Login
Remember me
Register
Getvoice.org
Questions
Unanswered
Tags
Users
Ask a Question
Ask a Question
Recent questions tagged cyber
1
answer
When can you use removable media on a Government system?
asked
Oct 6, 2022
in
Internet
by
voice
(
257k
points)
internet
internet-quiz
cyber
cyber-awareness
media
government
system
organisation
authority
1
answer
What should you do when going through an airport security checkpoint with a Government-issued mobile device?
asked
Oct 6, 2022
in
Internet
by
voice
(
257k
points)
internet
internet-quiz
cyber
cyber-awareness
airport
security
checkpoint
government
mobile
device
1
answer
What can help to protect the data on your personal mobile device?
asked
Oct 6, 2022
in
Internet
by
voice
(
257k
points)
internet
internet-quiz
cyber
cyber-awareness
helpdesk
protect
data
mobile
device
information
1
answer
What are some examples of malicious code?
asked
Oct 6, 2022
in
Internet
by
voice
(
257k
points)
internet
internet-quiz
cyber
cyber-awareness
example
malicious-code
trojan-horse
worm
malware
1
answer
After visiting a website on your Government device, a popup appears on your screen. The popup asks if you want to
asked
Oct 6, 2022
in
Internet
by
voice
(
257k
points)
internet
internet-quiz
cyber
cyber-awareness
website
government
device
popup
screen
application
1
answer
Which type of behavior should you report as a potential insider threat?
asked
Oct 6, 2022
in
Internet
by
voice
(
257k
points)
internet
internet-quiz
cyber
cyber-awareness
safe-behavior
type
report
potential-hazards
threat-indicator
insider
1
answer
Which scenario might indicate a reportable insider threat?
asked
Oct 6, 2022
in
Internet
by
voice
(
257k
points)
internet
internet-quiz
cyber
cyber-awareness
scenario
threat-indicator
report
insider
threat
1
answer
Which of the following should be reported as a potential security incident?
asked
Oct 6, 2022
in
Internet
by
voice
(
257k
points)
internet
internet-quiz
cyber
cyber-awareness
report
potential-hazards
security
incident
1
answer
What type of activity or behavior should be reported as a potential insider threat?
asked
Oct 6, 2022
in
Internet
by
voice
(
257k
points)
internet
internet-quiz
cyber
cyber-awareness
activity
safe-behavior
insider
threat-indicator
1
answer
What threat do insiders with authorized access to information or information systems pose?
asked
Oct 6, 2022
in
Internet
by
voice
(
257k
points)
internet
internet-quiz
cyber
cyber-awareness
threat
insider
unauthorized-access
information
classified-document
1
answer
What advantages do "insider threats" have over others that allows them to cause damage to their organizations
asked
Oct 6, 2022
in
Internet
by
voice
(
257k
points)
internet
internet-quiz
cyber
cyber-awareness
major-advantage
insider
threat
damage
organisation
1
answer
How many potential insider threat indicators does a coworker who often makes others uneasy by being persistent
asked
Oct 6, 2022
in
Internet
by
voice
(
257k
points)
internet
internet-quiz
cyber
cyber-awareness
insider
threat-indicator
coworker
information
credit-card
research-project
1
answer
Based on the description that follows, how many potential insiders threat indicator(s) are displayed?
asked
Oct 6, 2022
in
Internet
by
voice
(
257k
points)
internet
internet-quiz
cyber
cyber-awareness
description
insider
threat-indicator
vacation
colleague
1
answer
Based on the description that follows, how many potential insider threat indicator(s) are displayed? A colleague
asked
Oct 6, 2022
in
Internet
by
voice
(
257k
points)
internet
internet-quiz
cyber
cyber-awareness
description
insider
threat-indicator
classified-document
research-project
credit-card
1
answer
Based on the description that follows, how many potential insider threat indicator(s) are displayed?
asked
Oct 6, 2022
in
Internet
by
voice
(
257k
points)
internet
internet-quiz
cyber
cyber-awareness
description
insider
threat-indicator
classified-document
information
1
answer
Your DoD Common Access Card (CAC) has a Public Key Infrastructure (PKI) token approved for access to the NIPRNet.
asked
Oct 6, 2022
in
Internet
by
voice
(
257k
points)
internet
internet-quiz
cyber
cyber-awareness
access-code
card
dod
public-key
infrastructure
token
1
answer
Which of the following is the best description of two-factor authentication?
asked
Oct 6, 2022
in
Internet
by
voice
(
257k
points)
internet
internet-quiz
cyber
cyber-awareness
best-way
description
two-factor
authentication
2fa
1
answer
Which of the following is NOT a best practice to preserve the authenticity of your identity?
asked
Oct 6, 2022
in
Internet
by
voice
(
257k
points)
internet
internet-quiz
cyber
cyber-awareness
best-way
practice
authentication
identity
security
1
answer
Which of the following is an example of two-factor authentication?
asked
Oct 6, 2022
in
Internet
by
voice
(
257k
points)
internet
internet-quiz
cyber
cyber-awareness
example
two-factor
authentication
2fa
password
access-code
1
answer
Which of the following is an example of a strong password?
asked
Oct 6, 2022
in
Internet
by
voice
(
257k
points)
internet
internet-quiz
cyber
cyber-awareness
example
strong
password
information-infrastructure
1
answer
Which is NOT a sufficient way to protect your identity?
asked
Oct 6, 2022
in
Internet
by
voice
(
257k
points)
internet
internet-quiz
cyber
cyber-awareness
sufficient
identity
protect
1
answer
What is the best way to protect your Common Access Card (CAC)?
asked
Oct 6, 2022
in
Internet
by
voice
(
257k
points)
internet
internet-quiz
cyber
cyber-awareness
protect
best-way
access-code
card
2
answers
Which of the following is a best practice for securing your home computer?
asked
Oct 6, 2022
in
Internet
by
voice
(
257k
points)
internet
internet-quiz
cyber
cyber-awareness
practice
security
computer
protect
1
answer
What should you consider when using a wireless keyboard with your home computer?
asked
Oct 6, 2022
in
Internet
by
voice
(
257k
points)
internet
internet-quiz
cyber
cyber-awareness
consider
wireless
keyboard
computer
information-technology
1
answer
How can you protect your information when using wireless technology?
asked
Oct 6, 2022
in
Internet
by
voice
(
257k
points)
internet
internet-quiz
cyber
cyber-awareness
protect
information
wireless
technology
Page:
« prev
1
...
10
11
12
13
14
next »
...