Sign Up to our social questions and Answers Engine to ask questions, answer people’s questions, and connect with other people.
Login to our social questions & Answers Engine to ask questions answer people’s questions & connect with other people.
Lost your password? Please enter your email address. You will receive a link and will create a new password via email.
Please briefly explain why you feel this question should be reported.
Please briefly explain why you feel this answer should be reported.
Please briefly explain why you feel this user should be reported.
We want to connect the people who have knowledge to the people who need it, to bring together people with different perspectives so they can understand each other better, and to empower everyone to share their knowledge.
Which of the following is true of internet hoaxes?
They can be part of a distributed denial-of-service (DDoS) attack.
They can be part of a distributed denial-of-service (DDoS) attack.
See lessUnder which cyberspace protection condition is the priority focus limited to critical and essential functions?
The priority focus on critical and essential functions is established under Cyber Protection Condition (CPCON) level 1.
The priority focus on critical and essential functions is established under Cyber Protection Condition (CPCON) level 1.
See lessWhich of the following is an appropriate use of a DOD public key infrastructure token?
Do not use a token approved for NIPR on SIPR.
Do not use a token approved for NIPR on SIPR.
See lessWhich of the following best describes a way to safely transmit Controlled Unclassified Information
Debra ensures all recipients have the required clearance and an official need-to-know before sending CUI via encrypted e-mail.
Debra ensures all recipients have the required clearance and an official need-to-know before sending CUI via encrypted e-mail.
See lessWhich of the following is NOT a way that malicious code spreads?
Legitimate software updates.
Legitimate software updates.
See lessWhich of the following personally owned peripherals can you use with GFE
A headset with a microphone through a Universal Serial Bus (USB) port.
A headset with a microphone through a Universal Serial Bus (USB) port.
See lessWhich of the following does NOT constitute spillage?
Classified information that should be unclassified and is downgraded.
Classified information that should be unclassified and is downgraded.
See less