• wonderlic tests
  • EXAM REVIEW
  • NCCCO Examination
  • Summary
  • Class notes
  • QUESTIONS & ANSWERS
  • NCLEX EXAM
  • Exam (elaborations)
  • Study guide
  • Latest nclex materials
  • HESI EXAMS
  • EXAMS AND CERTIFICATIONS
  • HESI ENTRANCE EXAM
  • ATI EXAM
  • NR AND NUR Exams
  • Gizmos
  • PORTAGE LEARNING
  • Ihuman Case Study
  • LETRS
  • NURS EXAM
  • NSG Exam
  • Testbanks
  • Vsim
  • Latest WGU
  • AQA PAPERS AND MARK SCHEME
  • DMV
  • WGU EXAM
  • exam bundles
  • Study Material
  • Study Notes
  • Test Prep

DOD CYBER AWARENESS CHALENGE 2024

Summary Jan 8, 2026
Preview Mode - Purchase to view full document
Loading...

Loading study material viewer...

Page 0 of 0

Document Text

DOD CYBER AWARENESS CHALENGE 2024

FLASHCARDS

EXAM PREPARATION GUIDE | 37 ITEMS

Q:Which of the following must you do when working in a SCIF?

SELECT ALL

Q:Does this action pose a potential security risk?

Yes

Q:This is not an appropriate use if GFE. Why?

SELECT ALL

Q:Is this an appropriate use of government-furnished equipment (GFE)?

No

Q:Employee Passport NumberAdams, Jeff A12345678Brown, Marty

B23456789Clark, Tina C34567890What type of information does this personnel roster represent?Controlled Unclassified Information (CUI)

Q:Which of these personally-owned computer peripherals may be used with

government-furnished equipment?-HDMI Monitor-USB keyboard

Q:Employee Passport NumberAdams, Jeff A12345678Brown, Marty

B23456789Clark, Tina C34567890When e-mailing this personnel roster, which of the following should you do?

SELECT ALL

Q:Clue: Mr. Macaw and a colleague had a conversation about a shared project in the SCIF after verifying no one was nearby.Does this behavior represent a security concern?No

Q:What step should be taken next to securely telework?

Secure the area so others cannot view your monitor

Q:How do you secure your accounts?I receive a text message code when logging in

with a password.Yes Q:Your meeting notes are Unclassified. This means that your notes: Do not have the potential to damage national security.

Q:What kind of passwords do you use?I use Password1 as one of my passwords.

No

Q:Share a PostSoda Scare!

Keep Scrolling Q:True or false? You should monitor your credit card statements for unauthorized purchases.True Q:Clue: Dr. Dove printed a classified document and retrieved it promptly from the printer.Does this behavior represent a security concern?No

Q:Select an action to take in response to compromised Sensitive Compartmented

Information (SCI).Call your security point of contact (POC)

Q:Which method of getting online poses the least risk?

Approved mobile hotspot

Q:Friend RequestShaun S.

Deny

Q:Which payment method poses the least risk?

Cash

Q:Which of the following poses a physical security risk?

Posting an access roster in public view

Q:Does Bob demonstrate potential insider threat indicators?

Yes

Q:Which action will keep DoD data the safest?

Leave the coffee shop Q:Clue: COL. Cockatiel worked on an unmarked document on the classified network.Does this behavior represent a security concern?Yes Q:True or false? Voice-activated smart devices can collect and share your personal information.True Q:True or false? The best way to keep your passport safe is to carry it with you.False

Q:Which of these individuals demonstrated behavior that could lead to the

compromise of SCI?Col. Cockateil

Q:How should Bob's colleagues respond?

Report Bob Q:Which of the following mat indicate a malicious code attack? Select all that apply.Then select Submit.-A new app suddenly appears on the device.- The device slows down.-A new tab appears in the Web browser.

Q:DoD ITHow many social engineering indicators are present in this e-mail?

3+ Q:SELECT AN ACTION.Fwd: Save Thanksgiving Research Claim Q:DoD SoftwareHow many social engineering indicators are present in this e-mail?3+

Q:How do you protect your Common Access Card (CAC) or Personal Identity

Verification (PIV) card?I use my CAC occasionally as a secondary photo identification.No Q:How can you prevent the download of malicious code? Select all that apply. Then select Submit.-Scan external files before uploading to your device.-Research apps and their vulnerabilities before downloading.

Q:Which of the following must you do when using an unclassified laptop in a

collateral classified environment?-Disable the embedded camera, microphone, and Wi-Fi-Use government-issued wired peripherals

Download Study Material

Buy This Study Material

$11.99
Buy Now
  • Immediate download after payment
  • Available in the pdf format
  • 100% satisfaction guarantee

Study Material Information

Category: Summary
Description:

DOD CYBER AWARENESS CHALENGE 2024 FLASHCARDS EXAM PREPARATION GUIDE | 37 ITEMS Q:Which of the following must you do when working in a SCIF? SELECT ALL Q:Does this action pose a potential security r...

UNLOCK ACCESS $11.99