• wonderlic tests
  • EXAM REVIEW
  • NCCCO Examination
  • Summary
  • Class notes
  • QUESTIONS & ANSWERS
  • NCLEX EXAM
  • Exam (elaborations)
  • Study guide
  • Latest nclex materials
  • HESI EXAMS
  • EXAMS AND CERTIFICATIONS
  • HESI ENTRANCE EXAM
  • ATI EXAM
  • NR AND NUR Exams
  • Gizmos
  • PORTAGE LEARNING
  • Ihuman Case Study
  • LETRS
  • NURS EXAM
  • NSG Exam
  • Testbanks
  • Vsim
  • Latest WGU
  • AQA PAPERS AND MARK SCHEME
  • DMV
  • WGU EXAM
  • exam bundles
  • Study Material
  • Study Notes
  • Test Prep

CYBER AWARENESS CHALLENGE 2023

Class notes Jan 8, 2026
Preview Mode - Purchase to view full document
Loading...

Loading study material viewer...

Page 0 of 0

Document Text

CYBER AWARENESS CHALLENGE 2023

(KNOWLEDGE CHECK) FLASHCARDS

EXAM PREPARATION GUIDE | 32 ITEMS

Q:IDENTITY MANAGEMENT: Which of the following is true of using a DoD PKI token?It should only be in a system while actively using it for a PKI-required task Q:WEBSITE USE: Which of the following actions can help to protect your identity?Shred personal documents Q:MALICIOUS CODE: Which of the following is NOT a type of malicious code?Executables Q:INSIDER THREAT: Which of the following is a potential insider threat indicator?Interest in learning a foreign language (maybe) Q:CLASSIFIED DATA: What level of damage can the unauthorized disclosure of information classified as Top Secret reasonably be expected to cause?exceptionally grave damage Q:MOBILE DEVICES: Which of the following best describes the conditions under which mobile devices and applications can track your location?It may occur at any time without your knowledge or consent.Q:PHYSICAL SECURITY: Which of the following best describes good physical security?Lionel stops an individual in his secure area who is not wearing a badge

Q:**Insider ThreatBased on the description that follows, how many potential

insider threat indicator(s) are displayed? A colleague saves money for an overseas vacation every year, is a single father, and occasionally consumes alcohol.

  • (maybe)
  • Q:SENSITIVE COMPARTMENTED INFORMATION: Which of the following is true of transmitting sensitive compartmented information (SCI)?You many only transport SCI if you have been courier-briefed for SCI.Q:SOCIAL ENGINEERING: How can you protect yourself from social engineering?Verify the identity of all individuals.Q:CLASSIFIED DATA: Which of the following is a good practice for telework?use VPN Q:CUI: Which of the following best describes a way to safely transmit Controlled Unclassified Information (CUI)?

    TBD Q:USE OF GFE: Which of the following is NOT a permitted way to connect a personally-owned monitor to your GFE?

    USB Q:SPILLAGE: Which of the following may help to prevent spillage?Follow procedures for transferring data to and from outside agency and non-government networks.Q:SOCIAL NETWORKING: Which of the following statements is true?Many apps and smart devices collect and share your personal information and contribute to your online identity

Q:SOCIAL NETWORKING: Which of the following is a security best practice when using social networking sites?Avoiding posting your mother's maiden name Q:TRAVEL: What security risk does a public Wi-Fi connection pose?It may prohibit the use of a VPN (NOPE), It may expose the information sent to theft (??), Q:SOCIAL NETWORKING: Which of the following statements is true?Adversaries exploit social networking sites to disseminate fake news.Q:HOME COMPUTER SECURITY: How should you secure your home wireless network for teleworking?Implement Wi-Fi Protected Access 2 (WPA2) Personal encryption at a minimum.Q:SPILLAGE: Which of the following is a good practice to prevent spillage?

TBD Q:SPILLAGE: You receive an inquiry from a reporter about government information not cleared for public release. How should you respond?Refer to PA Q:REMOVABLE MEDIA IN A SCIF: Which of the following is true of portable electronic devices (PEDs) in a Sensitive Compartmented Information Facility

(SCIF)?

All personal and government-owned PEDs are prohibited in a SCIF (NOPE), only authorized govt PEDS (??) Q:SOCIAL ENGINEERING: What action should you take with a compressed Uniform Resource Locator (URL) on a website known to you?investigate the destination by using the preview feature to see where the link goes

Q:CLASSIFIED DATA: Who designates whether information is classified and its classification level?Original classification authority (??) Q:MOBILE DEVICES: How can you protect data on your mobile computing and portable electronic devices (PEDs)?Enable automatic screen locking after a period of inactivity.Q:INSIDER THREAT: What is an insider threat?Someone who uses authorized access, wittingly or unwittingly, to harm...... (maybe) Q:CUI: Which of the following is true of Protected Health Information (PHI)?

TBD Q:CUI: Which designation includes PII and PHI?Sensitive information Q:IDENTITY MANAGEMENT: Which of the following is true of the CAC or PIV card?You should remove and take your CAC/PIV card whenever you leave your workstation Q:SPILLAGE: You find information that you know to be classified on the Internet.What should you do?Note the website's URL and report the situation to your security point of contact Q:SOCIAL ENGINEERING: what is a common indicator of a phishing attempt?a claim that you must update or validate information Q:SENSITIVE COMPARTMENTED INFORMATION: Which of the following is true of Sensitive Compartmented Information (SCI)?Access requires Top Secret clearance and indoctrination into the SCI program.

Download Study Material

Buy This Study Material

$11.99
Buy Now
  • Immediate download after payment
  • Available in the pdf format
  • 100% satisfaction guarantee

Study Material Information

Category: Class notes
Description:

CYBER AWARENESS CHALLENGE 2023 (KNOWLEDGE CHECK) FLASHCARDS EXAM PREPARATION GUIDE | 32 ITEMS Q:IDENTITY MANAGEMENT: Which of the following is true of using a DoD PKI token? It should only be in a ...

UNLOCK ACCESS $11.99