Geschreven door studenten die geslaagd zijn Direct beschikbaar na je betaling Online lezen of als PDF Verkeerd document? Gratis ruilen 4,6 TrustPilot
logo-home
Tentamen (uitwerkingen)

US NAVY CYBER AWARENESS CHALLENGE 2025 QUESTIONS WITH CORRECT ANSWERS

Beoordeling
-
Verkocht
-
Pagina's
27
Cijfer
A+
Geüpload op
22-04-2025
Geschreven in
2024/2025

US NAVY CYBER AWARENESS CHALLENGE 2025 QUESTIONS WITH CORRECT ANSWERS

Instelling
US NAVY CYBER AWARENESS
Vak
US NAVY CYBER AWARENESS

Voorbeeld van de inhoud

US NAVY CYBER AWARENESS CHALLENGE 2025 QUESTIONS
WITH CORRECT ANSWERS


1) How can you protect data on a mobile device?

- Use two- factor authentication
- Store your data on a commercial cloud application
- Disable automatic screen locking after a period of inactivity
- Turn over your device as requested by authority figures -- Correct Answer
✔✔ Use two- factor authentication

2) Which of the following is true of compressed URLs (e.g., Tiny URL, goo.gl)?

- You must open the link to find out where it leads.
- You can hover your cursor over it to preview where it actually leads.
- They pose no risk.
- They may be used to mask malicious intent -- Correct Answer ✔✔ They may
be used to mask malicious intent

3) Which type of data could reasonably be expected to cause damage to national
security?

- Secret
- Confidential
- Controlled Unclassified Information (CUI)
- Top Secret -- Correct Answer ✔✔ Confidential

4) Which of the following is a best practice for physical security?

- Only hold the door for coworkers that you know work in the facility
- Post access rosters in a visible area outside the facility
- Lock your security badges away and avoid wearing it while in the facility

, - Report suspicious activity -- Correct Answer ✔✔ Report suspicious activity

5) Which of the following statement is true of DoD Unclassified data?

- It does not require access or distribution controls.
- It must be cleared before being released to the public.
- It poses no risk to the safety of government personnel, mission, or systems.
- It does not require classification markings. -- Correct Answer ✔✔ It must be
cleared before being released to the public.

6) How can you protect a mobile device while traveling?

- Only use public Wi- Fi offered by established businesses
- Only make voice calls, as they are more secure than data transmissions
- Connect with a Government VPN
- Store the device in a hotel safe when sightseeing -- Correct Answer ✔✔
Connect with a Government VPN

7) How can you protect your home computer?

- Turn off antivirus software scans
- Install spyware protection software
- Disable firewall protection
- Accept all mobile code -- Correct Answer ✔✔ Install spyware protection
software

8) How can you protect your home computer?

- Use the administration account for all users
- Disable the password feature
- Decline security updates
- Use legitimate, known antivirus software -- Correct Answer ✔✔ Use
legitimate, known antivirus software

9) Which of the following is true of spillage?

, - It occurs when authorization to transfer information is granted and then later
revoked.
- It describes information that is "spilled" to either a lower or higher protection
level.
- It refers specifically to classified information that becomes publicly available.
- It can be either inadvertent or intentional. -- Correct Answer ✔✔ It can be
either inadvertent or intentional.

10) Which of the following personally owned peripherals can you use with government
furnished equipment (GFE)?

- A wired keyboard connected via USB
- A wired webcam that requires installed drivers
- A Bluetooth headset
- A monitor connected via USB -- Correct Answer ✔✔ A wired keyboard
connected via USB

11) How can you protect yourself from identity theft?

- Share passwords and PINs in your household
- Review your credit report annually
- Scan personal documents before discarding them
- Segregate the data collected by your apps and devices -- Correct Answer ✔✔
Review your credit report annually

12) Which of the following is a way to protect classified data?

- Remove classification markings when transporting it
- Store it in a GSA- approved container
- Use a classified network for unclassified work
- Destroy inappropriately marked material -- Correct Answer ✔✔ Store it in a
GSA- approved container

13) What are the requirements for access to Sensitive Compartmented Information
(SCI)?

Geschreven voor

Instelling
US NAVY CYBER AWARENESS
Vak
US NAVY CYBER AWARENESS

Documentinformatie

Geüpload op
22 april 2025
Aantal pagina's
27
Geschreven in
2024/2025
Type
Tentamen (uitwerkingen)
Bevat
Vragen en antwoorden

Onderwerpen

$14.29
Krijg toegang tot het volledige document:

Verkeerd document? Gratis ruilen Binnen 14 dagen na aankoop en voor het downloaden kun je een ander document kiezen. Je kunt het bedrag gewoon opnieuw besteden.
Geschreven door studenten die geslaagd zijn
Direct beschikbaar na je betaling
Online lezen of als PDF

Maak kennis met de verkoper

Seller avatar
De reputatie van een verkoper is gebaseerd op het aantal documenten dat iemand tegen betaling verkocht heeft en de beoordelingen die voor die items ontvangen zijn. Er zijn drie niveau’s te onderscheiden: brons, zilver en goud. Hoe beter de reputatie, hoe meer de kwaliteit van zijn of haar werk te vertrouwen is.
Betatutors Chamberlain College Of Nursing
Volgen Je moet ingelogd zijn om studenten of vakken te kunnen volgen
Verkocht
21
Lid sinds
1 jaar
Aantal volgers
0
Documenten
2210
Laatst verkocht
1 week geleden
REALEXAMS

4.0

3 beoordelingen

5
1
4
1
3
1
2
0
1
0

Recent door jou bekeken

Waarom studenten kiezen voor Stuvia

Gemaakt door medestudenten, geverifieerd door reviews

Kwaliteit die je kunt vertrouwen: geschreven door studenten die slaagden en beoordeeld door anderen die dit document gebruikten.

Niet tevreden? Kies een ander document

Geen zorgen! Je kunt voor hetzelfde geld direct een ander document kiezen dat beter past bij wat je zoekt.

Betaal zoals je wilt, start meteen met leren

Geen abonnement, geen verplichtingen. Betaal zoals je gewend bent via iDeal of creditcard en download je PDF-document meteen.

Student with book image

“Gekocht, gedownload en geslaagd. Zo makkelijk kan het dus zijn.”

Alisha Student

Bezig met je bronvermelding?

Maak nauwkeurige citaten in APA, MLA en Harvard met onze gratis bronnengenerator.

Bezig met je bronvermelding?

Veelgestelde vragen