Back to AI Flashcard MakerInformation Technology /DoD Cyber Awareness Part 2
DoD Cyber Awareness Part 2
This deck covers key concepts and best practices for cybersecurity, physical security, identity management, and more, based on the DoD Cyber Awareness training.
Which of the following is a security best practice for protecting Personally Identifiable Information (PII)?
Only use Government-furnished or Government-approved equipment to process PIl.
Tap or swipe ↕ to flip
Swipe ←→Navigate
1/24
Key Terms
Term
Definition
Which of the following is a security best practice for protecting Personally Identifiable Information (PII)?
Only use Government-furnished or Government-approved equipment to process PIl.
Which of the following is a best practice for physical security?
Report suspicious activity
Which of the following best describes good physical security?
Lionel stops an individual in his secure area who is not wearing a badge.
Which of the following is true of using a DoD Public Key Infrastructure (PKI) token?
It should only be in a system while actively using it for a PKI-required task.
Which of the following is true of the Common Access Card (CAC)?
It contains certificates for identification, encryption, and digital signature.
Which of the following is an example of two-factor authentication?
A Common Access Card and Personal Identification Number
Related Flashcard Decks
Study Tips
- Press F to enter focus mode for distraction-free studying
- Review cards regularly to improve retention
- Try to recall the answer before flipping the card
- Share this deck with friends to study together
| Term | Definition |
|---|---|
Which of the following is a security best practice for protecting Personally Identifiable Information (PII)? | Only use Government-furnished or Government-approved equipment to process PIl. |
Which of the following is a best practice for physical security? | Report suspicious activity |
Which of the following best describes good physical security? | Lionel stops an individual in his secure area who is not wearing a badge. |
Which of the following is true of using a DoD Public Key Infrastructure (PKI) token? | It should only be in a system while actively using it for a PKI-required task. |
Which of the following is true of the Common Access Card (CAC)? | It contains certificates for identification, encryption, and digital signature. |
Which of the following is an example of two-factor authentication? | A Common Access Card and Personal Identification Number |
What is the best way to protect your Common Access Card (CAC) or Personal Identity Verification (PIV) card? | Store it in a shielded sleeve |
Which Cyber Protection Condition (CPCON) establishes a protection priority focus on critical functions only? | CPCON 1 |
What must authorized personnel do before permitting another individual to enter a Sensitive Compartmented Information Facility (SCIF)? | Confirm the individual's need-to-know and access |
Which of the following is true of sharing information in a Sensitive Compartmented Information Facility (SCIF)? | Individuals must avoid referencing derivatively classified reports classified higher than the recipient. |
Which of the following is true of Security Classification Guides? | The provide guidance on reasons for and duration of classification of information. |
Which of the following is true of portable electronic devices (PEDs) in a Sensitive Compartmented Information Facility (SCIF)? | Only connect government-owned PEDs to the same level classification information system when authorized |
Which of the following is NOT a potential consequence of using removable media unsafely in a Sensitive Compartmented Information Facility (SCIF)? | Damage to the removable media |
Which of the following is a way to prevent the spread of malicious code? | Scan all external files before uploading to your computer |
Which of the following is NOT a type of malicious code? | Executables |
Which of the following actions can help to protect your identity? | Shred personal documents |
What type of social engineering targets senior officials? | Whaling |
Which of the following is true? | Digitally signed e-mails are more secure. |
Which is an appropriate use of government e-mail? | Use a digital signature when sending attachments or hyperlinks |
What security risk does a public Wi-Fi connection pose? | It may expose the information sent to theft. |
Which of the following represents an ethical use of your Government-furnished equipment (GFE)? | Checking personal e-mail when allowed by your organization |
How can you protect data on your mobile computing and portable electronic devices (PEDs)? | Enable automatic screen locking after a period of inactivity |
Which of the following is an example of removable media? | Flash Drive / External hard drive |
How should you secure your home wireless network for teleworking? | Implement Wi-Fi Protected Access 2 (WPA2) Personal encryption at a minimum |