Login
Remember me
Register
Getvoice.org
Questions
Unanswered
Tags
Users
Ask a Question
User voice
Wall
Recent activity
All questions
All answers
Ask a Question
Questions by voice
1
answer
In the following statement, identify if an adversary could use this information as an indicator to obtain critical
asked
Oct 21, 2022
in
Jobs & Employment
jobs-n-employment
opsec
awareness
statement
information
threat-indicator
sensitive
telephone
1
answer
A colleague asks to leave a report containing Protected Health Information (PHI) on his desk overnight
asked
Oct 18, 2022
in
Internet
internet
internet-quiz
cyber
cyber-awareness
colleague
report
protect
information
helpdesk
response
1
answer
Besides social networking sites, what are some other potential sources of your online identity?
asked
Oct 18, 2022
in
Internet
internet
internet-quiz
cyber
cyber-awareness
social-network
website
resource
online
identity
1
answer
What is a best practice to protect data on your mobile computing device?
asked
Oct 18, 2022
in
Internet
internet
internet-quiz
cyber
cyber-awareness
best-way
practice
protect
mobile
computer
password
1
answer
What is a way to prevent the download of viruses and other malicious code when checking your e-mail?
asked
Oct 18, 2022
in
Internet
internet
internet-quiz
cyber
cyber-awareness
best-way
prevent-accident
computer-virus
malicious-code
email
1
answer
What portable electronic devices (PEDs) are allowed in a Secure Compartmented Information Facility (SCIF)?
asked
Oct 18, 2022
in
Internet
internet
internet-quiz
cyber
cyber-awareness
portable
device
security
sensitive
information
scif
1
answer
When is conducting a private money-making venture using your Government-furnished computer permitted?
asked
Oct 18, 2022
in
Internet
internet
internet-quiz
cyber
cyber-awareness
conduct
privacy
money-making
venture
computer
1
answer
What should you do if a commercial entity, such as a hotel reception desk, asks for Government identification so that
asked
Oct 18, 2022
in
Internet
internet
internet-quiz
cyber
cyber-awareness
commercial
identity
helpdesk
identification
photocopy
card
1
answer
What is a possible indication of a malicious code attack in progress?
asked
Oct 18, 2022
in
Internet
internet
internet-quiz
cyber
cyber-awareness
threat-indicator
malicious-code
attack
computer
1
answer
Which of the following helps protect data on your personal mobile devices?
asked
Oct 18, 2022
in
Internet
internet
internet-quiz
cyber
cyber-awareness
helpdesk
data
protect
personal
mobile
device
1
answer
Which is a wireless technology that enables your electronic devices to establish communications and exchange information
asked
Oct 18, 2022
in
Internet
internet
internet-quiz
cyber
cyber-awareness
wireless
technology
electronics
communication
information
1
answer
Which of the following activities is an ethical use of Government-furnished equipment (GFE)?
asked
Oct 18, 2022
in
Internet
internet
internet-quiz
cyber
cyber-awareness
ethics-orientation
government
equipment
expenses
report
travel
1
answer
What is a valid response when identity theft occurs?
asked
Oct 18, 2022
in
Internet
internet
internet-quiz
cyber
cyber-awareness
valid
response
identity
theft
law-enforcement
report
1
answer
Under what circumstances is it acceptable to use your Government-furnished computer to check person e-mail
asked
Oct 18, 2022
in
Internet
internet
internet-quiz
cyber
cyber-awareness
government
computer
email
personal
policy
1
answer
While on vacation, a coworker calls and asks you to access a site to review and approve a document that is hosted
asked
Oct 18, 2022
in
Internet
internet
internet-quiz
cyber
cyber-awareness
coworker
review-process
classified-document
website
dod
1
answer
What type of phishing attack targets particular individuals, groups of people, or organizations?
asked
Oct 18, 2022
in
Internet
internet
internet-quiz
cyber
cyber-awareness
phishing
attack
individual
organisation
1
answer
Which may be a security issue with compressed URLs?
asked
Oct 18, 2022
in
Internet
internet
internet-quiz
cyber
cyber-awareness
security
issue
url
hyperlink
1
answer
What is a common method used in social engineering?
asked
Oct 18, 2022
in
Internet
internet
internet-quiz
cyber
cyber-awareness
common-terminology
social
engineer
telephone
1
answer
Which is true of cookies?
asked
Oct 18, 2022
in
Internet
internet
internet-quiz
cyber
cyber-awareness
true-statement
cookies
server
website
1
answer
What can malicious code do?
asked
Oct 18, 2022
in
Internet
internet
internet-quiz
cyber
cyber-awareness
malicious-code
damage
emergency-management
hacking
1
answer
Which of the following is an appropriate use of Government e-mail?
asked
Oct 18, 2022
in
Internet
internet
internet-quiz
cyber
cyber-awareness
government
email
signature
attachment
hyperlink
1
answer
What are some actions you can take to try to protect your identity?
asked
Oct 18, 2022
in
Internet
internet
internet-quiz
cyber
cyber-awareness
protect
identity
personal
document
credit-card
report
1
answer
What is an indication that malicious code is running on your system?
asked
Oct 18, 2022
in
Internet
internet
internet-quiz
cyber
cyber-awareness
threat-indicator
malicious-code
system
file
1
answer
Which is a risk associated with removable media?
asked
Oct 18, 2022
in
Internet
internet
internet-quiz
cyber
cyber-awareness
risk
media
classified-document
spillage
information
1
answer
What must users do when using removable media within a Sensitive Compartmented Information Facility (SCIF)?
asked
Oct 18, 2022
in
Internet
internet
internet-quiz
cyber
cyber-awareness
media
sensitive
information
scif
management
Page:
« prev
1
...
5
6
7
8
9
10
11
...
198
next »
...