Have a question?
Message sent Close

Cyber Awareness Challenge 2024 Answers

Instructor
John Marsh
0
0 reviews
  • Description
  • Full Document
Blur-Preview

Cyber Awareness Challenge 2024

Which of the following is NOT a best practice for protecting your home wireless network for telework?

Beth taps her phone at a payment terminal to pay for a purchase. Does this pose a security risk?

How can you prevent viruses and malicious code?

Which of the following is an example of behavior that you should report?

You receive a text message from a package shipper notifying you that your package delivery is delayed due to needing updated delivery instructions from you.

Which of the following is an appropriate use of a DoD PKI token?

Which of the following is a best practice when browsing the internet?

Where are you permitted to use classified data?

Which of the following contributes to your online identity?

How can you protect your home computer?

Which of the following statements is true of DoD Unclassified data?

Which of the following is NOT a way that malicious code can spread?

What is the goal of an Insider Threat Program?

Which of the following uses of removable media is allowed?

Which of the following is permitted when using an unclassified laptop within a collateral classified space?

When is the safest time to post on social media about your vacation plans?

Which of the following is NOT an appropriate use of your CAC?

Which of the following is NOT a best practice for traveling overseas with a mobile device?

Do not travel with a mobile device if you can avoid itWhich of the following is true of spillage?

Which of the following is permitted within a Sensitive Compartmented Information Facility (SCIF)?

You receive a phone call offering you a $50 gift card if you participate in a survey. Which course of action should you take?

How should government owned removable media be stored?

Which of the following is a best practice for using government email?

Which of the following is a best practice for physical security?

Which of the following is least likely to pose a risk to share on a social networking site?

How can you protect your home computer?

Which of the following describes Sensitive Compartmented Information (SCI)? SCI is a program that ______________various types of classified information for _______________ protection and dissemination or distribution control.

Which of the following is true of telework?

Which of the following is true Sensitive Compartmented Information Facilities (SCIFs)?

Which of the following is NOT a best practice for teleworking in an environment where Internet of Things (IoT) devices are present?

Based on the description provided, how many insider threat indicators are present? Elyse has worked for a DoD agency for more than 10 years. She is a diligent employee who receives excellent performance reviews and is a valued team member. She has two children and takes them on a weeklong beach vacation every summer. She spent a semester abroad in France as a teenager and plans to take her children to visit France when they are older.

Tom is working on a report that contains employees’ names, home addresses, and salary. Which of the following is Tom prohibited from doing with the report?

Which of these is NOT a potential indicator that your device may be under a malicious code attack?

Which of the following is a best practice to protect your identity?

How can you protect your home computer?

Carl receives an e-mail about a potential health risk…

Which of the following is an appropriate use of government e-mail?

Sylvia commutes to work via public transportation. She often uses…

Which of the following is true of transmitting or transporting SCI?

What conditions are necessary to be granted access to SCI?

Terry sees a post on her social media feed that says there is smoke billowing from the Pentagon…

Which of the following statements about PHI is false?

NOTE: Please check the details before purchasing the document.

error: