Back to AI Flashcard MakerInformation Technology /Cyber Awareness Challenge 2024 Part 2
Cyber Awareness Challenge 2024 Part 2
This deck covers key concepts and best practices for cyber awareness, including data protection, identity security, and appropriate use of government resources.
Which of the following is a step you should NOT take to protect against spillage?
Purge any device's memory before connecting it to a classified network
Tap or swipe ↕ to flip
Swipe ←→Navigate
1/25
Key Terms
Term
Definition
Which of the following is a step you should NOT take to protect against spillage?
Purge any device's memory before connecting it to a classified network
Which of the following is a best practice to protect your identity?
Order a credit report annually
Which type of data could reasonably be expected to cause serious damage to national security?
Secret
Which of following is a best practice for physical security?
Use your own security badge or key code for facility access
Which of the following is an example of a strong password?
d+Uf_4RimUz
Which of the following is permitted within a Sensitive Compartmented Information Facility (SCIF)?
An authorized government owned portable electronic device (PED)
Related Flashcard Decks
Study Tips
- Press F to enter focus mode for distraction-free studying
- Review cards regularly to improve retention
- Try to recall the answer before flipping the card
- Share this deck with friends to study together
| Term | Definition |
|---|---|
Which of the following is a step you should NOT take to protect against spillage? | Purge any device's memory before connecting it to a classified network |
Which of the following is a best practice to protect your identity? | Order a credit report annually |
Which type of data could reasonably be expected to cause serious damage to national security? | Secret |
Which of following is a best practice for physical security? | Use your own security badge or key code for facility access |
Which of the following is an example of a strong password? | d+Uf_4RimUz |
Which of the following is permitted within a Sensitive Compartmented Information Facility (SCIF)? | An authorized government owned portable electronic device (PED) |
Which of the following is least likely to pose a risk to share on a social networking site? | Your pet's name |
How can you protect your home computer? | Turn on the password feature
Regularly back up your files |
Which of the following is an appropriate use of government e-mail? | Using a digital signature when sending attachments |
Which of the following is true of transmitting or transporting SCI? | Printed SCI must be retrieved promptly from the printer |
What conditions are necessary to be granted access to SCI? | Top Secret clearance and indoctrination into the SCI program |
Terry sees a post on her social media feed that says there is smoke billowing from the Pentagon... | This is probably a post designed to attract Terr's attention to click on a link and steal her information |
Which of the following statements about PHI is false? | It is created or received by a healthcare provider, health plan, or employer of a business associate of these. |
Which of the following is NOT a best practice for protecting your home wireless network for telework? | Use your router's pre-set SSID and password |
Which of the following is an example of behavior that you should report? | Taking sensitive information home for telework without authorization |
You receive a text message from a package shipper notifying you that your package delivery is delayed due to needing updated delivery instructions from you. | Delete the message |
Which of the following is an appropriate use of a DoD PKI token? | Do not use a token approved for NIPR on SIPR |
Which of the following is a best practice when browsing the internet? | Only accept cookies from reputable, trusted websites |
Where are you permitted to use classified data? | Only in areas with security appropriate to the classification level |
Which of the following contributes to your online identity? | All of these |
Which of the following statements is true of DoD Unclassified data? | It may require access and distribution controls |
What is the goal of an Insider Threat Program? | Deter, detect, and mitigate |
Which of the following uses of removable media is allowed? | Government owned removable media that is approved as operationally necessary |
Which of the following is permitted when using an unclassified laptop within a collateral classified space? | A government-issued WIRED headset with microphone |
Which of the following is NOT an appropriate use of your CAC? | Using it as photo identification with a commercial entity |