DOD Cyber Awareness Challenge 2019- Knowledge Check

What should you do after you have ended a call from a reporter asking you to confirm potentially classified info found on the web?

Alert your security point of contact.

Which of the following actions is appropriate after finding classified Government information on the internet?

Note any identifying information and the website's URL.

Which of these is true of unclassified data?

Its classification level may rise when aggregated.

What type of information includes personal, payroll, medical, and operational information?

Sensitive.

What is the best protection method for sharing Personally Identifiable Information (PII)?

Digitally sign and encrypt the email.

Which of the following is NOT a typical result from running malicious code?

Disables cookies.

Which of the following is a practice that helps to protect you from identity theft?

Ordering a credit report annually.

Which of the following describes an appropriate use of Government email?

Molly uses a digital signature when sending attachments or hyperlinks.

Which of the following is true of Internet hoaxes?

They can be part of a distributed denial-of-service (DDoS) attack.

Which of the following is a practice that helps to prevent the download of viruses and other malicious code when checking your email?

Do not access links or hyperlinked media such as buttons and graphics in email messages.

Upon connecting your Government-issued laptop to a public wireless connection, what should you immediately do?

Connect to the Government Virtual Private Network (VPN).

Under what circumstances is it acceptable to check personal email on Government-furnished equipment (GFE)?

If your organization allows it.

When checking in at the airline counter for a business trip...

Decline so that you maintain physical contact of your Government-issued laptop.

A man you do not know is trying to look at your Government-issued phone and has asked to use it. What should you do?

Decline to lend the man your phone.

How can you protect your information when using wireless technology?

Avoid using non-Bluetooth-paired or unencrypted wireless computer peripherals.

What kind of information could reasonably be expected to cause serious damage to national security in the event of unauthorized disclosure?

Top Secret

A colleague has visited several foreign countries recently...

. 2 indicators

Which of the following is NOT considered a potential insider threat indicator?

New interest in learning a foreign language.

When would be a good time to post your vacation location and dates on your social networking website?

When you return from your vacation.

Which of the following statements is TRUE about the use of DoD Public Key Infrastructure (PKI) tokens?

Always use DoD PKI tokens within their designated classification level.

How should you protect your Common Access Card (CAC) or Personal Identity Verification (PIV) card?

Store it in a shielded sleeve to avoid chip cloning.

DOD Cyber Awareness Challenge 2019- Knowledge Check - Subjecto.com

DOD Cyber Awareness Challenge 2019- Knowledge Check

Your page rank:

Total word count: 451
Pages: 2

Calculate the Price

- -
275 words
Looking for Expert Opinion?
Let us have a look at your work and suggest how to improve it!
Get a Consultant

What should you do after you have ended a call from a reporter asking you to confirm potentially classified info found on the web?

Alert your security point of contact.

Which of the following actions is appropriate after finding classified Government information on the internet?

Note any identifying information and the website’s URL.

Which of these is true of unclassified data?

Its classification level may rise when aggregated.

What type of information includes personal, payroll, medical, and operational information?

Sensitive.

What is the best protection method for sharing Personally Identifiable Information (PII)?

Digitally sign and encrypt the email.

Which of the following is NOT a typical result from running malicious code?

Disables cookies.

Which of the following is a practice that helps to protect you from identity theft?

Ordering a credit report annually.

Which of the following describes an appropriate use of Government email?

Molly uses a digital signature when sending attachments or hyperlinks.

Which of the following is true of Internet hoaxes?

They can be part of a distributed denial-of-service (DDoS) attack.

Which of the following is a practice that helps to prevent the download of viruses and other malicious code when checking your email?

Do not access links or hyperlinked media such as buttons and graphics in email messages.

Upon connecting your Government-issued laptop to a public wireless connection, what should you immediately do?

Connect to the Government Virtual Private Network (VPN).

Under what circumstances is it acceptable to check personal email on Government-furnished equipment (GFE)?

If your organization allows it.

When checking in at the airline counter for a business trip…

Decline so that you maintain physical contact of your Government-issued laptop.

A man you do not know is trying to look at your Government-issued phone and has asked to use it. What should you do?

Decline to lend the man your phone.

How can you protect your information when using wireless technology?

Avoid using non-Bluetooth-paired or unencrypted wireless computer peripherals.

What kind of information could reasonably be expected to cause serious damage to national security in the event of unauthorized disclosure?

Top Secret

A colleague has visited several foreign countries recently…

. 2 indicators

Which of the following is NOT considered a potential insider threat indicator?

New interest in learning a foreign language.

When would be a good time to post your vacation location and dates on your social networking website?

When you return from your vacation.

Which of the following statements is TRUE about the use of DoD Public Key Infrastructure (PKI) tokens?

Always use DoD PKI tokens within their designated classification level.

How should you protect your Common Access Card (CAC) or Personal Identity Verification (PIV) card?

Store it in a shielded sleeve to avoid chip cloning.

Share This
Flashcard

More flashcards like this

NCLEX 10000 Integumentary Disorders

When assessing a client with partial-thickness burns over 60% of the body, which finding should the nurse report immediately? a) ...

Read more

NCLEX 300-NEURO

A client with amyotrophic lateral sclerosis (ALS) tells the nurse, "Sometimes I feel so frustrated. I can’t do anything without ...

Read more

NASM Flashcards

Which of the following is the process of getting oxygen from the environment to the tissues of the body? Diffusion ...

Read more

Unfinished tasks keep piling up?

Let us complete them for you. Quickly and professionally.

Check Price

Successful message
sending