Cyber Awareness Challenge 2024 (Knowledge Pre-Check)
Study online at https://quizlet.com/_e1ppnj
1. Which of the following is a best practice for man- Validate connection requests
aging connection requests on social networking through another source if pos-
sites? sible
2. which of the following is an authoritative source for Security Classification Guide
derivative classification?
3. Which of the following is a step you should NOT Purge any device's memory be-
take to protect against spillage? fore connecting it to a classified
network?
4. Which best describes an insider threat? Someone authorized, wittingly or unwit-
who uses ____ access, ____, to harm national secu- tingly
rity through unauthorized disclosure, data modifi-
cation, espionage, terrorism, or kinetic actions.
5. Which of the following is NOT a best practice for Use the devices' default security
teleworking in an environment where Internet of settings
Things (IoT) devices are present?
6. Which of the following is a best practice for using Do not send mass e-mails
government e-mail?
7. How can you mitigate the potential risk associated Use the preview function to see
with a compressed URL (e.g., TinyURL, goo.gl)? where the link actually leads
8. Where are you permitted to use classified data? Only in areas with security ap-
propriate to the classification
level
9. Tom is working on a report that contains employ- Email it to a colleague like a silly
ees' names, home addresses, and salary. Which of goose
1/3
Study online at https://quizlet.com/_e1ppnj
1. Which of the following is a best practice for man- Validate connection requests
aging connection requests on social networking through another source if pos-
sites? sible
2. which of the following is an authoritative source for Security Classification Guide
derivative classification?
3. Which of the following is a step you should NOT Purge any device's memory be-
take to protect against spillage? fore connecting it to a classified
network?
4. Which best describes an insider threat? Someone authorized, wittingly or unwit-
who uses ____ access, ____, to harm national secu- tingly
rity through unauthorized disclosure, data modifi-
cation, espionage, terrorism, or kinetic actions.
5. Which of the following is NOT a best practice for Use the devices' default security
teleworking in an environment where Internet of settings
Things (IoT) devices are present?
6. Which of the following is a best practice for using Do not send mass e-mails
government e-mail?
7. How can you mitigate the potential risk associated Use the preview function to see
with a compressed URL (e.g., TinyURL, goo.gl)? where the link actually leads
8. Where are you permitted to use classified data? Only in areas with security ap-
propriate to the classification
level
9. Tom is working on a report that contains employ- Email it to a colleague like a silly
ees' names, home addresses, and salary. Which of goose
1/3