Login
Remember me
Register
Getvoice.org
Questions
Unanswered
Tags
Users
Ask a Question
User voice
Wall
Recent activity
All questions
All answers
Ask a Question
Questions by voice
1
answer
What type of security is "part of your responsibility" and "placed above all else?"
asked
Oct 14, 2022
in
Internet
internet
internet-quiz
cyber
cyber-awareness
security
responsibility
physical
networking
1
answer
Spear Phishing attacks commonly attempt to impersonate email from trusted entities. What security device is used
asked
Oct 14, 2022
in
Internet
internet
internet-quiz
cyber
cyber-awareness
phishing
attack
email
security
device
certificate
1
answer
If authorized, what can be done on a work computer?
asked
Oct 14, 2022
in
Internet
internet
internet-quiz
cyber
cyber-awareness
unauthorized-access
computer
work
email
1
answer
Which of the following is NOT Protected Health Information (PHI)?
asked
Oct 14, 2022
in
Internet
internet
internet-quiz
cyber
cyber-awareness
pii
phi
information
protect
medical
1
answer
Should you always label your removable media?
asked
Oct 14, 2022
in
Internet
internet
internet-quiz
cyber
cyber-awareness
label
removable
media
1
answer
How should you securely transport company information on a removable media?
asked
Oct 14, 2022
in
Internet
internet
internet-quiz
cyber
cyber-awareness
security
transportation
company
information
media
1
answer
You are having lunch at a local restaurant outside the installation, and you find a cd labeled "favorite song".
asked
Oct 14, 2022
in
Internet
internet
internet-quiz
cyber
cyber-awareness
restaurant
installation
lunch
song
1
answer
You receive an email from a company you have an account with. The email states your account has been compromised
asked
Oct 14, 2022
in
Internet
internet
internet-quiz
cyber
cyber-awareness
email
company
account
hyperlink
password
security
1
answer
Which is a way to protect against phishing attacks?
asked
Oct 14, 2022
in
Internet
internet
internet-quiz
cyber
cyber-awareness
protect
phishing
attack
certificate
cyber-attack
1
answer
You are logged on to your unclassified computer and just received an encrypted email from a co-worker.
asked
Oct 14, 2022
in
Internet
internet
internet-quiz
cyber
cyber-awareness
classified-document
computer
email
attachment
1
answer
What constitutes a strong password?
asked
Oct 14, 2022
in
Internet
internet
internet-quiz
cyber
cyber-awareness
constitute
strong
password
1
answer
What is considered ethical use of the Government email system?
asked
Oct 14, 2022
in
Internet
internet
internet-quiz
cyber
cyber-awareness
ethical
government
email
control-system
news
1
answer
The use of webmail is
asked
Oct 14, 2022
in
Internet
internet
internet-quiz
cyber
cyber-awareness
website
mail
organisation
permission
1
answer
Of the following, which is NOT a method to protect sensitive information?
asked
Oct 14, 2022
in
Internet
internet
internet-quiz
cyber
cyber-awareness
method
protect
sensitive
information
1
answer
What is NOT Personally Identifiable Information (PII)?
asked
Oct 14, 2022
in
Internet
internet
internet-quiz
cyber
cyber-awareness
identification
information
personal-insurance
1
answer
Which is NOT a way to protect removable media?
asked
Oct 14, 2022
in
Internet
internet
internet-quiz
cyber
cyber-awareness
best-way
protect
media
classified-document
practice
1
answer
What is considered a mobile computing device and therefore shouldn't be plugged in to your Government computer?
asked
Oct 14, 2022
in
Internet
internet
internet-quiz
cyber
cyber-awareness
mobile
computer
device
government
1
answer
Which of the following is a good practice to avoid email viruses?
asked
Oct 14, 2022
in
Internet
internet
internet-quiz
cyber
cyber-awareness
good-way
practice
avoid
email
security
1
answer
You are leaving the building where you work. What should you do?
asked
Oct 14, 2022
in
Internet
internet
internet-quiz
cyber
cyber-awareness
building
work
security
badges
1
answer
Which of the following best describes wireless technology?
asked
Oct 14, 2022
in
Internet
internet
internet-quiz
cyber
cyber-awareness
best-way
description
wireless
technology
security
1
answer
Which of the following is NOT a home security best practice?
asked
Oct 14, 2022
in
Internet
internet
internet-quiz
cyber
cyber-awareness
homeland-security
best-way
practice
computer
1
answer
Media containing Privacy Act information, PII, and PHI is not required to be labeled.
asked
Oct 14, 2022
in
Internet
internet
internet-quiz
cyber
cyber-awareness
media
privacy
information
pii
phi
1
answer
Of the following, which is NOT a problem or concern of an Internet hoax?
asked
Oct 14, 2022
in
Internet
internet
internet-quiz
cyber
cyber-awareness
problem
hoax
website
1
answer
Which of the following is NOT a criterion used to grant an individual access to classified data?
asked
Oct 14, 2022
in
Internet
internet
internet-quiz
cyber
cyber-awareness
grant-applicant
individual
classified-document
data
1
answer
Which of the following is NOT considered sensitive information?
asked
Oct 14, 2022
in
Internet
internet
internet-quiz
cyber
cyber-awareness
sensitive
information
personnel
record
Page:
« prev
1
...
11
12
13
14
15
16
17
...
198
next »
...