Back to AI Flashcard MakerInformation Technology /Annual DoD Cyber Awareness Challenge Exam Part 4

Annual DoD Cyber Awareness Challenge Exam Part 4

Information Technology18 CardsCreated 4 months ago

This deck covers key questions and answers from the Annual DoD Cyber Awareness Challenge Exam, focusing on security awareness, best practices, and handling of sensitive information.

Of the following, which is NOT a security awareness tip?

Remove security badge as you enter a restaurant or retail establishment
Tap or swipe ↕ to flip
Swipe ←→Navigate
1/18

Key Terms

Term
Definition
Of the following, which is NOT a security awareness tip?
Remove security badge as you enter a restaurant or retail establishment
ActiveX is a type of this?
Mobile code
Which of the following is NOT a security best practice when saving cookies to a hard drive?
Looking for 'https' in the URL. All https sites are legitimate.
Which is NOT a requirement for telework?
Telework is only authorized for unclassified and confidential information
Someone calls from an unknown number and says they are from IT and need some information about your computer. What should you do?
Request the user's full name and phone number
Which is NOT a wireless security practice?
Turning off computer when not in use

Related Flashcard Decks

Study Tips

  • Press F to enter focus mode for distraction-free studying
  • Review cards regularly to improve retention
  • Try to recall the answer before flipping the card
  • Share this deck with friends to study together
TermDefinition
Of the following, which is NOT a security awareness tip?
Remove security badge as you enter a restaurant or retail establishment
ActiveX is a type of this?
Mobile code
Which of the following is NOT a security best practice when saving cookies to a hard drive?
Looking for 'https' in the URL. All https sites are legitimate.
Which is NOT a requirement for telework?
Telework is only authorized for unclassified and confidential information
Someone calls from an unknown number and says they are from IT and need some information about your computer. What should you do?
Request the user's full name and phone number
Which is NOT a wireless security practice?
Turning off computer when not in use
Malicious code can do the following except?
Make your computer more secure
What type of data must be handled and stored properly based on classification markings and handling caveats?
Classified
What information should you avoid posting on social networking sites?
All of the above
A coworker has left an unknown CD on your desk. What should you do?
Put the CD in the trash
Which of the following is NOT a DoD special requirement for tokens?
Using NIPRNet tokens on systems of higher classification level
UNCLASSIFIED is a designation to mark information that does not have potential to damage national security.
TRUE
You receive a call on your work phone and you're asked to participate in a phone survey. As part of the survey the caller asks for birth date and address. What type of attack might this be?
Social Engineering
"Spillage" occurs when
Personal information is inadvertently posted at a website
What should be done to sensitive data on laptops and other mobile computing devices?
Encrypt the sensitive data
Which of the following should be done to keep your home computer secure?
All of the above
How are Trojan horses, worms, and malicious scripts spread?
By email attachments
The following practices help prevent viruses and the downloading of malicious code except.
Scan external files from only unverifiable sources before uploading to computer