FY24 DOD Cyber Awareness Challenge Knowledge Check (Questions + Answers) Verified 100% Correct!!.
Annabeth becomes aware that a conversation with a co-worker that involved Sensitive Compartmented Information (SCI) may have been overheard by someone who does not have the required clearance. What action should Annabeth take? - Contact her security POC with detailed information about the incident. Carl receives an e-mail about a potential health risk caused by a common ingredient in processed food. Which of the following actions should Carl NOT take with the e-mail? - Forward it. How can an adversary use information available in public records to target you? - Combine it with information from other data sources to learn how best to bait you with a scam. How can you mitigate the ptential rish associated with a compressed URL (e.g., TinyURL, )? - Use the preview function to see where the link actually leads. How can you prevent viruses and malicious code? - Scan all external files before uploading to your computer. How can you protect your home computer? - Regularly back up your files. Terry sees a post on her social media feed that says there is smoke billowing from the Pentagon. The post includes a video that shows smoke billowing from a building that is not readily identifiable as the Pentagon. Terry is not familiar with the source of the post. Which of the following describes what Terry has likely seen? - This is probably disinformation unless Terry can verify it on a legitimate news site. When is the safest time to post on social media about your vacation plans? - After the trip.Which best describes an insider threat? Someone who uses ______ access, ______, to harm national security through unauthorized disclosure, data modification, espionage, terrorism, or kinetic actions. - authorized; wittingly or unwittingly Which of the following is a best practice for physical security? - Use your own security badge or key code for facility access. Which of the following is a best practice for using government e-mail? - Do not send mass e-mails. Which of the following is a best practice to protect your identity? - Order a credit report annually. Which of the following is an appropriate use of government e-mail? - Using a digital signature when sending attachments. Which of the following is NOT a best practice for protecting data on a mobile device? - Disable automatic screen locking after a period of inactivity. Which of the following is NOT a best practice for teleworking in an environment where Internet of Things (IoT) devices are present? - Use the devices' default security settings. Which of the following is NOT an appropriate use of your Common Access Card (CAC)? - Using it as photo identification with a commercial entity. Which of the following is true of Controlled Unclassified Information (CUI)? - It must be handled using safeguarding or dissemination controls. Which of the following is true of Sensitive Compartmented Information Facilities (SCIFs)? - Personnel must position monitors so that they do not face windows or close the window blinds. Which of the following is true of transmitting or transporting Sensitive Compartmented Information (SCI)? - Printed SCI must be retrieved promptly from the printer.
Written for
- Institution
- FY24 DOD Cyber Awareness Challenge Knowledge Check
- Course
- FY24 DOD Cyber Awareness Challenge Knowledge Check
Document information
- Uploaded on
- June 15, 2024
- Number of pages
- 3
- Written in
- 2023/2024
- Type
- Exam (elaborations)
- Contains
- Questions & answers
Subjects
-
fy24 dod cyber awareness challenge knowledge check
Content preview
Also available in package deal