• wonderlic tests
  • EXAM REVIEW
  • NCCCO Examination
  • Summary
  • Class notes
  • QUESTIONS & ANSWERS
  • NCLEX EXAM
  • Exam (elaborations)
  • Study guide
  • Latest nclex materials
  • HESI EXAMS
  • EXAMS AND CERTIFICATIONS
  • HESI ENTRANCE EXAM
  • ATI EXAM
  • NR AND NUR Exams
  • Gizmos
  • PORTAGE LEARNING
  • Ihuman Case Study
  • LETRS
  • NURS EXAM
  • NSG Exam
  • Testbanks
  • Vsim
  • Latest WGU
  • AQA PAPERS AND MARK SCHEME
  • DMV
  • WGU EXAM
  • exam bundles
  • Study Material
  • Study Notes
  • Test Prep

DOD CYBER AWARENESS CHALLENGE

Class notes Jan 8, 2026
Preview Mode - Purchase to view full document
Loading...

Loading study material viewer...

Page 0 of 0

Document Text

DOD CYBER AWARENESS CHALLENGE

(FY22) FLASHCARDS

EXAM PREPARATION GUIDE | 40 ITEMS

Q:What portable electronic devices (PEDs) are permitted in a SCIF?

Only expressly authorized government-owned PEDs

Q:When is it appropriate to have your security badge visible?

At all times when in the facility

Q:How can malicious code cause damage?

  • corrupting files- erasing your hard drive- allowing hackers access

Q:Which of the following practices may reduce your appeal as a target for

adversaries seeking to exploit your insider status?- Discuss classified information freely within your closed work environment- Talk about your work only at a high level when attending public networking events- Retrieve messages from your smartphone immediately, regardless of your surroundings- Remove your security badge after leaving your controlled area or office building Remove your security badge after leaving your controlled area or office building Q:Which type of information could reasonably be expected to cause serious damage to national security if disclosed without authorization?- Secret- Top Secret- Controlled Unclassified- Confidential Secret

Q:Which of the following is an example of malicious code?- A system reminder to

install security updates- Software that installs itself without the user's knowledge- A firewall that monitors and controls network traffic Software that installs itself without the user's knowledge

Q:What guidance is available for marking Sensitive Compartmented Information

(SCI)?Security Classification GuidesYour supervisorOriginal Classification AuthoritySensitive Compartmented Information Guides ?

Q:Example of information that is personally identifiable information (PII)

social security number Q:You receive an inquiry from a reporter about potentially classified information on the Internet. How should you respond?Refer the reporter to your organization's public affairs office.Q:Which of the following individuals can access classified data?- Darryl is managing a project that requires access to classified information. He has the appropriate clearance and a signed, approved non-disclosure agreement.- Theodore is seeking access to classified information that eh does not need to know to perform his job duties. He has the appropriate clearance and a signed, approved non-disclosure agreement.- Maria received an assignment to support a project that requires access to classified information. She has recently been granted the appropriate clearance but has not yet signed the non-disclosure agreement.- Elsa is joining a project that required access to information that is classified t a higher level than her current clearance level. For her current clearance, she has a signed and approved non-disclosure agreement.Darryl is managing a project that requires access to classified information. He has the appropriate clearance and a signed, approved non-disclosure agreement.

Q:Example of information that is protected health information (PHI)

medical record or information of medical visit/history

Q:Your DoD Common Access Card (CAC) has a Public Key Infrastructure (PKI)

token approved for access to the Non-classified Internet Protocol Router network (NIPRNet). In which situation below are you permitted to use your PKI token?- On a system of a higher classification level, such as the Secret Internet protocol Router Network (SIPRNet)- On a computer displaying a notification to update the antivirus software- On a NIPRNet system while using it for a PKI-required task- On a computer at the public library to check your DoD e-mail On a NIPRNet system while using it for a PKI-required task

Q:Which of the following is NOT a best practice to preserve the authenticity of your identity?- Write your password down on a device that only you access (e.g., your smartphone)- Store your Common Access Card (CAC) or Personal Identity Verification (PIV) card in a shielded sleeve- Enable two-factor authentication whenever available, even for personal accounts- Change your password at least every 3 months Write your password down on a device that only you access (e.g., your smartphone)

Q:What action should you take if you become aware that Sensitive Compartmented

Information (SCI) has been compromised?- contact your security point of contact to report the incident- evaluate the causes of the compromise- e-mail detailed information about the incident to your security point of contact- access the amount of damage that could be caused by the compromise ?

Q:How should you respond to the theft of your identity?

Report the crime to local law enforcement Q:What should the participants in this conversation involving SCI do differently?Physically assess that everyone within listening distance is cleared and has need-to-know for the information being discussed

Q:Which of the following represents an ethical use of your Government-furnished

equipment (GFE)?- Downloading a pirated episode of your favorite television show- Listing a piece of furniture for sale on your neighborhood buy/sell group- Placing a bet on your Final Four bracket- E-mailing your co-workers to let them know you are taking a sick day E-mailing your co-workers to let them know you are taking a sick day Q:Which of the following demonstrates proper protection of mobile devices?- Sally stored her government-furnished laptop in her checked luggage using a TSA approved luggage lock.- Linda encrypts all of the sensitive data on her government-issued mobile devices.- Alan uses password protection as required on his government-issued smartphone but prefers the ease of no password on his personal smartphone.Linda encrypts all of the sensitive data on her government-issued mobile devices.

Q:Which of the following is an example of near field communication (NFC)?- A pair of people talking via hand-held, two-way radio transceivers (i.e., walkie talkies)- An internal chat message sent between team members on a workforce collaboration platform (e.g., Teams)- A smartphone that transmits credit card payment information when held in proximity to a credit card reader- An e-mail transmitted between a sender and recipient who are on the same e-mail server ?

Q:What should you consider when using a wireless keyboard with your home

computer?Reviewing and configuring the available security features, including encryption

Q:When is it okay to charge a personal mobile device using government-furnished

equipment (GFE)?this is never okay

Q:Which of the following is NOT a way that malicious code spreads?- Legitimate

software updates- Infected websites- E-mail attachments- File downloads Infected websites

Q:What security risk does a public Wi-Fi connection pose?

It may expose the connected device to malware

Q:When can you use removable media on a Government system?

When operationally necessary, owned by your organization, and approved by the appropriate authority Q:Which of the following is NOT a correct way to protect CUI?- CUI may be stored on any password-protected system.- CUI may be stored in a locked desk after working hours.- CUI may be e-mailed if encrypted.CUI may be stored on any password-protected system.

Download Study Material

Buy This Study Material

$11.99
Buy Now
  • Immediate download after payment
  • Available in the pdf format
  • 100% satisfaction guarantee

Study Material Information

Category: Class notes
Description:

DOD CYBER AWARENESS CHALLENGE (FY22) FLASHCARDS EXAM PREPARATION GUIDE | 40 ITEMS Q:What portable electronic devices (PEDs) are permitted in a SCIF? Only expressly authorized government-owned PEDs ...

UNLOCK ACCESS $11.99