Topic Deep DiveAcross 4 CBTs

Malicious Code

5 community-sourced questions and answers about Malicious Code, aggregated from every CBT we've indexed that covers this topic.

Community-sourced. Answers may be wrong or out of date. Always verify with your official training portal before submitting. Not affiliated with any branch, agency, or vendor. Details.
QUESTION 1

What are some examples of malicious code?

ANSWER

No, you should only allow mobile code to run from your organization or your organization's trusted sites.

QUESTION 2

Which of the following is NOT a way that malicious code spreads?

ANSWER

No, you should only allow mobile code to run from your organization or your organization's trusted sites.

QUESTION 3

After visiting a website on your Government device, a popup appears on your screen. The popup asks if you want to run an application. Is this safe?

ANSWER

No, you should only allow mobile code to run from your organization or your organization's trusted sites.

QUESTION 4

Which of the following is NOT a type of malicious code?

ANSWER

~By accepting cookies, you authorize websites to store your personal data on a web server. (Wrong)

QUESTION 5

Which of the following is true of downloading apps? -For personally owned devices, download apps from the original developer's site whenever possible. -Official app stores may be trusted to ensure security of apps they provide. -For Government-owned devices, you are responsible for researching any application and its vulnerabilities before downloading it. -For Government-owned devices, use approved and authorized applications only.

ANSWER

For Government-owned devices, use approved and authorized applications only.