• wonderlic tests
  • EXAM REVIEW
  • NCCCO Examination
  • Summary
  • Class notes
  • QUESTIONS & ANSWERS
  • NCLEX EXAM
  • Exam (elaborations)
  • Study guide
  • Latest nclex materials
  • HESI EXAMS
  • EXAMS AND CERTIFICATIONS
  • HESI ENTRANCE EXAM
  • ATI EXAM
  • NR AND NUR Exams
  • Gizmos
  • PORTAGE LEARNING
  • Ihuman Case Study
  • LETRS
  • NURS EXAM
  • NSG Exam
  • Testbanks
  • Vsim
  • Latest WGU
  • AQA PAPERS AND MARK SCHEME
  • DMV
  • WGU EXAM
  • exam bundles
  • Study Material
  • Study Notes
  • Test Prep

CYBER AWARENESS CHALLENGE 2023

Class notes Jan 8, 2026
Preview Mode - Purchase to view full document
Loading...

Loading study material viewer...

Page 0 of 0

Document Text

CYBER AWARENESS CHALLENGE 2023

(ARMY FIRE) (FORT GORDON) FLASHCARDS

EXAM PREPARATION GUIDE | 31 ITEMS

Q:Uncontrolled Unclassified Information/ Identity Management - What is true

about a Common Access Card (CAC)?You should remove and take your CAC/PIV card whenever you leave your workstation.(verified)

Q:Uncontrolled Unclassified Information/ Sensitive Compartmented Information -

What must authorized personnel do before permitting another individual to enter a Sensitive Compartmented Information Facility (SCIF)?Confirm the individual's need-to-know and access. (verified)

Q:Spillage - Which of the following may help prevent spillage?

Follow procedures for transferring data to...

Q:Uncontrolled Unclassified Information/ identity Management - Which of the

following is true of using a DoD Public Key Infrastructure (PKI) token?It should only be in a system while actively using it for a PKI-required task. (verified)

Q:Malicious Code - Which of the following is a way to prevent the spread of

malicious code?Scan all external files before uploading to your computer. (verified)

Q:Uncontrolled Unclassified Information/ Removable media - Which of the

following is true of portable electronic devices (PEDs) in a Sensitive Compartmented Information Facility (SCIF)?only connect government-owned PEDs to the same level classification information system when authorized. (verified)

Q:Malicious Code/ home computer security - Which is best practice for securing

your home computer?

  • install system security patches. 2. Create separate accounts for each user. (verified)

Q:Uncontrolled Unclassified Information/ Sensitive Compartmented Information -

Which of the following is true of Sensitive Compartmented Information (SCI)?Access requires Top Secret clearance and indoctrination into the SCI program. (verified) Q:Spillage/social media - Which of the following is a security best practice when using social networking sites?Avoid posting your mother's maiden name. (verified) Q:Malicious Code/ websites - Which of the following statements is true of cookies?By accepting cookies..... (incorrect) Q:Uncontrolled Unclassified Information - Which of the following is true of CUI?CUI must be handled using safeguarding or dissemination controls? (verified) Q:Spillage/Insider threat - Which of the following is a potential insider threat indicator?Difficult circumstances; death of a spouse. (verified)

Q:Spillage/Insider threat - How many potential insider threat indicators are

displayed? VIDEO GAMES, SOCIAL MEDIA and forget to secure smartphone?

  • indicator (verified)
  • Q:Spillage/Classified Data - Which of the following is a good practice to protect classified information?Store classified data appropriately in a GSA-approved vault/container.

Q:Spillage/social media - How can you protect your organization on social

networking sites?Ensure there are no identifiable landmarks visible in any photos....(verified)

Q:Uncontrolled Unclassified Information/ Physical Security - Which of the following best describes good physical security?Lionel stops an individual in his secure area....(verified) Q:Spillage - You find information that you know to be classified on the internet.What should you do?Note the website's URL and report the situation to your security point of contact.Q:Malicious Code/ Mobile Devices - Which of the following is a best practice for using removable media?Avoid inserting removable media with unknown content into your computer. (verified)

Q:Malicious Code/ Mobile devices Which is an example of removable media?

external hard drive (verified) Q:Spillage/Classified Data - What level of damage can the unauthorized disclosure of information classified as TOP SECURITY reasonably be expect to cause?Exceptionally grave... (verified)

Q:Uncontrolled Unclassified Information - Which designation includes PII and

PHI?CUI (verified)

Q:Spillage - Which of the following is a good practice to prevent spillage?

Always check to make sure you are using the correct network for the level of data.Q:Spillage/Insider threat -Which of the following is a reportable insider threat activity?Attempting to access sensitive info without a need-to-know. (verified)

Q:Malicious Code/ social engineering - How can you protect yourself form social

engineering?Verify the identity of all individuals. (verified)

Q:Malicious Code/ social engineering - Which of the following describes an

appropriate use of Government email?Use digital signature when sending attachments of hyperlinks. (verified)

Q:Malicious Code/ travel - What risk does a public Wi-Fi connection pose?

It may expose the information sent to theft. (verified)

Q:Malicious Code/ use of GFE - Which of the following personally-owned computer

peripherals is permitted for use with Government-furnished equipment?A headset with a microphone through a Universal Serial Bus (USB) port. (verified) Q:Spillage/social media - A trusted friend in your social network post a link to vaccine info on a website unknown to you. What action should you take?Research the source to evaluate its credibility and reliability. (verified)

Q:Uncontrolled Unclassified Information - Which of the following is true of

Protected Health Information (PHI)?It is created or received by a healthcare provider, health plan or employer. (verified)

Q:Malicious Code/ social engineering -

A claim that you must update or validate information. (verified)

Q:Spillage/Classified Data - What is the basis for the handling and storage of

classified data?Classification markings and handling caveats.

Download Study Material

Buy This Study Material

$11.99
Buy Now
  • Immediate download after payment
  • Available in the pdf format
  • 100% satisfaction guarantee

Study Material Information

Category: Class notes
Description:

CYBER AWARENESS CHALLENGE 2023 (ARMY FIRE) (FORT GORDON) FLASHCARDS EXAM PREPARATION GUIDE | 31 ITEMS Q:Uncontrolled Unclassified Information/ Identity Management - What is true about a Common Acce...

UNLOCK ACCESS $11.99