Docsity
Docsity

Prepare for your exams
Prepare for your exams

Study with the several resources on Docsity


Earn points to download
Earn points to download

Earn points by helping other students or get them with a premium plan


Guidelines and tips
Guidelines and tips

Cyber Awareness Challenge 2024 Questions and Answers | Verified, Exams of Computer Communication Systems

Cyber Awareness Challenge 2024 Questions and Answers | Verified

Typology: Exams

2024/2025

Available from 02/28/2025

wallen-smith
wallen-smith 🇺🇸

138 documents

1 / 3

Toggle sidebar

This page cannot be seen from the preview

Don't miss anything!

bg1
Cyber Awareness Challenge 2024
Questions and Answers | Verified
How can you protect your home computer? ✔✔Turn on the password feature
Carl receives an e-mail about a potential health risk... ✔✔Forward it
Which of the following is an appropriate use of government e-mail? ✔✔Using a digital signature when
sending attachments
Sylvia commutes to work via public transportation. She often uses... ✔✔Yes. Eavesdroppers may be
listening to Sylvia's phone calls, and shoulder surfers may be looking at her screen.
Which of the following is true of transmitting or transporting SCI? ✔✔Printed SCI must be retrieved
promptly from the printer
What conditions are necessary to be granted access to SCI? ✔✔Top Secret clearance and indoctrination
into the SCI program
Terry sees a post on her social media feed that says there is smoke billowing from the Pentagon...
✔✔This is probably a post designed to attract Terr's attention to click on a link and steal her information
Which of the following statements about PHI is false? ✔✔It is created or received by a healthcare
provider, health plan, or employer of a business associate of these.
Which of the following is NOT a best practice for protecting your home wireless network for telework?
✔✔Use your router's pre-set SSID and password
pf3

Partial preview of the text

Download Cyber Awareness Challenge 2024 Questions and Answers | Verified and more Exams Computer Communication Systems in PDF only on Docsity!

Cyber Awareness Challenge 2024

Questions and Answers | Verified

How can you protect your home computer? ✔✔Turn on the password feature Carl receives an e-mail about a potential health risk... ✔✔Forward it Which of the following is an appropriate use of government e-mail? ✔✔Using a digital signature when sending attachments Sylvia commutes to work via public transportation. She often uses... ✔✔Yes. Eavesdroppers may be listening to Sylvia's phone calls, and shoulder surfers may be looking at her screen. Which of the following is true of transmitting or transporting SCI? ✔✔Printed SCI must be retrieved promptly from the printer What conditions are necessary to be granted access to SCI? ✔✔Top Secret clearance and indoctrination into the SCI program Terry sees a post on her social media feed that says there is smoke billowing from the Pentagon... ✔✔This is probably a post designed to attract Terr's attention to click on a link and steal her information Which of the following statements about PHI is false? ✔✔It is created or received by a healthcare provider, health plan, or employer of a business associate of these. Which of the following is NOT a best practice for protecting your home wireless network for telework? ✔✔Use your router's pre-set SSID and password

Beth taps her phone at a payment terminal to pay for a purchase. Does this pose a security risk? ✔✔Yes, there is a risk that the signal could be intercepted and altered How can you prevent viruses and malicious code? ✔✔Scan all external files before uploading to your computer Which of the following is an example of behavior that you should report? ✔✔Taking sensitive information home for telework without authorization You receive a text message from a package shipper notifying you that your package delivery is delayed due to needing updated delivery instructions from you. ✔✔Delete the message Which of the following is an appropriate use of a DoD PKI token? ✔✔Do not use a token approved for NIPR on SIPR Which of the following is a best practice when browsing the internet? ✔✔Only accept cookies from reputable, trusted websites Where are you permitted to use classified data? ✔✔Only in areas with security appropriate to the classification level Which of the following contributes to your online identity? ✔✔All of these How can you protect your home computer? ✔✔Regularly back up your files Which of the following statements is true of DoD Unclassified data? ✔✔It may require access and distribution controls Which of the following is NOT a way that malicious code can spread? ✔✔Running a virus scan What is the goal of an Insider Threat Program? ✔✔Deter, detect, and mitigate