Back to AI Flashcard MakerInformation Technology /Annual DoD Cyber Awareness Challenge Exam Part 4
Annual DoD Cyber Awareness Challenge Exam Part 4
This deck covers key questions and answers from the Annual DoD Cyber Awareness Challenge Exam, focusing on security awareness, best practices, and handling of sensitive information.
Of the following, which is NOT a security awareness tip?
Remove security badge as you enter a restaurant or retail establishment
Tap or swipe ↕ to flip
Swipe ←→Navigate
1/18
Key Terms
Term
Definition
Of the following, which is NOT a security awareness tip?
Remove security badge as you enter a restaurant or retail establishment
ActiveX is a type of this?
Mobile code
Which of the following is NOT a security best practice when saving cookies to a hard drive?
Looking for 'https' in the URL. All https sites are legitimate.
Which is NOT a requirement for telework?
Telework is only authorized for unclassified and confidential information
Someone calls from an unknown number and says they are from IT and need some information about your computer. What should you do?
Request the user's full name and phone number
Which is NOT a wireless security practice?
Turning off computer when not in use
Related Flashcard Decks
Study Tips
- Press F to enter focus mode for distraction-free studying
- Review cards regularly to improve retention
- Try to recall the answer before flipping the card
- Share this deck with friends to study together
| Term | Definition |
|---|---|
Of the following, which is NOT a security awareness tip? | Remove security badge as you enter a restaurant or retail establishment |
ActiveX is a type of this? | Mobile code |
Which of the following is NOT a security best practice when saving cookies to a hard drive? | Looking for 'https' in the URL. All https sites are legitimate. |
Which is NOT a requirement for telework? | Telework is only authorized for unclassified and confidential information |
Someone calls from an unknown number and says they are from IT and need some information about your computer. What should you do? | Request the user's full name and phone number |
Which is NOT a wireless security practice? | Turning off computer when not in use |
Malicious code can do the following except? | Make your computer more secure |
What type of data must be handled and stored properly based on classification markings and handling caveats? | Classified |
What information should you avoid posting on social networking sites? | All of the above |
A coworker has left an unknown CD on your desk. What should you do? | Put the CD in the trash |
Which of the following is NOT a DoD special requirement for tokens? | Using NIPRNet tokens on systems of higher classification level |
UNCLASSIFIED is a designation to mark information that does not have potential to damage national security. | TRUE |
You receive a call on your work phone and you're asked to participate in a phone survey. As part of the survey the caller asks for birth date and address. What type of attack might this be? | Social Engineering |
"Spillage" occurs when | Personal information is inadvertently posted at a website |
What should be done to sensitive data on laptops and other mobile computing devices? | Encrypt the sensitive data |
Which of the following should be done to keep your home computer secure? | All of the above |
How are Trojan horses, worms, and malicious scripts spread? | By email attachments |
The following practices help prevent viruses and the downloading of malicious code except. | Scan external files from only unverifiable sources before uploading to computer |