CYBER AWARENESS CHALLENGE 2024
KNOWLEDGE TEST FLASHCARDS
EXAM PREPARATION GUIDE | 25 ITEMS
Q:Which of the following is a risk associated with removable media?
All of these
Q:Which of the following is true of telework?
You must have permission from your organization to telework.
Q:Which of the following is an example of behavior that you should report?
Taking sensitive information home for telework without authorization.
Q:On your home computer, how can you best establish passwords when creating
separate user accounts?Have each user create their own, strong password.
Q:Annabeth becomes aware that a conversation with a co-worker that involved
Sensitive Compartmented Information (SCI) may have been overheard by someone who does not have the required clearance. What action should Annabeth take?Contact her security POC with detailed information about the incident.
Q:Which of the following is NOT a best practice for travelling overseas with a
mobile device?Do not travel with a mobile device if you can avoid it.
Q:Which of the following is a best practice when browsing the internet?
Only accept cookies from reputable, trusted websites.
Q:Which of the following contributes to your online identity?
All of these.
Q:Which of the following is NOT a way that malicious code can spread?
Running a virus scan
Q:Where are you permitted to use classified data?
Only in areas with security appropriate to the classification level.Q:Sylvia commutes to work via public transportation. She often uses the time to get a head start on work by making phone calls or responding to e-mails on her government approved mobile device. Does this pose a security concern?No, because Sylvia is using a government approved device.
Q:Which of the following is an example of a strong password?
d+Uf_4RimUz Q:Tom is working on a report that contains employees' names, home addresses, and salary. Which of the following is Tom prohibited from doing with the report?E-mailing it to a colleague who needs to provide missing data
Q:How can you prevent viruses and malicious code?
Scan all external files before uploading to your computer
Q:Which of the following is permitted within a Sensitive Compartmented
Information Facility (SCIF)?An authorized Government-owned Portable Electronic Device (PED).
Q:Carl receives an email about a potential health risk caused by a common
ingredient in processed food. Which of the following actions should Carl NOT take with the e-mail?Delete it.
Q:Which of the following is NOT an appropriate use of you Common Access Card
(CAC)?
Using it as photo identification with a commercial entity.Q:Which of the following is an authoritative source for derivative classification?Security Classification Guide.
Q:Which of the following is NOT a best practice for protecting data on a mobile
device?Disable automatic screen locking after a period of inactivity.
Q:Under which Cyberspace Protection Condition (CPCON) is the priority focus
limited to critical and essential functions?
CPCON 1
Q:Which of the following is least likely to pose a risk to share on a social networking site?Your pet's name.
Q:You receive a text message from a package shipper notifying you that your
package delivery is delayed due to needing updated delivery instructions from you. It provides a shortened link for you to provide the needed information. You are not expecting a package. What is the best course of action?Delete the message.Q:Which of the following is NOT a best practice for teleworking in an environment where Internet of Things (IoT) devices are present?Use the devices' default security settings.
Q:How can you mitigate the potential risk associated with a compressed URL
(e.g.,TinyURL,goo.gl)?Use the preview function to see where the link actually leads.
Q:How can you protect your home computer?
Install spyware protection software