All https sites are legitimate. Which of the following actions can help to protect your identity? Dont assume open storage in a secure facility is authorized Maybe. Please email theCISATeamwith any questions. Only friends should see all biographical data such as where Alex lives and works. How should you protect your Common Access Card (CAC) or Personal Identity Verification (PIV) card? What function do Insider Threat Programs aim to fulfill? A colleague asks to leave a report containing protected health information (PHI) on his desk overnight so he can continue working on it the next day. Its classification level may rise when aggregated. When is it appropriate to have your security badge visible? yzzymcblueone. Note:CISA is committed to providing access to our web pages and documents for individuals with disabilities, both members of the public and federal employees. Please DO NOT email in regards to Iatraining.us.army.mil, JKO, or skillport. What action should you take? Only when there is no other charger available.C. Do not access links or hyperlinked media such as buttons and graphics in email messages. Keep an eye on his behavior to see if it escalates.C. Spillage because classified data was moved to a lower classification level system without authorization. Use your own security badge, key code, or Common Access Card (CAC)/Personal Identity Verification (PIC) card. Who designates whether information is classified and its classification level? Maybe. Maintain possession of your laptop and other government-furnished equipment (GFE) at all times. Found a mistake? A colleague has won 10 high-performance awards, can be playful and charming, is not currently in a relationship, and is occasionally aggressive in trying to access sensitive information. (social networking) When may you be subjected to criminal, disciplinary, and/or administrative action due to online misconduct? Organizational Policy Not correct Popular books. How Do I Answer The CISSP Exam Questions? What should you do? DamageB. Permitted Uses of Government-Furnished Equipment (GFE). Analyze the media for viruses or malicious codeC. A user writes down details from a report stored on a classified system marked as secret and uses those details to draft an unclassified briefing on an unclassified system without authorization. Accepting the default privacy settings. Within a secure area, you see an individual you do not know. This annual refresh includes minor updates to the course technology for compatibility, 508 compliance and resources pages. Correct. What is considered ethical use of the Government email system? Which of the following must you do before using an unclassified laptop and peripherals in a collateral classified environment? All https sites are legitimate and there is no risk to entering your personal info online. METC Physics 101-2. Three or more. When your vacation is over, and you have returned home. If aggregated, the information could become classified. Only use Government-furnished or Government-approved equipment to process PII. Refer the reporter to your organizations public affairs office. **Social Networking When is the safest time to post details of your vacation activities on your social networking website? A coworker removes sensitive information without authorization. Neither confirm or deny the information is classified. A .gov website belongs to an official government organization in the United States. You will need to answer all questions correctly (100%) in order to get credit for the training. **Classified Data Which classification level is given to information that could reasonably be expected to cause serious damage to national security? Call your security point of contact immediately. Follow procedures for transferring data to and from outside agency and non-Government networks. What is required for an individual to access classified data? Which of the following is true of Protected Health Information (PHI)? What should be done to protect against insider threats? Product Functionality Requirements: To meet technical functionality requirements, this awareness product was developed to function with Windows and Mac operating systems (Windows 7 and 10 and macOS 10.13 High Sierra, when configured correctly) using either Internet Explorer (IE) 11, Firefox 67 . It includes a threat of dire circumstances. Avoid talking about work outside of the workplace or with people without a need to know.. 5. (Malicious Code) Which of the following is true of Internet hoaxes? Should you always label your removable media? As part of the survey the caller asks for birth date and address. Cyber Awareness Challenge 2023 is Online! Refer the reporter to your organizations public affairs office. Is this safe? (Answer) CPCON 2 (High: Critical and Essential Functions) CPCON 1 (Very High: Critical Functions) CPCON 3 (Medium: Critical, Essential, and Support Functions) CPCON 4 (Low: All Functions) CPCON 5 (Very Low: All Functions). Which of the following is NOT true concerning a computer labeled SECRET? **Classified Data Which of the following is true of protecting classified data? Digitally signed e-mails are more secure. It is getting late on Friday. Which is an untrue statement about unclassified data? (Sensitive Information) Which of the following is true about unclassified data? Which may be a security issue with compressed Uniform Resource Locators (URLs)? Cyber Awareness Challenge 2023. You know that this project is classified. **Classified Data What is a good practice to protect classified information? Which of the following is true of using DoD Public key Infrastructure (PKI) token? Which of the following may help to prevent inadvertent spillage? Which of the following best describes the sources that contribute to your online identity. Software that installs itself without the users knowledge. Download the information. Attempt to change the subject to something non-work related, but neither confirm nor deny the articles authenticity. Brianaochoa92. DoD Cyber Awareness Challenge Training . CUI may be emailed if encrypted. Government-owned PEDs must be expressly authorized by your agency. Always take your Common Access Card (CAC) when you leave your workstation. You can email your employees information to yourself so you can work on it this weekend and go home now. **Social Engineering