MCQGeeks
0 : 0 : 1
CBSE
JEE
NTSE
NEET
English
UK Quiz
Quiz
Driving Test
Practice
Games
Practice
Dod Cyber Awareness 2019 Quiz
«
Multiple Choice Questions
»
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
A coworker brings a personal electronic device into prohibited areas.
0%
Which of the following is NOT considered a potential insider threat indicator?
0%
Which of the following is NOT an appropriate way to protect against inadvertent spillage?
0%
Which of the following is NOT true of traveling overseas with a mobile phone?
0%
Which of the following should be reported as a potential security incident (in accordance with your Agency's insider threat policy)?
Use a single, complex password for your system and application logons.
0%
Which of the following is NOT a good way to protect your identity?
0%
Which of the following represents a good physical security practice?
0%
Which of the following is an example of Protected Health Information (PHI)?
0%
Which of the following is NOT an appropriate way to protect against inadvertent spillage?
Decline so that you maintain physical control of your Government-issued laptop.
0%
What is a critical consideration on using cloud-based file sharing and storage applications on your Government-furnished equipment (GFE)?
0%
What action should you take if you receive a friend request on your social networking website from someone in Germany you met casually at a conference last year?
0%
When checking in at the airline counter for a business trip, you are asked if you would like to check your laptop bag. This bag contains your Government-issued laptop. What should you do?
0%
Which of the following should be reported as a potential security incident (in accordance with your Agency's insider threat policy)?
Download the information.
0%
Which of the following should you NOT do if you find classified information on the internet?
0%
Which of the following is NOT true concerning a computer labeled SECRET?
0%
Which of the following is NOT considered a potential insider threat indicator?
0%
Which of the following is NOT an appropriate way to protect against inadvertent spillage?
Avoid talking about work outside of the workplace or with people without a need-to-know.
0%
What should you do if a reporter asks you about potentially classified information on the web?
0%
Which of the following statements is TRUE about the use of DoD Public Key Infrastructure (PKI) tokens?
0%
How can you protect your information when using wireless technology?
0%
In addition to avoiding the temptation of greed to betray his country, what should Alex do differently?
Classified material must be appropriately marked.
0%
Which of the following is NOT an example of sensitive information?
0%
Which of the following is NOT true concerning a computer labeled SECRET?
0%
Which of the following is NOT considered a potential insider threat indicator?
0%
Which of the following is true of protecting classified data?
Since the URL does not start with "https," do not provide your credit card information.
0%
While you are registering for a conference, you arrive at the website http://www.dcsecurityconference.org/registration/. The website requires a credit card for registration. What should you do?
0%
Which of the following should be reported as a potential security incident (in accordance with your Agency's insider threat policy)?
0%
When checking in at the airline counter for a business trip, you are asked if you would like to check your laptop bag. This bag contains your Government-issued laptop. What should you do?
0%
After clicking on a link on a website, a box pops up and asks if you want to run an application. Is it okay to run it?
You must have your organization's permission to telework.
0%
Which of the following does NOT constitute spillage?
0%
Which of the following is true about telework?
0%
Which of the following is true of protecting classified data?
0%
Which of the following is NOT a good way to protect your identity?
No. Only allow mobile code to run from organization or your organization's trusted sites.
0%
When checking in at the airline counter for a business trip, you are asked if you would like to check your laptop bag. This bag contains your Government-issued laptop. What should you do?
0%
In addition to avoiding the temptation of greed to betray his country, what should Alex do differently?
0%
After clicking on a link on a website, a box pops up and asks if you want to run an application. Is it okay to run it?
0%
A coworker wants to send you a sensitive document to review while you are at lunch and you only have your personal tablet. What should you do?
Physical security of mobile phones carried overseas is not a major issue.
0%
Which of the following is NOT true of traveling overseas with a mobile phone?
0%
Which of the following is NOT considered a potential insider threat indicator?
0%
Which of the following is NOT an appropriate way to protect against inadvertent spillage?
0%
Which of the following is an example of Protected Health Information (PHI)?
Neither confirm nor deny the information is classified.
