• wonderlic tests
  • EXAM REVIEW
  • NCCCO Examination
  • Summary
  • Class notes
  • QUESTIONS & ANSWERS
  • NCLEX EXAM
  • Exam (elaborations)
  • Study guide
  • Latest nclex materials
  • HESI EXAMS
  • EXAMS AND CERTIFICATIONS
  • HESI ENTRANCE EXAM
  • ATI EXAM
  • NR AND NUR Exams
  • Gizmos
  • PORTAGE LEARNING
  • Ihuman Case Study
  • LETRS
  • NURS EXAM
  • NSG Exam
  • Testbanks
  • Vsim
  • Latest WGU
  • AQA PAPERS AND MARK SCHEME
  • DMV
  • WGU EXAM
  • exam bundles
  • Study Material
  • Study Notes
  • Test Prep

FY24 CYBER AWARENESS CHALLENGE

Summary Jan 8, 2026
Preview Mode - Purchase to view full document
Loading...

Loading study material viewer...

Page 0 of 0

Document Text

FY24 CYBER AWARENESS CHALLENGE

STUDY SET: SOCIOLOGY TERMS &

DEFINITIONS FLASHCARDS

EXAM PREPARATION GUIDE | 52 ITEMS

Q:Personally Identifiable Information (PII), which is a type of CUI

When e-mailing PII, which of the following should you do?

Q:Certificates for identification, encryption, and digital signature

You receive a text message from a package shipper notifying you that your package delivery is delayed due to needing updated delivery instructions from you. It provides a shortened link for you to provide the needed information. You are not expecting a package. What is the best course of action?

Q:USB Hub

Which of the following is true of telework?

Q:Which of the following is true of working with a Sensitive Compartmented

Information Facility (SCIF)?Authorized personnel who permit another individual to enter the SCIF are responsible for confirming the individual's need-to-know and access.

Q:Which of the following is NOT a best practice for travelling overseas with a

mobile device?Store the device in a hotel safe when sightseeing

Q:Which of the following is NOT a best practice for protecting data on a mobile

device?Disable automatic screen locking after a period of inactivity

Q:Order a credit report annually.

Annabeth becomes aware that a conversation with a co-worker that involved Sensitive Compartmented Information (SCI) may have been overheard by someone who does not have the required clearance. What action should Annabeth take?

Q:Taking sensitive information home for telework without authorization

Your meeting notes are unclassified. This means that your notes Q:Encrypt the PII, Digitally sign the e-mail, Use your Government e-mail account What actions should you take in response to compromised Sensitive Compartmented Information (SCI)?

Q:HDMI monitor, USB keyboard

What conditions are necessary to be granted access to Sensitive Compartmented Information

(SCI)?

Q:Printed SCI must be retrieved promptly from the printer.

Which of the following is an allowed use of government furnished equipment (GFE)?

Q:Which of the following is permitted within a Sensitive Compartmented

Information Facility (SCIF)?Which of the following is a best practice for managing connection requests on social networking sites?Q:You receive an e-mail with a link to schedule a time to update software on your government furnished laptop. Your IT department has not scheduled software updates like this in the past and has not announced this software update. the -mail is not digitally signed. What action should you take?Report the e-mail to your security POC or help desk

Q:Working on an unmarked document on the classified network

Which of the following poses a physical security risk?

Q:Secure the area so others cannot view your monitor

Which of these personally-owned computer peripherals may be used with government-furnished equipment (GFE)?

Q:Checking personal e-mail if your organization allows it

Which of the following statements is true of DoD Unclassified data?

Q:d+Uf_4RimUz

Which of these is true of working within a Sensitive Compartmented Information Facility

(SCIF)?

Q:a notification for a system update that has been publicized

Which of the following is an example of a strong password?Q:Which of the following is an appropriate use of a DoD Public Key Infrastructure (PKI) token?Do not use a token approved for NIPRNet on SIPRNet

Q:Which of the following statements about Protected Health Information (PHI) is

false?You receive a phone call offering you a $50 gift card if you participate in a survey. Which course of action should you take?

Q:How should government owned removable media be stored?

In a GSA-approved container according to the appropriate security classification

Q:Which of the following is NOT a way that malicious code can spread?

Running a virus scan

Q:Leave the place

What step should be taken to securely telework?

Q:Carl receives an e-mail about a potential health risk caused by a common

ingredient in processed food. Which of the following actions should Carl NOT take with the e-mail?Forward it

Q:Automobile make and model

Which of the following is least likely to pose a risk to share on a social networking site?

Q:Under which Cyberspace Protection Condition (CPCON) is the priority focus

limited to critical and essential functions?

CPCON 2

Q:Sylvia commutes to work via public transportation. She often uses the time to get a head start on work by making phone calls or responding to e-mails on her government approved mobile device. Does this pose a security concern?Yes. Eavesdroppers may be listening to Sylvia's phone calls, and shoulder surfers may be looking at her screen. Sylvia should be aware of these risks.

Q:You must have permission from your organization to telework.

Where are you permitted to use classified data?

Q:Top Secret clearance and indoctrination into the SCI program

How can you mitigate the potential risk associated with a compressed URL?

Q:Validate connection requests through another source if possible

Which of the following personally owned peripherals can you use with government furnished equipment (GFE)?

Q:Encrypting data stored on removable media.

What does the Common Access Card (CAC) contain?

Download Study Material

Buy This Study Material

$11.99
Buy Now
  • Immediate download after payment
  • Available in the pdf format
  • 100% satisfaction guarantee

Study Material Information

Category: Summary
Description:

FY24 CYBER AWARENESS CHALLENGE STUDY SET: SOCIOLOGY TERMS & DEFINITIONS FLASHCARDS EXAM PREPARATION GUIDE | 52 ITEMS Q:Personally Identifiable Information (PII), which is a type of CUI When e-maili...

UNLOCK ACCESS $11.99