CYBER AWARENESS CHALLENGE 2024
(KNOWLEDGE PRE-CHECK) FLASHCARDS
EXAM PREPARATION GUIDE | 21 ITEMS
Q:Which of the following is an appropriate use of government e-mail?
Using a digital signature when sending attachments Q:You receive an e-mail marked important from your boss asking for data that they need immediately for a meeting starting now. The e-mail was sent from a personal e-mail address that you do not recognize, but it addresses you by name.What concern does this e-mail pose?This may be a spear phishing attempt. Contact your boss using contact information that you know to be legitimate.Q:Which of the following is permitted when using an unclassified laptop within a collateral classified space?A Government-issued wired headset with microphone
Q:Which of the following personally owned peripherals can you use with
government furnished equipment (GFE)?A USB hub
Q:Where are you permitted to use classified data?
Only in areas with security appropriate to the classification level Q:Which of the following is an appropriate use of a DoD Public Key Infrastructure (PKI) token?Do not use a token approved for NIPR on SIPR
Q:Which of the following describes Sensitive Compartmented Information (SCI)?
SCI is a program that _____ various types of classified information for _____ protection and dissemination or distribution control.segregates, added Q:How can you mitigate the potential risk associated with a compressed URL (e.g., TinyURL, goo.gl)?Use the preview function to see where the link actually leads Q:Which of the following is NOT a best practice for teleworking in an environment where Internet of Things (IoT) devices are present?Use the devices' default security settings Q:which of the following is an authoritative source for derivative classification?Security Classification Guide
Q:Which of the following is a best practice for using government e-mail?
Do not send mass e-mails Q:Beth taps her phone at a payment terminal to pay for a purchase. Does this pose a security risk?Yes, there is a risk that the signal could be intercepted and altered Q:Which best describes an insider threat? Someone who uses ____ access, ____, to harm national security through unauthorized disclosure, data modification, espionage, terrorism, or kinetic actions.authorized, wittingly or unwittingly
Q:On your home computer, how can you best establish passwords when creating
separate user accounts?Have each user create their own, strong password
Q:Which of the following is a best practice for managing connection requests on
social networking sites?Validate connection requests through another source if possible
Q:When is the safest time to post on social media about your vacation plans?
After the trip Q:Which of the following is a step you should NOT take to protect against spillage?Purge any device's memory before connecting it to a classified network?
Q:Which of the following is true about telework?
You must have your organization's permission to telework
Q:How can you protect your home computer?
Regularly back up your files Q:Tom is working on a report that contains employees' names, home addresses, and salary. Which of the following is Tom prohibited from doing with the report?Email it to a colleague like a silly goose
Q:Which of the following uses of removable media is allowed?
Government owned removable media that is approved as operationally necessary
CONFIDENTIAL EXAM MATERIAL | Page 3