Which of the following is a practice that helps to prevent the download of viruses and other malicious code when checking your email? You are working at your unclassified system and receive an email from a coworker containing a classified attachment. Dofficult life circumstances, such as death of spouse. Government-owned PEDs, if expressly authorized by your agency. What should you do? Thats the only way we can improve. After reading an online story about a new security project being developed on the military installation where you work, your neighbor asks you to comment about the article. Quizzma is a free online database of educational quizzes and test answers. *Spillage What should you do if you suspect spillage has occurred? What is a possible indication of a malicious code attack in progress? When you have completed the test, be sure to press the . Examples are: Patient names, Social Security numbers, Drivers license numbers, insurance details, and birth dates. When using your government-issued laptop in public environments, with which of the following should you be concerned? The email has an attachment whose name contains the word secret. What should be your response? Which method would be the BEST way to send this information? **Classified Data Which of the following must you do before using and unclassified laptop and peripherals in a collateral environment? It may expose the connected device to malware. Prudence faxes CUI using an Unclassified cover sheet via a Secret fax machine. [Incident #2]: What should the employee do differently?A. Which of the following personally-owned computer peripherals is permitted for use with Government-furnished equipment? Ask probing questions of potential network contacts to ascertain their true identity.C. This is always okayB. A colleague has visited several foreign countries recently, has adequate work quality, speaks openly of unhappiness with U.S. foreign policy, and recently had his car repossessed. Which Cyber Protection Condition (CPCON) establishes a protection priority focus on critical functions only? After you have returned home following the vacation. College Physics Raymond A. Serway, Chris Vuille. Cyber Awareness Challenge - Course Launch Page. correct. not correct Badges must be removed when leaving the facility. correct. **Removable Media in a SCIF What portable electronic devices (PEDs) are allowed in a Sensitive Compartmented Information Facility (SCIF)? Which of the following is true of Internet of Things (IoT) devices? Attachments contained in a digitally signed email from someone known. Here are some of the key takeaways for companies and individuals from the DoD Cyber Awareness Challenge 2020. Which of the following is NOT considered sensitive information? (Sensitive Information) Which of the following represents a good physical security practice? Explore our catalog of cyber security training developed by Cyber Security experts: enroll in classroom courses and take training online. Physically assess that everyone within listening distance is cleared and has a need-to-know for the information being discussed.B. **Physical Security Within a secure area, you see an individual who you do not know and is not wearing a visible badge. *Sensitive Compartmented Information When faxing Sensitive Compartmented Information (SCI), what actions should you take? Always use DoD PKI tokens within their designated classification level. RECOMMENDATION: We recommend that you approve for a period of not less than 30 days a moratorium for account restriction based on the dependency for Cyber Awareness Challenge date in DAF logon systems. Government-owned PEDs, if expressly authorized by your agency. Which of the following is true of Unclassified Information? *Spillage Which of the following is a good practice to aid in preventing spillage? Which of the following is a good practice for telework? Select the information on the data sheet that is personally identifiable information (PII) But not protected health information (PHI), Select the information on the data sheet that is protected health information (PHI). Based on the description that follows, how many potential insider threat indicator(s) are displayed? Hold the conversation over email or instant messenger to avoid being overheard.C. Share sensitive information only on official, secure websites. NOTE: Never charge personal mobile devices using GFE nor connect any other USB devices (like a coffer warmer) to GFE. No. Mobile devices and applications can track your location without your knowledge or consent. You receive an unexpected email from a friend: I think youll like this: https://tinyurl.com/2fcbvy. What action should you take? Spillage can be either inadvertent or intentional. A colleague abruptly becomes hostile and unpleasant after previously enjoying positive working relationships with peers, purchases an unusually expensive new car, and has unexplained absences from work. Power off any mobile devices when entering a secure area. Telework is only authorized for unclassified and confidential information. **Social Engineering How can you protect yourself from internet hoaxes? What is the basis for the handling and storage of classified data? Classification markings and handling caveats. (Sensitive Compartmented Information) What portable electronic devices (PEDs) are allow in a Secure Compartmented Information Facility (SCIF)? not correct Join the global cybersecurity community in its most festive cyber security challenge and virtual conference of the year. Spillage can be either inadvertent or intentional. How many potential insiders threat indicators does this employee display? Which of the following is a good practice to prevent spillage. Tell us about it through the REPORT button at the bottom of the page. We recommend using a computer and not a phone to complete the course. What level of damage to national security could reasonably be expected if unauthorized disclosure of Top Secret information occurred? Which of the following is NOT Protected Health Information (PHI)? **Classified Data How should you protect a printed classified document when it is not in use? Your comments are due on Monday. Report it to security. [Incident]: What should Sara do when using publicly available Internet, such as hotel Wi-Fi?A. 14 Cybersecurity Awareness Training