Scheduled maintenance: Saturday, September 10 from 11PM to 12AM PDT Show
Home Subjects Expert solutions Create Log in Sign up Upgrade to remove ads Only ₩37,125/year
Terms in this set (35)Did you earn a Cyber Security Awareness Challenge 2018 Certificate of Completion? No Which of the following does NOT constitute spillage? Classified information that should be unclassified and is downgraded Which of the following is NOT an appropriate way to protect against inadvertent spillage? Use the classified network for all work, including unclassified work Which of the following should you NOT do if you find classified information on the internet? Download the information What level of damage to national security can you reasonably expect Top Secret information to cause if disclosed? Exceptionally grave damage Which of the following is true about telework? You must have your organization's permission to telework. Which of the following is true of protecting classified data? Classified material must be appropriately marked. In addition to avoiding the temptation of greed to betray his country, what should Alex do differently? Avoid talking about work outside of the workplace or with people without a need-to-know Ellen's Statement How many insider threat indicators does Alex demonstrate? Three or more Mark's Statement What should Alex's colleagues do? Report the suspicious behavior in accordance with their organization's insider threat policy Select all sections of the profile that contain an issue. Then select Submit. All three sections Select the appropriate setting for each item. Then select Save. Name and profile picture - Any Status, photos, and posts - Friends Only Family and relationships - Friends Only Birthday - Friends Only Photos and videos you are in - Friends Only Check in location via GPS: Off Which of the following is NOT an example of sensitive information? Press release data Which of the following is NOT a correct way to protect sensitive information? Sensitive information may be stored on any password-protected system. Victim Select the information on the data sheet that is personally identifiable information (PII) but not protected health information (PHI). Top box Select the information on the data sheet that is protected health information (PHI). Bottom box Incident #1 What should the employee do differently? Remove his CAC and lock his workstation. Incident #2 What should the employee do differently? Decline to let the person in and redirect her to security. Incident Select all violations at this unattended workstation. Then select Submit. Laptop with CAC left inserted Sticky note with Pin number Prevalence Which of the following is an example of malicious code? Software that installs itself without the user's knowledge
Damage All of these Spread How can you avoid downloading malicious code? Do not access website links in e-mail messages Incident Select all security issues. Then select Submit. Top and Bottom sections From Alice Murphy Select an action. Delete e-mail From Pursuit Bank Select an action. Delete e-mail From John Anderson Select an action. Report e-mail Incident What should Sara do when using publicly available Internet, such as hotel Wi-Fi? Only connect Government VPN What is the danger of using public Wi-Fi connetions? Both of these Incident Select Yes or No for each item. Then select Submit. (Permitted Uses of Government-Furnished Equipment GFE)) Viewing or downloading pornography - No Gambling online - No Conducting a private money-making venture - No Using unauthorized software - No Illegally downloading copyrighted material - No Making unauthorized configuration changes - No Incident When is it okay to charge a personal mobile device using government-furnished equipment (GFE)? This is never okay. Which of the following demonstrates proper protection of mobile devices? Linda encrypts all of the sensitive data on her government-issued mobile devices. Evidence Your antivirus is out-of-date. Update now? Update Security updates are ready to install. Install now? Install Firewall disabled. Would you like to enable the firewall? Enable A virus has been detected. Exit Sets with similar termsDoD Cyber Awareness 201938 terms kyle_terry4 DoD Cyber Awareness 201938 terms wolff4780PLUS DOD Cyber Awareness Challenge 2019: Knowledge Chec…69 terms
ewizzy58 AWARENESS19w15 terms mountainhigh22 Sets found in the same folderAnnual DoD Cyber Awareness Challenge Training - 20…35 terms sms8818 Cyber Awareness 2020 Knowledge Check95 terms Lilwhiteshark97 Cyber Awareness 2020 Knowledge Check78 terms Luis_Marino DOD Cyber Awareness Challenge 201924 terms Jamie_Lancaster Other sets by this creator
Military Requirements for Petty Officers Third and…30 terms navyEOD55 Military Requirements for Petty Officers Third and…10 terms navyEOD55 Military Requirements for Petty Officers Third and…53 terms navyEOD55 EPRC Operator Course JKO (8 hour) Pretest Answers90 terms navyEOD55 Other Quizlet setsChapter 22: Signal Transduction Mechanisms: I. Ele…75 terms lizbet_fischer Bio29 terms Jaimie_Frake Social Studies Chapter 1522 terms catievan Business Continuation and Succession Planning13 terms Heather_Orvis Related questions
QUESTION What were the three additional variables that the case studies suggested were important to the success of nonviolent campaigns? 3 answers QUESTION A security analyst is investigating a potential breach. upon gathering, documenting, and securing the evidence. What is the NEXT step to minimize the business impact? 3 answers QUESTION Which political reform gave people the power to approve or reject laws passed by a legislature? 3 answers QUESTION Misconfiguration is commonly seen in accounts that are set up for a user that provide more access then is necessary, such as providing total access over the entire device when the access should be more limited. 3 answers What level of damage to national security can you reasonably expect top secret information to cause if disclosed?The unauthorized disclosure of Top Secret information could reasonably be expected to cause exceptionally grave damage to national security.
Which of the following can be unauthorized disclosure of information classified as confidential reasonably be expected to cause?Unauthorized disclosure of Top Secret information could reasonably be expected to cause exceptionally grave damage to our national security. Unauthorized disclosure of Confidential information could reasonably be expected to cause damage to our national security.
What information is a security risk when posted publicly on your social networking profile?What security risk does a public Wi-Fi connection pose? It may expose the connected device to malware.
When should a security badge be visible?When is it appropriate to have your securing badge visible with a sensitive compartmented information facility? At all time when is the facility.
|