Cyber Awareness 2025

Information Technology25 CardsCreated 5 months ago

This deck covers key concepts and best practices for cyber awareness, including data protection, security risks, and appropriate use of government equipment.

Which of the following is a best practice when browsing the internet

look for https in the URL name
Tap or swipe ↕ to flip
Swipe ←→Navigate
1/25

Key Terms

Term
Definition
Which of the following is a best practice when browsing the internet
look for https in the URL name
Which of the following is an allowed use of government furnished equipment
emailing your supervisor
how do you protect data on a mobile device
use 2 factor authentication
which of the following is true of transmitting or transporting SCI
you must be courier briefed for sci to transport it
which of the following poses a security risk while teleworking in an environment where IOT divides are present
all of these
how can you prevent viruses and malicious code
scan all email attachments

Related Flashcard Decks

Study Tips

  • Press F to enter focus mode for distraction-free studying
  • Review cards regularly to improve retention
  • Try to recall the answer before flipping the card
  • Share this deck with friends to study together
TermDefinition
Which of the following is a best practice when browsing the internet
look for https in the URL name
Which of the following is an allowed use of government furnished equipment
emailing your supervisor
how do you protect data on a mobile device
use 2 factor authentication
which of the following is true of transmitting or transporting SCI
you must be courier briefed for sci to transport it
which of the following poses a security risk while teleworking in an environment where IOT divides are present
all of these
how can you prevent viruses and malicious code
scan all email attachments
example of removable media
compact disc
which of the following is a best practice to protect your identity
ask how information will be used before giving it out
Which of these is not a potential indicator that your device may be under malicious code attack
operating system update
how can you protect your home computer
install spyware protection software
Which of the following is permitted within a sensitive compartmented information facility SCIF?
An authorized Government-owned Portable Electronic Device (PED)
Type of data could reasonably be expected to cause damage to national security?
Top Secret
example of a strong password
bBrobr\@791\*p
Which of the following is true of working within a sensitive compartmented information facility SCIF
badges must be worn while in the facility and removed when leaving the facility
which of the following statements is true of DoD unclassified data?
It does not have potential to damage national security
as you scroll through your social media feed, a news headline catches your eye. What should you consider before sharing it
whether source is credible and reliable
how can you protect yourself from identity theft?
review your credit report annually
steve occasionally runs errands during virtual meetings. He joins the meeting using his approved government device. does this pose a security concern?
yes, eavesdroppers may be listening to steves conversation
how can you protect your home computer?
use legitament known antivirus software
which of the following is not an appropriate use of your cac?
exchanging for a visitor pass in another building
which of the following is true of removable media and portable electronic devices
risks associated with them may lead to loss of life
you receive a phone call from a unknown person asking for a directory name on your government furnished laptop so that a software update can be made, which course of action?
document the interaction, contact security POC
how can you protect yourself on social networking sites
validate connection requests through another source
John receives an email about a potential shutdown of a major social service unless a petition receives enough signatures, what action should john not take
forward it
what is an insider threat
Someone who uses authorized access, wittingly or unwittingly, to harm national security