Login
Remember me
Register
Getvoice.org
Questions
Unanswered
Tags
Users
Ask a Question
Ask a Question
Recent questions tagged cyber-awareness
1
answer
Which term describes an event where a person who does not have the required clearance or access caveats comes
asked
Oct 18, 2022
in
Internet
by
voice
(
257k
points)
internet
internet-quiz
cyber
cyber-awareness
common-terminology
sensitive
information
caveats
1
answer
What is a protection against internet hoaxes?
asked
Oct 18, 2022
in
Internet
by
voice
(
257k
points)
internet
internet-quiz
cyber
cyber-awareness
protect
hoax
website
potential-hazards
1
answer
What must you ensure if you work involves the use of different types of smart card security tokens?
asked
Oct 18, 2022
in
Internet
by
voice
(
257k
points)
internet
internet-quiz
cyber
cyber-awareness
work
card
security
token
violation
1
answer
When is the best time to post details of your vacation activities on your social networking website?
asked
Oct 18, 2022
in
Internet
by
voice
(
257k
points)
internet
internet-quiz
cyber
cyber-awareness
detail
vacation
social-network
media
website
1
answer
Which represents a security best practice when using social networking?
asked
Oct 18, 2022
in
Internet
by
voice
(
257k
points)
internet
internet-quiz
cyber
cyber-awareness
represent
security
best-way
social-network
networking
1
answer
What should you do if an individual asks you to let her follow you into your controlled space, stating that
asked
Oct 18, 2022
in
Internet
by
voice
(
257k
points)
internet
internet-quiz
cyber
cyber-awareness
individual
control-system
badges
helpdesk
security
1
answer
What are the requirements to be granted access to SCI material?
asked
Oct 18, 2022
in
Internet
by
voice
(
257k
points)
internet
internet-quiz
cyber
cyber-awareness
requirement
grant-applicant
scif
access-code
1
answer
What is a good practice when it is necessary to use a password to access a system or an application?
asked
Oct 18, 2022
in
Internet
by
voice
(
257k
points)
internet
internet-quiz
cyber
cyber-awareness
good-way
practice
password
system
application
1
answer
Is it acceptable to take a short break while a coworker monitors your computer while logged on with your CAC?
asked
Oct 18, 2022
in
Internet
by
voice
(
257k
points)
internet
internet-quiz
cyber
cyber-awareness
break
coworker
computer
cac
workstation
1
answer
What must you do when e-mailing Personally Identifiable Information (PII) or Protected Health Information (PHI)?
asked
Oct 18, 2022
in
Internet
by
voice
(
257k
points)
internet
internet-quiz
cyber
cyber-awareness
email
personal
identification
information
pii
phi
1
answer
What must you ensure before transmitting Personally Identifiable Information (PII) or Protected Health Information (PHI)
asked
Oct 18, 2022
in
Internet
by
voice
(
257k
points)
internet
internet-quiz
cyber
cyber-awareness
personal
identification
information
pii
phi
email
1
answer
What does Personally Identifiable Information (PII) include?
asked
Oct 18, 2022
in
Internet
by
voice
(
257k
points)
internet
internet-quiz
cyber
cyber-awareness
personal
identification
information
pii
security
social-network
1
answer
What is the best example of Protected Health Information (PHI)?
asked
Oct 18, 2022
in
Internet
by
voice
(
257k
points)
internet
internet-quiz
cyber
cyber-awareness
best-way
example
protect
information
phi
health-insurance
1
answer
What is the best example of Personally Identifiable Information (PII)?
asked
Oct 18, 2022
in
Internet
by
voice
(
257k
points)
internet
internet-quiz
cyber
cyber-awareness
example
personal
identification
information
pii
1
answer
Which of the following terms refers to harm inflicted on national security through authorized access to information
asked
Oct 18, 2022
in
Internet
by
voice
(
257k
points)
internet
internet-quiz
cyber
cyber-awareness
common-terminology
security
authorization
access-code
information
1
answer
How many potential insider threat indicators does a person who is playful and charming, consistently win performance
asked
Oct 18, 2022
in
Internet
by
voice
(
257k
points)
internet
internet-quiz
cyber
cyber-awareness
insider
threat-indicator
performance
sensitive
information
1
answer
Which is true for protecting classified data?
asked
Oct 18, 2022
in
Internet
by
voice
(
257k
points)
internet
internet-quiz
cyber
cyber-awareness
protect
classified-document
data
government
container
1
answer
Under what circumstances could unclassified information be considered a threat to national security?
asked
Oct 18, 2022
in
Internet
by
voice
(
257k
points)
internet
internet-quiz
cyber
cyber-awareness
classified-document
threat
security
information
1
answer
What is an individual's Personally Identifiable Information (PII) or Protected Health Information (PHI) considered?
asked
Oct 18, 2022
in
Internet
by
voice
(
257k
points)
internet
internet-quiz
cyber
cyber-awareness
individual
personal
identification
information
protect
1
answer
What information posted publicly on your personal social networking profile represents a security risk?
asked
Oct 18, 2022
in
Internet
by
voice
(
257k
points)
internet
internet-quiz
cyber
cyber-awareness
information
personal
social-network
security
risk
1
answer
What are some potential insider threat indicators?
asked
Oct 18, 2022
in
Internet
by
voice
(
257k
points)
internet
internet-quiz
cyber
cyber-awareness
potential-hazards
insider
threat
threat-indicator
1
answer
Under which circumstances may you be subject to criminal, disciplinary, and/or administrative action due to
asked
Oct 18, 2022
in
Internet
by
voice
(
257k
points)
internet
internet-quiz
cyber
cyber-awareness
disciplinary
administrative-incharge
online
misconduct
1
answer
Why might "insiders" be able to cause damage to their organizations more easily than others?
asked
Oct 18, 2022
in
Internet
by
voice
(
257k
points)
internet
internet-quiz
cyber
cyber-awareness
insider
damage
organisation
government
information
system
1
answer
Which scenario might indicate a reportable insider threat security incident?
asked
Oct 18, 2022
in
Internet
by
voice
(
257k
points)
internet
internet-quiz
cyber
cyber-awareness
scenario
report
insider
threat
security
incident
1
answer
Which of the following practices reduces the chance of becoming a target by adversaries seeking insider information?
asked
Oct 18, 2022
in
Internet
by
voice
(
257k
points)
internet
internet-quiz
cyber
cyber-awareness
practice
adverse-condition
insider
information
Page:
« prev
1
2
3
4
5
...
14
next »
...