• wonderlic tests
  • EXAM REVIEW
  • NCCCO Examination
  • Summary
  • Class notes
  • QUESTIONS & ANSWERS
  • NCLEX EXAM
  • Exam (elaborations)
  • Study guide
  • Latest nclex materials
  • HESI EXAMS
  • EXAMS AND CERTIFICATIONS
  • HESI ENTRANCE EXAM
  • ATI EXAM
  • NR AND NUR Exams
  • Gizmos
  • PORTAGE LEARNING
  • Ihuman Case Study
  • LETRS
  • NURS EXAM
  • NSG Exam
  • Testbanks
  • Vsim
  • Latest WGU
  • AQA PAPERS AND MARK SCHEME
  • DMV
  • WGU EXAM
  • exam bundles
  • Study Material
  • Study Notes
  • Test Prep

CYBER AWARENESS 2024 FLASHCARDS

Test Prep Jan 8, 2026
Preview Mode - Purchase to view full document
Loading...

Loading study material viewer...

Page 0 of 0

Document Text

CYBER AWARENESS 2024 FLASHCARDS

EXAM PREPARATION GUIDE | 49 ITEMS

Q:Based on the description provided, how many insider threat indicators are

present? Edward has worked for a DoD agency for 2 years. He is an analyst who takes a great deal of interest in his work. He occasionally takes a somewhat aggressive interest in others' work as well, including asking for classified details of their projects. He otherwise gets along well with his colleagues 1

Q:Which of the following is an example of behavior that you should report?

Taking sensitive information home for telework without authorization

Q:What is the goal of an Insider Threat Program?

Deter, detect, and mitigate the risks associated with insider threats

Q:Which of the following is true of compressed URLs (e.g., TinyURL, goo.gl)?

They may be used to mask malicious intent.

Q:Which of the following is NOT a best practice for protecting data on a mobile

device?Disable automatic screen locking after a period of inactivity

Q:Which of the following is true of Controlled Unclassified Information (CUI)?

It belongs to a defined category established in the DoD CUI Registry.

Q:Which of the following is NOT an appropriate use of your Common Access Card

(CAC)?

Using it as photo identification with a commercial entity

Q:You receive an e-mail with a link to run an anti-virus scan. Your IT department has not sent links like this in the past. The e-mail is not digitally signed. What action should you take?Report the e-mail to your security POC or help desk.

Q:How can you protect a mobile device while traveling?

Store the device in a hotel safe when sightseeing

Q:Which of the following is true of transmitting or transporting Sensitive

Compartmented Information (SCI)?You must be courier-briefed for SCI to transport it.

Q:Which of the following is true of spillage?

It can be either inadvertent or intentional.

Q:You receive a text message from a package shipper notifying you that your

package delivery is delayed due to needing updated delivery instructions from you. It provides a shortened link for you to provide the needed information. You are not expecting a package. What is the best course of action?Delete the message

Q:Which of the following is a best practice to protect your identity?

Ask how information will be used before giving it out

Q:Which of these is NOT a potential indicator that your device may be under a

malicious code attack?A notification for a system update that has been publicized

Q:How should government owned removable media be stored?

In a GSA-approved container according to the appropriate security classification

Q:Which of the following is a best practice for telework and remote work?

Connect to your Government Virtual Private Network (VPN)

Q:Which of the following is NOT an appropriate use of your Common Access Card

(CAC)?

Exchanging it for a visitor pass in another building

Q:Which of the following personally owned peripherals can you use with

government furnished equipment (GFE)?A wired keyboard connected via USB

Q:Which of the following is an example of a strong password?

d+Uf_4RimUz Q:Sylvia commutes to work via public transportation. She often uses the time to get a head start on work by making phone calls or responding to e-mails on her government approved mobile device. Does this pose a security concern?Yes. Eavesdroppers may be listening to Sylvia's phone calls, and shoulder surfers may be looking at her screen. Sylvia should be aware of these risks.

Q:How can you prevent viruses and malicious code?

Scan all external files before uploading to your computer

Q:Matt is a government employee who needs to share a dcoument containing source

selection data with his supervisor. Which of the following describes the most appropriate way for Matt to do this?Encrypt it and send it via digitally singed government e-mail.Q:When allowed, which of the following is an appropriate use of removable media?Labeling media that contains personally identifiable information (PII)

Q:How can you mitigate the potential risk associated with a compressed URL (e.g., TinyURL, goo.gl)?Use the preview function to see where the link actually leads

Q:Which of the following statements about Protected Health Information (PHI) is

false?It is a type of Controlled Unclassified Information (CUI)

Q:What conditions are necessary to be granted access to Sensitive Compartmented

Information (SCI)?The appropriate level of security clearance eligibility and a need-to-know Q:Which of the following is permitted when using an unclassified laptop within a collateral classified space?A personally-owned wired headset without a microphone

Q:Which of the following is a best practice for protecting your home wireless

network for telework or remote work?Implement, as a minimum, Wi-Fi Protected Access 2 (WPA2) Personal encryption

Q:What does the Common Access Card (CAC) contain?

Certificates for identification, encryption, and digital signature

Q:Which of the following statements is true of DoD Unclassified data?

It may require access and distribution controls.

Q:Which of the following describes Sensitive Compartmented Information?

SCI introduces an overlay of security to Top Secret, Secret, and Confidential information.

Q:Which of the following is an appropriate use of government e-mail?

Using a digital signature when sending hyperlinks

Download Study Material

Buy This Study Material

$11.99
Buy Now
  • Immediate download after payment
  • Available in the pdf format
  • 100% satisfaction guarantee

Study Material Information

Category: Test Prep
Description:

CYBER AWARENESS 2024 FLASHCARDS EXAM PREPARATION GUIDE | 49 ITEMS Q:Based on the description provided, how many insider threat indicators are present? Edward has worked for a DoD agency for 2 years...

UNLOCK ACCESS $11.99