Back to AI Flashcard MakerInformation Technology /Annual DoD Cyber Awareness Challenge Exam Part 2
Annual DoD Cyber Awareness Challenge Exam Part 2
This deck covers key concepts and questions from the Annual DoD Cyber Awareness Challenge Exam Part 2, focusing on ethical use of government systems, phishing attacks, and information security.
What is considered ethical use of the Government email system?
Distributing Company newsletter
Tap or swipe ↕ to flip
Swipe ←→Navigate
1/25
Key Terms
Term
Definition
What is considered ethical use of the Government email system?
Distributing Company newsletter
Which of the following attacks target high ranking officials and executives?
Whaling
What constitutes a strong password?
all of the above
You are logged on to your unclassified computer and just received an encrypted email from a co-worker. The email has an attachment whose name contains the word 'secret'. What should you do?
Contact your security POC right away
Which is a way to protect against phishing attacks?
Look for digital certificates
You receive an email from a company you have an account with. The email states your account has been compromised and you are invited to click on the link in order to reset your password. What action should you take?
Notify security
Related Flashcard Decks
Study Tips
- Press F to enter focus mode for distraction-free studying
- Review cards regularly to improve retention
- Try to recall the answer before flipping the card
- Share this deck with friends to study together
| Term | Definition |
|---|---|
What is considered ethical use of the Government email system? | Distributing Company newsletter |
Which of the following attacks target high ranking officials and executives? | Whaling |
What constitutes a strong password? | all of the above |
You are logged on to your unclassified computer and just received an encrypted email from a co-worker. The email has an attachment whose name contains the word 'secret'. What should you do? | Contact your security POC right away |
Which is a way to protect against phishing attacks? | Look for digital certificates |
You receive an email from a company you have an account with. The email states your account has been compromised and you are invited to click on the link in order to reset your password. What action should you take? | Notify security |
You are having lunch at a local restaurant outside the installation, and you find a cd labeled 'favorite song'. What should you do? | Leave the cd where it is |
How should you securely transport company information on a removable media? | Encrypt the removable media |
Should you always label your removable media? | Yes |
Which of the following is NOT Protected Health Information (PHI)? | Medical care facility name |
If authorized, what can be done on a work computer? | Check personal email |
Spear Phishing attacks commonly attempt to impersonate email from trusted entities. What security device is used in email to verify the identity of sender? | Digital Signatures |
What type of security is 'part of your responsibility' and 'placed above all else?' | Physical |
If your wireless device is improperly configured someone could gain control of the device? T/F | TRUE |
Which of the following is a proper way to secure your CAC/PIV? | Remove and take it with you whenever you leave your workstation |
What actions should you take prior to leaving the work environment and going to lunch? | All of the above |
P2P (Peer-to-Peer) software can do the following except: | Allow attackers physical access to network assets |
How can you guard yourself against Identity theft? | All of the above |
When leaving your work area, what is the first thing you should do? | Remove your CAC/PIV |
Using webmail may bypass built in security features. | TRUE |
Of the following, which is NOT a characteristic of a phishing attempt? | Directing you to a web site that is real |
Classified Information can only be accessed by individuals with | All of the above |
Which of the following definitions is true about disclosure of confidential information? | Damage to national security |
It is permissible to release unclassified information to the public prior to being cleared. | False |
Which of the following is NOT sensitive information? | Unclassified information cleared for public release |