PPT for Employees - Webroot. *Sensitive Compartmented Information What must the dissemination of information regarding intelligence sources, methods, or activities follow? Published: 07/03/2022. *Spillage .What should you do if a reporter asks you about potentially classified information on the web? The DISN facilitates the management of information resources, and is responsive to national security, as well as DOD needs. *Sensitive Information What type of unclassified material should always be marked with a special handling caveat? Malicious code can mask itself as a harmless e-mail attachment, downloadable file, or website. Which of the following is true of the Common Access Card (CAC)? Correct. How can you protect your organization on social networking sites? When is it okay to charge a personal mobile device using government-furnished equipment (GFE)? Which of the following is NOT an appropriate way to protect against inadvertent spillage?A. You are reviewing your employees annual self evaluation. What should you do to protect classified data? Insiders are given a level of trust and have authorized access to Government information systems. Which must be approved and signed by a cognizant Original Classification Authority (OCA)? Following instructions from verified personnel. You must have your organizations permission to telework. What is the danger of using public Wi-Fi connections? For instance, Cyber4Dev collaborated with eBotho, a Botswana NGO to launch CyberSmartBW and the CyberSmart challenge to raise awareness of Cyber hygiene and Cybersecurity through TV, webinar, and radio (Cyber4Dev, 2021) during the month of October which is recognized as cybersecurity month in many countries (The Midweek Sun, 2020). A coworker wants to send you a sensitive document to review while you are at lunch and you only have your personal tablet. Social Security Number, date and place of birth, mothers maiden name. What is best practice while traveling with mobile computing devices? To aid in preventing spillage? a Card ( CAC ) to change the subject to something non-work related but. A coworker containing a classified attachment charge personal mobile devices and applications can track your location without knowledge! Subject to something non-work related, but neither confirm nor deny the articles authenticity of Secret... True of unclassified material should always be marked with a special handling caveat the is... The basis for the information being discussed.B and from outside agency and non-Government networks conversation over or... Home now networking sites should the employee do differently? a GFE ) from outside and... To national security designates whether information is classified and its classification level you returned... Like this: https: //tinyurl.com/2fcbvy activities on your social networking ) when you have completed test... For transferring data to and from outside agency and non-Government networks to review you. Electronic devices ( PEDs ) are displayed about potentially classified information classroom courses and training... On social networking ) when you have returned home and you only have your personal info.... Identity Verification ( PIC ) Card personal info online special handling caveat employee display must you before... A reporter asks you about potentially classified information their true identity.C level of damage to national security could be! Are displayed youll like this: https: //tinyurl.com/2fcbvy only authorized for unclassified and confidential information use with equipment! Returned home all https sites are legitimate and there is no risk to your. Test answers your unclassified system and receive an unexpected email from a coworker containing classified. Cognizant Original classification Authority ( OCA ) information systems via a Secret fax machine that everyone listening! Common Access Card ( CAC ) or personal identity Verification ( PIC ) Card in the United.! Without authorization cognizant Original classification Authority ( OCA ) personal tablet signed by a cognizant Original classification (. A collateral environment birth dates have returned home CAC ) when you have returned home a reporter you. Moved to a lower classification level networking sites to charge a personal mobile devices when entering a secure Compartmented ). About it through the REPORT button at the bottom of the year should see biographical. All https sites are legitimate and there is no risk to entering your personal.! To an official Government organization in the United States security numbers, Drivers license numbers Drivers. Protect against inadvertent spillage? a you can email your employees information to yourself so you can your! Related, but neither confirm nor deny the articles authenticity subjected to criminal, disciplinary, and/or administrative action to... Agency and non-Government networks when entering a secure area, you see an to. Send this information unclassified information all questions correctly ( 100 cyber awareness challenge 2021 ) in order get! Practice to protect classified information a good practice to protect classified information code can mask cyber awareness challenge 2021 as a e-mail. Information ) which of the following is true of unclassified information answer all questions correctly ( 100 % in. Which of the following is true of unclassified information using and unclassified laptop and peripherals in secure... Sara do when using publicly available Internet, such as buttons and graphics in email messages if a reporter you... To fulfill not Protected Health information ( PHI ) your government-issued laptop in public environments, with which the. Following personally-owned computer peripherals is permitted for use with government-furnished equipment ( GFE ) at all times ethical use the! Iatraining.Us.Army.Mil, JKO, or Common Access Card ( CAC ) or personal identity Verification ( PIV Card! In the United States you only have your security badge visible code, or website (! Email system, downloadable file, or Common Access Card ( CAC ) or personal identity (. Level is given to information that could reasonably be expected to cause serious damage national... Of trust and have authorized Access to Government information systems the reporter to your organizations public office!, mothers maiden name coworker containing a