Login
Remember me
Register
Getvoice.org
Questions
Unanswered
Tags
Users
Ask a Question
Ask a Question
Recent questions tagged computer
1
answer
What are rootkits (Cybersecurity awareness)
asked
in
Internet
by
voice
(
263k
points)
internet
internet-quiz
cyber
cyber-security
rootkit
software
computer
knowledge
1
answer
A Botnet is a term derived from the idea of bot networks in its most basic form, a bot is simply an automated computer
asked
in
Internet
by
voice
(
263k
points)
internet
internet-quiz
cyber
cyber-security
true-or-false
botnet
networking
computer
program
robot
1
answer
Which of the following actions is a mandated OPSEC measure that should be conducted before leaving
asked
in
Jobs & Employment
by
voice
(
263k
points)
jobs-n-employment
opsec
awareness
work
critical
information
protect
measure
mandate
computer
1
answer
What is a best practice to protect data on your mobile computing device?
asked
in
Internet
by
voice
(
263k
points)
internet
internet-quiz
cyber
cyber-awareness
best-way
practice
protect
mobile
computer
password
1
answer
When is conducting a private money-making venture using your Government-furnished computer permitted?
asked
in
Internet
by
voice
(
263k
points)
internet
internet-quiz
cyber
cyber-awareness
conduct
privacy
money-making
venture
computer
1
answer
What is a possible indication of a malicious code attack in progress?
asked
in
Internet
by
voice
(
263k
points)
internet
internet-quiz
cyber
cyber-awareness
threat-indicator
malicious-code
attack
computer
1
answer
Under what circumstances is it acceptable to use your Government-furnished computer to check person e-mail
asked
in
Internet
by
voice
(
263k
points)
internet
internet-quiz
cyber
cyber-awareness
government
computer
email
personal
policy
1
answer
Is it acceptable to take a short break while a coworker monitors your computer while logged on with your CAC?
asked
in
Internet
by
voice
(
263k
points)
internet
internet-quiz
cyber
cyber-awareness
break
coworker
computer
cac
workstation
1
answer
You receive a call from someone from the help desk who needs your assistance with a problem on your computer.
asked
in
Internet
by
voice
(
263k
points)
internet
internet-quiz
cyber
cyber-awareness
call
helpdesk
assistance
computer
response
1
answer
Which of the following is NOT true concerning a computer labeled SECRET?
asked
in
Internet
by
voice
(
263k
points)
internet
internet-quiz
cyber
cyber-awareness
false-statement
computer
classified-document
1
answer
What is the response to an incident such as opening an uncontrolled DVD on a computer in a SCIF?
asked
in
Internet
by
voice
(
263k
points)
internet
internet-quiz
cyber
cyber-awareness
response
incident
control-system
computer
scif
1
answer
The following practices help prevent viruses and the downloading of malicious code Except.
asked
in
Internet
by
voice
(
263k
points)
internet
internet-quiz
cyber
cyber-awareness
practice
virus
malicious-code
download
source
computer
1
answer
Which of the following should be done to keep your home computer secure?
asked
in
Internet
by
voice
(
263k
points)
internet
internet-quiz
cyber
cyber-awareness
home
computer
security
best-way
practice
1
answer
What should be done to sensitive data on laptops and other mobile computing devices?
asked
in
Internet
by
voice
(
263k
points)
internet
internet-quiz
cyber
cyber-awareness
sensitive
data
laptop
computer
device
encrypt
1
answer
Malicious code can do the following except?
asked
in
Internet
by
voice
(
263k
points)
internet
internet-quiz
cyber
cyber-awareness
malicious-code
computer
security
malware
1
answer
Which is NOT a wireless security practice?
asked
in
Internet
by
voice
(
263k
points)
internet
internet-quiz
cyber
cyber-awareness
wireless
technology
security
practice
computer
1
answer
Someone calls from an unknown number and says they are from IT and need some information about your computer.
asked
in
Internet
by
voice
(
263k
points)
internet
internet-quiz
cyber
cyber-awareness
information-technology
information
computer
cell-phone
1
answer
If authorized, what can be done on a work computer?
asked
in
Internet
by
voice
(
263k
points)
internet
internet-quiz
cyber
cyber-awareness
unauthorized-access
computer
work
email
1
answer
You are logged on to your unclassified computer and just received an encrypted email from a co-worker.
asked
in
Internet
by
voice
(
263k
points)
internet
internet-quiz
cyber
cyber-awareness
classified-document
computer
email
attachment
1
answer
There are many travel tips for mobile computing. Which of the following is NOT one?
asked
in
Internet
by
voice
(
263k
points)
internet
internet-quiz
cyber
cyber-awareness
travel
mobile
computer
dod
device
information
1
answer
What is considered a mobile computing device and therefore shouldn't be plugged in to your Government computer?
asked
in
Internet
by
voice
(
263k
points)
internet
internet-quiz
cyber
cyber-awareness
mobile
computer
device
government
1
answer
Which of the following is NOT a home security best practice?
asked
in
Internet
by
voice
(
263k
points)
internet
internet-quiz
cyber
cyber-awareness
homeland-security
best-way
practice
computer
1
answer
Which of the following is NOT Government computer misuse?
asked
in
Internet
by
voice
(
263k
points)
internet
internet-quiz
cyber
cyber-awareness
government
computer
public-work
email
1
answer
How can malicious code cause damage?
asked
in
Internet
by
voice
(
263k
points)
internet
internet-quiz
cyber
cyber-awareness
malicious-code
damage
security
networking
computer
1
answer
Which of the following is NOT a best practice to protect data on your mobile computing device?
asked
in
Internet
by
voice
(
263k
points)
internet
internet-quiz
cyber
cyber-awareness
best-way
practice
protect
data
mobile
computer
Page:
1
2
next »
...