Back to AI Flashcard MakerInformation Technology /Annual DoD Cyber Awareness Challenge Exam Part 3

Annual DoD Cyber Awareness Challenge Exam Part 3

Information Technology25 CardsCreated 4 months ago

This deck covers key concepts and questions from the DoD Cyber Awareness Challenge, focusing on cybersecurity best practices, insider threats, and data protection.

What should you do to protect yourself while on social networks?

Validate all friend requests through another source before confirming them
Tap or swipe ↕ to flip
Swipe ←→Navigate
1/25

Key Terms

Term
Definition
What should you do to protect yourself while on social networks?
Validate all friend requests through another source before confirming them
Which is NOT a method of protecting classified data?
Assuming open storage is always authorized in a secure facility
What can you do to prevent spillage?
all of the above
Which of the following makes Alex's personal information vulnerable to attacks by identity thieves?
Carrying his Social Security Card with him
DoD employees are prohibited from using a DoD CAC in card-reader-enabled public device
TRUE
Which of the following is an example of malicious code?
Trojan horses

Related Flashcard Decks

Study Tips

  • Press F to enter focus mode for distraction-free studying
  • Review cards regularly to improve retention
  • Try to recall the answer before flipping the card
  • Share this deck with friends to study together
TermDefinition
What should you do to protect yourself while on social networks?
Validate all friend requests through another source before confirming them
Which is NOT a method of protecting classified data?
Assuming open storage is always authorized in a secure facility
What can you do to prevent spillage?
all of the above
Which of the following makes Alex's personal information vulnerable to attacks by identity thieves?
Carrying his Social Security Card with him
DoD employees are prohibited from using a DoD CAC in card-reader-enabled public device
TRUE
Which of the following is an example of malicious code?
Trojan horses
Which of the following is NOT PII?
Mother's maiden name
Classified Information is
Assigned a classification level by a supervisor
Maria is at home shopping for shoes on Amazon.com. Before long she has also purchased shoes from several other websites. What can be used to track Maria's web browsing habits?
Cookies
Which is an untrue statement about unclassified data?
If aggregated, the classification of the information may not be changed
A medium secure password has at least 15 characters and one of the following.
Special character
PII, PHI, and financial information is classified as what type of information?
Sensitive
The CAC/PIV is a controlled item and contains certificates for:
All of the above
An individual who has attempted to access sensitive information without need-to-know and has made unusual requests for sensitive information is displaying indicators of what?
Potential Insider Threat
Which of the following is NOT a social engineering tip?
Following instructions from verified personnel
Bob, a coworker, has been going through a divorce, has financial difficulties and is displaying hostile behavior. How many potential insider threat indicators is Bob displaying?
3
You are working at your unclassified system and receive an email from a coworker containing a classified attachment. What should you do?
Alert your security POC
You check your bank statement and see several debits you did not authorize. You believe that you are a victim of identity theft. Which of the following should you do immediately?
Monitor credit card statements for unauthorized purchases
Thumb drives, memory sticks, and flash drives are examples of
Removable media
What information relates to the physical or mental health of an individual?
PHI
What should be done if you find classified Government Data/Information Not Cleared for Public Release on the Internet?
Make note of any identifying information and the website URL and report it to your security office
All https sites are legitimate and there is no risk to entering your personal info online.
FALSE
When using a fax machine to send sensitive information, the sender should do which of the following?
Contact the recipient to confirm receipt
What should be done to protect against insider threats?
Report any suspicious behavior
Which of the following is NOT a potential insider threat?
Member of a religion or faith