Login
Remember me
Register
Getvoice.org
Questions
Unanswered
Tags
Users
Ask a Question
User admic
Wall
Recent activity
All questions
All answers
Ask a Question
Answers by admic
+1
vote
The following should be considered when assessing risk. (Select all that apply) [OPSEC]
answered
Oct 21, 2022
in
Jobs & Employment
jobs-n-employment
opsec
awareness
consider
risk
authorization
recipient
threat-indicator
+1
vote
Match the five-step OPSEC process with the action associated with the step.
answered
Oct 21, 2022
in
Jobs & Employment
jobs-n-employment
opsec
awareness
five-step
action
associate
next-step
information
critical
unauthorized-access
0
votes
Critical unclassified information is sometimes revealed by publicly available information.
answered
Oct 21, 2022
in
Jobs & Employment
jobs-n-employment
opsec
awareness
critical
classified-document
information
0
votes
In the following statement, identify if an adversary could use this information as an indicator to obtain critical
answered
Oct 21, 2022
in
Jobs & Employment
jobs-n-employment
opsec
awareness
identification
information
threat-indicator
badges
0
votes
A threat is an adversary that has the _________ + __________ to take any actions detrimental to the success
answered
Oct 21, 2022
in
Jobs & Employment
jobs-n-employment
opsec
awareness
threat
adverse-condition
traction
dod
operation-plan
0
votes
In the following statement, identify if an adversary could use this information as an indicator to obtain critical
answered
Oct 21, 2022
in
Jobs & Employment
jobs-n-employment
opsec
awareness
information
threat-indicator
critical
sensitive
training
exercise
0
votes
In the following statement, identify if an adversary could use this information as an indicator to obtain critical
answered
Oct 21, 2022
in
Jobs & Employment
jobs-n-employment
opsec
awareness
statement
information
threat-indicator
sensitive
telephone
0
votes
A colleague asks to leave a report containing Protected Health Information (PHI) on his desk overnight
answered
Oct 18, 2022
in
Internet
internet
internet-quiz
cyber
cyber-awareness
colleague
report
protect
information
helpdesk
response
0
votes
Besides social networking sites, what are some other potential sources of your online identity?
answered
Oct 18, 2022
in
Internet
internet
internet-quiz
cyber
cyber-awareness
social-network
website
resource
online
identity
0
votes
What is a best practice to protect data on your mobile computing device?
answered
Oct 18, 2022
in
Internet
internet
internet-quiz
cyber
cyber-awareness
best-way
practice
protect
mobile
computer
password
0
votes
What is a way to prevent the download of viruses and other malicious code when checking your e-mail?
answered
Oct 18, 2022
in
Internet
internet
internet-quiz
cyber
cyber-awareness
best-way
prevent-accident
computer-virus
malicious-code
email
0
votes
What portable electronic devices (PEDs) are allowed in a Secure Compartmented Information Facility (SCIF)?
answered
Oct 18, 2022
in
Internet
internet
internet-quiz
cyber
cyber-awareness
portable
device
security
sensitive
information
scif
0
votes
When is conducting a private money-making venture using your Government-furnished computer permitted?
answered
Oct 18, 2022
in
Internet
internet
internet-quiz
cyber
cyber-awareness
conduct
privacy
money-making
venture
computer
0
votes
What should you do if a commercial entity, such as a hotel reception desk, asks for Government identification so that
answered
Oct 18, 2022
in
Internet
internet
internet-quiz
cyber
cyber-awareness
commercial
identity
helpdesk
identification
photocopy
card
0
votes
What is a possible indication of a malicious code attack in progress?
answered
Oct 18, 2022
in
Internet
internet
internet-quiz
cyber
cyber-awareness
threat-indicator
malicious-code
attack
computer
0
votes
Which of the following helps protect data on your personal mobile devices?
answered
Oct 18, 2022
in
Internet
internet
internet-quiz
cyber
cyber-awareness
helpdesk
data
protect
personal
mobile
device
0
votes
Which is a wireless technology that enables your electronic devices to establish communications and exchange information
answered
Oct 18, 2022
in
Internet
internet
internet-quiz
cyber
cyber-awareness
wireless
technology
electronics
communication
information
0
votes
Which of the following activities is an ethical use of Government-furnished equipment (GFE)?
answered
Oct 18, 2022
in
Internet
internet
internet-quiz
cyber
cyber-awareness
ethics-orientation
government
equipment
expenses
report
travel
0
votes
What is a valid response when identity theft occurs?
answered
Oct 18, 2022
in
Internet
internet
internet-quiz
cyber
cyber-awareness
valid
response
identity
theft
law-enforcement
report
0
votes
Under what circumstances is it acceptable to use your Government-furnished computer to check person e-mail
answered
Oct 18, 2022
in
Internet
internet
internet-quiz
cyber
cyber-awareness
government
computer
email
personal
policy
0
votes
While on vacation, a coworker calls and asks you to access a site to review and approve a document that is hosted
answered
Oct 18, 2022
in
Internet
internet
internet-quiz
cyber
cyber-awareness
coworker
review-process
classified-document
website
dod
0
votes
What type of phishing attack targets particular individuals, groups of people, or organizations?
answered
Oct 18, 2022
in
Internet
internet
internet-quiz
cyber
cyber-awareness
phishing
attack
individual
organisation
0
votes
Which may be a security issue with compressed URLs?
answered
Oct 18, 2022
in
Internet
internet
internet-quiz
cyber
cyber-awareness
security
issue
url
hyperlink
0
votes
What is a common method used in social engineering?
answered
Oct 18, 2022
in
Internet
internet
internet-quiz
cyber
cyber-awareness
common-terminology
social
engineer
telephone
0
votes
Which is true of cookies?
answered
Oct 18, 2022
in
Internet
internet
internet-quiz
cyber
cyber-awareness
true-statement
cookies
server
website
Page:
« prev
1
...
5
6
7
8
9
10
11
...
115
next »
...