Which is a rule for removable media?
What is a rule for removable media, other portable electronic devices (PEDs), and mobile computing devices to protect Government systems? Do not use any personally owned/non-organizational removable media on your organization’s systems.
What is whaling vs phishing?
The difference between whaling and spear phishing is that whaling exclusively targets high-ranking individuals within an organization, while spear phishing usually goes after a category of individuals with a lower profile.
What are physical controls?
Physical control is the implementation of security measures in a defined structure used to deter or prevent unauthorized access to sensitive material. Examples of physical controls are: Closed-circuit surveillance cameras. Motion or thermal alarm systems.
What is a whaling attempt?
A whaling attack is a method used by cybercriminals to masquerade as a senior player at an organization and directly target senior or other important individuals at an organization, with the aim of stealing money or sensitive information or gaining access to their computer systems for criminal purposes.
What is whaling cyber?
Whaling is a highly targeted phishing attack – aimed at senior executives – masquerading as a legitimate email. Whaling is digitally enabled fraud through social engineering, designed to encourage victims to perform a secondary action, such as initiating a wire transfer of funds.
What is an indication that malicious is running on your system?
What is a possible indication of a malicious code attack in progress? A pop-up window that flashes and warns that your computer is infected with a virus.
What advantages do insider threats have over others?
What advantages do “insider threats” have over others that allows them to be able to do extraordinary damage to their organizations? They are trusted and have authorized access to Government information systems.
How do I know if there’s malware on my computer?
How to Tell if Your Computer Has a Malware Infection
- Your computer has noticeably slowed down, freezes, or crashes frequently.
- You’re locked out from logging on.
- Unusual error messages keep appearing.
- Your tasks are interrupted by pop-ups.
- Your browser homepage has changed without your input.
- Contacts are receiving mysterious messages from you.
What is a protection against Internet hoaxes quizlet?
What is a protection against internet hoaxes? Use online sites to confirm or expose potential hoaxes.
What must you ensure before transmitting personally identifiable information?
What must you ensure before transmitting Personally Identifiable Information (PII) or Protected Health Information (PHI) via e-mail? Transmissions must be between Government e-mail accounts and must be encrypted and digitally signed when possible.
What are the three major areas of security?
There are three primary areas or classifications of security controls. These include management security, operational security, and physical security controls.
What is an indication that malicious code is running on your system quizlet?
How can you protect against inadvertent spillage?
Which of the following may be helpful to prevent inadvertent spillage? Label all files, removable media, and subject headers with appropriate classification markings. What kind of information could reasonably be expected to cause serious damage to national security in the event of unauthorized disclosure?
When using your government issued laptop?
Upon connecting your Government-issued laptop to a public wireless connection, what should you immediately do? Connect to the Government Virtual Private Network (VPN). Under what circumstances is it acceptable to check personal email on Government-furnished equipment (GFE)? If your organization allows it.
Which of the following is an example of physical control?
Examples of physical controls include safes/vaults, guarded warehouses and stockrooms, firewalls on computer access, television monitoring of selected areas and alarm systems.
What is the best way to protect your CAC?
How should you protect your Common Access Card (CAC) or Personal Identity Verification (PIV) card? Store it in a shielded sleeve to avoid chip cloning.
Which of the following is an example of malicious code?
Taking advantage of common system vulnerabilities, malicious code examples include computer viruses, worms, Trojan horses, logic bombs, spyware, adware, and backdoor programs. Visiting infected websites or clicking on a bad email link or attachment are ways for malicious code to sneak its way into a system.
What should Alex’s colleagues do?
Calculate the Price
|What do you do if a spillage occurs?||Immediately notify your security point of contact.|
|How many insider threat indicators does Alex demonstrate?||Three or more|
|What should Alex’s colleagues do?||Report the suspicious behavior in accordance with their organization’s insider threat policy.|
What do you do if spillage occurs?
What do you do if a spillage occurs? Immediately notify your security point of contact. What should you do if a reporter asks you about potentially classified information on the web? Neither confirm nor deny the information is classified.
How can you protect your information when using wireless technology?
BY: NEISHA SANTIAGO
- Make Your Network Invisible.
- Rename Your Wireless Network.
- Encrypt Your Network Traffic.
- Change Your Administrator Password.
- Be Cautious with “File Sharing”
- Keep Your Access Point Software Up to Date.
What is a good practice for physical security?
Your physical security should incorporate surveillance cameras and sensors that track movements and changes in the environment, especially after hours. You also need to install proper security lighting to ensure all monitored areas are visible at any given moment.
How do you tell if your computer has been infected with malware?
13+ Warning Signs that Your Computer is Malware-Infected [Updated 2019]
- Your computer is slowing down.
- Annoying ads are displayed.
- Pop-up messages.
- Internet traffic suspiciously increases.
- Your browser homepage changed without your input.
- Unusual messages show unexpectedly.
- Your security solution is disabled.
What is whaling DOD cyber awareness?
A whaling attack, also known as whaling phishing or a whaling phishing attack, is a specific type of phishing attack that targets high-profile employees, such as the chief executive officer or chief financial officer, in order to steal sensitive information from a company.
Which of the following is the best example of PII?
Personally identifiable information, or PII, is any data that could potentially be used to identify a particular person. Examples include a full name, Social Security number, driver’s license number, bank account number, passport number, and email address.
What whaling means?
: the occupation of catching and extracting commercial products from whales.
What is the risk of removable media?
Removable media is very easily lost, which could result in the compromise of large volumes of sensitive information stored on it. Some media types will retain information even after user deletion, placing information at risk where the media is used between systems (or when the media is disposed of).
What helps protect from spear phishing?
What helps protect from spear phishing? Be wary of suspicious e-mails that use your name and/or appear to come from inside your organization.