0%
Which of the following is NOT an appropriate way to protect against inadvertent spillage?
0%
What should you do if a reporter asks you about potentially classified information on the web?
0%
What should you do when you are working on an unclassified system and receive an email with a classified attachment?
0%
Which of the following is NOT considered a potential insider threat indicator?
Only persons with appropriate clearance, a non-disclosure agreement, and need-to-know.
0%
Who can be permitted access to classified data?
0%
Which of the following represents a good physical security practice?
0%
Which of the following does NOT constitute spillage?
0%
While you are registering for a conference, you arrive at the website http://www.dcsecurityconference.org/registration/. The website requires a credit card for registration. What should you do?
May be used on an unclassified network.
0%
Which of the following is true of protecting classified data?
0%
Which of the following is NOT true concerning a computer labeled SECRET?
0%
Which of the following is NOT considered a potential insider threat indicator?
0%
Which of the following statements is TRUE about the use of DoD Public Key Infrastructure (PKI) tokens?
Always use DoD PKI tokens within their designated classification level.
0%
Which of the following is NOT true of traveling overseas with a mobile phone?
0%
Which of the following is NOT true concerning a computer labeled SECRET?
0%
Which of the following statements is TRUE about the use of DoD Public Key Infrastructure (PKI) tokens?
0%
Which of the following is an example of Protected Health Information (PHI)?
Classified information that should be unclassified and downgraded.
0%
Which of the following statements is TRUE about the use of DoD Public Key Infrastructure (PKI) tokens?
0%
Which of the following does NOT constitute spillage?
0%
Which of the following is true about telework?
0%
Which of the following is true of protecting classified data?
Determine if the software or service is authorized.
0%
What action should you take if you receive a friend request on your social networking website from someone in Germany you met casually at a conference last year?
0%
What is a critical consideration on using cloud-based file sharing and storage applications on your Government-furnished equipment (GFE)?
0%
What should you do when you are working on an unclassified system and receive an email with a classified attachment?
0%
When checking in at the airline counter for a business trip, you are asked if you would like to check your laptop bag. This bag contains your Government-issued laptop. What should you do?
Three or more
0%
Which of the following is NOT an example of sensitive information?
0%
Which of the following is the best example of Personally Identifiable Information (PPI)?
0%
How can you protect your information when using wireless technology?
0%
How many insider threat indicators does Alex demonstrate?
Explanation of benefits from a health insurance company.
0%
Which of the following is NOT considered a potential insider threat indicator?
0%
Which of the following is an example of Protected Health Information (PHI)?
0%
Which of the following is NOT true concerning a computer labeled SECRET?
0%
Which of the following is NOT true of traveling overseas with a mobile phone?
Exceptionally Grave Damage
0%
Which of the following should you NOT do if you find classified information on the internet?
0%
Which level of damage to national security can you reasonably expect Top Secret information to cause if disclosed?
0%
You receive a call from someone from the help desk who needs your assistance with a problem on your computer. How should you respond?
0%
Which of the following is an example of Protected Health Information (PHI)?
Press release date
0%
Which of the following is NOT true concerning a computer labeled SECRET?
0%
Which of the following is NOT an example of sensitive information?
0%
Which of the following is NOT a good way to protect your identity?
0%
Which of the following is true of protecting classified data?
Use your own security badge, key code, or Common Access Card (CAC)/Personal Identity Verification (PIV) card.
0%
Which of the following is an example of Protected Health Information (PHI)?
0%
Which of the following is NOT an appropriate way to protect against inadvertent spillage?
0%
Which of the following is NOT true of traveling overseas with a mobile phone?
0%
Which of the following represents a good physical security practice?
0 h : 0 m : 1 s
«
Multiple Choice Questions
»
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
0
Answered
0
Not Answered
0
Not Visited
Correct : 0
Incorrect : 0
Report Question
×
What's an issue?
Question is wrong
Answer is wrong
Other Reason
Want to elaborate a bit more? (optional)
Support mcqgeeks.com by disabling your adblocker.
×
Please disable the adBlock and continue.
Thank you.
Reload page