CYBER AWARENESS 2024 EDITION
FLASHCARDS
EXAM PREPARATION GUIDE | 25 ITEMS
Q:Which of the following is permitted when using an unclassified laptop within a collateral classified space?-government-issued wired headset with a microphone-a government-issued wireless headset without a microphone Q:Terry sees a post on her social media feed that says there is smoking billowing from the pentagon. the post includes a video that shows smoke billowing from a building that is not readily identifiable as the Pentagon. Terry Is not familiar with the source of the post. which of the following describes what Terry has likely seen?This is probably a post designed to attract Terry's attention to click on a link and steal her information
Q:Which of the following contributes to your online identity?
all of these Q:After a classified document is leaked online, it makes national headlines. Which of the following statements is true of the leaked information that is now accessible by the public?You should still treat it as classified even though it has been compromised.
Q:which of the following is true of working with Sensitive Compartmented
Information Facilities (SCIF)?A designated individual is responsible for securing the entrance and exit points
Q:Where are you permitted to use classified data?
only in areas with security appropriate to the classification level
Q:Which of the following is true of transmitting or transporting Sensitive
Compartmented Information (SCI)?Printed SCI must be retrieved promptly from the printer
Q:What does the common access card (CAC) contain?
Certificates for identification, encryption, and digital signature.
Q:Which of the following uses of removable media is appropriate?
Encrypting data stored on removable media
Q:How should government owned removal of media be stored?
in a GSA-approved Container according to the appropriate security classification
Q:Which of the following is NOT a best practice for protecting data on mobile
devices?Disabling automatic screen locking after a period of inactivity
Q:You receive a text message from a package shipper notifying you that your
package delivery is delayed due to a needing update delivery instructions from you. it provides a shortened link for you to provide the needed information. you are not expecting a package. What is the best course of action?delete the message
Q:Which of the following is a best practice for managing connection requests on
social networking sites?validate connection requests through another source if possible Q:Which of the following is true of sensitive compartmented information facilities
(SCIF)?
Personnel with access to SCIF have a need-to-know for all information processed within the SCIF
Q:which of the following is an allowed use of government furnished equipment?
checking personal email if your organization allows it
Q:Which of the following is the best practice when browsing the internet?
looking for H-T-T-P in the URL Q:Tom is working on a report that contains employees' names, home addresses, and salary. Which of the following is Tom prohibited from doing with the report?Emailing it to a colleague who needs to provide missing data
Q:What is the goal of an Insider threat program?
Deter, detect, and mitigate the risk associated with Insider threats Q:Which of the following is not a best practice for teleworking in an environment where Internet of Things (IoT) devices are present?use the devices' default security settings Q:When receiving a phone call offering a $50 gift card if you participate in a survey.Which course of action should you take?Decline to participate in the survey. this may be a social engineering attempt.
Q:Which of the following is a best practice to protect your identity?
ordering a credit report annually
Q:Which of these is not a potential indicator that your device may be under
malicious code attack?A notification for a system update that has been publicized Q:You receive an e-mail with a link to schedule a time to update software on your government furnished laptop. Your IT department has not scheduled software updates like this in the past and has not announced this software update. The e- mail is not digitally signed. What action should you take?report the e-mail to your security POC or help desk
Q:How can you protect your home computer?
Turn on the password feature
Q:Which of the following personally owned peripherals can you use with
government furnished equipment (GFE)?a monitor connected via USB