DoD Cyber Awareness Part 2

Information Technology24 CardsCreated 5 months ago

This deck covers key concepts and best practices for cybersecurity, physical security, identity management, and more, based on the DoD Cyber Awareness training.

Which of the following is a security best practice for protecting Personally Identifiable Information (PII)?

Only use Government-furnished or Government-approved equipment to process PIl.
Tap or swipe ↕ to flip
Swipe ←→Navigate
1/24

Key Terms

Term
Definition
Which of the following is a security best practice for protecting Personally Identifiable Information (PII)?
Only use Government-furnished or Government-approved equipment to process PIl.
Which of the following is a best practice for physical security?
Report suspicious activity
Which of the following best describes good physical security?
Lionel stops an individual in his secure area who is not wearing a badge.
Which of the following is true of using a DoD Public Key Infrastructure (PKI) token?
It should only be in a system while actively using it for a PKI-required task.
Which of the following is true of the Common Access Card (CAC)?
It contains certificates for identification, encryption, and digital signature.
Which of the following is an example of two-factor authentication?
A Common Access Card and Personal Identification Number

Related Flashcard Decks

Study Tips

  • Press F to enter focus mode for distraction-free studying
  • Review cards regularly to improve retention
  • Try to recall the answer before flipping the card
  • Share this deck with friends to study together
TermDefinition
Which of the following is a security best practice for protecting Personally Identifiable Information (PII)?
Only use Government-furnished or Government-approved equipment to process PIl.
Which of the following is a best practice for physical security?
Report suspicious activity
Which of the following best describes good physical security?
Lionel stops an individual in his secure area who is not wearing a badge.
Which of the following is true of using a DoD Public Key Infrastructure (PKI) token?
It should only be in a system while actively using it for a PKI-required task.
Which of the following is true of the Common Access Card (CAC)?
It contains certificates for identification, encryption, and digital signature.
Which of the following is an example of two-factor authentication?
A Common Access Card and Personal Identification Number
What is the best way to protect your Common Access Card (CAC) or Personal Identity Verification (PIV) card?
Store it in a shielded sleeve
Which Cyber Protection Condition (CPCON) establishes a protection priority focus on critical functions only?
CPCON 1
What must authorized personnel do before permitting another individual to enter a Sensitive Compartmented Information Facility (SCIF)?
Confirm the individual's need-to-know and access
Which of the following is true of sharing information in a Sensitive Compartmented Information Facility (SCIF)?
Individuals must avoid referencing derivatively classified reports classified higher than the recipient.
Which of the following is true of Security Classification Guides?
The provide guidance on reasons for and duration of classification of information.
Which of the following is true of portable electronic devices (PEDs) in a Sensitive Compartmented Information Facility (SCIF)?
Only connect government-owned PEDs to the same level classification information system when authorized
Which of the following is NOT a potential consequence of using removable media unsafely in a Sensitive Compartmented Information Facility (SCIF)?
Damage to the removable media
Which of the following is a way to prevent the spread of malicious code?
Scan all external files before uploading to your computer
Which of the following is NOT a type of malicious code?
Executables
Which of the following actions can help to protect your identity?
Shred personal documents
What type of social engineering targets senior officials?
Whaling
Which of the following is true?
Digitally signed e-mails are more secure.
Which is an appropriate use of government e-mail?
Use a digital signature when sending attachments or hyperlinks
What security risk does a public Wi-Fi connection pose?
It may expose the information sent to theft.
Which of the following represents an ethical use of your Government-furnished equipment (GFE)?
Checking personal e-mail when allowed by your organization
How can you protect data on your mobile computing and portable electronic devices (PEDs)?
Enable automatic screen locking after a period of inactivity
Which of the following is an example of removable media?
Flash Drive / External hard drive
How should you secure your home wireless network for teleworking?
Implement Wi-Fi Protected Access 2 (WPA2) Personal encryption at a minimum