Back to AI Flashcard MakerInformation Technology /DOD Cyber Awareness Challenge 2024: Key Concepts and Review
DOD Cyber Awareness Challenge 2024: Key Concepts and Review
This deck covers key concepts from the DOD Cyber Awareness Challenge 2024, focusing on information security, identifying threats, and best practices for handling sensitive information.
Your meeting notes are unclassified. This means that your notes
Do not have the potential to damage national security.
Tap or swipe ↕ to flip
Swipe ←→Navigate
1/19
Key Terms
Term
Definition
Your meeting notes are unclassified. This means that your notes
Do not have the potential to damage national security.
What type of information does this personnel roster represent
Controlled unclassified information (cui)
When e-mailing this personnel roster, which of the following should you do?
All 3- encrypt, digitally, use
Select an action to take in response to compromised sensitive compartmented information (sci)
Call your security point of contact (poc)
Select a clue/ laptop- waterjug- printer
laptop-yes/ waterjug-no/ printer- no
Which of these individuals demonstrated behavior that could lead to the compromise of SCI
Col. Cockatiel
Related Flashcard Decks
Study Tips
- Press F to enter focus mode for distraction-free studying
- Review cards regularly to improve retention
- Try to recall the answer before flipping the card
- Share this deck with friends to study together
| Term | Definition |
|---|---|
Your meeting notes are unclassified. This means that your notes | Do not have the potential to damage national security. |
What type of information does this personnel roster represent | Controlled unclassified information (cui) |
When e-mailing this personnel roster, which of the following should you do? | All 3- encrypt, digitally, use |
Select an action to take in response to compromised sensitive compartmented information (sci) | Call your security point of contact (poc) |
Select a clue/ laptop- waterjug- printer | laptop-yes/ waterjug-no/ printer- no |
Which of these individuals demonstrated behavior that could lead to the compromise of SCI | Col. Cockatiel |
Which of the following poses a physical security risk. | open office area- posting an access roster in public view collateral classified space- both choices. Disable camera,microphone,wifi/ and use gov. wired peripherals Sensitive compartmented information facility- All 3 choices |
Is this an appropriate use of government-furnished equipment (gfe) sending gov email selling cookies | no/ all 3 you choices |
Select the individual who securely authenticates their identity | Alex. she is her |
How can malicious code spread | all except virus scans |
How can you prevent the download of malicious code | Scan external files before uploading toy your device Research apps and their vulnerabilities before downloading |
Which of the following may indicate a malicious code attack | a new app suddenly appears appears on the device the device slows down a new tap appears in the web browser |
1st email DOD IT 2nd email DOD software | 1st- 3+ this email contains 4 phishing indicators 2nd- 3+ |
Mobile devices | cash, approved hotspot, leave |
Social networking | delete, deny, keep scrolling |
Website use | research claim |
Insider threat | yes, report Roberto |
Telework | secure the area, hdmi monitor and usb keyboard, yes |
Home computer security | yes-install anti virus, yes create user profile, yes enable |