Which of the following is a security best practice when using social networking sites?
Which of the following is a security best practice when using social networking sites quizletWhich of following is a security best practice when using social networking sites
A: Turn off Global Positioning System (GPS) before posting pictures of yourself in uniform with identifiable landmarks
B: Identify your work organization when contributing to online discussions
C: Use only your personal social networking account to harass people with whom you disagree
D: Use only your personal contact information when establishing your account
Show or Reveal the Answer
Use only your personal contact information when establishing your account
(Social Networking Knowledge Check)
Which of the following is a security best practice when using social networking sites?
Which of the following is a security best practice when using social networking sites 2022Which is a security best practice when using social networking sites
A: Accepting all information posted by your network as true
B: Connecting with people who share mutual connections with you, even if you don’t know them
C: Understanding and using the available privacy settings
D: Geotagging posts using Global Positioning System (GPS) or location links
Show or Reveal the Answer
Understanding and using the available privacy settings
(Social Networking Knowledge Check)
Which represents a security best practice when using social networking?
Which represents a security best practice when using social networking cyber awarenessWhich represents a security best practice when using social networking quizlet
Which represents a security best practice when using social networking sites
A: Understanding and using available privacy settings.
B: Posting social security number and date of birth so others can confirm who you are before they accept your friend request.
C: Automatically accepting all friend requests.
D: Sharing social networking site passwords with contacts and their friends.
Show or Reveal the Answer
Understanding and using available privacy settings.
(Social Networking Knowledge Check)
When may you be subject to criminal, disciplinary, and/or administrative action due to online misconduct?
A: If you participate in it while using DoD information systems onlyB: If you participate in or condone it during work hours only
C: If the online misconduct also occurs offline
D: If you participate in or condone it at any time
Show or Reveal the Answer
If you participate in or condone it at any time
(Social Networking Knowledge Check)
As someone who works with classified information, what should you do if you are contacted by a foreign national seeking information on a research project?
A: String the foreign national along to gain information about their identityB: Refer the foreign national to a colleague with more information
C: Provide the information requested
D: Inform your security point of contact
Show or Reveal the Answer
Inform your security point of contact
(Social Networking Knowledge Check)
As someone who works with classified information, what should you do if you are contacted by a foreign national seeking information on a research project?
A: Inform your security POC of all non-professional or non-routine contacts with foreign nationals, including, but not limited to, joining each other’s social media sites.B: Provide the foreign national your organization’s recall roster and direct him to the Public Affairs Officer.
C: Tell the foreign national to send his/her questions via e-mail so that you can do some research.
D: Establish a relationship with this foreign national and provide any information requested in order to keep up a good reputation for the United States.
Show or Reveal the Answer
Inform your security POC of all non-professional or non-routine contacts with foreign nationals, including, but not limited to, joining each other’s social media sites.
(Social Networking Knowledge Check)
Which of the following best describes the sources that contribute to your online identity?
Which of the following best describes the sources that contribute to your online identity quizletA: The sites, apps, and devices that collect data about you are secure, and your data remains private.
B: Your online identity is comprised only of data collected by sites, apps, and devices you choose to use.
C: By default, sites, apps, and devices that you use can only collect data that you actively share (such as posts that you make) and are prohibited from passively collecting data (such as your location).
D: Data about you collected from all sites, apps, and devices that you use can be aggregated to form a profile of you.
Show or Reveal the Answer
Data about you collected from all sites, apps, and devices that you use can be aggregated to form a profile of you.
(Social Networking Knowledge Check)
What information posted publicly on your personal social networking profile represents a security risk?
A: Your place of birthB: Hobbies of interest
C: Image of your pet
D: Food recipes
Show or Reveal the Answer
Your place of birth
(Social Networking Knowledge Check)
Which of the following information is a security risk when posted publicly on your social networking profile?
A: Your birthdayB: Your personal e-mail address
C: Pictures of your pet
D: Your hobbies
Show or Reveal the Answer
Your birthday
(Social Networking Knowledge Check)
Which of the following information is a security risk when posted publicly on your social networking profile?
A: Your favorite colorB: Your political affiliation
C: Photos of your past vacations
D: Your mother’s maiden name
Show or Reveal the Answer
Your mother’s maiden name
(Social Networking Knowledge Check)
When is the safest time to post details of your vacation activities on your social networking profile?
A: While participating in tourist activitiesB: After you have returned home following the vacation
C: When you arrive at your destination
D: While you are still planning your vacation
Show or Reveal the Answer
After you have returned home following the vacation
(Social Networking Knowledge Check)
When is the best time to post details of your vacation activities on your social networking website?
A: Upon arrival at your destinationB: While you are making your plans to go on vacation
C: When your vacation is over, and you have returned home
D: While participating in tourist activities
Show or Reveal the Answer
When your vacation is over, and you have returned home
(Social Networking Knowledge Check)
Your cousin posted a link to an article with an incendiary headline on social media. What action should you take?
A: Re-share the article so that it reaches as many people as possibleB: Research the source of the article to evaluate its credibility and reliability
C: Comment on your cousin’s post to thank them for sharing the article
D: Refer to the article to confirm your views when discussing its subject with others
Show or Reveal the Answer
Research the source of the article to evaluate its credibility and reliability
(Social Networking Knowledge Check)
Under which circumstances may you be subject to criminal, disciplinary, and/or administrative action due to online misconduct?
A: Only when using DoD information systems.B: Only when online harassment also occurs offline
C: Only if you reveal identifying information about an individual (i.e., doxing)
D: Any time you participate in or condone misconduct, whether offline or online
Show or Reveal the Answer
Any time you participate in or condone misconduct, whether offline or online
(Social Networking Knowledge Check)
Which of the following is a best practice to protect information about you and your organization on social networking sites and applications?
A: Post your Government work group recall roster on your personal social networking account to allow easy contact access by interested parties.B: Use only personal contact information when establishing personal social networking accounts, never use Government contact information.
C: Post pictures of yourself in front of identifiable landmarks such as your Government facility on the military post.
D: Use your Government contact information when establishing personal social networking accounts to protect your personal information.
Show or Reveal the Answer
Use only personal contact information when establishing personal social networking accounts, never use Government contact information.
Also find DOD Cyber Awareness Challenge Insider Threat Knowledge Check Answers
Also find DOD Cyber Awareness Challenge Sensitive information Knowledge Check Answers
No comments:
Post a Comment