MCQGeeks
0 : 0 : 1
CBSE
JEE
NTSE
NEET
English
UK Quiz
Quiz
Driving Test
Practice
Games
Practice
Dod Cyber Awareness 2021 Knowledge Check Quiz
«
Multiple Choice Questions
»
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
What type of activity or behavior should be reported as a potential insider threat?
0%
It displays a label showing maximum classification, date of creation, point of contact, and Change Management (CM Control Number.
0%
Maintain possession of your laptop and other government-furnished equipment (GFE) at all times.
0%
Coworker making consistent statements indicative of hostility or anger toward the United States and its policies.
0%
Shred personal documents, never share passwords and order a credit history annually.
Sensitive Information: Which of the following is an example of Protected Health Information (PHI)?
0%
Official use only
0%
Decline the request.
0%
Your personal email address/addresses
0%
Medical test results
Upon connecting your government-issued laptop to a public wireless connection, what should you immediately do?
0%
As long as the document is cleared for public release, you may share it outside of DoD.
0%
Connect to the Government Virtual Private Network (VPN).
0%
Ask the caller, "What's your full name and phone number?"
0%
If aggregated, the information could become classified.
When is the safest time to post details of your vacation activities on your social networking website?
0%
When your vacation is over, after you have returned home
0%
View email in plain text and don't view email in Preview Pane.
0%
Call your security point of contact immediately.
0%
Something you possess like a CAC, and a Pin or Password
Which of the following is NOT a correct way to protect sensitive information?
0%
New interest in learning a foreign language
0%
Sensitive information may be stored on any password-protected system.
0%
Digitally signing e-mails that contain attachments or hyperlinks.
0%
Follow the instructions given only by verified personnel.
What information posted publicly on your personal social networking profile represents a security risk?
0%
Your place of birth
0%
It is never permitted
0%
Official use only
0%
View email in plain text and don't view email in Preview Pane.
What is the best practice while traveling with mobile computing devices?
0%
Maintain possession of it at all times.
0%
Create separate user accounts with strong individual passwords.
0%
Maintain possession of your laptop and other government-furnished equipment (GFE) at all times.
0%
Shred personal documents, never share passwords and order a credit history annually.
How many the Cyberspace Protection Conditions (CPCON) are there?
0%
5
0%
Maintain possession of it at all times.
0%
Digitally signing e-mails that contain attachments or hyperlinks.
0%
Classified material must be appropriately marked
Under what circumstances is it acceptable to use your Government-furnished computer to check personal e-mail and do other non-work-related activities?
0%
If aggregated, the information could become classified.
0%
If allowed by organizational policy.
0%
At all time when is the facility.
0%
No. Only use you agency trusted websites.
What must users ensure when using removable media such as a compact disk (CD)?
0%
Store classified data appropriately in a GSA-approved vault/container.
0%
Shred personal documents, never share passwords and order a credit history annually.
0%
It displays a label showing maximum classification, date of creation, point of contact, and Change Management (CM Control Number.
0%
Coworker making consistent statements indicative of hostility or anger toward the United States and its policies.
Which of the following is the best description of two-factor authentication?
0%
Something you possess like a CAC, and a Pin or Password
0%
Use antivirus software and keep it up to date.
0%
Classified material must be appropriately marked
0%
Precise guidance regarding specific elements of information to be classified
You receive a call from someone from the help desk who needs your assistance with a problem on your computer. How should you respond?
0%
Decline to lend the man your phone.
0%
Retrieve classified documents promptly from printers.
0%
As long as the document is cleared for public release, you may share it outside of DoD.
0%
Ask the caller, "What's your full name and phone number?"
What is a security best practice to employ on your home computer?
0%
Create separate user accounts with strong individual passwords.
0%
View e-mail in plain text and don't view e-mail in Preview Pane.
0%
View email in plain text and don't view email in Preview Pane.
0%
Precise guidance regarding specific elements of information to be classified
A man you do not know is trying to look at your Government-issued phone and has asked to use it. What should you do?
0%
Decline to lend the man your phone.
0%
Connect to the Government Virtual Private Network (VPN).
0%
At all time when is the facility.
0%
Call your security point of contact immediately.
What is a way to prevent the download of viruses and other malicious code when checking your e-mail?
0%
Create separate user accounts with strong individual passwords.
0%
View e-mail in plain text and don't view e-mail in Preview Pane.
0%
Avoid using the same password between systems or applications.
0%
View email in plain text and don't view email in Preview Pane.
Malicious code:After clicking on a link on a website, a box pops up and asks if you want to run an application. Is it ok to run it?
0%
Decline to lend the man your phone.
0%
Call your security point of contact immediately.
0%
If allowed by organizational policy.
0%
No. Only use you agency trusted websites.
Which of the following terms refers to someone who harms national security through authorized access to information system?
0%
New interest in learning a foreign language
0%
Decline the request.
0%
Sensitive information may be stored on any password-protected system.
0%
Insider Threat
What is the best way to protect your Common Access Card (CAC)?
0%
Patching from a trusted source
0%
Something you possess like a CAC, and a Pin or Password
0%
Maintain possession of it at all times.
0%
Create separate user accounts with strong individual passwords.
What should you do if you receive a game application request that includes permission to access your friends, profile information, cookies, and sites visited?
0%
Official use only
0%
Decline the request.
0%
It is never permitted
0%
Decline to lend the man your phone.
When classified data is not in use, how can you protect it?
0%
Shred personal documents, never share passwords and order a credit history annually.
0%
Digitally signing e-mails that contain attachments or hyperlinks.
0%
Create separate user accounts with strong individual passwords.
0%
Store classified data appropriately in a GSA-approved vault/container.
When is it appropriate to have your securing badge visible with a sensitive compartmented information facility?
0%
View email in plain text and don't view email in Preview Pane.
0%
At all time when is the facility.
0%
Avoid using the same password between systems or applications.
0%
It is never permitted
What actions should you take when printing classified material within a Sensitive Compartmented Information Facility (SCIF)?
0%
Remind those involved that such a discussion should not take place in common areas within a SCIF.
0%
Retrieve classified documents promptly from printers.
0%
When your vacation is over, after you have returned home
0%
Ask the caller, "What's your full name and phone number?"
0 h : 0 m : 1 s
«
Multiple Choice Questions
»
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
0
Answered
0
Not Answered
0
Not Visited
Correct : 0
Incorrect : 0
Report Question
×
What's an issue?
Question is wrong
Answer is wrong
Other Reason
Want to elaborate a bit more? (optional)
Support mcqgeeks.com by disabling your adblocker.
×
Please disable the adBlock and continue.
Thank you.
Reload page