• wonderlic tests
  • EXAM REVIEW
  • NCCCO Examination
  • Summary
  • Class notes
  • QUESTIONS & ANSWERS
  • NCLEX EXAM
  • Exam (elaborations)
  • Study guide
  • Latest nclex materials
  • HESI EXAMS
  • EXAMS AND CERTIFICATIONS
  • HESI ENTRANCE EXAM
  • ATI EXAM
  • NR AND NUR Exams
  • Gizmos
  • PORTAGE LEARNING
  • Ihuman Case Study
  • LETRS
  • NURS EXAM
  • NSG Exam
  • Testbanks
  • Vsim
  • Latest WGU
  • AQA PAPERS AND MARK SCHEME
  • DMV
  • WGU EXAM
  • exam bundles
  • Study Material
  • Study Notes
  • Test Prep

CYBER AWARENESS 2020 KNOWLEDGE

Test Prep Jan 8, 2026
Preview Mode - Purchase to view full document
Loading...

Loading study material viewer...

Page 0 of 0

Document Text

CYBER AWARENESS 2020 KNOWLEDGE

CHECK FLASHCARDS

EXAM PREPARATION GUIDE | 78 ITEMS

Q:What describes how Sensitive Compartmented Information is marked?

Approved Security Classification Guide (SCG) Q:Which is a wireless technology that enables your electronic devices to establish communications and exchange information when places next to each other called?Near field communication (NFC)

Q:Which is true of cookies?

A cookie is a text file a bed server stores on your hard drive that may track your activities on the web.

Q:Which is a risk associated with removable media?

Spillage of classified information.

Q:Which of the following helps protect data on your personal mobile devices?

Secure personal mobile devices to the same level as Government-issued systems.Q:Which of the following terms refers to harm inflicted on national security through authorized access to information or information systems?Insider Threat

Q:What is a best practice to protect data on your mobile computing device?

Lock your device screen when not in use and require a password to reactivate.

Q:Which of the following is a good practice to aid in preventing spillage?

Be aware of classification markings and all handling caveats.

Q:What is whaling?

A type of phishing targeted at high-level personnel such as senior officials.

Q:When is conducting a private money-making venture using your

Government-furnished computer permitted?It is never permitted.Q:How many potential insider threat indicators does a person who is married with two children, vacations at the beach every year, is pleasant to work with, but sometimes has poor work quality display?

  • indicators

Q:What is a good practice to protect data on your home wireless systems?

Ensure that the wireless security features are properly configured.

Q:What certificates are contained on the DoD Public Key Infrastructure (PKI)

implemented by the Common Access Card (CAC)/Personal Identity Verification (PIV) card?Identification, encryption, and digital signature Q:After reading an online story about a new security project being developed on the military installation where you work, your neighbor asks you to comment about the article. You know this project is classified. What should be your response?Attempt to change the subject to something non-work related, but neither confirm nor deny the article's authenticity.Q:What is a good practice when it is necessary to use a password to access a system or an application?Avoid using the same password between systems or applications.

Q:What is a common indicator of a phishing attempt?

It includes a threat of dire circumstances.

Q:What portable electronic devices (PEDs) are allow in a Secure Compartmented

Information Facility (SCIF)?Government-owned PEDs, if expressly authorized by your agency.Q:Upon connecting your Government-issued laptop to a public wireless connection, what should you immediately do?Connect to the Government Virtual Private Network (VPN).Q:Which of the following can an unauthorized disclosure of information classified as Confidential reasonably be expected to cause?Damage to national security

Q:Which of the following practices reduces the chance of becoming a target by

adversaries seeking insider information?Don't talk about work outside your workspace unless it is a specifically designated public meeting environment and is controlled by the event planners.Q:Which of the following is a best practice to protect information about you and your organization on social networking sites and applications?Use only personal contact information when establishing personal social networking accounts, never use Government contact information.Q:Under which circumstances may you be subject to criminal, disciplinary, and/or administrative action due to online misconduct?Any time you participate in or condone misconduct, whether offline or online.

Q:What can malicious code do?

It can cause damage by corrupting files, erasing your hard drive, and/or allowing hackers access.

Q:Which represents a security best practice when using social networking?

Understanding and using available privacy settings.

Q:What is required for an individual to access classified data?

Appropriate clearance; signed and approved non-disclosure agreement; and need-to-know.Q:While on vacation, a coworker calls and asks you to access a site to review and approve a document that is hosted behind a DoD Public Key Infrastructure (PKI) protected webpage. You do not have your government-issued laptop. What action should you take?Wait until you have access to your government-issued laptop.

Q:Which of the following activities is an ethical use of Government-furnished

equipment (GFE)?Completing your expense report for your government travel.

Q:Which classification level is given to information that could reasonably be

expected to cause serious damage to national security?Secret

Q:What is an indication that malicious code is running on your system?

File corruption Q:Why might "insiders" be able to cause damage to their organizations more easily than others?Insiders are given a level of trust and have authorized access to Government information systems.

Q:What is a valid response when identity theft occurs?

Report the crime to local law enforcement.

Download Study Material

Buy This Study Material

$11.99
Buy Now
  • Immediate download after payment
  • Available in the pdf format
  • 100% satisfaction guarantee

Study Material Information

Category: Test Prep
Description:

CYBER AWARENESS 2020 KNOWLEDGE CHECK FLASHCARDS EXAM PREPARATION GUIDE | 78 ITEMS Q:What describes how Sensitive Compartmented Information is marked? Approved Security Classification Guide (SCG) Q:...

UNLOCK ACCESS $11.99