Back to AI Flashcard MakerInformation Technology /Department of Defense (DoD) Cyber Awareness Challenge 2024
Department of Defense (DoD) Cyber Awareness Challenge 2024
This deck covers key concepts and best practices for maintaining cybersecurity as outlined in the DoD Cyber Awareness Challenge 2024. It includes questions on appropriate use of removable media, protecting against viruses, and handling sensitive information.
Which of the following uses of removeable media is appropriate?
Encrypting data stored on removeable media
Tap or swipe ↕ to flip
Swipe ←→Navigate
1/25
Key Terms
Term
Definition
Which of the following uses of removeable media is appropriate?
Encrypting data stored on removeable media
How can you prevent viruses and malicious code?
Scan all external files before uploading to your computer
How can you protect your home computer?
Regularly back up your files
You receive a phone call offering you a $50 gift card if you participate in a survey. Which course of action should you take?
Decline to participate in the survey. This may be a social engineering attempt.
Which of the following is true of transmitting or transporting Sensitive Compartmented Information (SCI)?
Printed SCI must be retrieved promptly from the printer.
Under which Cyberspace Protection Condition (CPCON) is the priority focus limited to critical and essential functions?
CPCON 2
Related Flashcard Decks
Study Tips
- Press F to enter focus mode for distraction-free studying
- Review cards regularly to improve retention
- Try to recall the answer before flipping the card
- Share this deck with friends to study together
| Term | Definition |
|---|---|
Which of the following uses of removeable media is appropriate? | Encrypting data stored on removeable media |
How can you prevent viruses and malicious code? | Scan all external files before uploading to your computer |
How can you protect your home computer? | Regularly back up your files |
You receive a phone call offering you a $50 gift card if you participate in a survey. Which course of action should you take? | Decline to participate in the survey. This may be a social engineering attempt. |
Which of the following is true of transmitting or transporting Sensitive Compartmented Information (SCI)? | Printed SCI must be retrieved promptly from the printer. |
Under which Cyberspace Protection Condition (CPCON) is the priority focus limited to critical and essential functions? | CPCON 2 |
Which of the following is permitted when using an unclassified laptop within a collateral classified space? | A government issued wired headset with microphone. |
Which of the following contributes to your online identity? | All of these |
Which of the following is an appropriate use of a DoD Public Key Infrastructure (PKI) token? | Do not use a token approved for NIPR on SIPR |
Which of the following uses of removeable media is allowed? | Government owned removable media that is approved as operationally necessary |
Which of the following is not a best practice for traveling overseas with a mobile device? | Do not travel with a mobile device if you can avoid it |
Which of the following is a best practice to protect your identity? | Order a credit report annually |
Which of the following statements is true of DoD Unclassified data? | It may require access and distribution controls |
Which of the following is a best practice when browsing the internet? | Only accept cookies from reputable, trusted websites |
Which best describes an insider threat? Someone who uses __________ access, ______________, to harm national security through unauthorized disclosure, data modification, espionage, terrorism, or kinetic actions. | authorized, wittingly or unwittingly |
Which of the following describes Sensitive Compartmented Information (SCI)? SCI is a program that ____________ various types of classified information into distinct compartments for ________ protection and dissemination or distribution control. | segregates; added |
How can an adversary use information available in public records to target you? | Combine it with info from other data sources to learn how to best bait you with a scam |
Which type of data could reasonably be expected to cause serious damage to national security? | Secret |
After a classified document is leaked online, it makes national headlines. Which of the following statements is true of the leaked information that is now accessible by the public? | You should still treat it as classified even though it has been compromised. |
Which of the following is an example of a strong password? | d+Uf_4RimUz |
How can you mitigate the potential risk associated with a compressed URL? | Use the preview function to see where the link actually leads |
Which of the following is permitted within a Sensitive Compartmented Information (SCIF)? | An authorized Government-owned Portable Electronic Device (PED) |
Which of the following is NOT a best practice for teleworking in an environment where Internet of Things (IoT) devices are present? | Use the devices' default security settings |
Beth taps her phone at a payment terminal to pay for a purchase. Does this pose a security risk? | Yes, there is a risk that the signal could be intercepted and altered |
Which of the following is least likely to pose a risk to share on a social networking site? | Your pet's name |