Login
Remember me
Register
Getvoice.org
Questions
Unanswered
Tags
Users
Ask a Question
Ask a Question
Recent questions tagged cyber-awareness
1
answer
Which of the following should be reported as a potential security incident?
asked
Oct 6, 2022
in
Internet
by
voice
(
257k
points)
internet
internet-quiz
cyber
cyber-awareness
report
potential-hazards
security
incident
1
answer
What type of activity or behavior should be reported as a potential insider threat?
asked
Oct 6, 2022
in
Internet
by
voice
(
257k
points)
internet
internet-quiz
cyber
cyber-awareness
activity
safe-behavior
insider
threat-indicator
1
answer
What threat do insiders with authorized access to information or information systems pose?
asked
Oct 6, 2022
in
Internet
by
voice
(
257k
points)
internet
internet-quiz
cyber
cyber-awareness
threat
insider
unauthorized-access
information
classified-document
1
answer
What advantages do "insider threats" have over others that allows them to cause damage to their organizations
asked
Oct 6, 2022
in
Internet
by
voice
(
257k
points)
internet
internet-quiz
cyber
cyber-awareness
major-advantage
insider
threat
damage
organisation
1
answer
How many potential insider threat indicators does a coworker who often makes others uneasy by being persistent
asked
Oct 6, 2022
in
Internet
by
voice
(
257k
points)
internet
internet-quiz
cyber
cyber-awareness
insider
threat-indicator
coworker
information
credit-card
research-project
1
answer
Based on the description that follows, how many potential insiders threat indicator(s) are displayed?
asked
Oct 6, 2022
in
Internet
by
voice
(
257k
points)
internet
internet-quiz
cyber
cyber-awareness
description
insider
threat-indicator
vacation
colleague
1
answer
Based on the description that follows, how many potential insider threat indicator(s) are displayed? A colleague
asked
Oct 6, 2022
in
Internet
by
voice
(
257k
points)
internet
internet-quiz
cyber
cyber-awareness
description
insider
threat-indicator
classified-document
research-project
credit-card
1
answer
Based on the description that follows, how many potential insider threat indicator(s) are displayed?
asked
Oct 6, 2022
in
Internet
by
voice
(
257k
points)
internet
internet-quiz
cyber
cyber-awareness
description
insider
threat-indicator
classified-document
information
1
answer
Your DoD Common Access Card (CAC) has a Public Key Infrastructure (PKI) token approved for access to the NIPRNet.
asked
Oct 6, 2022
in
Internet
by
voice
(
257k
points)
internet
internet-quiz
cyber
cyber-awareness
access-code
card
dod
public-key
infrastructure
token
1
answer
Which of the following is the best description of two-factor authentication?
asked
Oct 6, 2022
in
Internet
by
voice
(
257k
points)
internet
internet-quiz
cyber
cyber-awareness
best-way
description
two-factor
authentication
2fa
1
answer
Which of the following is NOT a best practice to preserve the authenticity of your identity?
asked
Oct 6, 2022
in
Internet
by
voice
(
257k
points)
internet
internet-quiz
cyber
cyber-awareness
best-way
practice
authentication
identity
security
1
answer
Which of the following is an example of two-factor authentication?
asked
Oct 6, 2022
in
Internet
by
voice
(
257k
points)
internet
internet-quiz
cyber
cyber-awareness
example
two-factor
authentication
2fa
password
access-code
1
answer
Which of the following is an example of a strong password?
asked
Oct 6, 2022
in
Internet
by
voice
(
257k
points)
internet
internet-quiz
cyber
cyber-awareness
example
strong
password
information-infrastructure
1
answer
Which is NOT a sufficient way to protect your identity?
asked
Oct 6, 2022
in
Internet
by
voice
(
257k
points)
internet
internet-quiz
cyber
cyber-awareness
sufficient
identity
protect
1
answer
What is the best way to protect your Common Access Card (CAC)?
asked
Oct 6, 2022
in
Internet
by
voice
(
257k
points)
internet
internet-quiz
cyber
cyber-awareness
protect
best-way
access-code
card
2
answers
Which of the following is a best practice for securing your home computer?
asked
Oct 6, 2022
in
Internet
by
voice
(
257k
points)
internet
internet-quiz
cyber
cyber-awareness
practice
security
computer
protect
1
answer
What should you consider when using a wireless keyboard with your home computer?
asked
Oct 6, 2022
in
Internet
by
voice
(
257k
points)
internet
internet-quiz
cyber
cyber-awareness
consider
wireless
keyboard
computer
information-technology
1
answer
How can you protect your information when using wireless technology?
asked
Oct 6, 2022
in
Internet
by
voice
(
257k
points)
internet
internet-quiz
cyber
cyber-awareness
protect
information
wireless
technology
1
answer
Which type of information could reasonably be expected to cause serious damage to national security
asked
Oct 6, 2022
in
Internet
by
voice
(
257k
points)
internet
internet-quiz
cyber
cyber-awareness
information
damage
national-security
authorization
disclosure
1
answer
Which of the following is a good practice to protect classified information?
asked
Oct 6, 2022
in
Internet
by
voice
(
257k
points)
internet
internet-quiz
cyber
cyber-awareness
practice
protect
classified-document
information
data
1
answer
Which classification level is given to information that could reasonably be expected to cause serious damage to
asked
Oct 6, 2022
in
Internet
by
voice
(
257k
points)
internet
internet-quiz
cyber
cyber-awareness
classified-document
information
damage
national-security
1
answer
When classified data is not in use, how can you protect it?
asked
Oct 6, 2022
in
Internet
by
voice
(
257k
points)
internet
internet-quiz
cyber
cyber-awareness
classified-document
data
protect
information
1
answer
What level of damage can the unauthorized disclosure of information classified as Confidential reasonably be expected to
asked
Oct 6, 2022
in
Internet
by
voice
(
257k
points)
internet
internet-quiz
cyber
cyber-awareness
damage
unauthorized-access
disclosure
information
confidence
1
answer
What is required for an individual to access classified data?
asked
Oct 6, 2022
in
Internet
by
voice
(
257k
points)
internet
internet-quiz
cyber
cyber-awareness
individual
classified-document
data
information
protect
1
answer
How should you protect a printed classified document when it is not in use?
asked
Oct 6, 2022
in
Internet
by
voice
(
257k
points)
internet
internet-quiz
cyber
cyber-awareness
classified-document
protect
information
Page:
« prev
1
...
10
11
12
13
14
next »
...