


Study with the several resources on Docsity
Earn points by helping other students or get them with a premium plan
Prepare for your exams
Study with the several resources on Docsity
Earn points to download
Earn points by helping other students or get them with a premium plan
Community
Ask the community for help and clear up your study doubts
Discover the best universities in your country according to Docsity users
Free resources
Download our free guides on studying techniques, anxiety management strategies, and thesis advice from Docsity tutors
DOD CYBER AWARENESS CHALLENGE 2024
Typology: Exams
1 / 4
This page cannot be seen from the preview
Don't miss anything!
What conditions are necessary to be granted access to Sensitive Compartmented Information (SCI)? - Precise Answer ✔✔Top Secret clearance and indoctrination into the SCI program Which of the following is permitted when using an unclassified laptop within a collateral classified space? - Precise Answer ✔✔A Government-issued wired headset with microphone Which of the following is an authoritative source for derivative classification? - Precise Answer ✔✔Security Classification Guide Carl receives an e-mail about a potential health risk caused by a common ingredient in processed food. Which of the following actions should Carl NOT take with the e-mail? - Precise Answer ✔✔Forward it How can an adversary use information available in public records to target you? - Precise Answer ✔✔Combine it with information from other data sources to learn how best to bait you with a scam Which of the following is an appropriate use of government e-mail? - Precise Answer ✔✔Using a digital signature when sending attachments
Which of the following is NOT a best practice for protecting data on a mobile device? - Precise Answer ✔✔Disable automatic screen locking after a period of inactivity Annabeth becomes aware that a conversation with a co-worker that involved Sensitive Compartmented Information (SCI) may have been overheard by someone who does not have the required clearance. What action should Annabeth take? - Precise Answer ✔✔Contact her security POC to report the incident. On your home computer, how can you best establish passwords when creating separate user accounts? - Precise Answer ✔✔Have each user create their own, strong password Which of the following is an allowed use of government furnished equipment (GFE)? - Precise Answer ✔✔Checking personal e-mail if your organization allows it How can you prevent viruses and malicious code? - Precise Answer ✔✔Scan all external files before uploading to your computer Which best describes an insider threat? Someone who uses __________ access, ___________, to harm national security through unauthorized disclosure, data modification, espionage, terrorism, or kinetic actions. - Precise Answer ✔✔authorized, wittingly or unwittingly
listening to Sylvia's phone calls, and shoulder surfers may be looking at her screen. Sylvia should be aware of these risks. Beth taps her phone at a payment terminal to pay for a purchase. Does this pose a security risk? - Precise Answer ✔✔Yes, there is a risk that the signal could be intercepted and altered. Which of the following is NOT an appropriate use of your Common Access Card (CAC)? - Precise Answer ✔✔Using it as photo identification with a commercial entity When is the safest time to post on social media about your vacation plans? - Precise Answer ✔✔After the trip You receive a text message from a package shipper notifying you that your package delivery is delayed due to needing updated delivery instructions from you. It provides a shortened link for you to provide the needed information. You are not expecting a package. What is the best course of action? - Precise Answer ✔✔Delete the message Which of the following is NOT a best practice for protecting your home wireless network for telework? - Precise Answer ✔✔Use your router's pre-set Service Set Identifier (SSID) and password Which of the following is a best practice for using government e-mail? - Precise Answer ✔✔Do not send mass e-mails