• wonderlic tests
  • EXAM REVIEW
  • NCCCO Examination
  • Summary
  • Class notes
  • QUESTIONS & ANSWERS
  • NCLEX EXAM
  • Exam (elaborations)
  • Study guide
  • Latest nclex materials
  • HESI EXAMS
  • EXAMS AND CERTIFICATIONS
  • HESI ENTRANCE EXAM
  • ATI EXAM
  • NR AND NUR Exams
  • Gizmos
  • PORTAGE LEARNING
  • Ihuman Case Study
  • LETRS
  • NURS EXAM
  • NSG Exam
  • Testbanks
  • Vsim
  • Latest WGU
  • AQA PAPERS AND MARK SCHEME
  • DMV
  • WGU EXAM
  • exam bundles
  • Study Material
  • Study Notes
  • Test Prep

00 DON CYBER AWARENESS CHALLENGE

Summary Jan 8, 2026
Preview Mode - Purchase to view full document
Loading...

Loading study material viewer...

Page 0 of 0

Document Text

00 DON CYBER AWARENESS CHALLENGE

FLASHCARDS

EXAM PREPARATION GUIDE | 35 ITEMS

Q:bRobr@79I*P

Who designates whether information is classified and its classification level?

Q:Report the e-mail to your security POC or help desk.

Which of the following is an allowed use of government furnished equipment (GFE)?

Q:They may be used to mask malicious intent

I only had to retake "Unclassified Information" mission

Q:Labeling media that contains personally identifiable information (PII)

Which of these is NOT a potential indicator that your device may be under a malicious code attack?

Q:Only leave it in a system while actively using it for a PKI-required task

How can you protect date on a mobile device?

Q:SIPRNet

Devon receives an email on her classified computer. the email has an unmarked attachment that contains what she recognizes as classified information. what should devon do?Q:Their connectivity can be exploited as an attack vector to any other device on the same network.You receive a text message from a commercial shipping company notifying you that they need an updated address to deliver a package to you. It provides a link for you to provide the information needed. What is the best course of action?

Q:Spear phishing

Which of the following is a potential insider threat indicator?

Q:CPCON 1

Which of the following is true of compressed URLs (e.g., TinyURL, goo.gl)?

Q:Delete the message

How can you take back any content you post to a social networking site if you change your mind?

Q:Yes. Walter should avoid appearing to speak on behalf of the government

While taking a break at your workstation, you swith to your computer's web browser intending to look up the evening's weather forecast. You notice open tabs in your browser that you don't recall opening. Is this a concern?

Q:Immediately notify her security POC

Which of the following is an example of Protected Health Information (PHI)?

Q:All of these

You receive an e-mail with a link to run an anti-virus scan. Your IT department has not sent links like this in the past. The e-mail is not digitally signed. What action should you take?

Q:Install spyware protection software

Which of the following poses a security risk while teleworking in an environment where Internet of Things (IoT) devices are present?

Q:E-mailing your supervisor

Which of the following is an example of a strong password?

Q:Original classification authority

Which of the following is an example of behavior that you should report?

Q:An individual's medical record maintained by a healthcare provider

What risk is posed by Internet of Things (IoT) devices?

Q:Yes. Eavesdroppers may be listening to Steve's conversation.

How can you protect your home computer?

Q:Someone who uses authorized access, either wittingly or unwittingly, to harm

national security How can malicious code do damage?

Q:1

Which of the following can be used to catalogue information about you?

Q:It poses no risk to the safety of government personnel, missions, or systems.

How can you protect your home computer?

Q:Use legitimate, known antivirus software.

Which of the following statements is true of DoD Unclassified data?

Q:All of these

You receive an e-mail marked important from you agency head asking you to call them using a number you do not recognize. This e-mail was sent from a personal e-mail address that you do not recognize, but it addresses you by name. What action should you take?

Q:All of these

Which of the following is an appropriate use of a DoD Public Key Infrastructure (PKI) token?

Q:Bringing a phone into a prohibited area

What is insider threat?

Q:Your favorite movie

Under which Cyberspace Protection Condition (CPCON) is the priority focus limited to critical functions?

Q:Create separate accounts for each user and have each user create their own

password When allowed, which of the following is an appropriate use of removable media?

Q:Delete the post

You receive a suspicious e-mail that appears to have come from an organization that partners with your agency. Your co-workers have received a similar e-mail. What might this be?

Q:Which of the following describes Sensitive Compartmented Information (SCI)?

What is a best practice for creating user accounts for your home computer?

Q:I only had to retake "Unclassified Information" mission

walter shares a link to a news article abot the dod on his social media. along with the link, he states that he disagrees with the reporting in the article as a dod employee.

Q:Use two-factor authentication

Based on description provided, how many insider threat indicators are present? Edward has worked for a DoD agency for 2 years. He is an analyst who takes a great deal of interest in his work. He occasionally takes a somewhat aggressive interest in others' work as well, including asking for classified details of their projects. He otherwise gets along well with his colleagues.

Q:An operating system update

Steve occasionally runs errands during virtual meetings. He joins the meeting using his approved government device. Does this pose a security concern?Q:Yes. The appearance of new extensions or tabs in your web browser may indicate a cybersecurity incident In what level of system can you use a SIPRNet public key infrastructure (PKI) token?

Download Study Material

Buy This Study Material

$11.99
Buy Now
  • Immediate download after payment
  • Available in the pdf format
  • 100% satisfaction guarantee

Study Material Information

Category: Summary
Description:

00 DON CYBER AWARENESS CHALLENGE FLASHCARDS EXAM PREPARATION GUIDE | 35 ITEMS Q:bRobr@79I*P Who designates whether information is classified and its classification level? Q:Report the e-mail to you...

UNLOCK ACCESS $11.99