Login
Remember me
Register
Getvoice.org
Questions
Unanswered
Tags
Users
Ask a Question
User admic
Wall
Recent activity
All questions
All answers
Ask a Question
Answers by admic
0
votes
Which is a rule for removable media, other portable electronic devices (PEDs), and mobile computing devices to protect
answered
Oct 6, 2022
in
Internet
internet
internet-quiz
cyber
cyber-awareness
media
electronics
device
computer
government
0
votes
When can you use removable media on a Government system?
answered
Oct 6, 2022
in
Internet
internet
internet-quiz
cyber
cyber-awareness
media
government
system
organisation
authority
0
votes
What should you do when going through an airport security checkpoint with a Government-issued mobile device?
answered
Oct 6, 2022
in
Internet
internet
internet-quiz
cyber
cyber-awareness
airport
security
checkpoint
government
mobile
device
0
votes
What can help to protect the data on your personal mobile device?
answered
Oct 6, 2022
in
Internet
internet
internet-quiz
cyber
cyber-awareness
helpdesk
protect
data
mobile
device
information
0
votes
What are some examples of malicious code?
answered
Oct 6, 2022
in
Internet
internet
internet-quiz
cyber
cyber-awareness
example
malicious-code
trojan-horse
worm
malware
0
votes
After visiting a website on your Government device, a popup appears on your screen. The popup asks if you want to
answered
Oct 6, 2022
in
Internet
internet
internet-quiz
cyber
cyber-awareness
website
government
device
popup
screen
application
0
votes
Which type of behavior should you report as a potential insider threat?
answered
Oct 6, 2022
in
Internet
internet
internet-quiz
cyber
cyber-awareness
safe-behavior
type
report
potential-hazards
threat-indicator
insider
0
votes
Which scenario might indicate a reportable insider threat?
answered
Oct 6, 2022
in
Internet
internet
internet-quiz
cyber
cyber-awareness
scenario
threat-indicator
report
insider
threat
0
votes
Which of the following should be reported as a potential security incident?
answered
Oct 6, 2022
in
Internet
internet
internet-quiz
cyber
cyber-awareness
report
potential-hazards
security
incident
0
votes
What type of activity or behavior should be reported as a potential insider threat?
answered
Oct 6, 2022
in
Internet
internet
internet-quiz
cyber
cyber-awareness
activity
safe-behavior
insider
threat-indicator
0
votes
What threat do insiders with authorized access to information or information systems pose?
answered
Oct 6, 2022
in
Internet
internet
internet-quiz
cyber
cyber-awareness
threat
insider
unauthorized-access
information
classified-document
0
votes
What advantages do "insider threats" have over others that allows them to cause damage to their organizations
answered
Oct 6, 2022
in
Internet
internet
internet-quiz
cyber
cyber-awareness
major-advantage
insider
threat
damage
organisation
0
votes
How many potential insider threat indicators does a coworker who often makes others uneasy by being persistent
answered
Oct 6, 2022
in
Internet
internet
internet-quiz
cyber
cyber-awareness
insider
threat-indicator
coworker
information
credit-card
research-project
0
votes
Based on the description that follows, how many potential insiders threat indicator(s) are displayed?
answered
Oct 6, 2022
in
Internet
internet
internet-quiz
cyber
cyber-awareness
description
insider
threat-indicator
vacation
colleague
0
votes
Based on the description that follows, how many potential insider threat indicator(s) are displayed? A colleague
answered
Oct 6, 2022
in
Internet
internet
internet-quiz
cyber
cyber-awareness
description
insider
threat-indicator
classified-document
research-project
credit-card
0
votes
Based on the description that follows, how many potential insider threat indicator(s) are displayed?
answered
Oct 6, 2022
in
Internet
internet
internet-quiz
cyber
cyber-awareness
description
insider
threat-indicator
classified-document
information
0
votes
Your DoD Common Access Card (CAC) has a Public Key Infrastructure (PKI) token approved for access to the NIPRNet.
answered
Oct 6, 2022
in
Internet
internet
internet-quiz
cyber
cyber-awareness
access-code
card
dod
public-key
infrastructure
token
0
votes
Which of the following is the best description of two-factor authentication?
answered
Oct 6, 2022
in
Internet
internet
internet-quiz
cyber
cyber-awareness
best-way
description
two-factor
authentication
2fa
+1
vote
Which of the following is NOT a best practice to preserve the authenticity of your identity?
answered
Oct 6, 2022
in
Internet
internet
internet-quiz
cyber
cyber-awareness
best-way
practice
authentication
identity
security
0
votes
Which of the following is an example of two-factor authentication?
answered
Oct 6, 2022
in
Internet
internet
internet-quiz
cyber
cyber-awareness
example
two-factor
authentication
2fa
password
access-code
0
votes
Which of the following is an example of a strong password?
answered
Oct 6, 2022
in
Internet
internet
internet-quiz
cyber
cyber-awareness
example
strong
password
information-infrastructure
0
votes
Which is NOT a sufficient way to protect your identity?
answered
Oct 6, 2022
in
Internet
internet
internet-quiz
cyber
cyber-awareness
sufficient
identity
protect
0
votes
What is the best way to protect your Common Access Card (CAC)?
answered
Oct 6, 2022
in
Internet
internet
internet-quiz
cyber
cyber-awareness
protect
best-way
access-code
card
0
votes
Which of the following is a best practice for securing your home computer?
answered
Oct 6, 2022
in
Internet
internet
internet-quiz
cyber
cyber-awareness
practice
security
computer
protect
0
votes
What should you consider when using a wireless keyboard with your home computer?
answered
Oct 6, 2022
in
Internet
internet
internet-quiz
cyber
cyber-awareness
consider
wireless
keyboard
computer
information-technology
Page:
« prev
1
...
22
23
24
25
26
27
28
...
115
next »
...