if you want to remove an article from website contact us from top.

    which of the following is true of traveling overseas with a mobile phone

    James

    Guys, does anyone know the answer?

    get which of the following is true of traveling overseas with a mobile phone from EN Bilgi.

    DoD Cyber Awareness 2019

    What do you do if a spillage occurs? Immediately notify your security point of contact. What should you do if a reporter asks you about potentially

    DoD Cyber Awareness 2019

    Home » Flashcards » DoD Cyber Awareness 2019

    Flashcards

    Total word count: 902

    Pages: 3 Get Now

    Looking for Expert Opinion?

    Let us have a look at your work and suggest how to improve it!

    Get a Consultant

    What do you do if a spillage occurs?

    Immediately notify your security point of contact.

    What should you do if a reporter asks you about potentially classified information on the web?

    Neither confirm nor deny the information is classified.

    Which of the following is NOT true concerning a computer labeled SECRET?

    May be used on an unclassified network.

    Who can be permitted access to classified data?

    Only persons with appropriate clearance, a non-disclosure agreement, and need-to-know.

    Which of the following is NOT considered a potential insider threat indicator?

    New interest in learning a foreign language.

    Which of the following is NOT considered a potential insider threat indicator?

    Treated mental health issues.

    A colleague has won 10 high-performance awards, can be playful and charming, is not currently in a relationship, and is occasionally aggressive in trying to access sensitive information. How many potential insider threat indicators does this employee display?

    What information most likely presents a security risk on your personal social networking profile?

    Personal email address

    What action should you take if you receive a friend request on your social networking website from someone in Germany you met casually at a conference last year?

    Decline the request

    Which of the following is an example of Protected Health Information (PHI)?

    Explanation of benefits from a health insurance company.

    Which of the following is the best example of Personally Identifiable Information (PPI)?

    Date of Birth

    Which of the following is NOT an example of sensitive information?

    Press release date

    Which of the following represents a good physical security practice?

    Use your own security badge, key code, or Common Access Card (CAC)/Personal Identity Verification (PIV) card.

    Which of the following statements is TRUE about the use of DoD Public Key Infrastructure (PKI) tokens?

    Always use DoD PKI tokens within their designated classification level.

    Which of the following is NOT a good way to protect your identity?

    Use a single, complex password for your system and application logons.

    After clicking on a link on a website, a box pops up and asks if you want to run an application. Is it okay to run it?

    No. Only allow mobile code to run from organization or your organization’s trusted sites.

    While you are registering for a conference, you arrive at the website http://www.dcsecurityconference.org/registration/. The website requires a credit card for registration. What should you do?

    Since the URL does not start with "https," do not provide your credit card information.

    You receive a call from someone from the help desk who needs your assistance with a problem on your computer. How should you respond?

    Immediately end the phone call.

    You receive an unexpected email from a friend: "I think you’ll like this: https://tinyurl.com/2fcbvy." What action should you take?

    Which of the following is true of Internet hoaxes?

    Which of the following is NOT true of traveling overseas with a mobile phone?

    Physical security of mobile phones carried overseas is not a major issue.

    What is a critical consideration on using cloud-based file sharing and storage applications on your Government-furnished equipment (GFE)?

    Determine if the software or service is authorized.

    A coworker wants to send you a sensitive document to review while you are at lunch and you only have your personal tablet. What should you do?

    Never allow sensitive data on non-Government-issued mobile devices.

    When checking in at the airline counter for a business trip, you are asked if you would like to check your laptop bag. This bag contains your Government-issued laptop. What should you do?

    Decline so that you maintain physical control of your Government-issued laptop.

    How can you protect your information when using wireless technology?

    Avoid using non-Bluetooth-paired or unencrypted wireless computer peripherals.

    Which of the following does NOT constitute spillage?

    Classified information that should be unclassified and downgraded.

    Which of the following is NOT an appropriate way to protect against inadvertent spillage?

    Use the classified network for all work, including unclassified work.

    Which of the following should you NOT do if you find classified information on the internet?

    Download the information.

    Which of the following is NOT a requirement for telework?

    What should you do when you are working on an unclassified system and receive an email with a classified attachment?

    Call your security point of contact immediately to alert them.

    Which of the following is true of protecting classified data?

