Which of the following is a best practice for handling cookies cyber awareness?
Which of the following is a best practice for handling cookies? -If possible, set your browser preferences to prompt you each time a website wants to store a cookie.
(Spillage) Which of the following is a best practice to protect information about you and your organization on social networking sites and applications? Use only personal contact information when establishing personal social networking accounts, never use Government contact information.
Cookies and Website Use
Cookies may pose a security threat, particularly when they save unencrypted personal information. Cookies also may track your activities on the web. Note: Not all https sites are legitimate and there is still a risk to entering your information online.
Which is a good practice to protect classified information? Ensure proper labeling by appropriately marking all classified material and, when required, sensitive material.
Which of the following is a best practice for securing your home computer? Use antivirus software and keep it up to date.
Which of the following may help to prevent spillage? Label all files, removable media, and subject headers with appropriate classification markings.
Using antivirus software is the best way to defend your computer against malicious code. If you think your computer is infected, run your antivirus software program. Ideally, your antivirus program will identify any malicious code on your computer and quarantine them so they no longer affect your system.
Which of the following is a practice that helps to prevent the download of viruses and other malicious code when checking your email? Do not access links or hyperlinked media such as buttons and graphics in email messages.
Which of the following represents a good physical security practice? Use your own security badge, key code, or Common Access Card (CAC)/Personal Identity Verification (PIV) card.
Whaling is a highly targeted phishing attack - aimed at senior executives - masquerading as a legitimate email. Whaling is digitally enabled fraud through social engineering, designed to encourage victims to perform a secondary action, such as initiating a wire transfer of funds.