CYBER AWARENESS CHALLENGE
Study online at https://quizlet.com/_e60x10
1. How can you protect your home computer? Turn on the password fea-
ture
2. Carl receives an e-mail about a potential health risk... Forward it
3. Which of the following is an appropriate use of govern- Using a digital signa-
ment e-mail? ture when sending attach-
ments
4. Sylvia commutes to work via public transportation. She Yes. Eavesdroppers may
often uses... be listening to Sylvia's
phone calls, and shoulder
surfers may be looking at
her screen.
5. Which of the following is true of transmitting or trans- Printed SCI must be re-
porting SCI? trieved promptly from the
printer
6. What conditions are necessary to be granted access to Top Secret clearance and
SCI? indoctrination into the SCI
program
7. Terry sees a post on her social media feed that says This is probably a post de-
there is smoke billowing from the Pentagon... signed to attract Terr's at-
tention to click on a link
and steal her information
8. Which of the following statements about PHI is false? It is created or received
by a healthcare provider,
health plan, or employer
of a business associate of
these.
1/5
, CYBER AWARENESS CHALLENGE
Study online at https://quizlet.com/_e60x10
9. Which of the following is NOT a best practice for pro- Use your router's pre-set
tecting your home wireless network for telework? SSID and password
10. Beth taps her phone at a payment terminal to pay for Yes, there is a risk that the
a purchase. Does this pose a security risk? signal could be intercept-
ed and altered
11. How can you prevent viruses and malicious code? Scan all external files be-
fore uploading to your
computer
12. Which of the following is an example of behavior that Taking sensitive informa-
you should report? tion home for telework
without authorization
13. You receive a text message from a package shipper Delete the message
notifying you that your package delivery is delayed due
to needing updated delivery instructions from you.
14. Which of the following is an appropriate use of a DoD Do not use a token ap-
PKI token? proved for NIPR on SIPR
15. Which of the following is a best practice when brows- Only accept cookies from
ing the internet? reputable, trusted web-
sites
16. Where are you permitted to use classified data? Only in areas with security
appropriate to the classifi-
cation level
17. Which of the following contributes to your online iden- All of these
tity?
18. How can you protect your home computer?
2/5
Study online at https://quizlet.com/_e60x10
1. How can you protect your home computer? Turn on the password fea-
ture
2. Carl receives an e-mail about a potential health risk... Forward it
3. Which of the following is an appropriate use of govern- Using a digital signa-
ment e-mail? ture when sending attach-
ments
4. Sylvia commutes to work via public transportation. She Yes. Eavesdroppers may
often uses... be listening to Sylvia's
phone calls, and shoulder
surfers may be looking at
her screen.
5. Which of the following is true of transmitting or trans- Printed SCI must be re-
porting SCI? trieved promptly from the
printer
6. What conditions are necessary to be granted access to Top Secret clearance and
SCI? indoctrination into the SCI
program
7. Terry sees a post on her social media feed that says This is probably a post de-
there is smoke billowing from the Pentagon... signed to attract Terr's at-
tention to click on a link
and steal her information
8. Which of the following statements about PHI is false? It is created or received
by a healthcare provider,
health plan, or employer
of a business associate of
these.
1/5
, CYBER AWARENESS CHALLENGE
Study online at https://quizlet.com/_e60x10
9. Which of the following is NOT a best practice for pro- Use your router's pre-set
tecting your home wireless network for telework? SSID and password
10. Beth taps her phone at a payment terminal to pay for Yes, there is a risk that the
a purchase. Does this pose a security risk? signal could be intercept-
ed and altered
11. How can you prevent viruses and malicious code? Scan all external files be-
fore uploading to your
computer
12. Which of the following is an example of behavior that Taking sensitive informa-
you should report? tion home for telework
without authorization
13. You receive a text message from a package shipper Delete the message
notifying you that your package delivery is delayed due
to needing updated delivery instructions from you.
14. Which of the following is an appropriate use of a DoD Do not use a token ap-
PKI token? proved for NIPR on SIPR
15. Which of the following is a best practice when brows- Only accept cookies from
ing the internet? reputable, trusted web-
sites
16. Where are you permitted to use classified data? Only in areas with security
appropriate to the classifi-
cation level
17. Which of the following contributes to your online iden- All of these
tity?
18. How can you protect your home computer?
2/5