DOD Cyber Awareness Challenge 2019: Knowledge Check
What should you do after you have ended a call from a reporter asking you to confirm potentially classified info found on the web? - Alert your security point of contact. Which of the following actions is appropriate after finding classified Government information on the internet? - Note any identifying information and the website's URL. Which of these is true of unclassified data? - Its classification level may rise when aggregated. What type of information includes personal, payroll, medical, and operational information? - Sensitive. What is the best protection method for sharing Personally Identifiable Information (PII)? - Digitally sign and encrypt the email. Which of the following is NOT a typical result from running malicious code? - Disables cookies. Which of the following is a practice that helps to protect you from identity theft? - Ordering a credit report annually. Which of the following describes an appropriate use of Government email? - Molly uses a digital signature when sending attachments or hyperlinks. Which of the following is true of Internet hoaxes? - They can be part of a distributed denial-of-service (DDoS) attack.
Geschreven voor
- Instelling
- DOD Cyber Awareness Challenge 2019
- Vak
- DOD Cyber Awareness Challenge 2019
Documentinformatie
- Geüpload op
- 19 november 2022
- Aantal pagina's
- 3
- Geschreven in
- 2022/2023
- Type
- Tentamen (uitwerkingen)
- Bevat
- Antwoorden
Onderwerpen
-
what should you do after you have ended a call from a reporter asking you to confirm potentially classified info found on the web alert your security point of contact
-
which of the following actio
Ook beschikbaar in voordeelbundel