Always use strong passwords for your home computer. Create separate accounts for each user and have them create their own passwords using a strong password creation method. Install all system security updates, patches, and keep your defenses such as antivirus software, spyware, and firewall up to date.
What is a good practice for physical security cyber awareness?
What is a good practice for physical security? Challenge people without proper badges.
What is a good practice to protect data on your home wireless systems cyber awareness?
What is a good practice to protect data on your home wireless systems? Ensure that the wireless security features are properly configured. You just studied 2 terms!
How can you protect your information when using wireless technology Cyber Awareness 2020?
How can you protect your information when using wireless technology? Avoid using non-Bluetooth-paired or unencrypted wireless computer peripherals.
What is the best way to protect your CAC?
To protect the information on your CAC, you should never tell anyone your PIN or write it down where it can be easily found. Your PIN should be kept secure at all times, just like your Social Security Number.
What is a good practice for physical security quizlet cyber awareness?
(Sensitive Information) Which of the following represents a good physical security practice? Use your own security badge, key code, or Common Access Card (CAC)/Personal Identity Verification (PIV) card. (Sensitive Information) What certificates are contained on the Common Access Card (CAC)?
When should a security badge be visible?
When is it appropriate to have your securing badge visible with a sensitive compartmented information facility? At all time when is the facility.
What are some examples of malicious code cyber awareness?
Malicious code includes viruses, trojan horses, worms, macros, and scripts. They can damage or compromise digital files, erase your hard drive and/or allow hackers access to your PC or mobile from a remote location.
What is a best practice while traveling with mobile computing devices cyber awareness?
What is a best practice while traveling with mobile computing devices? Maintain possession of your laptop and other government-furnished equipment (GFE) at all times.
What are some examples of removable media?
Removable media is a type of storage device that can be removed from a computer whilst the system is running.
- USB memory sticks.
- External hard drives.
- Mobile phones and tablet devices.
Which is a rule for removable media?
What is a rule for removable media, other portable electronic devices (PEDs), and mobile computing devices to protect Government systems? Do not use any personally owned/non-organizational removable media on your organization’s systems. You just studied 2 terms!
How can you avoid downloading malicious code cyber awareness?
How can you avoid downloading malicious code? Select all security issues. Then select Submit. Select an action.
Which of the following is the best example of protected health information?
Health information such as diagnoses, treatment information, medical test results, and prescription information are considered protected health information under HIPAA, as are national identification numbers and demographic information such as birth dates, gender, ethnicity, and contact and emergency contact …