100% de satisfacción garantizada Inmediatamente disponible después del pago Tanto en línea como en PDF No estas atado a nada
logo-home
Annual DoD Training - Cyber Awareness-Information Assurance Challenge – 4-2024 Questions with Accurate Answers $14.49   Añadir al carrito

Examen

Annual DoD Training - Cyber Awareness-Information Assurance Challenge – 4-2024 Questions with Accurate Answers

 6 vistas  0 veces vendidas
  • Grado
  • Annual security awareness refresher
  • Institución
  • Annual Security Awareness Refresher

Annual DoD Training - Cyber Awareness-Information Assurance Challenge – 4-2024

Vista previa 2 fuera de 10  páginas

  • 2 de septiembre de 2024
  • 10
  • 2024/2025
  • Examen
  • Preguntas y respuestas
  • Annual security awareness refresher
  • Annual security awareness refresher
avatar-seller
Annual DoD Training - Cyber Awareness-
Information Assurance Challenge – 4-
2024


If you received an email asking for personal information, how would you respond?

A. If the email is from within my organization, there's no harm in providing the
information. I'd provide the requested information.

B. I'm not sure why my user name and password would be required. I'd notify my
security point of contact or help desk.

C. I don't care who is requesting my password, I would never provide it. I'd delete the e-
mail. - answerB

Selecting the link downloaded malicious code. Would you have selected the link?

A. Definitely, my organization has strong anti-virus software. I'd open the link.

B. No, I wouldn't open a link from an unknown forum poster.

C. It depends. If I was on a reputable site, I'd have no problem opening it. - answerB

What philosophy do you follow when creating passwords?

A. I use the same, very secure password for everything. It's 8 characters and includes
lower and upper case letters, numbers, and special characters. There's no way a
password cracker is getting my information.

B. I change passwords frequently and always use a combination of numbers, letters,
and special characters. I'm fairly confident my passwords are secure.

C. I don't worry about my password; my organization's security is strong enough to
defeat a hacker. I make sure to use something I can remember like a significant date or
name. - answerB

The defense contractor's information system was made vulnerable by outdated and
unpatched software. How does your organization handle this?

, A. System administrators are on top of it and we have a strict policy. I pay close
attention to notices to upgrade and apply patches.

B. We use what works; we're not necessarily concerned with upgrading to the latest and
greatest thing.

C. I have no idea; I'm busy enough as it is. I see notices about upgrades and patches,
but I don't have time to worry about software versions or if my computer has every
software patch installed. - answerA

The defense contractor was targeted via removable media. What is your organization's
policy on thumb drives and other removable media?

A. We use removable media; it's convenient and is an efficient way of sharing and
transferring information.

B. Removable media is strictly prohibited.

C. I'm not sure. - answerB

Which of the following is a best practice for managing connection requests on social
networking sites?

A. Make your posts publicly available so that everyone can view them without
connecting with you

B. Assume that people are who they say they are on social networking sites

C. Validate connection requests through another source if possible

D. Accept connection requests from people with whom you share mutual connections -
answerC

Which of the following is NOT a best practice for protecting data on a mobile device?

A. Maintain visual or physical control of your device at all times
B. Lock your device when not in use
C. Use two-factor authentication
D. Disable automatic screen locking after a period of inactivity - answerD

Which of the following is a step you should NOT take to protect against spillage?

A. Purge any device's memory before connecting it to a classified network
B. Verify that you are using the correct network for the level of data
C. Follow procedures for transferring data to non-Government networks
D. Label all files with appropriate classification markings - answerC

Los beneficios de comprar resúmenes en Stuvia estan en línea:

Garantiza la calidad de los comentarios

Garantiza la calidad de los comentarios

Compradores de Stuvia evaluaron más de 700.000 resúmenes. Así estas seguro que compras los mejores documentos!

Compra fácil y rápido

Compra fácil y rápido

Puedes pagar rápidamente y en una vez con iDeal, tarjeta de crédito o con tu crédito de Stuvia. Sin tener que hacerte miembro.

Enfócate en lo más importante

Enfócate en lo más importante

Tus compañeros escriben los resúmenes. Por eso tienes la seguridad que tienes un resumen actual y confiable. Así llegas a la conclusión rapidamente!

Preguntas frecuentes

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

100% de satisfacción garantizada: ¿Cómo funciona?

Nuestra garantía de satisfacción le asegura que siempre encontrará un documento de estudio a tu medida. Tu rellenas un formulario y nuestro equipo de atención al cliente se encarga del resto.

Who am I buying this summary from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller julianah420. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy this summary for $14.49. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

45,681 summaries were sold in the last 30 days

Founded in 2010, the go-to place to buy summaries for 14 years now

Empieza a vender
$14.49
  • (0)
  Añadir