FY24 CYBER AWARENESS CHALLENGE
STUDY SET: SOCIOLOGY TERMS &
DEFINITIONS FLASHCARDS
EXAM PREPARATION GUIDE | 52 ITEMS
Q:Personally Identifiable Information (PII), which is a type of CUI
When e-mailing PII, which of the following should you do?
Q:Certificates for identification, encryption, and digital signature
You receive a text message from a package shipper notifying you that your package delivery is delayed due to needing updated delivery instructions from you. It provides a shortened link for you to provide the needed information. You are not expecting a package. What is the best course of action?
Q:USB Hub
Which of the following is true of telework?
Q:Which of the following is true of working with a Sensitive Compartmented
Information Facility (SCIF)?Authorized personnel who permit another individual to enter the SCIF are responsible for confirming the individual's need-to-know and access.
Q:Which of the following is NOT a best practice for travelling overseas with a
mobile device?Store the device in a hotel safe when sightseeing
Q:Which of the following is NOT a best practice for protecting data on a mobile
device?Disable automatic screen locking after a period of inactivity
Q:Order a credit report annually.
Annabeth becomes aware that a conversation with a co-worker that involved Sensitive Compartmented Information (SCI) may have been overheard by someone who does not have the required clearance. What action should Annabeth take?
Q:Taking sensitive information home for telework without authorization
Your meeting notes are unclassified. This means that your notes Q:Encrypt the PII, Digitally sign the e-mail, Use your Government e-mail account What actions should you take in response to compromised Sensitive Compartmented Information (SCI)?
Q:HDMI monitor, USB keyboard
What conditions are necessary to be granted access to Sensitive Compartmented Information
(SCI)?
Q:Printed SCI must be retrieved promptly from the printer.
Which of the following is an allowed use of government furnished equipment (GFE)?
Q:Which of the following is permitted within a Sensitive Compartmented
Information Facility (SCIF)?Which of the following is a best practice for managing connection requests on social networking sites?Q:You receive an e-mail with a link to schedule a time to update software on your government furnished laptop. Your IT department has not scheduled software updates like this in the past and has not announced this software update. the -mail is not digitally signed. What action should you take?Report the e-mail to your security POC or help desk
Q:Working on an unmarked document on the classified network
Which of the following poses a physical security risk?
Q:Secure the area so others cannot view your monitor
Which of these personally-owned computer peripherals may be used with government-furnished equipment (GFE)?
Q:Checking personal e-mail if your organization allows it
Which of the following statements is true of DoD Unclassified data?
Q:d+Uf_4RimUz
Which of these is true of working within a Sensitive Compartmented Information Facility
(SCIF)?
Q:a notification for a system update that has been publicized
Which of the following is an example of a strong password?Q:Which of the following is an appropriate use of a DoD Public Key Infrastructure (PKI) token?Do not use a token approved for NIPRNet on SIPRNet
Q:Which of the following statements about Protected Health Information (PHI) is
false?You receive a phone call offering you a $50 gift card if you participate in a survey. Which course of action should you take?
Q:How should government owned removable media be stored?
In a GSA-approved container according to the appropriate security classification
Q:Which of the following is NOT a way that malicious code can spread?
Running a virus scan
Q:Leave the place
What step should be taken to securely telework?
Q:Carl receives an e-mail about a potential health risk caused by a common
ingredient in processed food. Which of the following actions should Carl NOT take with the e-mail?Forward it
Q:Automobile make and model
Which of the following is least likely to pose a risk to share on a social networking site?
Q:Under which Cyberspace Protection Condition (CPCON) is the priority focus
limited to critical and essential functions?
CPCON 2
Q:Sylvia commutes to work via public transportation. She often uses the time to get a head start on work by making phone calls or responding to e-mails on her government approved mobile device. Does this pose a security concern?Yes. Eavesdroppers may be listening to Sylvia's phone calls, and shoulder surfers may be looking at her screen. Sylvia should be aware of these risks.
Q:You must have permission from your organization to telework.
Where are you permitted to use classified data?
Q:Top Secret clearance and indoctrination into the SCI program
How can you mitigate the potential risk associated with a compressed URL?
Q:Validate connection requests through another source if possible
Which of the following personally owned peripherals can you use with government furnished equipment (GFE)?
Q:Encrypting data stored on removable media.
What does the Common Access Card (CAC) contain?