MCQGeeks
0 : 0 : 1
CBSE
JEE
NTSE
NEET
English
UK Quiz
Quiz
Driving Test
Practice
Games
Practice
Cyber Awareness 2020 Knowledge Check Quiz
«
Multiple Choice Questions
»
1
2
3
4
5
6
7
8
9
10
11
12
13
Which is true of cookies?
0%
A coworker is observed using a personal electronic device in an area where their use is prohibited.
0%
Use only personal contact information when establishing personal social networking accounts, never use Government contact information.
0%
A type of phishing targeted at high-level personnel such as senior officials.
0%
A cookie is a text file a bed server stores on your hard drive that may track your activities on the web.
What is a common method used in social engineering?
0%
Approved Security Classification Guide (SCG)
0%
Telephone surveys
0%
Spillage of classified information.
0%
Ensure that the wireless security features are properly configured.
What is the best example of Personally Identifiable Information (PII)?
0%
Note any identifying information, such as the website's URL, and report the situation to your security POC.
0%
When your vacation is over, and you have returned home
0%
Date and place of birth
0%
Telephone surveys
What type of unclassified material should always be marked with a special handling caveat?
0%
Near field communication (NFC)
0%
Your place of birth
0%
For Official Use Only (FOUO)
0%
It is never permitted.
What portable electronic devices (PEDs) are allow in a Secure Compartmented Information Facility (SCIF)?
0%
The proper security clearance and indoctrination into the SCI program.
0%
Government-owned PEDs, if expressly authorized by your agency.
0%
Ask for information about the website, including the URL.
0%
Completing your expense report for your government travel.
Which of the following is a best practice to protect information about you and your organization on social networking sites and applications?
0%
Secure personal mobile devices to the same level as Government-issued systems.
0%
Damage to national security
0%
Insider Threat
0%
Use only personal contact information when establishing personal social networking accounts, never use Government contact information.
What is the best example of Protected Health Information (PHI)?
0%
Ensure that the wireless security features are properly configured.
0%
Your health insurance explanation of benefits (EOB)
0%
Date and place of birth
0%
Note any identifying information, such as the website's URL, and report the situation to your security POC.
What are some examples of removable media?
0%
The proper security clearance and indoctrination into the SCI program.
0%
Shred personal documents; never share passwords; and order a credit report annually.
0%
Memory sticks, flash drives, or external hard drives
0%
Thumb drives, memory sticks, and optical disks
What is a possible indication of a malicious code attack in progress?
0%
Note any identifying information, such as the website's URL, and report the situation to your security POC.
0%
Something you possess, like a CAC, and something you know, like a PIN or password.
0%
A pop-up window that flashes and warns that your computer is infected with a virus.
0%
The proper security clearance and indoctrination into the SCI program.
What is a common indicator of a phishing attempt?
0%
It includes a threat of dire circumstances.
0%
Challenge people without proper badges.
0%
Telephone surveys
0%
Use online sites to confirm or expose potential hoaxes.
Which of the following is an appropriate use of Government e-mail?
0%
Digitally signing e-mails that contain attachments or hyperlinks.
0%
Secure personal mobile devices to the same level as Government-issued systems.
0%
When unclassified data is aggregated, its classification level may rise.
0%
Social Security Number; date and place of birth; mother's maiden name
Which term describes an event where a person who does not have the required clearance or access caveats comes into possession of Sensitive Compartmented Information (SCI)
0%
Compromise
0%
1 Indicator
0%
Department of Defense.
0%
It can cause damage by corrupting files, erasing your hard drive, and/or allowing hackers access.
Which of the following can an unauthorized disclosure of information classified as Confidential reasonably be expected to cause?
0%
Date and place of birth
0%
Secure personal mobile devices to the same level as Government-issued systems.
0%
Insider Threat
0%
Damage to national security
0 h : 0 m : 1 s
«
Multiple Choice Questions
»
1
2
3
4
5
6
7
8
9
10
11
12
13
0
Answered
0
Not Answered
0
Not Visited
Correct : 0
Incorrect : 0
Report Question
×
What's an issue?
Question is wrong
Answer is wrong
Other Reason
Want to elaborate a bit more? (optional)
Support mcqgeeks.com by disabling your adblocker.
×
Please disable the adBlock and continue.
Thank you.
Reload page