Which of the following is an example of near field communication cyber awareness quizlet?

*Spillage
Which of the following does NOT constitute spillage?
-Classified information that should be unclassified and is downgraded.


Which of the following is NOT an appropriate way to protect against inadvertent spillage?
-Use the classified network for all work, including unclassified work.


Which of the following should you NOT do if you find classified information on the internet?
-Download the information.


*Classified Data
Which of the following individuals can access classified data?
-Darryl is managing a project that requires access to classified information. He has the appropriate clearance and a signed approved non-disclosure agreement.


Which of the following is a god practice to protect classified information?
-Ensure proper labeling by appropriately marking all classified material and, when required, sensitive material.


*Insider Threat
What threat do insiders with authorized access to information or information systems pose?
-They may wittingly or unwittingly use their authorized access to perform actions that result in the loss or degradation of resources or capabilities.


Which type of behavior should you report as a potential threat?
-Hostility or anger toward the United States and its policies.


Which of the following practices may reduce your appeal as a target for adversaries seeking to exploit you insider status?
-Remove your security badge after leaving your controlled area or office building.

*Social Networking


Your cousin posted a link to an article with an incendiary headline on social media. What action should you take?
-Research the source of the article to evaluate its credibility and reliability.


Which of the following is a security best practice when using social networking sites?
-Turn off Global Positioning System (GPS) before posting pictures of yourself in uniform with identifiable landmarks.


How should you respond to the theft of your identity?
-Notify law enforcement.


*Malicious Code
What is a possible effect of malicious code?
-Files may be corrupted, erased, or compromised.


*Social Engineering
What action should you take with an e-mail from a friend containing a compressed Uniform Resource Locator (URL)?
-Investigate the link’s actual destination using the preview feature.


How can you protect yourself from internet hoaxes?
-Use online sites to confirm or expose potential hoaxes.


How can you protect yourself from social engineering?
-Follow instructions given only by verified personnel.


*Travel
What security risk does a public Wi-Fi connection pose?
-It may expose the connected device to malware.


*Use of GFE
When can you check personal e-mail on your Government-furnished equipment (GFE)?
-If allowed by organizational policy.


*Mobile Devices
What can help to protect data on your personal mobile device?
-Secure it to the same level as Government-issued systems.


Which of the following is an example of near field communication (NFC)?
-A smartphone that transmits credit card payment information when held in proximity to a credit card reader.


*Home Computer Security
Which of the following is a best practice for securing your home computer?
-Create separate accounts for each user.

Upgrade to remove ads

Only ₩37,125/year

  • Flashcards

  • Learn

  • Test

  • Match

  • Flashcards

  • Learn

  • Test

  • Match

Terms in this set (63)

This is the new Internet Protocol that was recently implemented to identify a much larger population of Internet users

IPv6

The combining of voice, video, and data communications into a single communications interface

Unified

A protocol consists of a URL where a Web page or specific document on the Internet can be readily located

False

The two most popular Web server software products currently in use

Apache HTTP Server, Microsoft Internet Information Services (IIS)

The Internet backbone relies predominantly on __________ for transmitting large volumes of data between major nodes

Fiber-Optic

Which of the following is stored in a root domain name server database for translation and tracking purposes?

Domain names, IP addresses

Data servlets travel over the Internet from router to router until reaching their final destinations.

False

As the amount of Internet _______ continue(s) to increase, streaming video and television are becoming commonplace.

Bandwidth

A distinctive advantage of accessing information on the Web is the ability to conveniently dig deeper into the subject matter at hand.

True

A distinguishing characteristic of cloud computing is to provide users with access to services for free.

False

BitTorrent is an example of which of the following network models?

peer-to-peer

A search engine attempts to catalog every Web page by topic through the use of cookies.

False

Government agencies have been reluctant to embrace cloud computing primarily due to which of the following?

Concerns about data security

Publishers use XML to separate data from the formatting of any given Web page.

True

Which of the following agencies played an important role in the birth of the Internet?

Department of Defense (DoD)

Internet radio is limited to local broadcasting stations that are within the metropolitan area that the receiver is currently located.

