Back to AI Flashcard MakerInformation Technology /DoD Cyber Awareness 2023 – Study Guide Part 3

DoD Cyber Awareness 2023 – Study Guide Part 3

Information Technology23 CardsCreated 4 months ago

This deck covers key concepts and security practices from the DoD Cyber Awareness 2023 guide, focusing on insider threats, mobile device security, ethical use of government equipment, and more.

In addition to avoiding the temptation of greed to betray his country, what should Alex do differently?

Avoid talking about work outside of the workplace or with people without a need-to-know.
Tap or swipe ↕ to flip
Swipe ←→Navigate
1/23

Key Terms

Term
Definition
In addition to avoiding the temptation of greed to betray his country, what should Alex do differently?
Avoid talking about work outside of the workplace or with people without a need-to-know.
How many insider threat indicators does Alex demonstrate?
Three or more.
What should Alex's colleagues do?
Report the suspicious behave in accordance with their organization's threat policy.
Which of the following is true?
Digitally signed e-mails are more secure.
Which of the following best describes the conditions under which mobile devices and applications can track your location?
It is often the default but can be prevented by disabling the location function.
When is it okay to charge a personal mobile device using government-furnished equipment (GFE)?
This is never okay.

Related Flashcard Decks

Study Tips

  • Press F to enter focus mode for distraction-free studying
  • Review cards regularly to improve retention
  • Try to recall the answer before flipping the card
  • Share this deck with friends to study together
TermDefinition
In addition to avoiding the temptation of greed to betray his country, what should Alex do differently?
Avoid talking about work outside of the workplace or with people without a need-to-know.
How many insider threat indicators does Alex demonstrate?
Three or more.
What should Alex's colleagues do?
Report the suspicious behave in accordance with their organization's threat policy.
Which of the following is true?
Digitally signed e-mails are more secure.
Which of the following best describes the conditions under which mobile devices and applications can track your location?
It is often the default but can be prevented by disabling the location function.
When is it okay to charge a personal mobile device using government-furnished equipment (GFE)?
This is never okay.
Which of the following demonstrates proper protection of mobile devices?
Linda encrypts all of the sensitive data on her government-issued mobile devices.
What security risk does a public Wi-Fi connection pose?
It may prohibit the use of a virtual private network (VPN).
Which of the following represents an ethical use of your Government-furnished equipment (GFE)?
Checking personal e-mail when allowed by your organization.
When may you be subject to criminal, disciplinary, and/or administrative action due to online harassment, bullying, stalking, hazing, discrimination, or retaliation?
If you participate in or condone it at any time.
How can you protect yourself on social networking sites?
Validate friend requests through another source through another source before confirming them.
Which piece of information is safest to include on your social media profile?
Photos of your pet.
Which of the following is true of removable media and portable electronic devices (PEDs)?
They have similar features, and the same rules and protections apply to both.
Which of the following is a security best practice for protecting Personally Identifiable Information (PII)?
Only use Government-approved equipment to process PII.
Which of the following is true of Controlled Unclassified Information (CUI)?
CUI must be handled using safeguarding or dissemination controls.
Which Cyber Protection Condition (CPCON) establishes a protection priority focus on critical functions only?
CPCON 1.
Which of the following is true of the Common Access Card (CAC) or Personal Identity Verification (PIV) card?
You should remove and take your CAC/PIV card whenever you leave your workstation.
Which of the following is an example of a strong password?
%2ZN=Ugq
A compromise of Sensitive Compartmented Information (SCI) occurs when a person who does not have the required clearance or access caveats comes into possession of SCI________.
in any manner.
Which of the following is a good practice to protest classified information?
Don't assume open storage in a secure facility is authorized.
Based on the description that follows, how many potential insider threat indicators(s) are displayed? A colleague saves money for an overseas vacation every year, is a single father, and occasionally consumes alcohol.
2 indicators.
Which of the following statements is true?
Adversaries exploit social networking sites to disseminate fake news.
Which of the following is true about URLs?
May be used to mask malicious intent.