• wonderlic tests
  • EXAM REVIEW
  • NCCCO Examination
  • Summary
  • Class notes
  • QUESTIONS & ANSWERS
  • NCLEX EXAM
  • Exam (elaborations)
  • Study guide
  • Latest nclex materials
  • HESI EXAMS
  • EXAMS AND CERTIFICATIONS
  • HESI ENTRANCE EXAM
  • ATI EXAM
  • NR AND NUR Exams
  • Gizmos
  • PORTAGE LEARNING
  • Ihuman Case Study
  • LETRS
  • NURS EXAM
  • NSG Exam
  • Testbanks
  • Vsim
  • Latest WGU
  • AQA PAPERS AND MARK SCHEME
  • DMV
  • WGU EXAM
  • exam bundles
  • Study Material
  • Study Notes
  • Test Prep

CYBER AWARENESS 2025 FLASHCARDS

Class notes Jan 8, 2026
Preview Mode - Purchase to view full document
Loading...

Loading study material viewer...

Page 0 of 0

Document Text

CYBER AWARENESS 2025 FLASHCARDS

EXAM PREPARATION GUIDE | 23 ITEMS

Q:An authorized Goverment-owned Portable Electronic Device (PED)

As you scroll through your social media feed, a news headline catches your eye. What should you consider before sharing it with your connections?

Q:Report the e-mail to your security POC or help desk.

Which of the following is an allowed use of government furnished equipment (GFE)?

Q:Which of the following is true of transmitting or transporting Sensitive

Compartmented Information (SCI)?You must be courier-briefed for SCI to transport it.

Q:Whether the source is credible and reliable.

How can you prevent viruses and malicious code?Q:Badges must be worn while in the facility and removed when leaving the facility.Which of the following is an example of removable media?

Q:Connect to your Government private network (VPN)

Which of the following is permitted within a Sensitive Compartmented Information Facility

(SCIF)?

Q:Report suspicious activity.

Which of the following is true of working within a Sensitive Compartmented Information Facility (SCIF)?

Q:When linked to a specific individual, which of the following is NOT an example of Personally Identifiable Information (PII)?Smartphone brand and model

Q:How can you protect yourself from identity theft?

Review your credit report annually.

Q:How can you protect a mobile device while traveling?

Connect with a Government VPN.

Q:E-mailing your supervisor

John receives an e-mail about a potential shutdown of a major social service unless a petition receives enough signatures. Which of the following actions should John NOT take with the e-mail?

Q:How can you protect your home computer?

Use legitimate, known antivirus software.

Q:Which type of data could reasonably be expected to cause damage to national

security?Confidential

Q:Using a digital signature when sending hyperlinks

Which of the following is a best practice for physical security?Q:Which of the following is an appropriate use of a DoD Public Key Infrastructure (PKI) token?Only leave it in a system while actively using it for a PKI-required task.

Q:Scan all e-mail attachments

Which of the following is an allowed use of government furnished equipment (GFE)?

Q:How can you protect yourself on social networking sites?

Validate connection requests through another source if possible.

Q:Forward it

Which of the following is an appropriate use of government e-mail?

Q:Which of the following statements about Protected Health Information (PHI) is

true?It is the health information that identifies the individual

Q:equipment (GFE)?E-mailing your supervisorBased on the description provided,

how many insider threat indicators are present? Edward has worked for the DoD agency for 2 years. He is an analyst who takes a great deal of interest in his work.He occasionally takes a somewhat aggressive interest in others' work as well, including asking for classified details of their projects. He otherwise gets along well with his colleagues.3

Q:A wired keyboard connected via USB

Which of the following is a best practice for protecting your home wireless network for telework or remote work?Q:Which of the following would work in combination for two-factor authentication?Which of the following is a way to protect classified data?

Q:Which of the following is true of spillage?

You receive an e-mail with a link to run an anti-virus scan. Your IT department has not sent links like this in the past. The e-mail is not digitally signed. What action should you take?

CONFIDENTIAL EXAM MATERIAL | Page 3

Download Study Material

Buy This Study Material

$11.99
Buy Now
  • Immediate download after payment
  • Available in the pdf format
  • 100% satisfaction guarantee

Study Material Information

Category: Class notes
Description:

CYBER AWARENESS 2025 FLASHCARDS EXAM PREPARATION GUIDE | 23 ITEMS Q:An authorized Goverment-owned Portable Electronic Device (PED) As you scroll through your social media feed, a news headline catc...

UNLOCK ACCESS $11.99