False

Wikis encourage the use of _______ to build content that can be constantly added, removed, and edited.

Crowdsourcing

Facebook and MySpace are considered to be which of the following types of Web sites?

Social Networking

Which of the following is generally credited to Tim Berners-Lee?

All of the answers provided are corrected

A Web server responds to Web page requests from client computers via http or https.

True

Wirelessly synchronizing your laptop with your cell phone is one example of the use of a PAN.

True

A mobile networking standard defines the terms of service provided by a cellular carrier

False

The microwave used to heat your food and the cell phones you use are part of the ____.

Electromagnetic Spectrum

A DSL modem is similar to a satellite connection and provides high-speed Internet service via a wireless network.

False

Protocols play a vital role in defining how telecommunications work.

True

Which of the following technologies have become the international industry choice for 4G networks?

GSM

Which of the following is not one of the three primary types of physical cables that can carry a communications signal?

Satellite and Cellular

Many cities have adopted ____ technology to provide faster Internet speed to their users.

WiMAX

Which of the following is not considered to be a cell phone service option?

Electronic Data Interchange

Which of the following networks includes transmission towers that connect to handsets in the nearby vicinity?

Cellular

A personal area network is created when two or more local area networks are connected to share information.

False

A personal area network usually covers a range of around _______ feet.

33

Smart phones like the iPhone and Android-based phones provide access to thousands of apps, many of which are free.

True

Which of the following filters the information coming into a network?

Firewall

Geotagging is the process of adding geographic identification metadata to digital media and messages.

True

Bluetooth is an example of a technology used with a ____ area network.

Personal

Fiber-optic cabling sends signals much more slowly than twisted pair or coaxial cabling.

False

RFID is one example of near field communications (NFC).

True

Analog systems were designed to support voice communications.

True

To connect multiple businesses from different locations, a ____ area network setup could be used.

Wide

Ethernet is the most widely used network standard for private networks.

True

All devices attached to a network are identified as _______.

Nodes

An email with a subject heading "Urgent Security Update" that requests a username and password followed by a link to "re-login and resolve the issue" is a good example of which of the following?

Phishing

Which of the following refers to an individual who illegally downloads copyright-protected software?

Pirate

An identity thief could steal your credit card number by using a special device known as a skimmer when processing a payment using your card.

True

Assume that while you're surfin' da Net, a window "pops up" on your PC, appearing to originate with your local bank. Upon reading it, you discover that it asks for you to validate your personal identification information to ensure proper delivery of digital bank statements. You should immediately fill in the requested information because it is from a trusted source.

False

A Guest account is for someone who does not have a permanent account and needs to temporarily access computer or network resources.

True

Which of the following are realistic ways to promote Internet security?

Install antivirus software and enable automatic updates; Select strong passwords and change them regularly

You can protect yourself from identity theft by using ____ when transmitting information over network connections.

Encryption

Malware is periodically spread through music-sharing P2P networks.

True

In addition to Blackboard, which of the following software products are being used at UofL to facilitate distance learning activities in some online and even more traditional courses?

Tegrity; Wimba

Which of the following is not an example of malware?

Patches

Which of the following refers to a practice by which someone may manipulate people into performing actions or divulging confidential information?

Social Engineering

Which of the following companies provide digital certifications for Web transactions?

VeriSign

A ____ allows hackers to gain access to important code or information in a software program.

Security Hole

An IP address identifies you by name as a user on the Internet.

False

A firewall is network hardware or software that examines data packets flowing into and sometimes out of a network or computer in order to filter out packets that are potentially dangerous.

True

Employers are legally allowed to monitor employee email or Web activity without first notifying the employee of this practice through network usage policies.

True

By default, wireless access points are set to broadcast their presence so others can easily detect the wireless signal.

True

To limit the spread of computer viruses, most organizations allow users to install their own software on the corporate PC installed in their office space.

False

Which of the following refers to a PC that is remotely controlled by a hacker to damage or corrupt a computer resource?

Zombie

Once installed, antivirus software is effective for the life of the computer.

False

Which of the following can be used to filter data that may be undesirable?

