• wonderlic tests
  • EXAM REVIEW
  • NCCCO Examination
  • Summary
  • Class notes
  • QUESTIONS & ANSWERS
  • NCLEX EXAM
  • Exam (elaborations)
  • Study guide
  • Latest nclex materials
  • HESI EXAMS
  • EXAMS AND CERTIFICATIONS
  • HESI ENTRANCE EXAM
  • ATI EXAM
  • NR AND NUR Exams
  • Gizmos
  • PORTAGE LEARNING
  • Ihuman Case Study
  • LETRS
  • NURS EXAM
  • NSG Exam
  • Testbanks
  • Vsim
  • Latest WGU
  • AQA PAPERS AND MARK SCHEME
  • DMV
  • WGU EXAM
  • exam bundles
  • Study Material
  • Study Notes
  • Test Prep

CYBER AWARENESS CHALLENGE 2024

Class notes Jan 8, 2026
Preview Mode - Purchase to view full document
Loading...

Loading study material viewer...

Page 0 of 0

Document Text

CYBER AWARENESS CHALLENGE 2024

(KNOWLEDGE PRE-CHECK) FLASHCARDS

EXAM PREPARATION GUIDE | 21 ITEMS

Q:Which of the following is an appropriate use of government e-mail?

Using a digital signature when sending attachments Q:You receive an e-mail marked important from your boss asking for data that they need immediately for a meeting starting now. The e-mail was sent from a personal e-mail address that you do not recognize, but it addresses you by name.What concern does this e-mail pose?This may be a spear phishing attempt. Contact your boss using contact information that you know to be legitimate.Q:Which of the following is permitted when using an unclassified laptop within a collateral classified space?A Government-issued wired headset with microphone

Q:Which of the following personally owned peripherals can you use with

government furnished equipment (GFE)?A USB hub

Q:Where are you permitted to use classified data?

Only in areas with security appropriate to the classification level Q:Which of the following is an appropriate use of a DoD Public Key Infrastructure (PKI) token?Do not use a token approved for NIPR on SIPR

Q:Which of the following describes Sensitive Compartmented Information (SCI)?

SCI is a program that _____ various types of classified information for _____ protection and dissemination or distribution control.segregates, added Q:How can you mitigate the potential risk associated with a compressed URL (e.g., TinyURL, goo.gl)?Use the preview function to see where the link actually leads Q:Which of the following is NOT a best practice for teleworking in an environment where Internet of Things (IoT) devices are present?Use the devices' default security settings Q:which of the following is an authoritative source for derivative classification?Security Classification Guide

Q:Which of the following is a best practice for using government e-mail?

Do not send mass e-mails Q:Beth taps her phone at a payment terminal to pay for a purchase. Does this pose a security risk?Yes, there is a risk that the signal could be intercepted and altered Q:Which best describes an insider threat? Someone who uses ____ access, ____, to harm national security through unauthorized disclosure, data modification, espionage, terrorism, or kinetic actions.authorized, wittingly or unwittingly

Q:On your home computer, how can you best establish passwords when creating

separate user accounts?Have each user create their own, strong password

Q:Which of the following is a best practice for managing connection requests on

social networking sites?Validate connection requests through another source if possible

Q:When is the safest time to post on social media about your vacation plans?

After the trip Q:Which of the following is a step you should NOT take to protect against spillage?Purge any device's memory before connecting it to a classified network?

Q:Which of the following is true about telework?

You must have your organization's permission to telework

Q:How can you protect your home computer?

Regularly back up your files Q:Tom is working on a report that contains employees' names, home addresses, and salary. Which of the following is Tom prohibited from doing with the report?Email it to a colleague like a silly goose

Q:Which of the following uses of removable media is allowed?

Government owned removable media that is approved as operationally necessary

CONFIDENTIAL EXAM MATERIAL | Page 3

Download Study Material

Buy This Study Material

$11.99
Buy Now
  • Immediate download after payment
  • Available in the pdf format
  • 100% satisfaction guarantee

Study Material Information

Category: Class notes
Description:

CYBER AWARENESS CHALLENGE 2024 (KNOWLEDGE PRE-CHECK) FLASHCARDS EXAM PREPARATION GUIDE | 21 ITEMS Q:Which of the following is an appropriate use of government e-mail? Using a digital signature when...

UNLOCK ACCESS $11.99