• wonderlic tests
  • EXAM REVIEW
  • NCCCO Examination
  • Summary
  • Class notes
  • QUESTIONS & ANSWERS
  • NCLEX EXAM
  • Exam (elaborations)
  • Study guide
  • Latest nclex materials
  • HESI EXAMS
  • EXAMS AND CERTIFICATIONS
  • HESI ENTRANCE EXAM
  • ATI EXAM
  • NR AND NUR Exams
  • Gizmos
  • PORTAGE LEARNING
  • Ihuman Case Study
  • LETRS
  • NURS EXAM
  • NSG Exam
  • Testbanks
  • Vsim
  • Latest WGU
  • AQA PAPERS AND MARK SCHEME
  • DMV
  • WGU EXAM
  • exam bundles
  • Study Material
  • Study Notes
  • Test Prep

DOD CYBER AWARENESS CHALLENGE 2024

Test Prep Jan 8, 2026
Preview Mode - Purchase to view full document
Loading...

Loading study material viewer...

Page 0 of 0

Document Text

DOD CYBER AWARENESS CHALLENGE 2024

US-1364-24 FLASHCARDS

EXAM PREPARATION GUIDE | 35 ITEMS

Q:Permitted Use of Classified Data

Only in a SCIF

Q:Derivative Classification Source

Security classification guide

Q:What is a type of malware that restricts access to a computer system until a

ransom is paid?Ransomware

Q:Best Practice for Browsing the Internet

Only accept cookies from reputable, trusted websites Q:What is the unauthorized access, use, disclosure, disruption, modification, or destruction of information?Data breach

Q:Best Practice for Using Government Email

Do not send mass e-mails

Q:Appropriate Use of Removable Media

Encrypting data stored on removable media

Q:Action to Take if Sensitive Information Overheard

Contact her security POC with detailed information about the incident

Q:Storage of Government Owned Removable Media

In a GSA approved container, according to the appropriate security classification

Q:Transmitting SCI

Printed SCI must be retrieved properly from the printer Q:What is a program that appears legitimate but performs malicious activities when executed?Trojan horse

Q:Identifying Smoke Source

Post designed to attract attention to steal information

Q:Not Best Practice for Protecting Home Wireless Network for Telework

Use your router's preset service set identifier (SSID) and password

Q:Home Computer Protection

Turn on password feature

Q:Number of Insider Threat Indicators Present

None

Q:True Statement about DOD Unclassified Data

May require access and distribution controls

Q:What is the term for a security incident that occurs when an individual or

organization is tricked into divulging sensitive information?Social engineering

Q:What is the process of converting data into a code to prevent unauthorized

access?Encryption

Q:Step to Not Take to Protect Against Spillage

Purge any device's memory before connecting it to a classified network

Q:Mobile Data Protection

Disable automatic screen locking after inactivity

Q:Mabel Sharing Document

Share document containing contractor proprietary information with supervisor

Q:Unexpected Package Delivery

Delete unexpected package delivery message

Q:False Statement about Protected Health Information PHI

It is a type of controlled unclassified information Q:What is a software vulnerability that is exploited by hackers before the software developers are aware and able to fix it?Zero-day exploit

Q:Spillage

Improper release of classified information

Q:Contribution to Online Identity

All of these

Q:Common Access Card Use

Using it as a photo identification with a commercial entity

Q:What is a common method used by cybercriminals to gain unauthorized access to

sensitive information?Phishing emails

Q:Best Practice for Physical Security

Use your own security badge or key code for facility access

Q:Not Potential Indicator of Malicious Code Attack

A notification for a system update that has been publicized Q:What is a type of attack where multiple compromised systems are used to target a single system for a denial-of-service attack?Botnet attack

Q:Reporting Behavior

Taking sensitive information home for telework without authorization

Q:Risk Associated with Removable Media

All of these Q:What is the practice of protecting networks, devices, and data from unauthorized access or criminal use?Cybersecurity

Q:What is a security measure that requires users to provide two different

authentication factors to verify their identity?Two-factor authentication

Download Study Material

Buy This Study Material

$11.99
Buy Now
  • Immediate download after payment
  • Available in the pdf format
  • 100% satisfaction guarantee

Study Material Information

Category: Test Prep
Description:

DOD CYBER AWARENESS CHALLENGE 2024 US-1364-24 FLASHCARDS EXAM PREPARATION GUIDE | 35 ITEMS Q:Permitted Use of Classified Data Only in a SCIF Q:Derivative Classification Source Security classificati...

UNLOCK ACCESS $11.99