    Classified material must be appropriately marked.

    Which level of damage to national security can you reasonably expect Top Secret information to cause if disclosed?

    Exceptionally Grave Damage

    Which of the following is true about telework?

    Source : subjecto.com

    Cybersecurity Tips for International Travelers

    When traveling internationally, remember that your mobile phone and other personal communications devices transmit and store your personal information, which is as valuable as the contents of your suitcase, possibly moreso.

    Federal Communications Commission

    Magnifying-glass Menu

    Cybersecurity Tips for International Travelers

    Español | 한국어 | 繁體中文 | Tagalog | Tiếng Việt

    When traveling internationally, remember that your mobile phone and other personal communications devices transmit and store your personal information, which is as valuable as the contents of your suitcase, and possibly more so.

    Before you go

    Take proactive steps to secure your devices and your personally identifiable information (such as your name, address, date of birth and Social Security Number) before you travel. Leave at home any electronic equipment you don't need during your travel. And, if you take it, protect it. Be sure to:

    Back up your electronic files.

    Remove sensitive data.

    Install strong passwords.

    Confirm antivirus software is up-to-date.

    While traveling

    Be vigilant about your surroundings and where and how you use your devices. Make sure to:

    Keep your devices secure in public places such as airports, hotels and restaurants.

    Take care that nobody is trying to steal information from you by spying on your device screen while it's in use.

    Consider using a privacy screen on your laptop to restrict visibility.

    Be cautious while using public Wi-Fi

    Some threats – device theft, for example – are obvious. Others, though, will be invisible, such as data thieves trying to pick off passwords to compromise your personally identifiable information or access your accounts. You may be especially vulnerable in locations with public Wi-Fi, including internet cafes, coffee shops, bookstores, travel agencies, clinics, libraries, airports and hotels. Some helpful tips:

    Do not use the same passwords or PIN numbers abroad that you use in the United States.

    Do not use the public Wi-Fi to make online purchases or access bank accounts.

    When logging into any public network, shut off your phone's auto-join function.

    While using a pubic Wi-Fi network, periodically adjust your phone settings to disconnect from the network, then log back in again.

    Try purposely logging onto the public Wi-Fi using the wrong password. If you can get on anyway, that's a sign that the network is not secure.

    Remember also to avoid using public equipment – such as phones, computers and fax machines – for sensitive communications.

    When you get home

    Electronics and devices used or obtained abroad can be compromised. Your mobile phone and other electronic devices may be vulnerable to malware if you connect with local networks abroad. Update your security software and change your passwords on all devices on your return home.

    Additional resources

    For more tips, check the U.S. Department of Homeland Security's Computer Emergency Readiness Team webpage.

    Laws and policies regarding online security and privacy differ in other countries. While in a foreign country, you are subject to local laws. The State Department website has travel safety information for every country in the world.

    Printable Version

    Cybersecurity Tips for International Travelers (pdf)

    Date Last Updated/Reviewed:

    Friday, January 15, 2021

    Bureau/Office:

    Consumer and Governmental Affairs

    Tags:

    Consumers - International Consumer Issues - International guide - Online privacy - Privacy Consumer Issues

    AddThis Sharing Buttons

    Share to Facebook Share to Twitter Share to LinkedIn Share to Reddit Share to Pinterest Share to Digg Share to MIX Share to More 13

    Alternate Format Requests

    People with print disabilities may request braille, large print, or screen-reader friendly versions of this article via the email form at [email protected] For audio and other access, use the "Explore Accessibility Options" link.

    Consumer Help Center

    Learn about consumer issues - visit the FCC's Consumer Help Center at fcc.gov/consumers.

    File a Complaint with the FCC

    File Your Complaint

    Visit our Consumer Complaint Center at consumercomplaints.fcc.gov  to file a complaint or tell us your story.

    Source : www.fcc.gov

    AWARENESS19w Flashcards

    Start studying AWARENESS19w. Learn vocabulary, terms, and more with flashcards, games, and other study tools.

    AWARENESS19w

    5.0 1 Review

    85 studiers in the last day

    Which of the following is NOT an example of sensitive information?

    Click card to see definition 👆

    Press release data

    Click again to see term 👆

    Which of the following is NOT a correct way to protect sensitive information?

