• wonderlic tests
  • EXAM REVIEW
  • NCCCO Examination
  • Summary
  • Class notes
  • QUESTIONS & ANSWERS
  • NCLEX EXAM
  • Exam (elaborations)
  • Study guide
  • Latest nclex materials
  • HESI EXAMS
  • EXAMS AND CERTIFICATIONS
  • HESI ENTRANCE EXAM
  • ATI EXAM
  • NR AND NUR Exams
  • Gizmos
  • PORTAGE LEARNING
  • Ihuman Case Study
  • LETRS
  • NURS EXAM
  • NSG Exam
  • Testbanks
  • Vsim
  • Latest WGU
  • AQA PAPERS AND MARK SCHEME
  • DMV
  • WGU EXAM
  • exam bundles
  • Study Material
  • Study Notes
  • Test Prep

DOD CYBER AWARENESS CHALLENGE 2024

Test Prep Jan 8, 2026
Preview Mode - Purchase to view full document
Loading...

Loading study material viewer...

Page 0 of 0

Document Text

DOD CYBER AWARENESS CHALLENGE 2024

FLASHCARDS

EXAM PREPARATION GUIDE | 25 ITEMS

Q:You receive an e-mail marked important from your boss asking for data that they need immediately for a meeting starting now. The e-mail was sent from a personal e-mail address that you do not recognize, but it addresses you by name.What concern does this e-mail pose?This may be a spear phishing attempt. Contact your boss using contact information that you know to be legitimate.

Q:What conditions are necessary to be granted access to Sensitive Compartmented

Information (SCI)?Top Secret clearance and indoctrination into the SCI program.Q:Sylvia commutes to work via public transportation. She often use the time to get a head start on work by making phone calls or responding to e-mails on her government approved mobile device. Does she pose a security concern?Yes. Eavesdroppers may be listening to Sylvia's phone calls, and shoulder surfers may be looking at her screen. Sylvia should be aware of these risks.

Q:Which of the following is true of spillage?

It can be either inadvertent or intentional.

Q:Which of the following personally owned peripherals can you use with

government furnished equipment (GFE)?A USB hub.

Q:How can you protect your home computer?

Regularly back up your files.

Q:Which of the following is true of transmitting or transporting Sensitive

Compartmented Information (SCI)?Printed SCI must be retrieved promptly from the printer.

Q:Which of the following is NOT a way that malicious code can spread?

Running a virus scan.

Q:Which of the following is a best practice for using government email?

Do not send mass e-mails.

Q:Which of the following is an example of a strong password?

d+Uf_4RimUz Q:When linked to a specific individual, which of the following is NOT an example of Personally Identifiable Information (PII)?Automobile make and model.

Q:Which of the following is NOT a best practice for protecting data on a mobile

device?Disable automatic screen locking after a period of inactivity.

Q:Carl receives an e-mail about a potential health risk caused by a common

ingredient in processed food. Which of the following actions should Carl NOT take with the e-mail?Forward it.

Q:Which of the following is an appropriate use of DoD Public Key Infrastructure

(PKI) token?Do not use a token approved for NIPRNet on SIPRNet.Q:Which of the following is least likely to pose a risk to share on a social networking site?Your pet's name.

Q:How can you prevent viruses and malicious code?

Scan all external files before uploading to your computer.

Q:Based on the description provided, how many insider threat indicators are

present? Elyse has worked for a DoD agency for more than 10 years. She is a diligent employee who receives excellent performance reviews and is a valued team member. She has two children and takes them on a weeklong beach vacation every summer. She spent a semester abroad in France as a teenager and plans to take her children to visit France when they are older.

  • (Zero).

Q:Which of the following is best practice to protect your identity?

Order a credit report annually.

Q:Which of the following is a risk associated with removable media?

ALL OF THESE: Introduction of malicious codes; compromise of systems' confidentiality, availability, or integrity; spillage of classified documents.

Q:You receive a phone call offering you a $50 gift card if you participate in a

survey. Which course of action should you take?Decline to participate in the survey. This may be a social engineering attempt.

Q:Which of the following is permitted within a Sensitive Compartmented

Information SCIF?An authorized Government-owned Portable Electronic Device (PED) Q:Which of the following is NOT a best practice for protecting your home wireless network for telework?Use your router's pre-set Service Set Identifier (SSID) and password.

Q:Where are you permitted to use classified data?

Only in SCIF.

Q:How can you protect your home computer?

Turn on the password feature.Q:Which of the following is permitted when using an unclassified laptop within a collateral classified space?A government issued wired headset with microphone.

Download Study Material

Buy This Study Material

$11.99
Buy Now
  • Immediate download after payment
  • Available in the pdf format
  • 100% satisfaction guarantee

Study Material Information

Category: Test Prep
Description:

DOD CYBER AWARENESS CHALLENGE 2024 FLASHCARDS EXAM PREPARATION GUIDE | 25 ITEMS Q:You receive an e-mail marked important from your boss asking for data that they need immediately for a meeting star...

UNLOCK ACCESS $11.99