Back to AI Flashcard MakerInformation Technology /Cybersecurity and Information Assurance Knowledge

Cybersecurity and Information Assurance Knowledge

Information Technology25 CardsCreated 5 months ago

This deck covers key concepts and best practices in cybersecurity and information assurance, focusing on personal and organizational security measures.

When linked to a specific individual, which of the following is NOT an example of Personally Identifiable Information (PII)?

Automobile make and model
Tap or swipe ↕ to flip
Swipe ←→Navigate
1/25

Key Terms

Term
Definition
When linked to a specific individual, which of the following is NOT an example of Personally Identifiable Information (PII)?
Automobile make and model
How can you mitigate the potential risk associated with a compressed URL (e.g., TinyURL, goo.gl)?
Use the preview function to see where the link actually leads
What is the goal of an Insider Threat Program?
Deter, Detect, and Mitigate the risks associated with insider threats
Elyse with excellent performance, vacation with two children, semester in France, plans to visit. How many threats?
Common answer: 3-4 potential threats, context-dependent
Mabel needs to share a document with her supervisor, which is appropriate?
Encrypt it and send digitally
Which of the following is NOT a best practice for protecting data on a mobile device?
Disable automatic screen locking after a period of inactivity

Related Flashcard Decks

Study Tips

  • Press F to enter focus mode for distraction-free studying
  • Review cards regularly to improve retention
  • Try to recall the answer before flipping the card
  • Share this deck with friends to study together
TermDefinition
When linked to a specific individual, which of the following is NOT an example of Personally Identifiable Information (PII)?
Automobile make and model
How can you mitigate the potential risk associated with a compressed URL (e.g., TinyURL, goo.gl)?
Use the preview function to see where the link actually leads
What is the goal of an Insider Threat Program?
Deter, Detect, and Mitigate the risks associated with insider threats
Elyse with excellent performance, vacation with two children, semester in France, plans to visit. How many threats?
Common answer: 3-4 potential threats, context-dependent
Mabel needs to share a document with her supervisor, which is appropriate?
Encrypt it and send digitally
Which of the following is NOT a best practice for protecting data on a mobile device?
Disable automatic screen locking after a period of inactivity
Which of these is NOT a potential indicator that your device may be under a malicious code attack?
A notification for a system update that has been publicized
When is the safest time to post on social media about your vacation plans?
After the trip
You receive email with link to update software on Govt laptop. IT department hasn't done this before nor announced it. Email not digitally signed. What should you do?
Report the email to your security POC or help desk
After a classified document is leaked online, it makes headlines. Which of the following is true?
You should still treat it as classified even though it has been compromised
Where are you permitted to use classified materials?
Only in areas with security appropriate to the classification level
Which of the following is a risk associated with removable media?
All of these
Which of the following is a best practice for physical security?
Use your own security badge or key code for facility access
Which of the following is a best practice to protect your identity?
Order a credit report annually
Which of the following is NOT an appropriate use of your Common Access Card (CAC)?
Using it as photo identification with a commercial entity
Which of the following is an authoritative source for derivative classification?
Security Classification Guide
How should government-owned removable media be stored?
In a GSA-approved safe with appropriate classification level
Which of the following is an allowed use of government-furnished equipment?
Checking personal email if organization allows it
Which of the following is true of Controlled Unclassified Information?
It must be handled using safeguarding or dissemination controls
How can you protect your home computer?
Turn on the password feature
Which of the following is an appropriate use of government email?
Using a digital signature when sending attachments
Which of the following is true of working within a Sensitive Compartmented Information Facility (SCIF)?
A designated individual is responsible for securing the entrance and exit points
Which of the following is true of spillage?
It can be either inadvertent or intentional
Text message from package shipper says delivery delayed. You are not expecting a package. Best course of action?
Delete the message
Which of the following personally owned peripherals can you use with government-furnished equipment?
Keyboard and USB hub