- Advertisement -
TechnologyWhat are some examples of malicious code cyber awareness?

What are some examples of malicious code cyber awareness?

3) Malicious Code Malicious code includes viruses, trojan horses, worms, macros, and scripts. They can damage or compromise digital files, erase your hard drive and/or allow hackers access to your PC or mobile from a remote location.

How can you protect your information when using wireless technology cyber awareness?

How can you protect your information when using wireless technology? Avoid using non-Bluetooth-paired or unencrypted wireless computer peripherals. What kind of information could reasonably be expected to cause serious damage to national security in the event of unauthorized disclosure?

See also  In Brazil, iPhone seizing is new punishment for not including in-box charger

Which of the following is not a requirement for telework?

Which of the following is NOT a requirement for telework? You must posses security clearance eligibility to telework. What should you do if a reporter asks you about potentially classified information on the web?

Which are examples of portable electronic devices Cyber Awareness 2021?

Examples of such devices include, but are not limited to: pagers, laptops, cellular telephones, radios, compact disc and cassette players/recorders, portable digital assistant, audio devices, watches with input capability, and reminder recorders.

Which of the following helps protect data on your personal mobile devices cyber awareness?

Which of the following helps protect data on your personal mobile devices? Secure personal mobile devices to the same level as Government-issued systems. What is a possible indication of a malicious code attack in progress? A pop-up window that flashes and warns that your computer is infected with a virus.

What are some actions you can take to try to protect your identity cyber awareness challenge?

What are some actions you can take to try to protect your identity? Shred personal documents; never share passwords, and order a credit report annually.

What is the best way to protect your CAC?

To protect the information on your CAC, you should never tell anyone your PIN or write it down where it can be easily found. Your PIN should be kept secure at all times, just like your Social Security Number.

What are the Cpcons?

The Cyberspace Protection Conditions (CPCON) process is designed to determine, establish, and communicate protection measures to ensure unity of effort across the DoD. CPCON is a dynamic and systematic approach to escalation and de-escalation of cyber protection postures.

See also  What is the name for a small device that connects to a computer phone used to access the Internet?

Which of the following does Cpcon establish?

Which of the following does Cyberspace Protection Conditions (CPCON) establish during significant cyberspace events? protection priorities. Which of the following statements is NOT true about protecting your virtual identity?

Who sets Infocon?

1.3. 1. DoD INFOCON Declaration Authority. The Secretary of Defense delegated the authority toset global INFOCON levels to CDRUSSTRATCOM.

Which of the following is not considered a potential insider threat indicator?

Which of the following is NOT considered a potential insider threat indicator? Treated mental health issues. What would you do if you receive a game application request on your government computer that includes permission to access your friends, profile information, cookies, and sites visited?

Which of the following is a way to protect against social engineering cyber awareness 2020?

Which of the following is a way to protect against social engineering? Follow instructions given only by verified personnel. While on vacation, a coworker calls and asks you to access a site to review and approve a document that is hosted behind a DoD Public Key Infrastructure (PKI) protected webpage.

Which are example of portable electronic devices?

A PED is a Portable Electronic Device. Examples are laptop computers, tablets, e-readers, smartphones, MP3 players, drones and electronic toys.

Which of the following is not a type of malware?

Among the options cookies is not a malware. Cookies are the packet of data that a computer receives and then sends back without changing or altering it. It will be stored on the user’s computer by the web browser while browsing a website.

Which of the following is not an example of malware?

Which of the following is not an example of malware? Answer: C – A hacker accessing your system is not an example of malware. Malware is any software that the user does not want on his or her system. Legal forms of malware, such as adware, fit that definition even if they do not intend to harm the user or his computer.

See also  What are the 5 steps in the design process?

Which of the following is an example of PII cyber awareness?

According to the NIST PII Guide, the following items definitely qualify as PII, because they can unequivocally identify a human being: full name (if not common), face, home address, email, ID number, passport number, vehicle plate number, driver’s license, fingerprints or handwriting, credit card number, digital …

What is true of cookies quizlet cyber awareness?

Since cookies are saved in plain text, and can be easily altered, cookies must never be used to store sensitive data. Poor cookie design can lead to exposed user information and financial loss.

What are some potential insider threat indicators Cyber Awareness 2020?

What are some potential insider threat indicators? Difficult life circumstances such as substance abuse; divided loyalty or allegiance to the U.S.; or extreme, persistent interpersonal difficulties.

Which of the following may help to prevent spillage Cyber Awareness 2022?

Which of the following may help to prevent spillage? Label all files, removable media, and subject headers with appropriate classification markings.

- Advertisement -

Latest article

More article

You cannot copy content of this page