DOD CYBER AWARENESS CHALENGE 2024
FLASHCARDS
EXAM PREPARATION GUIDE | 37 ITEMS
Q:Which of the following must you do when working in a SCIF?
SELECT ALL
Q:Does this action pose a potential security risk?
Yes
Q:This is not an appropriate use if GFE. Why?
SELECT ALL
Q:Is this an appropriate use of government-furnished equipment (GFE)?
No
Q:Employee Passport NumberAdams, Jeff A12345678Brown, Marty
B23456789Clark, Tina C34567890What type of information does this personnel roster represent?Controlled Unclassified Information (CUI)
Q:Which of these personally-owned computer peripherals may be used with
government-furnished equipment?-HDMI Monitor-USB keyboard
Q:Employee Passport NumberAdams, Jeff A12345678Brown, Marty
B23456789Clark, Tina C34567890When e-mailing this personnel roster, which of the following should you do?
SELECT ALL
Q:Clue: Mr. Macaw and a colleague had a conversation about a shared project in the SCIF after verifying no one was nearby.Does this behavior represent a security concern?No
Q:What step should be taken next to securely telework?
Secure the area so others cannot view your monitor
Q:How do you secure your accounts?I receive a text message code when logging in
with a password.Yes Q:Your meeting notes are Unclassified. This means that your notes: Do not have the potential to damage national security.
Q:What kind of passwords do you use?I use Password1 as one of my passwords.
No
Q:Share a PostSoda Scare!
Keep Scrolling Q:True or false? You should monitor your credit card statements for unauthorized purchases.True Q:Clue: Dr. Dove printed a classified document and retrieved it promptly from the printer.Does this behavior represent a security concern?No
Q:Select an action to take in response to compromised Sensitive Compartmented
Information (SCI).Call your security point of contact (POC)
Q:Which method of getting online poses the least risk?
Approved mobile hotspot
Q:Friend RequestShaun S.
Deny
Q:Which payment method poses the least risk?
Cash
Q:Which of the following poses a physical security risk?
Posting an access roster in public view
Q:Does Bob demonstrate potential insider threat indicators?
Yes
Q:Which action will keep DoD data the safest?
Leave the coffee shop Q:Clue: COL. Cockatiel worked on an unmarked document on the classified network.Does this behavior represent a security concern?Yes Q:True or false? Voice-activated smart devices can collect and share your personal information.True Q:True or false? The best way to keep your passport safe is to carry it with you.False
Q:Which of these individuals demonstrated behavior that could lead to the
compromise of SCI?Col. Cockateil
Q:How should Bob's colleagues respond?
Report Bob Q:Which of the following mat indicate a malicious code attack? Select all that apply.Then select Submit.-A new app suddenly appears on the device.- The device slows down.-A new tab appears in the Web browser.
Q:DoD ITHow many social engineering indicators are present in this e-mail?
3+ Q:SELECT AN ACTION.Fwd: Save Thanksgiving Research Claim Q:DoD SoftwareHow many social engineering indicators are present in this e-mail?3+
Q:How do you protect your Common Access Card (CAC) or Personal Identity
Verification (PIV) card?I use my CAC occasionally as a secondary photo identification.No Q:How can you prevent the download of malicious code? Select all that apply. Then select Submit.-Scan external files before uploading to your device.-Research apps and their vulnerabilities before downloading.
Q:Which of the following must you do when using an unclassified laptop in a
collateral classified environment?-Disable the embedded camera, microphone, and Wi-Fi-Use government-issued wired peripherals