MCQExams
0:0:1
CBSE
JEE
NTSE
NEET
Practice
Homework
×
practice
Dod Cyber Awareness Challenge 2019 Quiz
How should you protect your Common Access Card (CAC) or Personal Identity Verification (PIV) card?
Report Question
0%
Avoid using non-Bluetooth-paired or unencrypted wireless computer peripherals.
0%
Connect to the Government Virtual Private Network (VPN).??
0%
Use TinyURL's preview feature to investigate where the link leads.
0%
Store it in a shielded sleeve to avoid chip cloning.
Which of the following is NOT a typical result from running malicious code?
Report Question
0%
Linda encrypts all of the sensitive data on her government-issued mobile devices.
0%
Disabling cookies
0%
Treated mental health issues.
0%
Sensitive information may be stored on any password-protected system.
What level of damage to national security could reasonably be expected if unauthorized disclosure of Top Secret information occurred?
Report Question
0%
Treated mental health issues.
0%
Exceptionally grave damage
0%
Use TinyURL's preview feature to investigate where the link leads.
0%
Decline the request.
Which of the following is true about telework?
Report Question
0%
If possible, set your browser preferences to prompt you each time a website wants to store a cookie.
0%
You must have your organization's permission to telework.
0%
Always use DoD PKI tokens within their designated classification level.
0%
New interest in learning another language?
You have reached the office door to exit your controlled area. As a security best practice, what should you do before exiting?
Report Question
0%
If possible, set your browser preferences to prompt you each time a website wants to store a cookie.
0%
Use TinyURL's preview feature to investigate where the link leads.
0%
Never allow sensitive data on non-Government-issued mobile devices.
0%
Remove your security badge, common access card (CAC), or personal identity verification (PIV) card.
Which of the following statements is TRUE about the use of DoD Public Key Infrastructure (PKI) tokens?
Report Question
0%
Linda encrypts all of the sensitive data on her government-issued mobile devices.
0%
Sensitive information may be stored on any password-protected system.
0%
Always use DoD PKI tokens within their designated classification level.
0%
New interest in learning another language?
A colleague has visited several foreign countries recently, has adequate work quality, speaks openly of unhappiness with U.S. foreign policy, and recently had his car repossessed. How many indicators does this employee display?
Report Question
0%
Sensitive
0%
3 or more?
0%
Decline the request.
0%
I'll pass.
What would you do if you receive a game application request on your government computer that includes permission to access your friends, profile information, cookies, and sites visited?
Report Question
0%
Decline the request.
0%
Exceptionally grave damage
0%
Store it in a shielded sleeve to avoid chip cloning.
0%
Disabling cookies
How can you protect your information when using wireless technology?
Report Question
0%
Linda encrypts all of the sensitive data on her government-issued mobile devices.
0%
Store it in a shielded sleeve to avoid chip cloning.
0%
Always use DoD PKI tokens within their designated classification level.
0%
Avoid using non-Bluetooth-paired or unencrypted wireless computer peripherals.
What is TRUE of a phishing attack?
Report Question
0%
New interest in learning another language?
0%
Phishing can be an email with a hyperlink as bait.
0%
Classified material must be appropriately marked.
0%
You must have your organization's permission to telework.
Which type of information includes personal, payroll, medical, and operational information?
Report Question
0%
Disabling cookies
0%
Sensitive
0%
Sensitive information may be stored on any password-protected system.
0%
Birthplace
Which of these is true of unclassified data?
Report Question
0%
If possible, set your browser preferences to prompt you each time a website wants to store a cookie.
0%
Linda encrypts all of the sensitive data on her government-issued mobile devices.
0%
-It must be released to the public immediately.-Its classification level may rise when aggregated. (Correct)-It does not affect the safety of Government missions.-It never requires classification markings.
0%
You must have your organization's permission to telework.
Which of the following demonstrates proper protection of mobile devices?
Report Question
0%
Sensitive information may be stored on any password-protected system.
0%
If possible, set your browser preferences to prompt you each time a website wants to store a cookie.
0%
Linda encrypts all of the sensitive data on her government-issued mobile devices.
0%
Always use DoD PKI tokens within their designated classification level.
Which of the following is a best practice for handling cookies?
Report Question
0%
Linda encrypts all of the sensitive data on her government-issued mobile devices.
0%
Sensitive information may be stored on any password-protected system.
0%
If possible, set your browser preferences to prompt you each time a website wants to store a cookie.
0%
You must have your organization's permission to telework.
Which of following is true of protecting classified data?
Report Question
0%
You must have your organization's permission to telework.
0%
If possible, set your browser preferences to prompt you each time a website wants to store a cookie.
0%
Sensitive information may be stored on any password-protected system.
0%
Classified material must be appropriately marked.
0:0:1
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
0
Answered
0
Not Answered
0
Not Visited
Correct : 0
Incorrect : 0
Report Question
×
What's an issue?
Question is wrong
Answer is wrong
Other Reason
Want to elaborate a bit more? (optional)
Support mcqexams.com by disabling your adblocker.
×
Please disable the adBlock and continue.
Thank you.
Reload page