Back to AI Flashcard MakerInformation Technology /Cyber Awareness Knowledge Check - 2024 Part 3

Cyber Awareness Knowledge Check - 2024 Part 3

Information Technology25 CardsCreated 4 months ago

This deck covers essential concepts related to cyber awareness, including risks associated with removable media, indicators of malicious code, and best practices for protecting personal and government data.

Which is a risk associated with removable media?

Spillage of classified information.
Tap or swipe ↕ to flip
Swipe ←→Navigate
1/25

Key Terms

Term
Definition
Which is a risk associated with removable media?
Spillage of classified information.
What is an indication that malicious code is running on your system?
File corruption
What are some actions you can take to try to protect your identity?
Shred personal documents; never share passwords; and order a credit report annually.
Which of the following is an appropriate use of Government e-mail?
Digitally signing e-mails that contain attachments or hyperlinks.
What is a protection against internet hoaxes?
Use online sites to confirm or expose potential hoaxes.
What can malicious code do?
It can cause damage by corrupting files, erasing your hard drive, and/or allowing hackers access.

Related Flashcard Decks

Study Tips

  • Press F to enter focus mode for distraction-free studying
  • Review cards regularly to improve retention
  • Try to recall the answer before flipping the card
  • Share this deck with friends to study together
TermDefinition
Which is a risk associated with removable media?
Spillage of classified information.
What is an indication that malicious code is running on your system?
File corruption
What are some actions you can take to try to protect your identity?
Shred personal documents; never share passwords; and order a credit report annually.
Which of the following is an appropriate use of Government e-mail?
Digitally signing e-mails that contain attachments or hyperlinks.
What is a protection against internet hoaxes?
Use online sites to confirm or expose potential hoaxes.
What can malicious code do?
It can cause damage by corrupting files, erasing your hard drive, and/or allowing hackers access.
Which is true of cookies?
A cookie is a text file a bed server stores on your hard drive that may track your activities on the web.
What is a common method used in social engineering?
Telephone surveys
Which may be a security issue with compressed URLs?
There is no way to know where the link actually leads.
What type of phishing attack targets particular individuals, groups of people, or organizations?
Spear phishing
While on vacation, a coworker calls and asks you to access a site to review and approve a document that is hosted behind a DoD Public Key Infrastructure (PKI) protected webpage. You do not have your government-issued laptop. What action should you take?
Wait until you have access to your government-issued laptop.
Under what circumstances is it acceptable to use your Government-furnished computer to check personal e-mail and do other non-work-related activities?
If allowed by organization policy.
Which are examples of portable electronic devices (PEDs)?
Thumb drives, memory sticks, and optical disks
What are some examples of removable media?
Memory sticks, flash drives, or external hard drives
What is a valid response when identity theft occurs?
Report the crime to local law enforcement.
What is a common indicator of a phishing attempt?
It includes a threat of dire circumstances.
What is whaling?
A type of phishing targeted at high-level personnel such as senior officials.
Upon connecting your Government-issued laptop to a public wireless connection, what should you immediately do?
Connect to the Government Virtual Private Network (VPN).
Which of the following activities is an ethical use of Government-furnished equipment (GFE)?
Completing your expense report for your government travel.
Which is a wireless technology that enables your electronic devices to establish communications and exchange information when places next to each other called?
Near field communication (NFC)
Which of the following helps protect data on your personal mobile devices?
Secure personal mobile devices to the same level as Government-issued systems.
What is a possible indication of a malicious code attack in progress?
A pop-up window that flashes and warns that your computer is infected with a virus.
What should you do if a commercial entity, such as a hotel reception desk, asks for Government identification so that they can make a photocopy?
Do not allow you Common Access Card (CAC) to be photocopied.
When is conducting a private money-making venture using your Government-furnished computer permitted?
It is never permitted.
What is a good practice to protect data on your home wireless systems?
Ensure that the wireless security features are properly configured.