Back to AI Flashcard MakerInformation Technology /DoD Cyber Awareness 2023 – Study Guide Part 2

DoD Cyber Awareness 2023 – Study Guide Part 2

Information Technology25 CardsCreated 4 months ago

This deck covers key questions and answers from the DoD Cyber Awareness 2023 guide, focusing on security protocols, device usage, and data protection.

What portable electronic devices (PEDs) are permitted in a SCIF?

Only expressly authorized government-owned PEDs.
Tap or swipe ↕ to flip
Swipe ←→Navigate
1/25

Key Terms

Term
Definition
What portable electronic devices (PEDs) are permitted in a SCIF?
Only expressly authorized government-owned PEDs.
What is the response to an incident such as opening an uncontrolled DVD on a computer in a SCIF?
All of these.
Which of the following is NOT a type of malicious code?
Executables.
Which of the following actions can help tp protect your identity?
Shred personal documents.
Which is an appropriate use of government e-mail?
Use a digital signature when sending attachments or hyperlinks.
What type of social engineering targets particular groups of people?
Spear phishing.

Related Flashcard Decks

Study Tips

  • Press F to enter focus mode for distraction-free studying
  • Review cards regularly to improve retention
  • Try to recall the answer before flipping the card
  • Share this deck with friends to study together
TermDefinition
What portable electronic devices (PEDs) are permitted in a SCIF?
Only expressly authorized government-owned PEDs.
What is the response to an incident such as opening an uncontrolled DVD on a computer in a SCIF?
All of these.
Which of the following is NOT a type of malicious code?
Executables.
Which of the following actions can help tp protect your identity?
Shred personal documents.
Which is an appropriate use of government e-mail?
Use a digital signature when sending attachments or hyperlinks.
What type of social engineering targets particular groups of people?
Spear phishing.
How can you protect yourself from social engineering?
Verify the identity of all individuals.
Which of the following is true of traveling overseas with a mobile phone?
A personally owned device approved under Bring Your Own Approved Device (BYOAD) policy must be unenrolled while out of the country.
What should Sara do when using publicly available Internet, such as hotel Wi-Fi?
Only connect with Government VPN.
What is the danger of using public Wi-Fi connections?
Both of these.
Which of the following personally-owned computer peripherals is permitted for use with Government-furnished equipment?
A headset with a microphone through a Universal Serial Bus (USB) port.
How can you protect data on your mobile computing and portable electronic devices (PEDs)?
Enable automatic screen locking after a period of inactivity.
Which of the following is an example of removable media?
External hard drive.
Which of the following is true of Internet of Things (IoT) devices?
They can become an attack vector to other devices on your home network.
When is it appropriate to have your security badge visible?
At all times when in the facility.
What should the owner of this printed SCI do differently?
Retrieve classified documents promptly from printers.
What should the participants in this conversation involving SCI do differently?
Physically assess that everyone within listening distance is cleared and has a need-to-know for the information being discussed.
Which of the following demonstrates proper protection of mobile devices?
Linda encrypts all of the sensitive data on her government-issued mobile devices.
Which of the following does NOT constitute spillage?
Classified information that should be unclassified and is downgraded.
Which of the following is NOT an appropriate way to protect against inadvertent spillage?
Use the classified network for all work, including unclassified work.
Which of the following should you NOT do if you find classified information on the internet?
Download the information.
Who designates whether information is classified and its classification level?
Original classification authority.
Which of the following is a good practice to protect classified information?
Follow procedures for transferring data to and from outside agency and non-government networks.
Which of the following may help to prevent spillage?
Follow procedures for transferring data to and from outside agency and non-government networks.
Who designates whether information is classified and its classification level?
Original classification authority.