DoD Cyber Awareness Challenge 2024 Pre Test
25 Questions
113 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

How can an adversary use information available in public records to target you?

Combine it with info from other data sources to learn how to best bait you with a scam

Which of the following is an example of a strong password?

  • d+Uf_4RimUz (correct)
  • qwerty
  • password
  • 123456
  • Where are you permitted to use classified data?

    Only in areas with security appropriate to the classification level

    What conditions are necessary to be granted access to SCI?

    <p>Special access authorization and indoctrination into the SCI program</p> Signup and view all the answers

    Which of the following is NOT a best practice for traveling overseas with a mobile device?

    <p>Do not travel with a mobile device if you can avoid it</p> Signup and view all the answers

    Under which Cyberspace Protection Condition (CPCON) is the priority focus limited to critical and essential functions?

    <p>CPCON 2</p> Signup and view all the answers

    Which of the following is prohibited for Tom while working on a report that contains employee names and sensitive information?

    <p>Using his home computer to print the report while teleworking</p> Signup and view all the answers

    Which of the following uses of removable media is appropriate?

    <p>Encrypting data stored on removable media</p> Signup and view all the answers

    Which of the following is NOT a best practice for protecting data on a mobile device?

    <p>Disable auto screen locking after a period of inactivity</p> Signup and view all the answers

    Which of the following is a best practice to protect your identity?

    <p>Order a credit report annually</p> Signup and view all the answers

    Which of the following is permitted within a SCIF?

    <p>An authorized Government-owned PED</p> Signup and view all the answers

    Which of the following is a best practice when browsing the internet?

    <p>Only accept cookies from reputable, trusted websites</p> Signup and view all the answers

    Which of the following is a risk associated with removable media?

    <p>All of these</p> Signup and view all the answers

    Which of these is NOT a potential indicator that your device may be under a malicious code attack?

    <p>A notification of a system update that has been publicized</p> Signup and view all the answers

    What is the best course of action if you receive a suspicious text message about a package delivery?

    <p>Delete the message</p> Signup and view all the answers

    What does the CAC contain?

    <p>Certificates for identification, encryption, and digital signature</p> Signup and view all the answers

    How can you prevent viruses and malicious code?

    <p>Scan all external files before uploading to your computer</p> Signup and view all the answers

    Which type of data could reasonably be expected to cause serious damage to national security?

    <p>Secret</p> Signup and view all the answers

    Which of the following is true of telework?

    <p>True</p> Signup and view all the answers

    Which of the following is an example of behavior that you should report?

    <p>Taking sensitive information home for telework without authorization</p> Signup and view all the answers

    Which of the following is least likely to pose a risk to share on a social networking site?

    <p>Your pets name</p> Signup and view all the answers

    Does Sylvia's use of a government-approved mobile device for calls during her commute pose a security concern?

    <p>True</p> Signup and view all the answers

    How can you mitigate the potential risk associated with a compressed URL?

    <p>Use the preview function to see where the link actually leads</p> Signup and view all the answers

    How can you protect your home computer?

    <p>Turn on password feature</p> Signup and view all the answers

    Which best describes an insider threat? Someone who uses __________ access, ______________, to harm national security through unauthorized disclosure, data modification, espionage, terrorism, or kinetic actions.

    <p>authorized, wittingly or unwittingly</p> Signup and view all the answers

    Study Notes

    Cybersecurity Awareness and Best Practices

    • Public records can be combined with data from other sources by adversaries to target individuals for scams.
    • Strong passwords are complex; an example is d+Uf_4RimUz.
    • Classified data should only be handled in security areas appropriate for its classification level.
    • Access to Sensitive Compartmented Information (SCI) requires special access authorization and indoctrination into the SCI program.
    • Avoid traveling with mobile devices when possible as a cybersecurity best practice.

    Cyber Protection Conditions and Data Handling

    • Cyberspace Protection Condition (CPCON) 2 limits priority focus to critical and essential functions.
    • Using a home computer for printing sensitive reports while teleworking is prohibited, especially when it contains personal employee details.
    • Appropriate use of removable media includes encrypting data stored on it.

    Mobile Device Security and Internet Safety

    • Disabling auto screen locking on mobile devices is not a recommended practice for protecting data.
    • Best practices for identity protection include ordering a credit report annually.
    • A Government-owned Portable Electronic Device (PED) is permitted in a Sensitive Compartmented Information Facility (SCIF).
    • When browsing the internet, only accept cookies from reputable websites.

    Risks and Indicators of Cyber Attacks

    • Removable media poses various risks, which include unauthorized access or malware.
    • Notifications of system updates that have been publicized are not indicators of malicious attacks.
    • Receiving unsolicited messages, such as package delivery delays from unknown sources with shortened links, should be approached with caution; the best action is to delete such messages.

    Common Security Practices

    • Common Access Card (CAC) includes certificates for identification, encryption, and digital signatures.
    • To prevent viruses and malicious code, always scan external files before uploading them to your devices.
    • Data classified as Secret could cause serious damage to national security if disclosed.

    Telework and Reporting Security Issues

    • Teleworking requires prior permission from your organization.
    • Reporting is essential for behaviors like taking home sensitive information without authorization.
    • Sharing innocuous information, such as your pet's name, is less likely to pose security risks on social media.

    Transportation Security Considerations

    • Using public transport for work-related calls poses security concerns due to eavesdropping and shoulder surfing.
    • To safely manage risks associated with compressed URLs, utilize the preview function to verify destination links.

    Home Computer Protection

    • Activate password protection on home computers to enhance security.
    • Insider threats involve individuals misusing their authorized access, whether knowingly or unknowingly, to compromise national security.

    Studying That Suits You

    Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

    Quiz Team

    Description

    Test your knowledge on cybersecurity with the Department of Defense Cyber Awareness Challenge 2024 pre-test flashcards. This quiz covers key concepts on information security, strong passwords, and the regulations governing classified data usage. Perfect for individuals preparing for cybersecurity training or assessments.

    More Like This

    Use Quizgecko on...
    Browser
    Browser