Login
Remember me
Register
Getvoice.org
Questions
Unanswered
Tags
Users
Ask a Question
Ask a Question
Recent questions tagged internet
1
answer
Using webmail may bypass built in security features.
asked
Oct 15, 2022
in
Internet
by
voice
(
257k
points)
internet
internet-quiz
cyber
cyber-awareness
mail
website
bypass
security
feature
true-or-false
1
answer
When leaving your work area, what is the first thing you should do?
asked
Oct 15, 2022
in
Internet
by
voice
(
257k
points)
internet
internet-quiz
cyber
cyber-awareness
leave
work
area
cac
piv
1
answer
How can you guard yourself against Identity theft?
asked
Oct 15, 2022
in
Internet
by
voice
(
257k
points)
internet
internet-quiz
cyber
cyber-awareness
guard
identity
theft
1
answer
P2P (Peer-to-Peer) software can do the following except:
asked
Oct 15, 2022
in
Internet
by
voice
(
257k
points)
internet
internet-quiz
cyber
cyber-awareness
p2p
peer-to-peer
software
attack
networking
access-code
1
answer
If your wireless device is improperly configured someone could gain control of the device? T/F
asked
Oct 15, 2022
in
Internet
by
voice
(
257k
points)
internet
internet-quiz
cyber
cyber-awareness
wireless
device
configure
true-or-false
1
answer
What actions should you take prior to leaving the work environment and going to lunch?
asked
Oct 15, 2022
in
Internet
by
voice
(
257k
points)
internet
internet-quiz
cyber
cyber-awareness
action
work
environment
lunch
security
1
answer
Which of the following is a proper way to secure your CAC/PIV?
asked
Oct 14, 2022
in
Internet
by
voice
(
257k
points)
internet
internet-quiz
cyber
cyber-awareness
best-way
security
cac
piv
work
1
answer
What type of security is "part of your responsibility" and "placed above all else?"
asked
Oct 14, 2022
in
Internet
by
voice
(
257k
points)
internet
internet-quiz
cyber
cyber-awareness
security
responsibility
physical
networking
1
answer
Spear Phishing attacks commonly attempt to impersonate email from trusted entities. What security device is used
asked
Oct 14, 2022
in
Internet
by
voice
(
257k
points)
internet
internet-quiz
cyber
cyber-awareness
phishing
attack
email
security
device
certificate
1
answer
If authorized, what can be done on a work computer?
asked
Oct 14, 2022
in
Internet
by
voice
(
257k
points)
internet
internet-quiz
cyber
cyber-awareness
unauthorized-access
computer
work
email
1
answer
Which of the following is NOT Protected Health Information (PHI)?
asked
Oct 14, 2022
in
Internet
by
voice
(
257k
points)
internet
internet-quiz
cyber
cyber-awareness
pii
phi
information
protect
medical
1
answer
Should you always label your removable media?
asked
Oct 14, 2022
in
Internet
by
voice
(
257k
points)
internet
internet-quiz
cyber
cyber-awareness
label
removable
media
1
answer
How should you securely transport company information on a removable media?
asked
Oct 14, 2022
in
Internet
by
voice
(
257k
points)
internet
internet-quiz
cyber
cyber-awareness
security
transportation
company
information
media
1
answer
You are having lunch at a local restaurant outside the installation, and you find a cd labeled "favorite song".
asked
Oct 14, 2022
in
Internet
by
voice
(
257k
points)
internet
internet-quiz
cyber
cyber-awareness
restaurant
installation
lunch
song
1
answer
You receive an email from a company you have an account with. The email states your account has been compromised
asked
Oct 14, 2022
in
Internet
by
voice
(
257k
points)
internet
internet-quiz
cyber
cyber-awareness
email
company
account
hyperlink
password
security
1
answer
Which is a way to protect against phishing attacks?
asked
Oct 14, 2022
in
Internet
by
voice
(
257k
points)
internet
internet-quiz
cyber
cyber-awareness
protect
phishing
attack
certificate
cyber-attack
1
answer
You are logged on to your unclassified computer and just received an encrypted email from a co-worker.
asked
Oct 14, 2022
in
Internet
by
voice
(
257k
points)
internet
internet-quiz
cyber
cyber-awareness
classified-document
computer
email
attachment
1
answer
What constitutes a strong password?
asked
Oct 14, 2022
in
Internet
by
voice
(
257k
points)
internet
internet-quiz
cyber
cyber-awareness
constitute
strong
password
1
answer
What is considered ethical use of the Government email system?
asked
Oct 14, 2022
in
Internet
by
voice
(
257k
points)
internet
internet-quiz
cyber
cyber-awareness
ethical
government
email
control-system
news
1
answer
The use of webmail is
asked
Oct 14, 2022
in
Internet
by
voice
(
257k
points)
internet
internet-quiz
cyber
cyber-awareness
website
mail
organisation
permission
1
answer
Of the following, which is NOT a method to protect sensitive information?
asked
Oct 14, 2022
in
Internet
by
voice
(
257k
points)
internet
internet-quiz
cyber
cyber-awareness
method
protect
sensitive
information
1
answer
What is NOT Personally Identifiable Information (PII)?
asked
Oct 14, 2022
in
Internet
by
voice
(
257k
points)
internet
internet-quiz
cyber
cyber-awareness
identification
information
personal-insurance
1
answer
Which is NOT a way to protect removable media?
asked
Oct 14, 2022
in
Internet
by
voice
(
257k
points)
internet
internet-quiz
cyber
cyber-awareness
best-way
protect
media
classified-document
practice
1
answer
What is considered a mobile computing device and therefore shouldn't be plugged in to your Government computer?
asked
Oct 14, 2022
in
Internet
by
voice
(
257k
points)
internet
internet-quiz
cyber
cyber-awareness
mobile
computer
device
government
1
answer
Which of the following is a good practice to avoid email viruses?
asked
Oct 14, 2022
in
Internet
by
voice
(
257k
points)
internet
internet-quiz
cyber
cyber-awareness
good-way
practice
avoid
email
security
Page:
« prev
1
...
4
5
6
7
8
9
10
...
15
next »
...