• wonderlic tests
  • EXAM REVIEW
  • NCCCO Examination
  • Summary
  • Class notes
  • QUESTIONS & ANSWERS
  • NCLEX EXAM
  • Exam (elaborations)
  • Study guide
  • Latest nclex materials
  • HESI EXAMS
  • EXAMS AND CERTIFICATIONS
  • HESI ENTRANCE EXAM
  • ATI EXAM
  • NR AND NUR Exams
  • Gizmos
  • PORTAGE LEARNING
  • Ihuman Case Study
  • LETRS
  • NURS EXAM
  • NSG Exam
  • Testbanks
  • Vsim
  • Latest WGU
  • AQA PAPERS AND MARK SCHEME
  • DMV
  • WGU EXAM
  • exam bundles
  • Study Material
  • Study Notes
  • Test Prep

JKO CYBER AWARENESS CHALLENGE

Test Prep Jan 8, 2026
Preview Mode - Purchase to view full document
Loading...

Loading study material viewer...

Page 0 of 0

Document Text

JKO CYBER AWARENESS CHALLENGE

KNOWLEDGE CHECK 2020 FLASHCARDS

EXAM PREPARATION GUIDE | 27 ITEMS

Q:Which represents a security best practice when using social networking?

Understanding and using available privacy settings Q:As someone who works with classified information, what should you do if you are contacted by a foreign national seeking information on a research project?Inform your security POC of all non-professional or non-routine contacts with foreign nationals, including, but not limited to, joining each other's social media sites.

Q:What is a valid response when identity theft occurs?

Report the crime to local law enforcement.Q:While on vacation, a coworker calls and asks you to access a site to review and approve a document that is hosted behind a DoD Public Key Infrastructure (PKI) protected webpage. You do not have your government-issued laptop. What action should you take?Wait until you have access to your goverment-issued laptop.Q:Which of the following should you NOT do if you find classified information on the internet?Download the information

Q:Which are examples of portable electronic devices (PEDs)?

Fitness bands, electronic readers, and Bluetooth devices.

Q:What is a common method used in social engineering?

Telephone surveys Q:What should you do if a reporter asks you about potentially classified information on the web?Ask for information about the website, including the URL.

Q:What is a best practice to protect data on your mobile computing device?

Lock your device screen when not in use and require a password to reactivate.

Q:What is the best example of Protected Health Information (PHI)?

Your health insurance explanation of benefits (EOB)

Q:What is whaling?

A type of phishing targeted at high-level personnel such as senior officials.

Q:What portable electronic devices (PEDs) are allowed in a Secure Compartmented

Information Facility (SCIF)?Government-owned PEDs, if expressly authorized by your agency.

Q:When is conducting a private money-making venture using your

Government-furnished computer permitted?It is never permitted.

Q:What is a good practice for physical security?

Challenge people without proper badges.Q:After reading an online story about a new security project being developed on the military installation where you work, your neighbor asks you to comment about the article. You know this project is classified. What should be your response?Attempt to change the subject to something non-work related, but neither confirm nor deny the article's authenticity.

Q:What must you do when emailing Personally Identifiable Information (PII) or

Protected Health Information (PHI)?Encrypt the email and use your Government email account Q:What is a good practice when it is necessary to use a password to access a system or an application?Avoid using the same password between systems or applications.

Q:Which is NOT sufficient to protect your identity?

Use a common password for all your system and application logons.Q:Which of the following is NOT an appropriate way to protect against inadvertent spillage?Use the classified network for all work, including unclassified work

Q:What is a security best practice to employ on your home computer?

Create separate user accounts with strong individual passwords.

Q:What can malicious code do?

It can cause damage by corrupting files, erasing your hard drive, and/or allowing hackers access.

Q:Which of the following is a way to protect against social engineering?

Follow instructions given only by verified personnel.

Q:Which of the following does NOT constitute spillage?

Classified information that should be unclassified and is downgraded

Q:When classified data is not in use, how can you protect it?

Store classified data appropriately in a GSA-approved vault/container when not in use.

Q:Which of the following is true about unclassified data?

When unclassified data is aggregated, its classification level may rise.Q:Which of the following can an unauthorized disclosure of information classified as confidential reasonably be expected to cause?Damage to national security

Q:What organization issues the directives concerning the dissemination of

information regarding intelligence sources, methods, or activities?Which must be approved and signed by a cognizant Original Classification Authority (OCA)?

Download Study Material

Buy This Study Material

$11.99
Buy Now
  • Immediate download after payment
  • Available in the pdf format
  • 100% satisfaction guarantee

Study Material Information

Category: Test Prep
Description:

JKO CYBER AWARENESS CHALLENGE KNOWLEDGE CHECK 2020 FLASHCARDS EXAM PREPARATION GUIDE | 27 ITEMS Q:Which represents a security best practice when using social networking? Understanding and using ava...

UNLOCK ACCESS $11.99