• wonderlic tests
  • EXAM REVIEW
  • NCCCO Examination
  • Summary
  • Class notes
  • QUESTIONS & ANSWERS
  • NCLEX EXAM
  • Exam (elaborations)
  • Study guide
  • Latest nclex materials
  • HESI EXAMS
  • EXAMS AND CERTIFICATIONS
  • HESI ENTRANCE EXAM
  • ATI EXAM
  • NR AND NUR Exams
  • Gizmos
  • PORTAGE LEARNING
  • Ihuman Case Study
  • LETRS
  • NURS EXAM
  • NSG Exam
  • Testbanks
  • Vsim
  • Latest WGU
  • AQA PAPERS AND MARK SCHEME
  • DMV
  • WGU EXAM
  • exam bundles
  • Study Material
  • Study Notes
  • Test Prep

CYBER AWARENESS CHALLENGE V2025

Class notes Jan 8, 2026
Preview Mode - Purchase to view full document
Loading...

Loading study material viewer...

Page 0 of 0

Document Text

CYBER AWARENESS CHALLENGE V2025

FLASHCARDS

EXAM PREPARATION GUIDE | 28 ITEMS

Q:Which of the following statements is true of DOD unclassified data?

It may require access and distribution controls

Q:How can you prevent viruses and malicious code?

Scan all external files before uploading into your computer

Q:you receive a text message from a package shipper notifying you that your

package delivery is delayed due to needing updated delivery instructions from you. It provides a shortened link for you to provide the needed information. You are not expecting package. What is the best course of action?Delete the message

Q:Carl receives an email about a potential health risk caused by a common

ingredient in process food. Which of the following following actions should Carl not take with the email?forward it Q:Which of the following is an authoritative source for derivative classification?Security Classification Guide Q:Under which cyberspace protection condition (cpcon) is the priority focus limited to critical and essential functions??

Q:which of these is not a potential indicator that your device may be under a

malicious code attack?A notification for a system update that has been publicized.Q:You receive an email with the link to schedule a time to update software on your government furnish laptop. Your IT department has not scheduled software updates like this in the past and has not announced the software update. The email is not digitally signed. What action should you take?Report the email to your security POC or help desk.Q:Which of the following is true of sensitive compartmented information facilities?personnel disposition monitor so that they do not face windows or close the window blinds

Q:Which of the following contributes to your online identity?

Social networking sites, audio, enabled, digital assistance, and fitness trackers. All of these.

Q:Oliver uses his phone to look up information about a jacket he might want to

purchase. Later, he notices ads for the jacket appearing on websites that he views using his laptop. Why would he see this happen?Oliver's apps and devices collect and share information about him

Q:Which of the following is not a best practice for traveling overseas with the

mobile device?Store the device in a hotel safe when sightseeing

Q:What is the goal of an insider threat program?

Deter, Detect, and Mitigate the risks associated with insider threats

Q:Which of the following is not an appropriate use of your common access card?

Using it as photo identification with a commercial entity

Q:Tom is working on a report that contains employees names, home addresses, and

salary. Which of the following is prohibited from doing with the report?using his home computer to print the report while teleworking.Q:which of the following is least likely oppose a risk to share on a social networking site?your pet's name

Q:Which of the following is true of spillage?

It refers specifically to classified information that becomes publicly available.

Q:what is a security classification guide?

?

Q:Which of the following is permitted within a sensitive compartmented

information facility?An authorized government owned portable electronic device

Q:On your home computer, how can you best establish passwords when creating

separate user accounts?Have each user create their own, strong password Q:Which of the following describes sensitive compartmented information? SCI is a program that ___ various types of classified information for ___ protection and dissemination or distribution control.Segregates; added Q:How can an adversary use information available in public records to target you?Combine it with information from other data sources to learn how best to bait you with a scam.

Q:which best describes an insider threat? Someone who uses ___ access, ___, to

harm national security through unauthorized disclosure, data, modification, espionage, terrorism, or kinetic actions.authorized; wittingly or unwittingly

Q:Which of the following is the best practice for managing connection requests on social networking sites?Validate connection requests through another source if possible Q:which of the following is not a best practice for teleworking in an environment where Internet of things (IoT) devices are present?Use the devices' default security settings.Q:which of the following is an allowed use of government furnish equipment (GFE)?checking personal email if your organization allows it

Q:Which of the following uses of removable media is appropriate?

encrypting data stored on removable media

Q:Which of the following is not a best practice for protecting data on a mobile

device?Disable automatic screen locking after a period of inactivity

Download Study Material

Buy This Study Material

$11.99
Buy Now
  • Immediate download after payment
  • Available in the pdf format
  • 100% satisfaction guarantee

Study Material Information

Category: Class notes
Description:

CYBER AWARENESS CHALLENGE V2025 FLASHCARDS EXAM PREPARATION GUIDE | 28 ITEMS Q:Which of the following statements is true of DOD unclassified data? It may require access and distribution controls Q:...

UNLOCK ACCESS $11.99