Back to AI Flashcard MakerInformation Technology /Cyber Awareness Challenge 2024 (Knowledge Pre-Check)

Cyber Awareness Challenge 2024 (Knowledge Pre-Check)

Information Technology21 CardsCreated 5 months ago

This deck covers key concepts and best practices for cyber awareness, including handling classified information, social networking, teleworking, and more.

Which of the following is a best practice for managing connection requests on social networking sites?

Validate connection requests through another source if possible
Tap or swipe ↕ to flip
Swipe ←→Navigate
1/21

Key Terms

Term
Definition
Which of the following is a best practice for managing connection requests on social networking sites?
Validate connection requests through another source if possible
Which of the following is an authoritative source for derivative classification?
Security Classification Guide
Which of the following is a step you should NOT take to protect against spillage?
Purge any device's memory before connecting it to a classified network?
Which best describes an insider threat? Someone who uses _________ access, _________, to harm national security through unauthorized disclosure, data modification, espionage, terrorism, or kinetic actions.
authorized, wittingly or unwittingly
Which of the following is NOT a best practice for teleworking in an environment where Internet of Things (IoT) devices are present?
Use the devices' default security settings
Which of the following is a best practice for using government e-mail?
Do not send mass e-mails

Related Flashcard Decks

Study Tips

  • Press F to enter focus mode for distraction-free studying
  • Review cards regularly to improve retention
  • Try to recall the answer before flipping the card
  • Share this deck with friends to study together
TermDefinition
Which of the following is a best practice for managing connection requests on social networking sites?
Validate connection requests through another source if possible
Which of the following is an authoritative source for derivative classification?
Security Classification Guide
Which of the following is a step you should NOT take to protect against spillage?
Purge any device's memory before connecting it to a classified network?
Which best describes an insider threat? Someone who uses _________ access, _________, to harm national security through unauthorized disclosure, data modification, espionage, terrorism, or kinetic actions.
authorized, wittingly or unwittingly
Which of the following is NOT a best practice for teleworking in an environment where Internet of Things (IoT) devices are present?
Use the devices' default security settings
Which of the following is a best practice for using government e-mail?
Do not send mass e-mails
How can you mitigate the potential risk associated with a compressed URL (e.g., TinyURL, goo.gl)?
Use the preview function to see where the link actually leads
Where are you permitted to use classified data?
Only in areas with security appropriate to the classification level
Tom is working on a report that contains employees' names, home addresses, and salary. Which of the following is Tom prohibited from doing with the report?
Email it to a colleague like a silly goose
Beth taps her phone at a payment terminal to pay for a purchase. Does this pose a security risk?
Yes, there is a risk that the signal could be intercepted and altered
When is the safest time to post on social media about your vacation plans?
After the trip
Which of the following is permitted when using an unclassified laptop within a collateral classified space?
A Government-issued wired headset with microphone
Which of the following uses of removable media is allowed?
Government owned removable media that is approved as operationally necessary
On your home computer, how can you best establish passwords when creating separate user accounts?
Have each user create their own, strong password
You receive an e-mail marked important from your boss asking for data that they need immediately for a meeting starting now. The e-mail was sent from a personal e-mail address that you do not recognize, but it addresses you by name. What concern does this e-mail pose?
This may be a spear phishing attempt. Contact your boss using contact information that you know to be legitimate.
How can you protect your home computer?
Regularly back up your files
Which of the following is an appropriate use of a DoD Public Key Infrastructure (PKI) token?
Do not use a token approved for NIPR on SIPR
Which of the following describes Sensitive Compartmented Information (SCI)? SCI is a program that _________ various types of classified information for _________ protection and dissemination or distribution control.
segregates, added
Which of the following is true about telework?
You must have your organization's permission to telework
Which of the following is an appropriate use of government e-mail?
Using a digital signature when sending attachments
Which of the following personally owned peripherals can you use with government furnished equipment (GFE)?
A USB hub