MCQGeeks
0 : 0 : 1
CBSE
JEE
NTSE
NEET
English
UK Quiz
Quiz
Driving Test
Practice
Games
Practice
Dod Cyber Awareness Quiz
«
Multiple Choice Questions
»
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
Sensitive information may be store on any password-protected system
0%
Which of the following is NOT a correct way to protect sensitive information?
0%
Which of the following is not a constitutional spillage?
0%
Which of the following is NOT an appropriate way to protect against inadvertent spillage?
0%
Which of the following demonstrates proper protection of mobile devices?
Only connect, exposure of malware
0%
What should the participants in this conversation involving SCI do directly?
0%
What should the owner of this printed SCI do differently?
0%
What portable electronic device (ped's) are permitted in a SCIF
0%
What should Sara do when using publicly available internet, such as hotel WI-FI?
ALL OF THE ABOVEcorrupting files, erasing your hard drive, allowing hackers access
0%
How can malicious code caused damage?
0%
What is the response to an incident such as opening an uncontrolled DVD on a computer in a SCIF?
0%
How can you avoid downloading malicious code?
0%
What should Alex's colleagues do?
Do not access website links en e-mail messages
0%
Which of the following is true about telework?
0%
When is it appropriate to have your security badge visible?
0%
What is the danger of using public WI-FI connections?
0%
How can you avoid downloading malicious code?
Physically assess that everyone within listening distance is cleared and has a need-to-know for the information being discussed
0%
What should the owner of this printed SCI do differently?
0%
What should Sara do when using publicly available internet, such as hotel WI-FI?
0%
What should Alex's colleagues do?
0%
What should the participants in this conversation involving SCI do directly?
delete buttondelete buttonreport button
0%
What should the owner of this printed SCI do differently?
0%
What portable electronic device (ped's) are permitted in a SCIF
0%
Books linkYesterday2 days ago (required profile update)
0%
Antivirus AlertUpdate StatusFirewall StatusVirus Alert
ALL OF THE ABOVE-notify your security POC-analyze the media for viruses or malicious code-analyze the other workstations in the SCIF for viruses or malicious code
0%
Which of the following is NOT an appropriate way to protect against inadvertent spillage?
0%
What is the response to an incident such as opening an uncontrolled DVD on a computer in a SCIF?
0%
Which of the following should you NOT do if you find classified information on the internet?
0%
What is the danger of using public WI-FI connections?
Linda encrypts all of the sensitive data on her government-issued mobile devices
0%
Which of the following demonstrates proper protection of mobile devices?
0%
Which of the following is NOT an appropriate way to protect against inadvertent spillage?
0%
Which of the following is NOT a correct way to protect sensitive information?
0%
Which of the following is an example of malicious code?
Pick the one without social security number
0%
What portable electronic device (ped's) are permitted in a SCIF
0%
PII but not PHI?
0%
What should the owner of this printed SCI do differently?
0%
PHI Protected
-click update-click install-click enable-click exit
0%
What is the danger of using public WI-FI connections?
0%
What should the owner of this printed SCI do differently?
0%
Which of the following is true of protecting classified data?
0%
Antivirus AlertUpdate StatusFirewall StatusVirus Alert
Exceptionally grave damage
0%
When is it okay to charge a personal mobile device using government-furnished equipment (GFE)
0%
What level of damage to national security can you reasonably expect Top Secret information to cause if disclosed?
0%
What should Sara do when using publicly available internet, such as hotel WI-FI?
0%
Which of the following should you NOT do if you find classified information on the internet?
Only expressly authorized government-owned ped's
0%
What is the danger of using public WI-FI connections?
0%
What should the owner of this printed SCI do differently?
0%
What portable electronic device (ped's) are permitted in a SCIF
0%
What should Sara do when using publicly available internet, such as hotel WI-FI?
this is never okay
0%
When is it appropriate to have your security badge visible?
0%
Which of the following should you NOT do if you find classified information on the internet?
0%
When is it okay to charge a personal mobile device using government-furnished equipment (GFE)
0%
Which of the following is NOT an example of sensitive information?
Avoid talking questions of potential work outside of the workplace or with people without a need-to-know
0%
Which of the following is NOT a correct way to protect sensitive information?
0%
In addition to avoiding the temptation of green to betray his country, what would Alex do differently?
0%
What should the participants in this conversation involving SCI do directly?
0%
What is the response to an incident such as opening an uncontrolled DVD on a computer in a SCIF?
Classified material must be appropriate marked
0%
Which of the following is true of protecting classified data?
0%
Which of the following is not a constitutional spillage?
0%
Which of the following is an example of malicious code?
0%
Which of the following is NOT a correct way to protect sensitive information?
Software that install itself without the user's knowledge
0%
Which of the following is true about telework?
0%
Which of the following is an example of malicious code?
0%
Which of the following is not a constitutional spillage?
0%
Which of the following is true of protecting classified data?
You must have your organization's permission to telework
0%
Which of the following is true about telework?
0%
Which of the following is an example of malicious code?
0%
Which of the following is not a constitutional spillage?
0%
Which of the following is true of protecting classified data?
Classified information that should be unclassified and is downgraded
0%
Which of the following is NOT a correct way to protect sensitive information?
0%
Which of the following is true of protecting classified data?
0%
Which of the following is not a constitutional spillage?
0%
Which of the following is an example of malicious code?
Computer and CAC, pin on the board, finger prints and biometrics, DOD token, CAC/PIV
0%
PHI Protected
0%
PII but not PHI?
0%
What should Alex's colleagues do?
0%
Security Violations
BOTH OF THESE-compromise of data-exposure of malware
0%
Which of the following is true about telework?
0%
What should the owner of this printed SCI do differently?
0%
Which of the following is an example of malicious code?
0%
What is the danger of using public WI-FI connections?
Three or mroe
0%
NOT permitted uses of government-furnished equip (GFE)
0%
Books linkYesterday2 days ago (required profile update)
0%
How many insider threat indicates does Alex demonstrate?
0%
Which of the following is NOT an example of sensitive information?
0 h : 0 m : 1 s
«
Multiple Choice Questions
»
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
0
Answered
0
Not Answered
0
Not Visited
Correct : 0
Incorrect : 0
Report Question
×
What's an issue?
Question is wrong
Answer is wrong
Other Reason
Want to elaborate a bit more? (optional)
Support mcqgeeks.com by disabling your adblocker.
×
Please disable the adBlock and continue.
Thank you.
Reload page