Firewall

Sets with similar terms

IS Chapter 6 MC

54 terms

bbalsam

CGS 2060 Chapter 10

37 terms

abwesthofen

Information Systems

50 terms

quinn_dumais

Chapter 10- Computer

50 terms

Christopher_Weaver

Sets found in the same folder

M1U5.2

20 terms

emily_bond5

M1U5.3

20 terms

emily_bond5

M4U6

20 terms

emily_bond5

M3U2 (EC)

8 terms

emily_bond5

Other sets by this creator

CPCU 530 Important Concepts

216 terms

nick_stoeckle

GARS NH Form Numbers (Primary)

26 terms

nick_stoeckle

EQIN 101 Test 3

37 terms

nick_stoeckle

Updated EQIN 101 Test 2

33 terms

nick_stoeckle

Verified questions

COMPUTER SCIENCE

A Turing machine with stay put instead of left is similar to an ordinary Turing machine, but the transition function has the form $\delta: Q \times \Gamma \longrightarrow Q \times \Gamma \times\{\mathrm{R}, \mathrm{S}\}$. At each point, the machine can move its head right or let it stay in the same position. Show that this Turing machine variant is not equivalent to the usual version. What class of languages do these machines recognize?

Verified answer

COMPUTER SCIENCE

What does the following code display? $$ \begin{matrix} \text{numbers = [1, 2, 3, 4, 5, 6, 7, 8]}\\ \text{print(numbers[-4:])}\\ \end{matrix} $$

Verified answer

COMPUTER SCIENCE

As written, each loop iteration in the LIST-SEARCH' procedure requires two tests: one for x ≠ L.nil and one for x.key ≠ k. Show how to eliminate the test for x ≠ L.nil in each iteration.

Verified answer

COMPUTER SCIENCE

Modify the statistics package so that client programs have more flexibility in computing the mean and/or standard deviation. Specifically, redesign the library to have the following functions: mean(nums) Returns the mean of numbers in nums. stdDev(nums) Returns the standard deviation of nums. meanstdDev(nums) Returns both the mean and standard deviation of nums.

Verified answer

Recommended textbook solutions

Information Technology Project Management: Providing Measurable Organizational Value

5th EditionJack T. Marchewka

346 solutions

Computer Organization and Design MIPS Edition: The Hardware/Software Interface

5th EditionDavid A. Patterson, John L. Hennessy

220 solutions

Service Management: Operations, Strategy, and Information Technology

7th EditionJames Fitzsimmons, Mona Fitzsimmons

103 solutions

Operating System Concepts

9th EditionAbraham Silberschatz, Greg Gagne, Peter B. Galvin

489 solutions

Other Quizlet sets

MINS 346 Final 2018

27 terms

MissShortyx46

Unit 8 Study guilde

51 terms

Zac_C2

CGS quiz 8

15 terms

sfiocchi

MIT FINAL EXAM

150 terms

kelsey2696

Related questions

QUESTION

Lightweight Directory Access Protocol (LDAP) uses an encryption certificate to avoid transmitting passwords over a network in cleartext. True or False?

2 answers

QUESTION

When you digitize a sound wave, you measure and record its amplitude at regular time intervals called

2 answers

QUESTION

Suppose you have an application running on a Windows virtual machine in Azure. What is the best-practice guidance on where the app should store data files?

9 answers

QUESTION

Sampling rate is important when creating an analog signal from a digital source. (T or F)

8 answers

Which of the following is not an example of CUI cyber awareness?

1 Answer. 'Press release data' is NOT an example of CUI.

What are some examples of removable media cyber awareness?

Removable media include flash media, such as thumb drives, memory sticks, and flash drives; external hard drives; optical discs (such as CDs, DVDs, and Blu-rays); and music players (such as iPods).

Which of the following is the best example of PII?

Personal identification numbers: social security number (SSN), passport number, driver's license number, taxpayer identification number, patient identification number, financial account number, or credit card number.

What is a possible effect of malicious code Cyber Awareness 2022?

Malicious code can do damage by corrupting files, erasing your hard drive, and/or allowing hackers access. Malicious code includes viruses, Trojan horses, worms, macros, and scripts.

Toplist

Neuester Beitrag

Stichworte