DOD CYBER AWARENESS CHALLENGE 2024
US-1364-24 FLASHCARDS
EXAM PREPARATION GUIDE | 35 ITEMS
Q:Permitted Use of Classified Data
Only in a SCIF
Q:Derivative Classification Source
Security classification guide
Q:What is a type of malware that restricts access to a computer system until a
ransom is paid?Ransomware
Q:Best Practice for Browsing the Internet
Only accept cookies from reputable, trusted websites Q:What is the unauthorized access, use, disclosure, disruption, modification, or destruction of information?Data breach
Q:Best Practice for Using Government Email
Do not send mass e-mails
Q:Appropriate Use of Removable Media
Encrypting data stored on removable media
Q:Action to Take if Sensitive Information Overheard
Contact her security POC with detailed information about the incident
Q:Storage of Government Owned Removable Media
In a GSA approved container, according to the appropriate security classification
Q:Transmitting SCI
Printed SCI must be retrieved properly from the printer Q:What is a program that appears legitimate but performs malicious activities when executed?Trojan horse
Q:Identifying Smoke Source
Post designed to attract attention to steal information
Q:Not Best Practice for Protecting Home Wireless Network for Telework
Use your router's preset service set identifier (SSID) and password
Q:Home Computer Protection
Turn on password feature
Q:Number of Insider Threat Indicators Present
None
Q:True Statement about DOD Unclassified Data
May require access and distribution controls
Q:What is the term for a security incident that occurs when an individual or
organization is tricked into divulging sensitive information?Social engineering
Q:What is the process of converting data into a code to prevent unauthorized
access?Encryption
Q:Step to Not Take to Protect Against Spillage
Purge any device's memory before connecting it to a classified network
Q:Mobile Data Protection
Disable automatic screen locking after inactivity
Q:Mabel Sharing Document
Share document containing contractor proprietary information with supervisor
Q:Unexpected Package Delivery
Delete unexpected package delivery message
Q:False Statement about Protected Health Information PHI
It is a type of controlled unclassified information Q:What is a software vulnerability that is exploited by hackers before the software developers are aware and able to fix it?Zero-day exploit
Q:Spillage
Improper release of classified information
Q:Contribution to Online Identity
All of these
Q:Common Access Card Use
Using it as a photo identification with a commercial entity
Q:What is a common method used by cybercriminals to gain unauthorized access to
sensitive information?Phishing emails
Q:Best Practice for Physical Security
Use your own security badge or key code for facility access
Q:Not Potential Indicator of Malicious Code Attack
A notification for a system update that has been publicized Q:What is a type of attack where multiple compromised systems are used to target a single system for a denial-of-service attack?Botnet attack
Q:Reporting Behavior
Taking sensitive information home for telework without authorization
Q:Risk Associated with Removable Media
All of these Q:What is the practice of protecting networks, devices, and data from unauthorized access or criminal use?Cybersecurity
Q:What is a security measure that requires users to provide two different
authentication factors to verify their identity?Two-factor authentication