Back to AI Flashcard MakerInformation Technology /Cyber Awareness 2025
Cyber Awareness 2025
This deck covers key concepts and best practices for cyber awareness, including data protection, security risks, and appropriate use of government equipment.
Which of the following is a best practice when browsing the internet
look for https in the URL name
Tap or swipe ↕ to flip
Swipe ←→Navigate
1/25
Key Terms
Term
Definition
Which of the following is a best practice when browsing the internet
look for https in the URL name
Which of the following is an allowed use of government furnished equipment
emailing your supervisor
how do you protect data on a mobile device
use 2 factor authentication
which of the following is true of transmitting or transporting SCI
you must be courier briefed for sci to transport it
which of the following poses a security risk while teleworking in an environment where IOT divides are present
all of these
how can you prevent viruses and malicious code
scan all email attachments
Related Flashcard Decks
Study Tips
- Press F to enter focus mode for distraction-free studying
- Review cards regularly to improve retention
- Try to recall the answer before flipping the card
- Share this deck with friends to study together
| Term | Definition |
|---|---|
Which of the following is a best practice when browsing the internet | look for https in the URL name |
Which of the following is an allowed use of government furnished equipment | emailing your supervisor |
how do you protect data on a mobile device | use 2 factor authentication |
which of the following is true of transmitting or transporting SCI | you must be courier briefed for sci to transport it |
which of the following poses a security risk while teleworking in an environment where IOT divides are present | all of these |
how can you prevent viruses and malicious code | scan all email attachments |
example of removable media | compact disc |
which of the following is a best practice to protect your identity | ask how information will be used before giving it out |
Which of these is not a potential indicator that your device may be under malicious code attack | operating system update |
how can you protect your home computer | install spyware protection software |
Which of the following is permitted within a sensitive compartmented information facility SCIF? | An authorized Government-owned Portable Electronic Device (PED) |
Type of data could reasonably be expected to cause damage to national security? | Top Secret |
example of a strong password | bBrobr\@791\*p |
Which of the following is true of working within a sensitive compartmented information facility SCIF | badges must be worn while in the facility and removed when leaving the facility |
which of the following statements is true of DoD unclassified data? | It does not have potential to damage national security |
as you scroll through your social media feed, a news headline catches your eye. What should you consider before sharing it | whether source is credible and reliable |
how can you protect yourself from identity theft? | review your credit report annually |
steve occasionally runs errands during virtual meetings. He joins the meeting using his approved government device. does this pose a security concern? | yes, eavesdroppers may be listening to steves conversation |
how can you protect your home computer? | use legitament known antivirus software |
which of the following is not an appropriate use of your cac? | exchanging for a visitor pass in another building |
which of the following is true of removable media and portable electronic devices | risks associated with them may lead to loss of life |
you receive a phone call from a unknown person asking for a directory name on your government furnished laptop so that a software update can be made, which course of action? | document the interaction, contact security POC |
how can you protect yourself on social networking sites | validate connection requests through another source |
John receives an email about a potential shutdown of a major social service unless a petition receives enough signatures, what action should john not take | forward it |
what is an insider threat | Someone who uses authorized access, wittingly or unwittingly, to harm national security |