Back to AI Flashcard MakerInformation Technology /DOD Cyber Awareness Challenge 2024: Key Concepts and Review

DOD Cyber Awareness Challenge 2024: Key Concepts and Review

Information Technology19 CardsCreated 4 months ago

This deck covers key concepts from the DOD Cyber Awareness Challenge 2024, focusing on information security, identifying threats, and best practices for handling sensitive information.

Your meeting notes are unclassified. This means that your notes

Do not have the potential to damage national security.
Tap or swipe ↕ to flip
Swipe ←→Navigate
1/19

Key Terms

Term
Definition
Your meeting notes are unclassified. This means that your notes
Do not have the potential to damage national security.
What type of information does this personnel roster represent
Controlled unclassified information (cui)
When e-mailing this personnel roster, which of the following should you do?
All 3- encrypt, digitally, use
Select an action to take in response to compromised sensitive compartmented information (sci)
Call your security point of contact (poc)
Select a clue/ laptop- waterjug- printer
laptop-yes/ waterjug-no/ printer- no
Which of these individuals demonstrated behavior that could lead to the compromise of SCI
Col. Cockatiel

Related Flashcard Decks

Study Tips

  • Press F to enter focus mode for distraction-free studying
  • Review cards regularly to improve retention
  • Try to recall the answer before flipping the card
  • Share this deck with friends to study together
TermDefinition
Your meeting notes are unclassified. This means that your notes
Do not have the potential to damage national security.
What type of information does this personnel roster represent
Controlled unclassified information (cui)
When e-mailing this personnel roster, which of the following should you do?
All 3- encrypt, digitally, use
Select an action to take in response to compromised sensitive compartmented information (sci)
Call your security point of contact (poc)
Select a clue/ laptop- waterjug- printer
laptop-yes/ waterjug-no/ printer- no
Which of these individuals demonstrated behavior that could lead to the compromise of SCI
Col. Cockatiel
Which of the following poses a physical security risk.
open office area- posting an access roster in public view collateral classified space- both choices. Disable camera,microphone,wifi/ and use gov. wired peripherals Sensitive compartmented information facility- All 3 choices
Is this an appropriate use of government-furnished equipment (gfe) sending gov email selling cookies
no/ all 3 you choices
Select the individual who securely authenticates their identity
Alex. she is her
How can malicious code spread
all except virus scans
How can you prevent the download of malicious code
Scan external files before uploading toy your device Research apps and their vulnerabilities before downloading
Which of the following may indicate a malicious code attack
a new app suddenly appears appears on the device the device slows down a new tap appears in the web browser
1st email DOD IT 2nd email DOD software
1st- 3+ this email contains 4 phishing indicators 2nd- 3+
Mobile devices
cash, approved hotspot, leave
Social networking
delete, deny, keep scrolling
Website use
research claim
Insider threat
yes, report Roberto
Telework
secure the area, hdmi monitor and usb keyboard, yes
Home computer security
yes-install anti virus, yes create user profile, yes enable