Back to AI Flashcard MakerInformation Technology /Cyber Awareness Knowledge Check - 2024 Part 5

Cyber Awareness Knowledge Check - 2024 Part 5

Information Technology30 CardsCreated 4 months ago

This deck covers key concepts related to cyber awareness, including security practices, data protection, and appropriate use of government systems.

Which of the following is true of traveling overseas with a mobile phone?

It may be compromised as soon as you exit the plane.
Tap or swipe ↕ to flip
Swipe ←→Navigate
1/30

Key Terms

Term
Definition
Which of the following is true of traveling overseas with a mobile phone?
It may be compromised as soon as you exit the plane.
When can you use removable media on a Government system?
When operationally necessary, owned by your organization, and approved by the appropriate authority
Which of the following can an unauthorized disclosure of information classified as Top Secret reasonably be expected to cause?
Exceptionally grave damage to national security
Which Cyber Protection Condition (CPCON) establishes a protection priority focus on critical functions only?
CPCON 4 - NOT CORRECT
Which of the following is NOT a permitted way to connect a personally-owned monitor to your Government-furnished equipment (GFE)?
Universal Serial Bus (USB)
Which type of data could reasonably be expected to cause serious damage to national security?
Secret

Related Flashcard Decks

Study Tips

  • Press F to enter focus mode for distraction-free studying
  • Review cards regularly to improve retention
  • Try to recall the answer before flipping the card
  • Share this deck with friends to study together
TermDefinition
Which of the following is true of traveling overseas with a mobile phone?
It may be compromised as soon as you exit the plane.
When can you use removable media on a Government system?
When operationally necessary, owned by your organization, and approved by the appropriate authority
Which of the following can an unauthorized disclosure of information classified as Top Secret reasonably be expected to cause?
Exceptionally grave damage to national security
Which Cyber Protection Condition (CPCON) establishes a protection priority focus on critical functions only?
CPCON 4 - NOT CORRECT
Which of the following is NOT a permitted way to connect a personally-owned monitor to your Government-furnished equipment (GFE)?
Universal Serial Bus (USB)
Which type of data could reasonably be expected to cause serious damage to national security?
Secret
Beth taps her phone at a payment terminal to pay for a purchase. Does this pose a security risk?
Yes, there is a risk that the signal could be intercepted and altered.
Which of the following is a best practice to protect your identity?
Order a credit report annually
Sylvia commutes to work via public transportation. She often uses the time to get a head start on work by making phone calls or responding to e-mails on her government approved mobile device. Does this pose a security concern?
Yes. Eavesdroppers may be listening to Sylvia's phone calls, and shoulder surfers may be looking at her screen. Sylvia should be aware of these risks.
How can you protect your home computer?
Turn on the password feature
Which of the following is an example of behavior that you should report?
Taking sensitive information home for telework without authorization
When is the safest time to post on social media about your vacation plans?
After the trip
Which of the following statements about Protected Health Information (PHI) is false?
It is a type of controlled unclassified information
You receive a phone call offering you a $50 gift care if your participate in a survey. Which course of action should you take?
Decline to participate. This may be a social engineering attempt.
Annabeth becomes aware that a conversation with a co-worker that involved Sensitive Compartmented Information (SCI) may have been overheard by someone who does not have the required clearance. What action should Annabeth take?
Contact her security POC to report the incident.
Which of the following uses of removable media is appropriate?
Encrypting data stored on removable media
Which of the following is NOT an appropriate use of your Common Access Card (CAC)?
Using it as photo identification with a commercial entity
Which of the following is least likely to pose a risk to share on a social networking site?
Your pet's name
Which of the following is a step you should NOT take to protect against spillage?
Purge any devices memory before connecting it to a classified network
On your home computer, how can you best establish passwords when creating separate user accounts?
Have each user create their own, strong password
Which of the following contributes to your online identity?
All of these
Which of the following is a best practice for using government email?
Do not send mass e-mails.
Which of the following is NOT a best practice for protecting data on a mobile device?
Disable automatic screen locking after a period of inactivity
Which of the following is NOT a way that malicious code can spread?
Running a virus scan
Based on the description provided, how many insider threat indicators are present? Elyse has worked for a DoD agency for more than 10 years. She is a diligent employee who receives excellent performance reviews and is a valued team member. She has two children and takes them on a weeklong beach vacation every summer. She spent a semester abroad in France as a teenager and plans to take her children to visit France when they are older.
0
Which of the following personally owned peripherals can you use with government furnished equipment (GFE)?
A monitor connected via USB
Which of the following is an example of a strong password?
d+Uf_4RimUz
Tom is working on a report that contains employees' names, home addresses, and salary. Which of the following is Tom prohibited from doing with the report?
E-mailing it to a colleague who needs to provide missing data
Carl receives an e-mail about a potential health risk caused by a common ingredient in processed food. Which of the following actions should Carl NOT take with the e-mail?
Forward it
Which of the following is true of telework?
You must have permission from your organization to telework.