Social Sciences  >  QUESTIONS & ANSWERS  >  DOD CYBER AWARENESS QUESTIONS AND ANSWERS 100% PASS (All)

DOD CYBER AWARENESS QUESTIONS AND ANSWERS 100% PASS

Document Content and Description Below

DOD CYBER AWARENESS QUESTIONS AND ANSWERS 100% PASS Which of the following is not a constitutional spillage? ✔✔Classified information that should be unclassified and is downgraded Which of the ... following is NOT an appropriate way to protect against inadvertent spillage? ✔✔Use the classified network for all work, including unclassified work Which of the following should you NOT do if you find classified information on the internet? ✔✔Download the information Which of the following is NOT an example of sensitive information? ✔✔Press release date Which of the following is NOT a correct way to protect sensitive information? ✔✔Sensitive information may be store on any password-protected system PII but not PHI? ✔✔Pick the one with social security number PHI Protected ✔✔Pick the one without social security number Which of the following is an example of malicious code? ✔✔Software that install itself without the user's knowledge How can malicious code caused damage? ✔✔ALL OF THE ABOVE corrupting files, erasing your hard drive, allowing hackers access How can you avoid downloading malicious code? ✔✔Do not access website links en e-mail messages What level of damage to national security can you reasonably expect Top Secret information to cause if disclosed? ✔✔Exceptionally grave damage Which of the following is true about telework? ✔✔You must have your organization's permission to telework Which of the following is true of protecting classified data? ✔✔Classified material must be appropriate marked In addition to avoiding the temptation of green to betray his country, what would Alex do differently? ✔✔Avoid talking questions of potential work outside of the workplace or with people without a need-to-know How many insider threat indicates does Alex demonstrate? ✔✔Three or mroe What should Alex's colleagues do? ✔✔Report the suspicious behavior in accordance with their organization's insider threat policy What should the employee do differently? ✔✔Remove his CAC and lock his workstation What should the employee do differently? ✔✔Decline to let the person in and redirect her to security Security Violations ✔✔Computer and CAC, pin on the board, finger prints and biometrics, DOD token, CAC/PIV When is it appropriate to have your security badge visible? ✔✔At all times when in the facility What should the owner of this printed SCI do differently? ✔✔Retrieve classified documents promptly from printers What should the participants in this conversation involving SCI do directly? ✔✔Physically assess that everyone within listening distance is cleared and has a need-to-know for the information being discussed What portable electronic device (ped's) are permitted in a SCIF ✔✔Only expressly authorized government-owned ped's What is the response to an incident such as opening an uncontrolled DVD on a computer in a SCIF? ✔✔ALL OF THE ABOVE -notify your security POC -analyze the media for viruses or malicious code -analyze the other workstations in the SCIF for viruses or malicious code Books link Yesterday 2 days ago (required profile update) ✔✔delete button delete button report button What should Sara do when using publicly available internet, such as hotel WI-FI? ✔✔Only connect, exposure of malware What is the danger of using public WI-FI connections? ✔✔BOTH OF THESE -compromise of data -exposure of malware NOT permitted uses of government-furnished equip (GFE) ✔✔-viewing or downloading pornography -conducting a private gambling online -using unauthorized software -illegal downloading copyrighted materials -making unauthorized configuration changes When is it okay to charge a personal mobile device using government-furnished equipment (GFE) ✔✔this is never okay Which of the following demonstrates proper protection of mobile devices? ✔✔Linda encrypts all of the sensitive data on her government-issued mobile devices Antivirus Alert Update Status Firewall Status Virus Alert ✔✔-click update -click install -click enable -click exit [Show More]

Last updated: 3 years ago

Preview 1 out of 4 pages

Buy Now

Instant download

We Accept:

Payment methods accepted on Scholarfriends (We Accept)
Preview image of DOD CYBER AWARENESS QUESTIONS AND ANSWERS 100% PASS document

Buy this document to get the full access instantly

Instant Download Access after purchase

Buy Now

Instant download

We Accept:

Payment methods accepted on Scholarfriends (We Accept)

Also available in bundle (1)

Click Below to Access Bundle(s)

(Solved) Cyber Awareness Challenge Bundled Exams Questions and Answers All Rated A+

(Solved) Cyber Awareness Challenge Bundled Exams Questions and Answers All Rated A+

By Nutmegs 3 years ago

$17

12  

Reviews( 0 )

$8.00

Buy Now

We Accept:

Payment methods accepted on Scholarfriends (We Accept)

Instant download

Can't find what you want? Try our AI powered Search

207
0

Document information


Connected school, study & course


About the document


Uploaded On

Sep 24, 2022

Number of pages

4

Written in

All

Seller


Profile illustration for Nutmegs
Nutmegs

Member since 4 years

607 Documents Sold

Reviews Received
77
14
8
2
21
Additional information

This document has been written for:

Uploaded

Sep 24, 2022

Downloads

 0

Views

 207

Document Keyword Tags


$8.00
What is Scholarfriends

Scholarfriends.com Online Platform by Browsegrades Inc. 651N South Broad St, Middletown DE. United States.

We are here to help

We're available through e-mail, Twitter, Facebook, and live chat.
 FAQ
 Questions? Leave a message!

Follow us on
 Twitter

Copyright © Scholarfriends · High quality services·