• wonderlic tests
  • EXAM REVIEW
  • NCCCO Examination
  • Summary
  • Class notes
  • QUESTIONS & ANSWERS
  • NCLEX EXAM
  • Exam (elaborations)
  • Study guide
  • Latest nclex materials
  • HESI EXAMS
  • EXAMS AND CERTIFICATIONS
  • HESI ENTRANCE EXAM
  • ATI EXAM
  • NR AND NUR Exams
  • Gizmos
  • PORTAGE LEARNING
  • Ihuman Case Study
  • LETRS
  • NURS EXAM
  • NSG Exam
  • Testbanks
  • Vsim
  • Latest WGU
  • AQA PAPERS AND MARK SCHEME
  • DMV
  • WGU EXAM
  • exam bundles
  • Study Material
  • Study Notes
  • Test Prep

CYBER AWARENESS CHALLENGE 2024

Summary Jan 8, 2026
Preview Mode - Purchase to view full document
Loading...

Loading study material viewer...

Page 0 of 0

Document Text

CYBER AWARENESS CHALLENGE 2024

KNOWLEDGE TEST FLASHCARDS

EXAM PREPARATION GUIDE | 25 ITEMS

Q:Which of the following is a risk associated with removable media?

All of these

Q:Which of the following is true of telework?

You must have permission from your organization to telework.

Q:Which of the following is an example of behavior that you should report?

Taking sensitive information home for telework without authorization.

Q:On your home computer, how can you best establish passwords when creating

separate user accounts?Have each user create their own, strong password.

Q:Annabeth becomes aware that a conversation with a co-worker that involved

Sensitive Compartmented Information (SCI) may have been overheard by someone who does not have the required clearance. What action should Annabeth take?Contact her security POC with detailed information about the incident.

Q:Which of the following is NOT a best practice for travelling overseas with a

mobile device?Do not travel with a mobile device if you can avoid it.

Q:Which of the following is a best practice when browsing the internet?

Only accept cookies from reputable, trusted websites.

Q:Which of the following contributes to your online identity?

All of these.

Q:Which of the following is NOT a way that malicious code can spread?

Running a virus scan

Q:Where are you permitted to use classified data?

Only in areas with security appropriate to the classification level.Q:Sylvia commutes to work via public transportation. She often uses the time to get a head start on work by making phone calls or responding to e-mails on her government approved mobile device. Does this pose a security concern?No, because Sylvia is using a government approved device.

Q:Which of the following is an example of a strong password?

d+Uf_4RimUz Q:Tom is working on a report that contains employees' names, home addresses, and salary. Which of the following is Tom prohibited from doing with the report?E-mailing it to a colleague who needs to provide missing data

Q:How can you prevent viruses and malicious code?

Scan all external files before uploading to your computer

Q:Which of the following is permitted within a Sensitive Compartmented

Information Facility (SCIF)?An authorized Government-owned Portable Electronic Device (PED).

Q:Carl receives an email about a potential health risk caused by a common

ingredient in processed food. Which of the following actions should Carl NOT take with the e-mail?Delete it.

Q:Which of the following is NOT an appropriate use of you Common Access Card

(CAC)?

Using it as photo identification with a commercial entity.Q:Which of the following is an authoritative source for derivative classification?Security Classification Guide.

Q:Which of the following is NOT a best practice for protecting data on a mobile

device?Disable automatic screen locking after a period of inactivity.

Q:Under which Cyberspace Protection Condition (CPCON) is the priority focus

limited to critical and essential functions?

CPCON 1

Q:Which of the following is least likely to pose a risk to share on a social networking site?Your pet's name.

Q:You receive a text message from a package shipper notifying you that your

package delivery is delayed due to needing updated delivery instructions from you. It provides a shortened link for you to provide the needed information. You are not expecting a package. What is the best course of action?Delete the message.Q:Which of the following is NOT a best practice for teleworking in an environment where Internet of Things (IoT) devices are present?Use the devices' default security settings.

Q:How can you mitigate the potential risk associated with a compressed URL

(e.g.,TinyURL,goo.gl)?Use the preview function to see where the link actually leads.

Q:How can you protect your home computer?

Install spyware protection software

Download Study Material

Buy This Study Material

$11.99
Buy Now
  • Immediate download after payment
  • Available in the pdf format
  • 100% satisfaction guarantee

Study Material Information

Category: Summary
Description:

CYBER AWARENESS CHALLENGE 2024 KNOWLEDGE TEST FLASHCARDS EXAM PREPARATION GUIDE | 25 ITEMS Q:Which of the following is a risk associated with removable media? All of these Q:Which of the following ...

UNLOCK ACCESS $11.99