DoD Cyber Awareness Challenge 2024 Flashcards
25 Questions
148 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

Which of the following is permitted when using an unclassified laptop within a collateral classified space?

  • An unapproved mobile device
  • A government issued tablet
  • A government issued wired headset with microphone (correct)
  • A personal laptop
  • Which of the following is a best practice for using government email?

  • Share your email password with trusted colleagues
  • Send mass e-mails to all contacts
  • Use a personal email for official communications
  • Do not send mass e-mails (correct)
  • Which of the following personally owned peripherals can you use with government-furnished equipment (GFE)?

  • A personal printer
  • A tablet
  • A smartphone
  • A USB hub (correct)
  • Which of the following is NOT a best practice for protecting data on a mobile device?

    <p>Disable automatic screen locking after a period of inactivity</p> Signup and view all the answers

    You receive a phone call offering you a $50 gift card if you participate in a survey. What course of action should you take?

    <p>Decline to participate in the survey.</p> Signup and view all the answers

    Which of the following is NOT a way that malicious code can spread?

    <p>Running a virus scan</p> Signup and view all the answers

    Which of the following is NOT a best practice for protecting your home wireless network for telework?

    <p>Use your router's pre-set Service Set Identifier (SSID) and password</p> Signup and view all the answers

    What is an example of a strong password?

    <p>d+Uf_4RimUz</p> Signup and view all the answers

    Which of the following is least likely to pose a risk to share on a social networking site?

    <p>Your pet's name</p> Signup and view all the answers

    Carl receives an e-mail about a potential health risk caused by a common ingredient in processed food. Which of the following actions should Carl NOT take with the e-mail?

    <p>Forward it</p> Signup and view all the answers

    Where are you permitted to use classified data?

    <p>Only in SCIF.</p> Signup and view all the answers

    Which of the following is an appropriate use of DoD Public Key Infrastructure (PKI) token?

    <p>Use a token approved for SIPRNet on SIPRNet</p> Signup and view all the answers

    How can you protect your home computer?

    <p>Regularly back up your files.</p> Signup and view all the answers

    Which of the following is true of transmitting or transporting Sensitive Compartmented Information (SCI)?

    <p>Printed SCI must be retrieved promptly from the printer</p> Signup and view all the answers

    Which of the following is permitted within a Sensitive Compartmented Information SCIF?

    <p>An authorized Government-owned Portable Electronic Device (PED)</p> Signup and view all the answers

    Does Sylvia pose a security concern while commuting?

    <p>Yes.</p> Signup and view all the answers

    How can you prevent viruses and malicious code?

    <p>Scan all external files before uploading to your computer.</p> Signup and view all the answers

    What concern does the email from Carl's boss pose?

    <p>This may be a spear phishing attempt.</p> Signup and view all the answers

    What conditions are necessary to be granted access to Sensitive Compartmented Information (SCI)?

    <p>Top Secret clearance and indoctrination into the SCI program.</p> Signup and view all the answers

    When linked to a specific individual, which of the following is NOT an example of Personally Identifiable Information (PII)?

    <p>Automobile make and model</p> Signup and view all the answers

    Which of the following is best practice to protect your identity?

    <p>Order a credit report annually</p> Signup and view all the answers

    Which of the following is true of spillage?

    <p>It can be either inadvertent or intentional</p> Signup and view all the answers

    Which of the following is a risk associated with removable media?

    <p>ALL OF THESE</p> Signup and view all the answers

    Based on the description provided, how many insider threat indicators are present for Elyse?

    <p>0 (Zero).</p> Signup and view all the answers

    How can you protect your home computer?

    <p>Turn on the password feature.</p> Signup and view all the answers

    Study Notes

    Cybersecurity Best Practices

    • Use a government-issued wired headset with microphone for unclassified laptops in classified spaces to maintain security protocols.
    • Avoid sending mass emails from government accounts to prevent information overload and potential security breaches.
    • A USB hub is an acceptable personally owned peripheral for use with Government Furnished Equipment (GFE).

    Mobile Device Security

    • Do not disable automatic screen locking on mobile devices; this feature is essential for data protection.
    • Be cautious with unsolicited phone calls offering gifts; they may be attempts at social engineering. Always decline such offers.

    Data Protection Strategies

    • Regularly scan external files before uploading to your computer to prevent viruses and malicious code.
    • Printed Sensitive Compartmented Information (SCI) must be promptly retrieved from printers to maintain document confidentiality.

    Handling Sensitive Information

    • Access to SCI requires Top Secret clearance and indoctrination into the SCI program, ensuring only authorized personnel handle sensitive data.
    • It is inappropriate to forward unverified emails regarding health risks, as they may spread misinformation.

    Password Security

    • A strong example of a password is "d+Uf_4RimUz," showcasing the importance of complexity in password creation.
    • To safeguard online identity, ordering a credit report annually is highly recommended.

    Wireless Network Safety

    • Avoid using pre-set router SSIDs and passwords for home wireless networks to enhance security against unauthorized access.

    Recognizing Phishing Attempts

    • Emails from unknown personal addresses requesting urgent information may represent spear phishing attempts; verify with known contact methods.

    Removable Media Risks

    • Using removable media can introduce malicious code and compromise system integrity, confidentiality, and availability.

    Insider Threat Indicators

    • Assessing insider threats requires careful observation; in the provided example, Elyse shows no indicators of risk.

    Social Engineering Awareness

    • Sharing innocuous personal information, like a pet’s name, is typically low-risk, but caution is still advised on social networking sites.

    Studying That Suits You

    Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

    Quiz Team

    Description

    Test your knowledge with these flashcards focused on the DoD Cyber Awareness Challenge 2024. Each card highlights important best practices and guidelines for using government equipment and email. Perfect for anyone preparing for cybersecurity awareness in a military context.

    More Like This

    Use Quizgecko on...
    Browser
    Browser