100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
Annual DoD Training - Cyber Awareness-Information Assurance Challenge – 4-2024 Questions with Accurate Answers $14.49   Add to cart

Exam (elaborations)

Annual DoD Training - Cyber Awareness-Information Assurance Challenge – 4-2024 Questions with Accurate Answers

 6 views  0 purchase
  • Course
  • Annual security awareness refresher
  • Institution
  • Annual Security Awareness Refresher

Annual DoD Training - Cyber Awareness-Information Assurance Challenge – 4-2024

Preview 2 out of 10  pages

  • September 2, 2024
  • 10
  • 2024/2025
  • Exam (elaborations)
  • Questions & answers
  • Annual security awareness refresher
  • Annual security awareness refresher
avatar-seller
julianah420
Annual DoD Training - Cyber Awareness-
Information Assurance Challenge – 4-
2024


If you received an email asking for personal information, how would you respond?

A. If the email is from within my organization, there's no harm in providing the
information. I'd provide the requested information.

B. I'm not sure why my user name and password would be required. I'd notify my
security point of contact or help desk.

C. I don't care who is requesting my password, I would never provide it. I'd delete the e-
mail. - answerB

Selecting the link downloaded malicious code. Would you have selected the link?

A. Definitely, my organization has strong anti-virus software. I'd open the link.

B. No, I wouldn't open a link from an unknown forum poster.

C. It depends. If I was on a reputable site, I'd have no problem opening it. - answerB

What philosophy do you follow when creating passwords?

A. I use the same, very secure password for everything. It's 8 characters and includes
lower and upper case letters, numbers, and special characters. There's no way a
password cracker is getting my information.

B. I change passwords frequently and always use a combination of numbers, letters,
and special characters. I'm fairly confident my passwords are secure.

C. I don't worry about my password; my organization's security is strong enough to
defeat a hacker. I make sure to use something I can remember like a significant date or
name. - answerB

The defense contractor's information system was made vulnerable by outdated and
unpatched software. How does your organization handle this?

, A. System administrators are on top of it and we have a strict policy. I pay close
attention to notices to upgrade and apply patches.

B. We use what works; we're not necessarily concerned with upgrading to the latest and
greatest thing.

C. I have no idea; I'm busy enough as it is. I see notices about upgrades and patches,
but I don't have time to worry about software versions or if my computer has every
software patch installed. - answerA

The defense contractor was targeted via removable media. What is your organization's
policy on thumb drives and other removable media?

A. We use removable media; it's convenient and is an efficient way of sharing and
transferring information.

B. Removable media is strictly prohibited.

C. I'm not sure. - answerB

Which of the following is a best practice for managing connection requests on social
networking sites?

A. Make your posts publicly available so that everyone can view them without
connecting with you

B. Assume that people are who they say they are on social networking sites

C. Validate connection requests through another source if possible

D. Accept connection requests from people with whom you share mutual connections -
answerC

Which of the following is NOT a best practice for protecting data on a mobile device?

A. Maintain visual or physical control of your device at all times
B. Lock your device when not in use
C. Use two-factor authentication
D. Disable automatic screen locking after a period of inactivity - answerD

Which of the following is a step you should NOT take to protect against spillage?

A. Purge any device's memory before connecting it to a classified network
B. Verify that you are using the correct network for the level of data
C. Follow procedures for transferring data to non-Government networks
D. Label all files with appropriate classification markings - answerC

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller julianah420. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for $14.49. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

67096 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy study notes for 14 years now

Start selling
$14.49
  • (0)
  Add to cart