Login
Remember me
Register
Getvoice.org
Questions
Unanswered
Tags
Users
Ask a Question
User admic
Wall
Recent activity
All questions
All answers
Ask a Question
Answers by admic
0
votes
Which is NOT a method of protecting classified data?
answered
Oct 15, 2022
in
Internet
internet
internet-quiz
cyber
cyber-awareness
method
protect
classified-document
data
storage
unauthorized-access
0
votes
What should you do to protect yourself while on social networks?
answered
Oct 15, 2022
in
Internet
internet
internet-quiz
cyber
cyber-awareness
protect
social-network
friend
source
confirm
validate
0
votes
Which of the following is NOT sensitive information?
answered
Oct 15, 2022
in
Internet
internet
internet-quiz
cyber
cyber-awareness
false-statement
sensitive
information
classified-document
public
0
votes
It is permissible to release unclassified information to the public prior to being cleared.
answered
Oct 15, 2022
in
Internet
internet
internet-quiz
cyber
cyber-awareness
permission
classified-document
information
public-work
true-or-false
0
votes
Which of the following definitions is true about disclosure of confidential information?
answered
Oct 15, 2022
in
Internet
internet
internet-quiz
cyber
cyber-awareness
definition
true-statement
disclosure
confidence
information
0
votes
Classified Information can only be accessed by individuals with
answered
Oct 15, 2022
in
Internet
internet
internet-quiz
cyber
cyber-awareness
classified-document
information
individual
access-code
0
votes
Of the following, which is NOT a characteristic of a phishing attempt?
answered
Oct 15, 2022
in
Internet
internet
internet-quiz
cyber
cyber-awareness
character
phishing
attack
website
redirect
0
votes
Using webmail may bypass built in security features.
answered
Oct 15, 2022
in
Internet
internet
internet-quiz
cyber
cyber-awareness
mail
website
bypass
security
feature
true-or-false
0
votes
When leaving your work area, what is the first thing you should do?
answered
Oct 15, 2022
in
Internet
internet
internet-quiz
cyber
cyber-awareness
leave
work
area
cac
piv
0
votes
How can you guard yourself against Identity theft?
answered
Oct 15, 2022
in
Internet
internet
internet-quiz
cyber
cyber-awareness
guard
identity
theft
0
votes
P2P (Peer-to-Peer) software can do the following except:
answered
Oct 15, 2022
in
Internet
internet
internet-quiz
cyber
cyber-awareness
p2p
peer-to-peer
software
attack
networking
access-code
0
votes
If your wireless device is improperly configured someone could gain control of the device? T/F
answered
Oct 15, 2022
in
Internet
internet
internet-quiz
cyber
cyber-awareness
wireless
device
configure
true-or-false
0
votes
What actions should you take prior to leaving the work environment and going to lunch?
answered
Oct 15, 2022
in
Internet
internet
internet-quiz
cyber
cyber-awareness
action
work
environment
lunch
security
0
votes
Which of the following is a proper way to secure your CAC/PIV?
answered
Oct 14, 2022
in
Internet
internet
internet-quiz
cyber
cyber-awareness
best-way
security
cac
piv
work
0
votes
What type of security is "part of your responsibility" and "placed above all else?"
answered
Oct 14, 2022
in
Internet
internet
internet-quiz
cyber
cyber-awareness
security
responsibility
physical
networking
0
votes
Spear Phishing attacks commonly attempt to impersonate email from trusted entities. What security device is used
answered
Oct 14, 2022
in
Internet
internet
internet-quiz
cyber
cyber-awareness
phishing
attack
email
security
device
certificate
0
votes
If authorized, what can be done on a work computer?
answered
Oct 14, 2022
in
Internet
internet
internet-quiz
cyber
cyber-awareness
unauthorized-access
computer
work
email
0
votes
Which of the following is NOT Protected Health Information (PHI)?
answered
Oct 14, 2022
in
Internet
internet
internet-quiz
cyber
cyber-awareness
pii
phi
information
protect
medical
0
votes
Should you always label your removable media?
answered
Oct 14, 2022
in
Internet
internet
internet-quiz
cyber
cyber-awareness
label
removable
media
0
votes
How should you securely transport company information on a removable media?
answered
Oct 14, 2022
in
Internet
internet
internet-quiz
cyber
cyber-awareness
security
transportation
company
information
media
0
votes
You are having lunch at a local restaurant outside the installation, and you find a cd labeled "favorite song".
answered
Oct 14, 2022
in
Internet
internet
internet-quiz
cyber
cyber-awareness
restaurant
installation
lunch
song
0
votes
You receive an email from a company you have an account with. The email states your account has been compromised
answered
Oct 14, 2022
in
Internet
internet
internet-quiz
cyber
cyber-awareness
email
company
account
hyperlink
password
security
0
votes
Which is a way to protect against phishing attacks?
answered
Oct 14, 2022
in
Internet
internet
internet-quiz
cyber
cyber-awareness
protect
phishing
attack
certificate
cyber-attack
0
votes
You are logged on to your unclassified computer and just received an encrypted email from a co-worker.
answered
Oct 14, 2022
in
Internet
internet
internet-quiz
cyber
cyber-awareness
classified-document
computer
email
attachment
0
votes
What constitutes a strong password?
answered
Oct 14, 2022
in
Internet
internet
internet-quiz
cyber
cyber-awareness
constitute
strong
password
Page:
« prev
1
...
11
12
13
14
15
16
17
...
115
next »
...