Question: What Is A Protection Against Internet Hoaxes Quizlet?

When classified data is not in use How can you protect it quizlet?

Ensure proper labeling by appropriately marking all classified material and, when required, sensitive material.

When classified data is not in use, how can you protect it.

Store classified data appropriately in a GSA-approved vault/container when not in use..

What is a good practice to protect classified information?

Which is a good practice to protect classified information? Ensure proper labeling by appropriately marking all classified material and, when required, sensitive material.

Which is a rule for removable media?

What is a rule for removable media, other portable electronic devices (PEDs), and mobile computing devices to protect Government systems? Do not use any personally owned/non-organizational removable media on your organization’s systems.

What is a common method used in social engineering cyber awareness 2020?

Phishing. Phishing attacks are the most common type of attacks leveraging social engineering techniques. Attackers use emails, social media, instant messaging and SMS to trick victims into providing sensitive information or visiting malicious URLs in the attempt to compromise their systems.

What is a good practice to protect data on your home wireless systems quizlet?

What is a good practice to protect data on your home wireless systems? Ensure that the wireless security features are properly configured.

How can you protect your information when using wireless technology?

Public Wireless Security Use a virtual private network (VPN) if possible. Avoid using passwords and providing personal information to web sites. Encrypt your files. Be aware of your surroundings.

What is the best practice to protect data on your mobile computing device?

Put a passcode on the device. Install security updates and download anti‐malware protection on all devices. Review the privacy and security settings on the device and in each app. Do not use public Wi‐Fi if accessing client information or other sensitive information.

What are examples of malicious code?

Taking advantage of common system vulnerabilities, malicious code examples include computer viruses, worms, Trojan horses, logic bombs, spyware, adware, and backdoor programs.

What is a way to prevent the download of viruses cyber awareness?

Which of the following is a practice that helps to prevent the download of viruses and other malicious code when checking your email? Do not access links or hyperlinked media such as buttons and graphics in email messages. … A flashing pop-up that warns you your computer is infected with a virus.

What is a best practice while traveling with mobile computing devices cyber awareness?

Encrypt all sensitive data on laptops/mobile. Always maintain visual or physical control of your laptop/mobile devices, especially when going through airport security checkpoints. Use public or free Wi-Fi only with the organization’s approved VPN.

What is a good practice to protect data on your home wireless system?

To keep your wireless communication confidential, ensure your personal or ISP-provided WAP is using Wi-Fi Protected Access 2 (WPA2) instead of the much weaker, and easily broken Wired Equivalent Privacy (WEP) or the original WPA. When configuring WPA2, change the default key to a complex, hard-to-guess passphrase.

What is a good practice for physical security cyber awareness?

Only allow mobile code to run from your organization or your organization’s trusted sites. Which of the following represents a good physical security practice? Use your own security badge, key code, or Common Access Card (CAC)/Personal Identity Verification (PIC) card.

How do you protect against malicious code?

How can you protect yourself against malicious code?Install and maintain antivirus software. … Use caution with links and attachments. … Block pop-up advertisements. … Use an account with limited permissions. … Disable external media AutoRun and AutoPlay features. … Change your passwords. … Keep software updated. … Back up data.More items…•

What can a malicious code do?

Malicious code is the kind of harmful computer code or web script designed to create system vulnerabilities leading to back doors, security breaches, information and data theft, and other potential damages to files and computing systems. It’s a type of threat that may not be blocked by antivirus software on its own.

What can malicious code do quizlet?

What is malicious code? any code in a software system or script intended to cause undesired effects, security breaches or damage to a system. … it cannot be prevented by using conventional antivirus software alone. You just studied 9 terms!

What is the best protection method for sharing personally identifiable information?

What is the best protection method for sharing Personally Identifiable Information (PII)? Digitally sign and encrypt the email.

What is an indication that malicious code is running on your system?

What is a possible indication of a malicious code attack in progress? A pop-up window that flashes and warns that your computer is infected with a virus.

What do you mean by Internet security and best practices for it?

Following IT security best practices means keeping your security software, web browsers, and operating systems updated with the latest protections. Antivirus and anti-malware protections are frequently revised to target and respond to new cyberthreats.

Which email attachments are generally safe to open?

Microsoft has classified several types of dangerous extensions; however, only a few are considered safe. These are GIF, JPG or JPEG, TIF or TIFF, MPG or MPEG, MP3 and WAV. These extensions represent different file types and are the formats that the majority of internet users tend to send as email attachments.

Who can access classified data?

Who can be permitted access to classified data? Only persons with appropriate clearance, a non-disclosure agreement, and need-to-know.

What describes how sensitive compartmented information is marked quizlet?

Sensitive Compartmented Information: Classified information concerning or derived from intelligence sources, methods, or analytical processes, which is required to be handled within formal access control systems established by the Director of Central Intelligence. … SCI must be stored in GSA approved security containers.