• wonderlic tests
  • EXAM REVIEW
  • NCCCO Examination
  • Summary
  • Class notes
  • QUESTIONS & ANSWERS
  • NCLEX EXAM
  • Exam (elaborations)
  • Study guide
  • Latest nclex materials
  • HESI EXAMS
  • EXAMS AND CERTIFICATIONS
  • HESI ENTRANCE EXAM
  • ATI EXAM
  • NR AND NUR Exams
  • Gizmos
  • PORTAGE LEARNING
  • Ihuman Case Study
  • LETRS
  • NURS EXAM
  • NSG Exam
  • Testbanks
  • Vsim
  • Latest WGU
  • AQA PAPERS AND MARK SCHEME
  • DMV
  • WGU EXAM
  • exam bundles
  • Study Material
  • Study Notes
  • Test Prep

CYBER AWARENESS ARMY 2025

Class notes Jan 8, 2026
Preview Mode - Purchase to view full document
Loading...

Loading study material viewer...

Page 0 of 0

Document Text

CYBER AWARENESS ARMY 2025

FLASHCARDS

EXAM PREPARATION GUIDE | 20 ITEMS

Q:Which of these is NOT a potential indicator that your device may be under

amaliciouy code attack?Loss of control of the mouse or keyboard Astrange PoP-UP during system startup The device slows down An operating system update An operating system update Q:Which of the following is permitted when using an unclassified laptop within a collateral classified space?A Government-issued wireless headset with a microphone?Amicrophone embedded in theA Government-issued wireless headset without microphone A personally-owned wired headset without microphone A personally-owned wired headset without microphone

Q:Employee Passport Number Adams, Jeff A12345678 Brown, Marty B23456789

Clark, Tina C34567890When e-mailing this personnel roster, which of the following should you do? Encrypt the PlI Digitally sign the e-mail Use your Government e-mail account ALL

Q:Which of the following is a best practice for protecting your home wireless

networkfor telework or remote work?? Turn off al other devices that connect to your router while working? Use your router's pre-set Service Set identifier (SSID) and password Implement, a5 a minimum, Wi-Fi Protected Access 2 (WPA2) Personal encryption Open access to your network to all devices Implement, as a minimum, Wi-Fi Protected Access 2 (WPA2) Personal encryption.

Q:Which of the following is an allowed use of government furnished

equipment(GFE)?? Conducting ransactions on your side businessE-mailing your supervisorViewing family photos from your shared DropBox Lending it to your spouse to watch a movie E-mailing your supervisor Q:Personnel should physically assess whether everyone within listening distance has need-to-know before starting conversations involving classified information Which of the following is NOT an appropriate use of. your Common Access CardReporting it immediately if lost or misplaced E D C e Exchanging it for visitor pass in another building m

Using On Systems with up-to- date security E Storing it in a: shielded sleeve

Q:Exchanging it for a visitor pass in another building

Your meeting notes are Unclassified. This means that your notes: May be released to the public. Do not have the potential to damage national security. Do not have the potential to affect the safety of personnel, missions, or systems, Do not require any markings.Help Me

Q:All of these

When is the safest time to post on social media about your work-related travel?After the trip?During the trijpBefore the trip Q:How can you protect data on a mobile device?? Store your data on a com mercial doud application ? Use two-factor authentication Disable automatic screen locking after a period of inactivity Turn over your device a5 requested by Buthority figures Use two-factor authentication

Q:How can you prevent viruses and malicious code??View e-mail using the Preview

Pane rather than opening it? Scan all e-mail attachments? Allow mobile code to run on all websites? E-mail infected files to your security POC Scan all e-mail attachments

Q:do not have the potential to damage national security

CUI

Q:Which of the following uses of removable media is allowed?? Nickgy uses

Undlassified government owned removable media to transfer work files to a personal laptop.? Sam uses approved Government owned removable media to transfer files between government systems as authorized.? Cameron connects a personal phone to an Unclassified government laptop to charge.?Alex uses personally owned removable media on an Unclassified government laptop to transfer personal music files Sam uses approved Government owned removable media to transfer files between government systems as authorized.

Q:Which of the following is permitted within a Sensitive Compartmented

Information Facility (SCIF)?A Govemment-issued smartphone D An authorized Government-owned Portable Electronic Device (PED) # A Government-issued laptop with Wi-fi capability fe A Bluetooth medical device, such as glucose monitor An authorized Government-owned Portable Electronic Device (PED).

Q:Which of the following can be used to catalogue information about you?Social

networking sites? Audio-enabled digital assistants (e.g., Siri, Alexa)? Fitness trackers? All of these All of these Q:Adam sees a coworker who does not have the reguired clearance with a printed ?document marked as Sensitive Compartmented Information (SCI). What should he do?? Nothing. It is mot his responsibility, Retrieve the document and verify that the coworker did not read it. Contact his security POC to report the incident.D E-mail his security POC with detailed information about the information and person involved.Which of the following poses a security risk while teleworking in an environment where Internet of Things (loT) devices are present?Voice. enabled listening and recording S Default loT device passwordsUnknown devices connected via BluetoothAll of these

Q:Which of the following is a best practice when browsing the Internet?? Set your browser to Bccept all cookies E Confirm that the site uses an unencrypted link Save your cedit crd information or. e-commerce sites ? Look forh-ttp-s in the URL name Look for https in the URL name

Q:After the trip.

Which of the following is true of transmitting or transporting Sensitive Compartmented Information (SCI)?You must be courier-briefed for 5CI to transport it. ? SC does not require a covers heet in an open storage environment. You may only transmit SCI via certified mail.You must never print SCl

Q:As you browse a social media site, you come across photos of information with

classification markings. What should you do?? Notify your security point of contact? Download the information to your computer.? You may forward the URL to the information to interested parties.? You are authorized to respond to inquiries about it.Notify your security point of contact Q:Which of the following is true of removable media and portable electronic devices (PEDs)?The risks associated with them may lead to loss of life. Removable media pose more risks than PEDs and are not permitted in governmentfacilities.Their utility Outweighs any risk associated with them. D They cannot be adequately secured, So they are prohibited by the DoD.The risks associated with them may lead to loss of life

Q:You must be courier-briefed for SCI to transport it

Which of the following is true of Sensitiye Compartmented Information Facilities(SCIFs)?Phone conversations within a SCIF are inherently secure and require no further protection. 6 D Personnel should physically assess whether everyone within listening distance has need-to-know before starting conversations involving classified information.SCIFS are not Permitted to be constructed with windows unless fixred unalterable window coverings are in place. ? Due to the physical security measures in place within a SCIF, open storage is allowed.

Download Study Material

Buy This Study Material

$11.99
Buy Now
  • Immediate download after payment
  • Available in the pdf format
  • 100% satisfaction guarantee

Study Material Information

Category: Class notes
Description:

CYBER AWARENESS ARMY 2025 FLASHCARDS EXAM PREPARATION GUIDE | 20 ITEMS Q:Which of these is NOT a potential indicator that your device may be under amaliciouy code attack?Loss of control of the mous...

UNLOCK ACCESS $11.99