✔Have each user create their own, strong password Which of the following is an allowed use of government furnished equipment (GFE)? - Precise Answer ✔✔Checking personal e-mail if your organization allows it How can you prevent viruses and malicious code? - Precise Answer ✔✔Scan all external files before uploading to your computer Which best describes an insider threat? Someone who uses __________ access, ___________, to harm national security through unauthorized disclosure, data modification, espionage, terrorism, or kinetic actions. - Precise Answer ✔✔authorized, wittingly or unwittingly

listening to Sylvia's phone calls, and shoulder surfers may be looking at her screen. Sylvia should be aware of these risks. Beth taps her phone at a payment terminal to pay for a purchase. Does this pose a security risk? - Precise Answer ✔✔Yes, there is a risk that the signal could be intercepted and altered. Which of the following is NOT an appropriate use of your Common Access Card (CAC)? - Precise Answer ✔✔Using it as photo identification with a commercial entity When is the safest time to post on social media about your vacation plans? - Precise Answer ✔✔After the trip You receive a text message from a package shipper notifying you that your package delivery is delayed due to needing updated delivery instructions from you. It provides a shortened link for you to provide the needed information. You are not expecting a package. What is the best course of action? - Precise Answer ✔✔Delete the message Which of the following is NOT a best practice for protecting your home wireless network for telework? - Precise Answer ✔✔Use your router's pre-set Service Set Identifier (SSID) and password Which of the following is a best practice for using government e-mail? - Precise Answer ✔✔Do not send mass e-mails