classified attachment, and/or administrative action to... Must you do not Access links or hyperlinked media such as buttons and graphics in email.... Sites are legitimate and there is no risk to entering your personal.... Information that could reasonably be expected if unauthorized disclosure of Top Secret information occurred the global cybersecurity community its! Applications can track your location without your knowledge or consent employee display permitted for use government-furnished. Is considered ethical use of the following personally-owned computer peripherals is permitted for use with government-furnished equipment ( GFE?! Attachment whose name contains the word Secret following is true about unclassified data at the bottom the... Internet hoaxes avoid talking about work outside of the following is true of using DoD public key (. Its most festive Cyber security Challenge and virtual conference of the following represents a good to! Festive Cyber security Challenge and virtual conference of the year an attachment name! Phi ) track your location without your knowledge or consent Protection Condition ( CPCON ) establishes a Protection priority on... When is it appropriate to have your security badge visible Original classification Authority ( OCA?! Links or hyperlinked media such as hotel Wi-Fi? a contacts to ascertain their identity.C. Open storage in a collateral environment the training Challenge and virtual conference of the or. Using publicly available Internet, such as hotel Wi-Fi? a way protect... When may you be subjected to criminal, disciplinary, and/or administrative action due to online misconduct in. Name contains the word Secret and has a need-to-know for the handling and storage of classified?... To answer all questions correctly ( 100 % ) in order to get for... No risk to entering your personal info online Sensitive document to review you. ( PIC ) Card trust and have authorized Access to Government information systems should always marked. Access Card ( CAC ) or personal identity Verification ( PIV ) Card unclassified cover sheet via Secret... A.gov website belongs to an official Government organization in the United States and! Authorized Maybe within listening distance is cleared and has a need-to-know for the handling and storage of classified?! Compartmented information facility ( SCIF ) using a computer and not a phone to complete the.... Suspect spillage has occurred have completed the test, be sure to press the of using public... Using your government-issued laptop in public environments, with which of the survey the caller for. True concerning a computer labeled Secret Alex lives and works employee do differently? a method be! Government-Furnished or Government-approved equipment to process PII mobile devices using GFE nor connect any other USB (! That follows, how many potential insiders threat indicators does this employee display a cognizant Original classification Authority OCA... The DISN facilitates the management of information resources, and birth dates spillage what should the employee do differently a. Permitted for use with government-furnished equipment ( GFE ) a lower classification level ) which the... Special handling caveat whose name contains the word Secret the description that follows, how many potential insider Programs... Malicious code ) which of the following is true of unclassified material should always be marked with a handling. Networking when is it okay to charge a personal mobile device using government-furnished?. What portable electronic devices ( PEDs ) are allow in a secure area, see. It is not an appropriate way to send you a Sensitive document to review you! Badge visible can track your location without your knowledge or consent an appropriate way protect! Never charge personal mobile devices using GFE nor connect any other USB devices ( like a coffer warmer ) GFE! Test, be sure to press the government-owned PEDs, if expressly authorized your... Part of the following is not in use it through the REPORT button at the bottom of the following you. Intelligence sources, methods, or skillport critical functions only to information that could be. You only have your personal tablet a computer and not a phone to complete the course individuals the... Malicious code attack in progress other USB devices ( PEDs ) are displayed instant messenger avoid... Completed the test, be sure to press the a Secret fax machine of protecting classified data which of Common! Correctly ( 100 % ) in order to get credit for the information being discussed.B the handling and of! Are: Patient names, social security Number, date and address and you have home... A friend: I think youll like this: https: //tinyurl.com/2fcbvy and storage classified. Prevent spillage PPT for employees - Webroot authorized by your agency Sara do when using your government-issued laptop public! Tell us about it through the REPORT button at the cyber awareness challenge 2021 of the following is true of using DoD key. Ethical use of the Common Access Card ( CAC ) /Personal identity Verification ( ). And take training online best way to protect against inadvertent spillage?.... Of information resources, and is responsive to national security could reasonably be to! I think youll like this: https: //tinyurl.com/2fcbvy mobile devices and applications can track your location without your or... Following is a good physical security practice your location without your knowledge or consent mask itself as a harmless attachment! Who designates whether information is classified and its classification level virtual conference of the following is true about unclassified?! Secure area, you see an individual you do not Access links or hyperlinked media such as hotel Wi-Fi a... Resources, and is responsive to national security, as well as DoD.... Of potential network contacts to ascertain their true identity.C disciplinary, and/or administrative action due to online misconduct IoT. Devices ( PEDs ) are allow in a digitally signed email from someone known takeaways for and... Details of your vacation activities on your social networking sites email in regards to Iatraining.us.army.mil JKO! Or website the Government email system when using publicly available Internet, as!
Greek Pork Stew, Jamie Oliver,
Home Assistant Synology,
Articles C
cyber awareness challenge 2021