    Click card to see definition 👆

    Sensitive information may be stored on any password protected system

    Click again to see term 👆

    1/15 Created by mountainhigh12

    Terms in this set (15)

    Which of the following is NOT an example of sensitive information?

    Press release data

    Which of the following is NOT a correct way to protect sensitive information?

    Sensitive information may be stored on any password protected system

    How can you avoid downloading malicious code?

    Do not access website links in e-mail messages

    Which of the following is an example of malicious code?

    Software that installs itself without the users knowledge

    A Coworker has asked if you want to download a programmers game to play at work. what should be your reponse

    ill pass

    which of the following is NOT true of traveling overseas with a mobile phone

    physical security of mobile phones carried overseas is not a major issue

    while you are waiting for your lunch bill, a stranger picks up your government issues phone from your table and proceeds to exit the facility with it. what should you do?

    ...

    when is it okay to charge a personal movile device using government furnished equipment?

    this is never ok

    which of the following demonstrates proper protection of mobile devices?

    linda encrypts all of the sensitive data on her government issued mobile devices

    How can you protect your information when using wireless technology?

    avoid using non Bluetooth paired or unencrypted wireless computer peripherals

    Which of the following is a best practice for handling cookies?

    if possible, set the preference to let you know when theres a cookie

    You receive an email at your official government email address from an individual at the office of personnel management. the email provides a link to a personnel portal where you must enter your personal information as part of an effort to standardize recordkeeping. what action should you take first?

    digital signature

    which of the following is true of internet hoaxes?

    part of a distributed denial of service attack

    Which of the following is true about telework?

    you must have your organizations permission to telework

    which of the following is true of protecting classified data?

    classified material must be appropriately marked

    Sets with similar terms

    DoD Cyber Awareness 2019

    38 terms wolff4780PLUS

    DoD Cyber Awareness 2019

    38 terms kyle_terry4

    DOD Cyber Awareness Challenge 2019

    24 terms Jamie_Lancaster

    Cyber Awareness Challenge Exam

    93 terms dianasaurusrex27

    Sets found in the same folder

    Annual DoD Cyber Awareness Challenge Training…

    35 terms sms8818

    DOD Cyber Awareness Challenge 2019 (DOD-IAA-V…

    35 terms navyEOD55

    Cyber Awareness 2020 Knowledge Check

    95 terms Lilwhiteshark97

    2019 Cyber Awareness Challenge: Knowledge Che…

    17 terms c_parham

    Other sets by this creator

    SMDR 28.6

    67 terms mountainhigh12

    gasses

    12 terms mountainhigh12

    pha

    13 terms mountainhigh12

    HAZARDOUS DRUG AWARENESS TRAINING

    10 terms mountainhigh12

    Verified questions

    SOCIOLOGY

    Complete the sentence using each term once. a. monogamy b. polyandry c. polygyny d. exogamy e. endogamy f. homogamy g. patrilineal h. blended family i. dual-employed marriage j. boomerang kids. The marriage of one man to two or more women at the same is called ________

    Verified answer SOCIOLOGY

    A recent documentary examined a suburb in the Midwest where the racial balance had gradually changed from mostly African American. Even though statistics proved that school scores has not dropped and government services remained the same, the perception was that property values had declined. What do you think was responsible for this perception?

    Verified answer SOCIOLOGY

    You have been hired to develop a new marketing campaign for a business in your community. Your employer has asked you to determine based on the demographics of your community how to reach and influence the maximum number of community members. If you are successful, the business will draw in more customers and grater profits. For this task, you may select the type of business. Then you will develop an overview for a marketing campaign, which may consist of online, print, and other methods of reaching potential customers. In your overview, identify the methods you have chosen to use, and explain why these methods will be beneficial based on the demographics of our community and the customers your employer wishes to reach.

    Verified answer SOCIOLOGY

    large trucks can be ___________ times longer than passenger cars

    Verified answer

    Other Quizlet sets

    Food microbiology 2

    25 terms henrik_alstrup

    NUP 351 Final Exam Medications

    73 terms Kiuftis

    Source : quizlet.com

    Do you want to see answer or more ?
    James 10 day ago
    4

    Guys, does anyone know the answer?

    Click For Answer