Back to AI Flashcard MakerInformation Technology /Cyber Awareness Challenge 2024 Knowledge Test
Cyber Awareness Challenge 2024 Knowledge Test
This deck covers key concepts and best practices for cyber awareness, including protection measures, risk management, and proper handling of sensitive information.
Under which Cyberspace Protection Condition (CPCON) is the priority focus limited to critical and essential functions?
CPCON 1
Tap or swipe ↕ to flip
Swipe ←→Navigate
1/25
Key Terms
Term
Definition
Under which Cyberspace Protection Condition (CPCON) is the priority focus limited to critical and essential functions?
CPCON 1
Which of the following is a risk associated with removable media?
All of these
Tom is working on a report that contains employees' names, home addresses, and salary. Which of the following is Tom prohibited from doing with the report?
E-mailing it to a colleague who needs to provide missing data
Which of the following is NOT a way that malicious code can spread?
Running a virus scan
How can you prevent viruses and malicious code?
Scan all external files before uploading to your computer
Which of the following is an example of a strong password?
d+Uf_4RimUz
Related Flashcard Decks
Study Tips
- Press F to enter focus mode for distraction-free studying
- Review cards regularly to improve retention
- Try to recall the answer before flipping the card
- Share this deck with friends to study together
| Term | Definition |
|---|---|
Under which Cyberspace Protection Condition (CPCON) is the priority focus limited to critical and essential functions? | CPCON 1 |
Which of the following is a risk associated with removable media? | All of these |
Tom is working on a report that contains employees' names, home addresses, and salary. Which of the following is Tom prohibited from doing with the report? | E-mailing it to a colleague who needs to provide missing data |
Which of the following is NOT a way that malicious code can spread? | Running a virus scan |
How can you prevent viruses and malicious code? | Scan all external files before uploading to your computer |
Which of the following is an example of a strong password? | d+Uf_4RimUz |
Which of the following is permitted within a Sensitive Compartmented Information Facility (SCIF)? | An authorized Government-owned Portable Electronic Device (PED). |
Which of the following is an authoritative source for derivative classification? | Security Classification Guide. |
Which of the following is a best practice when browsing the internet? | Only accept cookies from reputable, trusted websites. |
Sylvia commutes to work via public transportation. She often uses the time to get a head start on work by making phone calls or responding to e-mails on her government approved mobile device. Does this pose a security concern? | No, because Sylvia is using a government approved device. |
How can you protect your home computer? | Install spyware protection software |
Carl receives an email about a potential health risk caused by a common ingredient in processed food. Which of the following actions should Carl NOT take with the e-mail? | Delete it. |
Annabeth becomes aware that a conversation with a co-worker that involved Sensitive Compartmented Information (SCI) may have been overheard by someone who does not have the required clearance. What action should Annabeth take? | Contact her security POC with detailed information about the incident. |
Which of the following is NOT a best practice for travelling overseas with a mobile device? | Do not travel with a mobile device if you can avoid it. |
Which of the following is true of telework? | You must have permission from your organization to telework. |
You receive a text message from a package shipper notifying you that your package delivery is delayed due to needing updated delivery instructions from you. It provides a shortened link for you to provide the needed information. You are not expecting a package. What is the best course of action? | Delete the message. |
Which of the following is NOT a best practice for protecting data on a mobile device? | Disable automatic screen locking after a period of inactivity. |
How can you mitigate the potential risk associated with a compressed URL (e.g.,TinyURL,goo.gl)? | Use the preview function to see where the link actually leads. |
Which of the following is NOT a best practice for teleworking in an environment where Internet of Things (IoT) devices are present? | Use the devices' default security settings. |
Where are you permitted to use classified data? | Only in areas with security appropriate to the classification level. |
Which of the following is an example of behavior that you should report? | Taking sensitive information home for telework without authorization. |
Which of the following contributes to your online identity? | All of these. |
Which of the following is least likely to pose a risk to share on a social networking site? | Your pet's name. |
On your home computer, how can you best establish passwords when creating separate user accounts? | Have each user create their own, strong password. |
Which of the following is NOT an appropriate use of your Common Access Card (CAC)? | Using it as photo identification with a commercial entity. |