Sign Up to our social questions and Answers Engine to ask questions, answer people’s questions, and connect with other people.
Login to our social questions & Answers Engine to ask questions answer people’s questions & connect with other people.
Lost your password? Please enter your email address. You will receive a link and will create a new password via email.
Please briefly explain why you feel this question should be reported.
Please briefly explain why you feel this answer should be reported.
Please briefly explain why you feel this user should be reported.
Which of the following is NOT an example of CUI?
Press release data
Press release data
See lessWhich of the following is permitted when using an unclassified laptop within a collateral classified space?
A Government-issued wired headset with microphone.
A Government-issued wired headset with microphone.
See lessWhich scenario might indicate a reportable insider threat?
A colleague removes sensitive information without seeking authorization in order to perform authorized telework.
A colleague removes sensitive information without seeking authorization in order to perform authorized telework.
See lessWhich of the following is a way to prevent the spread of malicious code?
Scan all external files before uploading to your computer.
Scan all external files before uploading to your computer.
See lessHow can you prevent viruses and malicious code Cyber Awareness 2024
Scan all external files before uploading to your computer.
Scan all external files before uploading to your computer.
See lessTom is working on a report that contains employees names
Using his home computer to print the report while teleworking.
Using his home computer to print the report while teleworking.
See lessWhich of the following is true of internet hoaxes?
They can be part of a distributed denial-of-service (DDoS) attack.
They can be part of a distributed denial-of-service (DDoS) attack.
See lessUnder which cyberspace protection condition is the priority focus limited to critical and essential functions?
The priority focus on critical and essential functions is established under Cyber Protection Condition (CPCON) level 1.
The priority focus on critical and essential functions is established under Cyber Protection Condition (CPCON) level 1.
See lessWhich of the following is an appropriate use of a DOD public key infrastructure token?
Do not use a token approved for NIPR on SIPR.
Do not use a token approved for NIPR on SIPR.
See lessWhich of the following best describes a way to safely transmit Controlled Unclassified Information
Debra ensures all recipients have the required clearance and an official need-to-know before sending CUI via encrypted e-mail.
Debra ensures all recipients have the required clearance and an official need-to-know before sending CUI via encrypted e-mail.
See lessWhich of the following is NOT a way that malicious code spreads?
Legitimate software updates.
Legitimate software updates.
See lessWhich of the following personally owned peripherals can you use with GFE
A headset with a microphone through a Universal Serial Bus (USB) port.
A headset with a microphone through a Universal Serial Bus (USB) port.
See lessWhich of the following does NOT constitute spillage?
Classified information that should be unclassified and is downgraded.
Classified information that should be unclassified and is downgraded.
See lessWhich of the following is a best practice to protect your identity Cyber Awareness 2024
Order a credit report annually.
Order a credit report annually.
See lessWhich of the following is NOT a best practice for teleworking in an environment?
Use the devices' default security settings.
Use the devices’ default security settings.
See lessWhich of these is NOT a potential indicator that your device may be under a malicious code attack?
A notification for a system update that has been publicized.
A notification for a system update that has been publicized.
See lessWhich of the following is a best practice for physical security?
Report suspicious activity
Report suspicious activity
See lessWhich of the following may help to prevent spillage?
Follow procedures for transferring data to and from outside agency and non-Government networks.
Follow procedures for transferring data to and from outside agency and non-Government networks.
See lessWhich of the following is true of removable media and portable electronic devices?
PEDs pose more risks than removable media and therefore have more stringent rules and protections.
PEDs pose more risks than removable media and therefore have more stringent rules and protections.
See lessWhich of the following is an appropriate use of government email?
Using a digital signature when sending attachments.
Using a digital signature when sending attachments.
See lessWhich of the following is NOT a best practice for protecting your home wireless network for telework?
Use your router’s pre-set Service Set Identifier (SSID) and password.
Use your router’s pre-set Service Set Identifier (SSID) and password.
See lessHow can you protect your home computer Cyber Awareness 2024
Regularly back up your files.
Regularly back up your files.
See lessWhich of the following is true of transmitting and transporting sensitive compartmented information?
Printed SCI must be retrieved promptly from the printer.
Printed SCI must be retrieved promptly from the printer.
See lessWhich of the following is NOT a way that malicious code can spread?
Running a virus scan.
Running a virus scan.
See lessBased on the description provided how many insider threat indicators are present
Elyse has worked for a DoD agency for more than 10 years.
Elyse has worked for a DoD agency for more than 10 years.
See lessWhich of the following is permitted when using an unclassified laptop within a collateral classified space?
A Government-issued wired headset with microphone.
A Government-issued wired headset with microphone.
See lessWhich of the following is not a best practice for traveling overseas with a mobile device
Do not travel with a mobile device if you can avoid it.
Do not travel with a mobile device if you can avoid it.
See lessWhich of the following is true of transmitting or transporting sensitive compartmented information?
Printed SCI must be retrieved promptly from the printer.
Printed SCI must be retrieved promptly from the printer.
See lessWhat age does Walmart hire?
Walmart generally hires individuals who are at least 16 years old for most hourly positions. However, there are some exceptions to this rule. For example, Sam's Club requires employees to be at least 18 years old. Additionally, some specific positions may have a higher minimum age requirement, suchRead more
Walmart generally hires individuals who are at least 16 years old for most hourly positions. However, there are some exceptions to this rule. For example, Sam’s Club requires employees to be at least 18 years old. Additionally, some specific positions may have a higher minimum age requirement, such as cashier or forklift operator.
Here is a more detailed breakdown of the minimum age requirements for working at Walmart:
In addition to the minimum age requirement, Walmart also has other hiring requirements. These include:
If you are interested in working at Walmart, you can apply online or in person at your local Walmart store.
See lessWhich of the following is true of working within a SCIF?
Authorized personnel who permit another individual to enter the SCIF are responsible for confirming the individual’s need-to-know and access.
Authorized personnel who permit another individual to enter the SCIF are responsible for confirming the individual’s need-to-know and access.
See lessWhich of the following statements is true of DoD Unclassified data?
It may require access and distribution controls.
It may require access and distribution controls.
See lessWhich of these is NOT a potential indicator that your device may be under a malicious code attack?
A notification for a system update that has been publicized.
A notification for a system update that has been publicized.
See lessWhich of the following is permitted within a sensitive compartmented information facility
A Sensitive Compartment Information Facility is a secure area where sensitive information related to national security is stored and discussed. Permitted activities within a SCIF include discussing classified information, analyzing sensitive data, and conducting security briefings.
A Sensitive Compartment Information Facility is a secure area where sensitive information related to national security is stored and discussed. Permitted activities within a SCIF include discussing classified information, analyzing sensitive data, and conducting security briefings.
See lesswhich of the following personally owned peripherals can you use with government furnished equipment
A headset with a microphone through a Universal Serial Bus (USB) port.
A headset with a microphone through a Universal Serial Bus (USB) port.
See lessWhich of the following is true of transmitting Sensitive Compartmented Information
You may only transport SCI if you have been courier-briefed for SCI.
You may only transport SCI if you have been courier-briefed for SCI.
See lessWhich of the following is true of spillage
It can be either inadvertent or intentional.
It can be either inadvertent or intentional.
See lessWhich of the following is true of working within a Sensitive Compartmented Information Facility (SCIF)?
Authorized personnel who permit another individual to enter the SCIF are responsible for confirming the individual’s need-to-know and access.
Authorized personnel who permit another individual to enter the SCIF are responsible for confirming the individual’s need-to-know and access.
See less