• wonderlic tests
  • EXAM REVIEW
  • NCCCO Examination
  • Summary
  • Class notes
  • QUESTIONS & ANSWERS
  • NCLEX EXAM
  • Exam (elaborations)
  • Study guide
  • Latest nclex materials
  • HESI EXAMS
  • EXAMS AND CERTIFICATIONS
  • HESI ENTRANCE EXAM
  • ATI EXAM
  • NR AND NUR Exams
  • Gizmos
  • PORTAGE LEARNING
  • Ihuman Case Study
  • LETRS
  • NURS EXAM
  • NSG Exam
  • Testbanks
  • Vsim
  • Latest WGU
  • AQA PAPERS AND MARK SCHEME
  • DMV
  • WGU EXAM
  • exam bundles
  • Study Material
  • Study Notes
  • Test Prep

CYBER AWARENESS CHALLENGE 2020

Summary Jan 8, 2026
Preview Mode - Purchase to view full document
Loading...

Loading study material viewer...

Page 0 of 0

Document Text

CYBER AWARENESS CHALLENGE 2020

KNOWLEDGE CHECK FLASHCARDS

EXAM PREPARATION GUIDE | 28 ITEMS

Q:What organization issues the directives concerning the dissemination of

information regarding intelligence sources, methods, or activities?The Director of National Intelligence.

Q:What is a valid response when identity theft occurs?

Report the crime to local law enforcement.

Q:which of the following practices reduces the chance of becoming a target by

adversaries seeking information?Don't talk about work outside your workspace unless it is a specifically designated public meeting environment and is controlled by the event planners.

Q:Which is a risk associated with removable media?

Spillage of classified information.

Q:which represents a security best practice when using social networking?

Understanding and using all available privacy settings.Q:Which is a wireless technology that enables your electronic devices to establish communications and exchange information when placed next to each other called?Near field communication (NFC).Q:When is the best time to post details of your vacation activities on your social networking website?When your vacation is over, and you have returned home.

Q:What is required for an individual to access classified data?

Appropriate clearance; signed and approved non-disclosure agreement; and need-to-know

Q:Which may be a security issue with compressed URLs?

They may be used to mask malicious intent.

Q:What is the best example of Protected Health information (PHI)?

Your health insurance explanation of benefits (EOB).

Q:What can malicious code do?

it can cause damage by corrupting files, erasing your hard drive, and/or allowing hackers access.

Q:Whats is the best description of two-factor authentication?

Something you possess, like a CAC, and something you know, like a PIN or password.

Q:Which of the following is a good practice to aid in preventing spillage?

Be aware of classification markings and all handling caveats.

Q:Under what circumstances is it acceptable to use your Government-furnished

computer to check personal e-mail and do other non-work related activities?If allowed by organizational policy.

Q:What is a good practice for physical security?

Challenge people without proper badges.

Q:What is a good practice to protect data on your home wireless systems?

Ensure that the wireless security features are properly configured.Q:Which is a rule for removable media, other portable electronic devices (PEDs), and mobile computing devices to protect Government systems?Do not use any personally owned/non-organizational removable media on your organization's systems.

Q:What is a good practice when it is necessary to use a password to access a system or an application?Avoid using the same password between systems or applications.Q:Upon connecting your Government-issued laptop to a public wireless connection, what should you immediately do?Connect to the Government Virtual Private Network (VPN).Q:Why might "insiders' be able to cause damage to their organizations more easily than others?Insiders are given a level of trust and have authorized access to government information systems.

Q:What helps protect from spear phishing?

Be wary of suspicious e-mails that use your name and/or appear to come from inside your organization.

Q:What must you do when e-mailing Personally Identifiable Information (PII) or

Protected Health Information (PHI)?Encrypt the e-mail and use your Government e-mail account.

Q:What is whaling?

A type of phishing targeted at high-end personnel such as senior officials.

Q:Which scenario might indicate a reportable insider threat security incident?

A coworker is observed using a personal electronic device in an area where their use is prohibited.

Q:When classified data is not in use, how can you protect it?

store classified data appropriately in a GSA- approved vault/container when not in use.

Q:What is the best response if you find classified government data on the internet?Note any identifying information, such as the website's URL, and report the situation to your security POC.Q:Under what circumstances could unclassified information be considered a threat to national security?If aggregated, the information could become classified.

Q:What are the requirements to be granted access to SCI material?

The proper security clearance and indoctrination into the SCI program.

Download Study Material

Buy This Study Material

$11.99
Buy Now
  • Immediate download after payment
  • Available in the pdf format
  • 100% satisfaction guarantee

Study Material Information

Category: Summary
Description:

CYBER AWARENESS CHALLENGE 2020 KNOWLEDGE CHECK FLASHCARDS EXAM PREPARATION GUIDE | 28 ITEMS Q:What organization issues the directives concerning the dissemination of information regarding intellige...

UNLOCK ACCESS $11.99