• wonderlic tests
  • EXAM REVIEW
  • NCCCO Examination
  • Summary
  • Class notes
  • QUESTIONS & ANSWERS
  • NCLEX EXAM
  • Exam (elaborations)
  • Study guide
  • Latest nclex materials
  • HESI EXAMS
  • EXAMS AND CERTIFICATIONS
  • HESI ENTRANCE EXAM
  • ATI EXAM
  • NR AND NUR Exams
  • Gizmos
  • PORTAGE LEARNING
  • Ihuman Case Study
  • LETRS
  • NURS EXAM
  • NSG Exam
  • Testbanks
  • Vsim
  • Latest WGU
  • AQA PAPERS AND MARK SCHEME
  • DMV
  • WGU EXAM
  • exam bundles
  • Study Material
  • Study Notes
  • Test Prep

CYBER AWARENESS 2024 EDITION

Test Prep Jan 8, 2026
Preview Mode - Purchase to view full document
Loading...

Loading study material viewer...

Page 0 of 0

Document Text

CYBER AWARENESS 2024 EDITION

FLASHCARDS

EXAM PREPARATION GUIDE | 25 ITEMS

Q:Which of the following is permitted when using an unclassified laptop within a collateral classified space?-government-issued wired headset with a microphone-a government-issued wireless headset without a microphone Q:Terry sees a post on her social media feed that says there is smoking billowing from the pentagon. the post includes a video that shows smoke billowing from a building that is not readily identifiable as the Pentagon. Terry Is not familiar with the source of the post. which of the following describes what Terry has likely seen?This is probably a post designed to attract Terry's attention to click on a link and steal her information

Q:Which of the following contributes to your online identity?

all of these Q:After a classified document is leaked online, it makes national headlines. Which of the following statements is true of the leaked information that is now accessible by the public?You should still treat it as classified even though it has been compromised.

Q:which of the following is true of working with Sensitive Compartmented

Information Facilities (SCIF)?A designated individual is responsible for securing the entrance and exit points

Q:Where are you permitted to use classified data?

only in areas with security appropriate to the classification level

Q:Which of the following is true of transmitting or transporting Sensitive

Compartmented Information (SCI)?Printed SCI must be retrieved promptly from the printer

Q:What does the common access card (CAC) contain?

Certificates for identification, encryption, and digital signature.

Q:Which of the following uses of removable media is appropriate?

Encrypting data stored on removable media

Q:How should government owned removal of media be stored?

in a GSA-approved Container according to the appropriate security classification

Q:Which of the following is NOT a best practice for protecting data on mobile

devices?Disabling automatic screen locking after a period of inactivity

Q:You receive a text message from a package shipper notifying you that your

package delivery is delayed due to a needing update delivery instructions from you. it provides a shortened link for you to provide the needed information. you are not expecting a package. What is the best course of action?delete the message

Q:Which of the following is a best practice for managing connection requests on

social networking sites?validate connection requests through another source if possible Q:Which of the following is true of sensitive compartmented information facilities

(SCIF)?

Personnel with access to SCIF have a need-to-know for all information processed within the SCIF

Q:which of the following is an allowed use of government furnished equipment?

checking personal email if your organization allows it

Q:Which of the following is the best practice when browsing the internet?

looking for H-T-T-P in the URL Q:Tom is working on a report that contains employees' names, home addresses, and salary. Which of the following is Tom prohibited from doing with the report?Emailing it to a colleague who needs to provide missing data

Q:What is the goal of an Insider threat program?

Deter, detect, and mitigate the risk associated with Insider threats Q:Which of the following is not a best practice for teleworking in an environment where Internet of Things (IoT) devices are present?use the devices' default security settings Q:When receiving a phone call offering a $50 gift card if you participate in a survey.Which course of action should you take?Decline to participate in the survey. this may be a social engineering attempt.

Q:Which of the following is a best practice to protect your identity?

ordering a credit report annually

Q:Which of these is not a potential indicator that your device may be under

malicious code attack?A notification for a system update that has been publicized Q:You receive an e-mail with a link to schedule a time to update software on your government furnished laptop. Your IT department has not scheduled software updates like this in the past and has not announced this software update. The e- mail is not digitally signed. What action should you take?report the e-mail to your security POC or help desk

Q:How can you protect your home computer?

Turn on the password feature

Q:Which of the following personally owned peripherals can you use with

government furnished equipment (GFE)?a monitor connected via USB

Download Study Material

Buy This Study Material

$11.99
Buy Now
  • Immediate download after payment
  • Available in the pdf format
  • 100% satisfaction guarantee

Study Material Information

Category: Test Prep
Description:

CYBER AWARENESS 2024 EDITION FLASHCARDS EXAM PREPARATION GUIDE | 25 ITEMS Q:Which of the following is permitted when using an unclassified laptop within a collateral classified space? -government-i...

UNLOCK ACCESS $11.99