Scheduled maintenance: Saturday, September 10 from 11PM to 12AM PDT
Home
Subjects
Expert solutions
Create
Log in
Sign up
Upgrade to remove ads
Only ₩37,125/year
-
Flashcards
-
Learn
-
Test
-
Match
-
Flashcards
-
Learn
-
Test
-
Match
Terms in this set (35)
Did you earn a Cyber Security Awareness Challenge 2018 Certificate of Completion?
No
Which of the following does NOT constitute spillage?
Classified information that should be unclassified and is downgraded
Which of the following is NOT an appropriate way to protect against inadvertent spillage?
Use the classified network for all work, including unclassified work
Which of the following should you NOT do if you find classified information on the internet?
Download the information
What level of damage to national security can you reasonably expect Top Secret information to cause if disclosed?
Exceptionally grave damage
Which of the following is true about telework?
You must have your organization's permission to telework.
Which of the following is true of protecting classified data?
Classified material must be appropriately marked.
In addition to avoiding the temptation of greed to betray his country, what should Alex do differently?
Avoid talking about work outside of the workplace or with people without a need-to-know
Ellen's Statement
How many insider threat indicators does Alex demonstrate?
Three or more
Mark's Statement
What should Alex's colleagues do?
Report the suspicious behavior in accordance with their organization's insider threat policy
Select all sections of the profile that contain an issue. Then select Submit.
All three sections
Select the appropriate setting for each item. Then select Save.
Name and profile picture - Any
Status, photos, and posts - Friends Only
Family and relationships - Friends Only
Birthday - Friends Only
Photos and videos you are in - Friends Only
Check in location via GPS: Off
Which of the following is NOT an example of sensitive information?
Press release data
Which of the following is NOT a correct way to protect sensitive information?
Sensitive information may be stored on any password-protected system.
Victim
Select the information on the data sheet that is personally identifiable information (PII) but not protected health information (PHI).
Top box
Select the information on the data sheet that is protected health information (PHI).
Bottom box
Incident #1
What should the employee do differently?
Remove his CAC and lock his workstation.
Incident #2
What should the employee do differently?
Decline to let the person in and redirect her to security.
Incident
Select all violations at this unattended workstation. Then select Submit.
Laptop with CAC left inserted
Sticky note with Pin number
Prevalence
Which of the following is an example of malicious code?
Software that installs itself without the user's knowledge
Damage
How can malicious code cause damage?
All of these
Spread
How can you avoid downloading malicious code?
Do not access website links in e-mail messages
Incident
Select all security issues. Then select Submit.
Top and Bottom sections
From Alice Murphy
Select an action.
Delete e-mail
From Pursuit Bank
Select an action.
Delete e-mail
From John Anderson
Select an action.
Report e-mail
Incident
What should Sara do when using publicly available Internet, such as hotel Wi-Fi?
Only connect Government VPN
What is the danger of using public Wi-Fi connetions?
Both of these
Incident
Select Yes or No for each item. Then select Submit. (Permitted Uses of Government-Furnished Equipment GFE))
Viewing or downloading pornography - No
Gambling online - No
Conducting a private money-making venture - No
Using unauthorized software - No
Illegally downloading copyrighted material - No
Making unauthorized configuration changes - No
Incident
When is it okay to charge a personal mobile device using government-furnished equipment (GFE)?
This is never okay.
Which of the following demonstrates proper protection of mobile devices?
Linda encrypts all of the sensitive data on her government-issued mobile devices.
Evidence
Your antivirus is out-of-date. Update now?
Update
Security updates are ready to install. Install now?
Install
Firewall disabled. Would you like to enable the firewall?
Enable
A virus has been detected.
Exit
Sets with similar termsDoD Cyber Awareness 2019
38 terms
kyle_terry4
DoD Cyber Awareness 2019
38 terms
wolff4780PLUS
DOD Cyber Awareness Challenge 2019: Knowledge Chec…
69 terms
ewizzy58
AWARENESS19w
15 terms
mountainhigh22
Sets found in the same folderAnnual DoD Cyber Awareness Challenge Training - 20…
35 terms
sms8818
Cyber Awareness 2020 Knowledge Check
95 terms
Lilwhiteshark97
Cyber Awareness 2020 Knowledge Check
78 terms
Luis_Marino
DOD Cyber Awareness Challenge 2019
24 terms
Jamie_Lancaster
Other sets by this creator
Military Requirements for Petty Officers Third and…
30 terms
navyEOD55
Military Requirements for Petty Officers Third and…
10 terms
navyEOD55
Military Requirements for Petty Officers Third and…
53 terms
navyEOD55
EPRC Operator Course JKO (8 hour) Pretest Answers
90 terms
navyEOD55
Other Quizlet setsChapter 22: Signal Transduction Mechanisms: I. Ele…
75 terms
lizbet_fischer
Bio
29 terms
Jaimie_Frake
Social Studies Chapter 15
22 terms
catievan
Business Continuation and Succession Planning
13 terms
Heather_Orvis
Related questions
QUESTION
What were the three additional variables that the case studies suggested were important to the success of nonviolent campaigns?
3 answers
QUESTION
A security analyst is investigating a potential breach. upon gathering, documenting, and securing the evidence. What is the NEXT step to minimize the business impact?
3 answers
QUESTION
Which political reform gave people the power to approve or reject laws passed by a legislature?
3 answers
QUESTION
Misconfiguration is commonly seen in accounts that are set up for a user that provide more access then is necessary, such as providing total access over the entire device when the access should be more limited.
3 answers