Back to AI Flashcard MakerInformation Technology /Annual DoD Cyber Awareness Challenge Exam Part 2

Annual DoD Cyber Awareness Challenge Exam Part 2

Information Technology25 CardsCreated 4 months ago

This deck covers key concepts and questions from the Annual DoD Cyber Awareness Challenge Exam Part 2, focusing on ethical use of government systems, phishing attacks, and information security.

What is considered ethical use of the Government email system?

Distributing Company newsletter
Tap or swipe ↕ to flip
Swipe ←→Navigate
1/25

Key Terms

Term
Definition
What is considered ethical use of the Government email system?
Distributing Company newsletter
Which of the following attacks target high ranking officials and executives?
Whaling
What constitutes a strong password?
all of the above
You are logged on to your unclassified computer and just received an encrypted email from a co-worker. The email has an attachment whose name contains the word 'secret'. What should you do?
Contact your security POC right away
Which is a way to protect against phishing attacks?
Look for digital certificates
You receive an email from a company you have an account with. The email states your account has been compromised and you are invited to click on the link in order to reset your password. What action should you take?
Notify security

Related Flashcard Decks

Study Tips

  • Press F to enter focus mode for distraction-free studying
  • Review cards regularly to improve retention
  • Try to recall the answer before flipping the card
  • Share this deck with friends to study together
TermDefinition
What is considered ethical use of the Government email system?
Distributing Company newsletter
Which of the following attacks target high ranking officials and executives?
Whaling
What constitutes a strong password?
all of the above
You are logged on to your unclassified computer and just received an encrypted email from a co-worker. The email has an attachment whose name contains the word 'secret'. What should you do?
Contact your security POC right away
Which is a way to protect against phishing attacks?
Look for digital certificates
You receive an email from a company you have an account with. The email states your account has been compromised and you are invited to click on the link in order to reset your password. What action should you take?
Notify security
You are having lunch at a local restaurant outside the installation, and you find a cd labeled 'favorite song'. What should you do?
Leave the cd where it is
How should you securely transport company information on a removable media?
Encrypt the removable media
Should you always label your removable media?
Yes
Which of the following is NOT Protected Health Information (PHI)?
Medical care facility name
If authorized, what can be done on a work computer?
Check personal email
Spear Phishing attacks commonly attempt to impersonate email from trusted entities. What security device is used in email to verify the identity of sender?
Digital Signatures
What type of security is 'part of your responsibility' and 'placed above all else?'
Physical
If your wireless device is improperly configured someone could gain control of the device? T/F
TRUE
Which of the following is a proper way to secure your CAC/PIV?
Remove and take it with you whenever you leave your workstation
What actions should you take prior to leaving the work environment and going to lunch?
All of the above
P2P (Peer-to-Peer) software can do the following except:
Allow attackers physical access to network assets
How can you guard yourself against Identity theft?
All of the above
When leaving your work area, what is the first thing you should do?
Remove your CAC/PIV
Using webmail may bypass built in security features.
TRUE
Of the following, which is NOT a characteristic of a phishing attempt?
Directing you to a web site that is real
Classified Information can only be accessed by individuals with
All of the above
Which of the following definitions is true about disclosure of confidential information?
Damage to national security
It is permissible to release unclassified information to the public prior to being cleared.
False
Which of the following is NOT sensitive information?
Unclassified information cleared for public release