![]() What action is recommended when somebody calls you to inquire about your work environment or specific account information? Using webmail may bypass built in security features. is only allowed if the organization permits it UNCLASSIFIED is a designation to mark information that does not have potential to damage national security. Thumb drives, memory sticks, and flash drives are examples of When using a public device with a card reader, only use your DoD CAC to access unclassified information There are many travel tips for mobile computing. Personal information is inadvertently posted at a website What security device is used in email to verify the identity of sender? Spear Phishing attacks commonly attempt to impersonate email from trusted entities. ![]() Request the user's full name and phone number Someone calls from an unknown number and says they are from IT and need some information about your computer. Should you always label your removable media? PII, PHI, and financial information is classified as what type of information? Allow attackers physical access to network assets P2P (Peer-to-Peer) software can do the following except: Remove security badge as you enter a restaurant or retail establishment Of the following, which is NOT a security awareness tip? Directing you to a website that looks real Of the following, which is NOT a problem or concern of an Internet hoax? Of the following, which is NOT an intelligence community mandate for passwords? After work hours, storing sensitive information in unlocked containers, desks, or cabinets if security is not present Of the following, which is NOT a method to protect sensitive information? Directing you to a web site that is real Of the following, which is NOT a characteristic of a phishing attempt? Media containing Privacy Act information, PII, and PHI is not required to be labeled.Ī medium secure password has at least 15 characters and one of the following. What can be used to track Maria's web browsing habits? Before long she has also purchased shoes from several other websites. Malicious code can do the following except? It is permissible to release unclassified information to the public prior to being cleared. Use the government email system so you can encrypt the information and open the email on your government issued laptop Which method would be the BEST way to send this information? You can email your employees information to yourself so you can work on it this weekend and go home now. You are reviewing your employees annual self evaluation. If your wireless device is improperly configured someone could gain control of the device? T/FĪn individual who has attempted to access sensitive information without need-to-know and has made unusual requests for sensitive information is displaying indicators of what? If classified information were released, which classification level would result in "Exceptionally grave damage to national security"? If authorized, what can be done on a work computer? ![]() How should you securely transport company information on a removable media? How can you guard yourself against Identity theft? How are Trojan horses, worms, and malicious scripts spread? Scan external files from only unverifiable sources before uploading to computer The following practices help prevent viruses and the downloading of malicious code except. What should you do?ĭoD employees are prohibited from using a DoD CAC in card-reader-enabled public devices. Assigned a classification level by a supervisorĪ coworker has left an unknown CD on your desk. ![]() The CAC/PIV is a controlled item and contains certificates for:Ĭlassified Information can only be accessed by individuals with How many potential insider threat indicators is Bob displaying? This article will provide you with all the questions and answers for Cyber Awareness Challenge.Īll https sites are legitimate and there is no risk to entering your personal info online.īob, a coworker, has been going through a divorce, has financial difficulties and is displaying hostile behavior. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |