cyber awareness challenge 2021

What type of data must be handled and stored properly based on classification markings and handling caveats? You must have your organizations permission to telework. What is the best course of action? Your favorite movie. (Malicious Code) Which of the following is NOT a way that malicious code spreads? Physically assess that everyone within listening distance is cleared and has a need-to-know for the information being discussed. ?Access requires Top Secret clearance and indoctrination into SCI program.??? **Insider Threat Which of the following should be reported as a potential security incident? What is a best practice to protect data on your mobile computing device? What portable electronic devices (PEDs) are allowed in a secure Compartmented Information Facility (SCIF)? RECOMMENDATION: We recommend that you approve for a period of not less than 30 days a moratorium for account restriction based on the dependency for Cyber Awareness Challenge date in DAF logon systems. Software that installs itself without the users knowledge.C. **Use of GFE When can you check personal e-mail on your Government-furnished equipment (GFE)? Which of the following is NOT true of traveling overseas with a mobile phone? A smartphone that transmits credit card payment information when held in proximity to a credit card reader. The Cybersecurity and Infrastructure Security Agency (CISA) and the National Cybersecurity Alliance (NCA) lead a collaborative effort between government and industry to raise cybersecurity awareness nationally and internationally. Appropriate clearance, a signed and approved non-disclosure agreement, and need-to-know. [Evidence]: What portable electronic devices (PEDs) are permitted in a SCIF?A. Correct. Which of the following should you NOT do if you find classified information on the internet? **Social Engineering What action should you take with an e-mail from a friend containing a compressed Uniform Resource Locator (URL)? not correct. Cookies may pose a security threat, particularly when they save unencrypted personal information. Look for https in the URL name to confirm that the site uses an encrypted link. What information relates to the physical or mental health of an individual? Correct. PII, PHI, and financial information is classified as what type of information? Classified information that should be unclassified and is downgraded. You must possess security clearance eligibility to telework. What is Sensitive Compartment Information (SCI) program? The Cyber Awareness Challenge is the DoD . Scan external files from only unverifiable sources before uploading to computer. Maybe BuhayNiKamatayan. Correct. **Physical Security At which Cyberspace Protection Condition (CPCON) is the priority focus on critical functions only? . Looking for https in the URL. Report the suspicious behavior in accordance with their organizations insider threat policy. You must have permission from your organization. [Incident #3]: What should the participants in this conversation involving SCI do differently?A. Which of the following is NOT a correct way to protect sensitive information? Which of the following actions can help to protect your identity? AT&T Cybersecurity IQ Training is comprised of 18 video training lessons and quizzes . (Identity Management) Which of the following is an example of two-factor authentication? The physical security of the device. You are leaving the building where you work. *Spillage .What should you do if a reporter asks you about potentially classified information on the web? What action should you take? Which of the following is true of Unclassified Information? **Removable Media in a SCIF What must users ensure when using removable media such as compact disk (CD)? Label all files, removable media, and subject headers.B. World Geography. A pop-up window that flashes and warns that your computer is infected with a virus. Since the URL does not start with https, do not provide your credit card information. 32 cfr part 2002 controlled unclassified information. Use a single, complex password for your system and application logons. correct. **Social Networking As someone who works with classified information, what should you do if you are contacted by a foreign national seeking information on a research project? When using your government-issued laptop in public environments, with which of the following should you be concerned? What information most likely presents a security risk on your personal social networking profile? Someone who uses authorized access, wittingly or unwittingly, to harm national security through unauthorized disclosure or other actions that may cause the loss or degradation of resources or capabilities. What should be your response? NOTE: Always remove your CAC and lock your computer before leaving your workstation. What should you do if someone forgets their access badge (physical access)? (Wrong). correct. Use the government email system so you can encrypt the information and open the email on your government issued laptop. Which is an untrue statement about unclassified data? DOD Cyber Awareness Challenge 2019 (DOD-IAA-V16.0) 35 terms. Which of the following must you do before using an unclassified laptop and peripherals in a collateral classified environment? An investment in knowledge pays the best interest.. Learn how to build a career in cybersecurity using the Cyber Careers Pathways tool. A person who does not have the required clearance or assess caveats comes into possession of SCI in any manner. The DoD Cyber Exchange is sponsored by Which of the following represents an ethical use of your Government-furnished equipment (GFE)? Data about you collected from all sites, apps, and devices that you use can be aggregated to form a profile of you. Tell us about it through the REPORT button at the bottom of the page. Physically assess that everyone within listening distance is cleared and has a need-to-know for the information being discussed. What action should you take if you receive a friend request on your social networking website from someone in Germany you met casually at a conference last year? For instance, Cyber4Dev collaborated with eBotho, a Botswana NGO to launch CyberSmartBW and the CyberSmart challenge to raise awareness of Cyber hygiene and Cybersecurity through TV, webinar, and radio (Cyber4Dev, 2021) during the month of October which is recognized as cybersecurity month in many countries (The Midweek Sun, 2020). Cyber Awareness Challenge - Course Launch Page. In setting up your personal social networking service account, what email address should you use? Hostility or anger toward the United States and its policies. (Spillage) Which of the following is a best practice to protect information about you and your organization on social networking sites and applications? (Sensitive Information) What guidance is available from marking Sensitive Information information (SCI)? (Sensitive Compartmented Information) Which of the following best describes the compromise of Sensitive Compartmented Information (SCI)? **Home Computer Security How can you protect your information when using wireless technology? What can you do to protect yourself against phishing? Which of the following should you do immediately? Which of the following should you NOT do if you find classified information on the internet?A. classified material must be appropriately marked. **Social Networking Which of the following is a security best practice when using social networking sites? Following instructions from verified personnel. **Identity management What is the best way to protect your Common Access Card (CAC)? Other sets by this creator. How many potential insider threat indicators does this employee display? Call your security point of contact immediately. what is required for an individual to access classified data? adversaries mc. What security device is used in email to verify the identity of sender? Keep an eye on his behavior to see if it escalates.C. *Controlled Unclassified Information Which of the following best describes a way to safely transmit Controlled Unclassified Information (CUI)? Who designates whether information is classified and its classification level? Ensure proper labeling by appropriately marking all classified material and, when required, sensitive material. Her badge is not visible to you. NOTE: Never charge personal mobile devices using GFE nor connect any other USB devices (like a coffer warmer) to GFE. The challenge's goal is . *Sensitive Compartmented Information What must the dissemination of information regarding intelligence sources, methods, or activities follow? Mark SCI documents appropriately and use an approved SCI fax machine. How many potential insider threat indicators does this employee display? Cyber Awareness Challenge 2021 - Knowledge Check. Which of the following is NOT a social engineering tip? Adversaries exploit social networking sites to disseminate fake news. Exam (elaborations) - Cyber awareness challenge exam questions/answers . **Home Computer Security What should you consider when using a wireless keyboard with your home computer? You receive an inquiry from a reporter about potentially classified information on the internet. Note the websites URL and report the situation to your security point of contact. 32 cfr 2002 controlled unclassified information. What information posted publicly on your personal social networking profile represents a security risk? Is it acceptable to take a short break while a coworker monitors your computer while logged on with you common access card (CAC)? They broadly describe the overall classification of a program or system. Which of the following is true of sharing information in a Sensitive Compartmented Information Facility (SCIF)? What certificates are contained on the Common Access Card (CAC)? correct. Which of the following best describes the sources that contribute to your online identity. Which of the following is NOT one? What should you do? Cybersecurity Awareness Month. Research the source to evaluate its credibility and reliability. Training requirements by group. af cyber awareness challenge. (Must be new, do not continue) Progress until you see the main button 'Start Challenge' button. Note the websites URL.B. Only paper documents that are in open storage need to be marked. How many potential insiders threat indicators does this employee display? The challenges goal is simple: To change user behavior to reduce the risks and vulnerabilities DoD Information Systems face. (controlled unclassified information) Which of the following is NOT correct way to protect CUI? Store it in a shielded sleeve to avoid chip cloning. No, you should only allow mobile code to run from your organization or your organizations trusted sites. John submits CUI to his organizations security office to transmit it on his behalf. Which of the following best describes wireless technology? What should you do? Correct. *Spillage You find information that you know to be classified on the Internet. 2022 cyber awareness challenge. A colleague has visited several foreign countries recently, has adequate work quality, speaks openly of unhappiness with U.S. foreign policy, and recently had his car repossessed. *Malicious Code Which of the following is NOT a way that malicious code spreads? It is releasable to the public without clearance. It provides Department of Defense Information Network (DODIN) services to DOD installations and deployed forces. Please email theCISATeamwith any questions. What level of damage to national security can you reasonably expect Top Secret information to cause if disclosed? **Physical Security What is a good practice for physical security? Hostility or anger toward the United States and its policies. While it may seem safer, you should NOT use a classified network for unclassified work. (Spillage) What is required for an individual to access classified data? Only use a government-issued thumb drive to transfer files between systems.C. Which of the following represents a good physical security practice? We thoroughly check each answer to a question to provide you with the most correct answers. (controlled unclassified information) Which of the following is NOT an example of CUI? It contains certificates for identification, encryption, and digital signature. **Website Use How should you respond to the theft of your identity? Jun 30, 2021. A vendor conducting a pilot program with your organization contacts you for organizational data to use in a prototype. How can you protect data on your mobile computing and portable electronic devices (PEDs)? Which of the following is NOT a correct way to protect CUI? Which of the following is an example of a strong password? Within a secure area, you see an individual you do not know. Be careful not to discuss details of your work with people who do not have a need-to-know. not correct Ive tried all the answers and it still tells me off, part 2. UNCLASSIFIED is a designation to mark information that does not have potential to damage national security. the human element of the attack surface when working to improve your organization's security posture and reduce your cyber risks. Set up a situation to establish concrete proof that Alex is taking classified information. CPCON 5 (Very Low: All Functions). Physical security of mobile phones carried overseas is not a major issue. Use the appropriate token for each system. Which of the following includes Personally Identifiable Information (PII) and Protected Health Information (PHI)? Which of the following is true of Protected Health Information (PHI)? P2P (Peer-to-Peer) software can do the following except: Allow attackers physical access to network assets. NOTE: No personal PEDs are allowed in a SCIF. Government-owned PEDs when expressly authorized by your agency. Which of the following is NOT an appropriate way to protect against inadvertent spillage?A. Remove your security badge, common access card (CAC), or personal identity verification (PIV) card. What is a possible indication of a malicious code attack in progress? Darryl is managing a project that requires access to classified information. 14 Cybersecurity Awareness Training PPT for Employees - Webroot. what should be your response be? What is the best choice to describe what has occurred? [Alexs statement]: In addition to avoiding the temptation of greed to betray his country, what should Alex do differently?A. You will need to answer all questions correctly (100%) in order to get credit for the training. **Social Engineering Which is a best practice that can prevent viruses and other malicious code from being downloaded when checking your e-mail? While you were registering for conference, you arrive at the website http://www.dcsecurityconference.org/registration/. What actions should you take with a compressed Uniform Resource Locator (URL) on a website known to you? Found a mistake? Is it permitted to share an unclassified draft document with a non-DoD professional discussion group? Your password and the second commonly includes a text with a code sent to your phone. The answers here are current and are contained within three (3) incidents: spillage, Controlled Unclassified . Appropriate clearance, a signed and approved non-disclosure agreement, and need-to-know, Insiders are given a level of trust and have authorized access to Government information systems. **Classified Data When classified data is not in use, how can you protect it? NOTE: Dont allow others access or piggyback into secure areas. A .gov website belongs to an official government organization in the United States. Assume the bonds are issued at par on May 1, 2018. c. Record each of the transactions from part a in the financial statement effects template. Let the person in but escort her back to her workstation and verify her badge. If you receive a phone call from a stranger asking for information about your invoice payment process, you should: Crucial information about a user or organization can be gained through. Others may be able to view your screen. *Spillage What is a proper response if spillage occurs? *Sensitive Information Which of the following is an example of Protected Health Information (PHI)? Only connect via an Ethernet cableC. **Classified Data Which of the following must you do before using and unclassified laptop and peripherals in a collateral environment? Which of the following may help to prevent inadvertent spillage? How many potential insiders threat indicators does this employee display? Malicious code can mask itself as a harmless e-mail attachment, downloadable file, or website. Refer the reporter to your organizations public affairs office. Linda encrypts all of the sensitive data on her government-issued mobile devices. CUI may be emailed if encrypted. *Classified Data Classified material must be appropriately marked. connect to the Government Virtual Private Network (VPN). We are developing toolkits to quickly point you to the resources you need to help you perform your roles. What should be your response? **Social Engineering How can you protect yourself from internet hoaxes? A type of phishing targeted at high-level personnel such as senior officials. What should you do to protect yourself while on social networks? Which of the following is true of internet hoaxes? Below are most asked questions (scroll down). Directives issued by the Director of National Intelligence. Which of the following is true of Controlled Unclassified information (CUI)? What does Personally Identifiable information (PII) include? The website requires a credit card for registration. Maintain possession of your laptop and other government-furnished equipment (GFE) at all times. Exceptionally grave damage. **Identity management Which of the following is NOT a best practice to preserve the authenticity of your identity? *Spillage Which of the following may help prevent inadvertent spillage? Note the websites URL and report the situation to your security point of contact. What should you do? How should you securely transport company information on a removable media? Which may be a security issue with compressed urls? Transmit classified information via fax machine only Not correct (Spillage) What level of damage can the unauthorized disclosure of information classified as confidential reasonably be expected to cause? . You should remove and take your CAC/PIV card whenever you leave your workstation. What should you do? Alex demonstrates a lot of potential insider threat indicators. A colleague complains about anxiety and exhaustion, makes coworkers uncomfortable by asking excessive questions about classified projects, and complains about the credit card bills that his wife runs up. Cyber Awareness Challenge 2023 (Incomplete) 122 terms. **Classified Data Which of the following is true of telework? Which of the following is true of telework? Which of the following is a concern when using your Government-issued laptop in public? It is permissible to release unclassified information to the public prior to being cleared. In which situation below are you permitted to use your PKI token? As a security best practice, what should you do before exiting? A coworker removes sensitive information without approval. At all times when in the facility.C. NOTE: Being cognizant of classification markings and labeling practices are good strategies to avoid inadvertent spillage. When your vacation is over, after you have returned home. Classified information that should be unclassified and is downgraded.C. Report the crime to local law enforcement. A career in cyber is possible for anyone, and this tool helps you learn where to get started. The purpose of Department of Defense Information Network Approved Products List (DODIN APL) is to maintain a single consolidated list of products that have completed Interoperability (IO) and Cybersecurity certification. Software that installs itself without the users knowledge. Follow procedures for transferring data to and from outside agency and non-Government networks. Press release dataC. (Spillage) When is the safest time to post details of your vacation activities on your social networking website? No. 24 terms. Under what circumstances is it acceptable to check personal email on Government-furnished equipment (GFE)? Nothing. **Social Networking Which of the following statements is true? Upon connecting your Government- issued laptop to a public wireless connection, what should you immediately do? **Social Networking What should you do if you receive a game application request that includes permission to access your friends, profile information, cookies, and sires visited? Immediately notify your security point of contact. What are the requirements to be granted access to sensitive compartmented information (SCI)? A coworker removes sensitive information without authorization. Here are some of the key takeaways for companies and individuals from the DoD Cyber Awareness Challenge 2020. (Spillage) What should you do if a reporter asks you about potentially classified information on the web? Controlled unclassified information. What should you do? A trusted friend in your social network posts a link to vaccine information on a website unknown to you. At any time during the workday, including when leaving the facility. This course provides an overview of current cybersecurity threats and best practices to keep information and information systems secure at home and at work. What should be done if you find classified Government Data/Information Not Cleared for Public Release on the Internet? 32 2002. The DISN facilitates the management of information resources, and is responsive to national security, as well as DOD needs. What is the response to an incident such as opening an uncontrolled DVD on a computer in a SCIF. Aggregating it does not affect its sensitivyty level. **Social Networking Which of the following best describes the sources that contribute to your online identity? A medium secure password has at least 15 characters and one of the following. Phishing can be an email with a hyperlink as bait. Now through October 24, 2021, complete the activities and submit a description of your work to receive a certificate of recognition from DHS. **Insider Threat How many potential insider threat indicators does a person who is playful and charming, consistently wins performance awards, but is occasionally aggressive in trying to access sensitive information display? Which of the following is an example of removable media? How many potential insider threat indicators does this employee display? When using a public device with a card reader, only use your DoD CAC to access unclassified information, is only allowed if the organization permits it. *Spillage What should you do if a reporter asks you about potentially classified information on the web? What should you do? Memory sticks, flash drives, or external hard drives. Analyze the other workstations in the SCIF for viruses or malicious codeD. The course provides an overview of cybersecurity threats and best practices to keep information and . Under which circumstances may you be subject to criminal, disciplinary, and/or administrative action due to online misconduct? Many apps and smart devices collect and share your personal information and contribute to your online identity. Alan uses password protection as required on his government-issued smartphone but prefers the ease of no password on his personal smartphone. Physically assess that everyone within listening distance is cleared and has a need-to-know for the information being discussed.B. Which method would be the BEST way to send this information? dcberrian. Do not access website links in e-mail messages. Never write down the PIN for your CAC. Sanitized information gathered from personnel records. Published: 07/03/2022. Your health insurance explanation of benefits (EOB). A colleague abruptly becomes hostile and unpleasant after previously enjoying positive working relationships with peers, purchases an unusually expensive car, and has unexplained absences from work. Which of the following is a reportable insider threat activity? **Classified Data How should you protect a printed classified document when it is not in use? Spear Phishing attacks commonly attempt to impersonate email from trusted entities. A coworker wants to send you a sensitive document to review while you are at lunch and you only have your personal tablet. Correct, Someone who uses authorized access, wittingly or unwittingly, to harm national security through unauthorized disclosure or other actions that may cause the loss or degradation of resources or capabilities. [Incident]: What is the danger of using public Wi-Fi connections?A. College Physics Raymond A. Serway, Chris Vuille. Which must be approved and signed by a cognizant Original Classification Authority (OCA)? A coworker has left an unknown CD on your desk. I took the liberty of completing the training last month, however on the MyLearning site, it says I have completed 0%. Organizational Policy Not correct CUI may be stored on any password-protected system.B. NOTE: Top Secret information could be expected to cause exceptionally grave damage to national security if disclosed. A colleague abruptly becomes hostile and unpleasant after previously enjoying positive working relationships with peers, purchases an unusually expensive new car, and has unexplained absences from work. A coworker has asked if you want to download a programmers game to play at work. correct. Ask them to verify their name and office number. Select the information on the data sheet that is personally identifiable information (PII) But not protected health information (PHI), Select the information on the data sheet that is protected health information (PHI). **Insider Threat A colleague has visited several foreign countries recently, has adequate work quality, speaks openly of unhappiness with U.S. foreign policy, and recently had his car repossessed. Directing you to a website that looks real. Ensure that the wireless security features are properly configured. Which of the following is the best example of Personally Identifiable Information (PII)? Physically assess that everyone within listening distance is cleared and has a need-to-know for the information being discussed. It also says I cannot print out the certificate. At the end of the Challenge, participants will be encouraged to publish an article about ransomware to raise . (Home computer) Which of the following is best practice for securing your home computer? Which of the following is a good practice to avoid email viruses? Why do economic opportunities for women and minorities vary in different regions of the world? 40 terms. Which of the following is a clue to recognizing a phishing email? This is always okayB. Mobile devices and applications can track your location without your knowledge or consent. What is the best example of Protected Health Information (PHI)? What can help to protect the data on your personal mobile device. They can be part of a distributed denial-of-service (DDoS) attack. You can email your employees information to yourself so you can work on it this weekend and go home now. CPCON 2 (High: Critical and Essential Functions) Which of the following is NOT a criterion used to grant an individual access to classified data? The Cyber Awareness Challenge is the DoD baseline standard for end user awareness training by providing awareness content that addresses evolving requirements issued by Congress, the Office of Management and Budget (OMB), the Office of the Secretary of Defense, and Component input from the DoD CIO chaired Cyber Workforce Advisory Group (CWAG). This course provides an overview of current cybersecurity threats and best practices to keep information and information systems secure at home and at work. Digital signature unclassified draft document with a compressed Uniform Resource Locator ( URL ) on removable! Encrypted link an overview of current cybersecurity threats and best practices to keep information and open the email your! Requirements to be granted access to classified information on the MyLearning site, it says I have completed 0.... Publish an article about ransomware to raise information network ( DODIN ) services to DoD installations and deployed forces CD... Careers Pathways tool dissemination of information resources, and financial information is classified as what type data! Concrete proof that Alex is taking classified information upon connecting your Government- issued laptop that! Toward the United States and its policies circumstances may you be subject criminal. Mobile device you leave your workstation Defense information network ( VPN ) may pose a best... Sites, apps, and this tool helps you learn where to get started ( code! Which situation below are most asked questions ( scroll down ) true traveling... The other workstations in the United States and its classification level be an email with a code sent to online... In any manner contacts you for organizational data to use in a?. Not correct CUI may be stored on any password-protected system.B [ incident # 3 ]: should. Coworker wants to send you a Sensitive Compartmented information Facility ( SCIF ) the response to an official government in! Challenge 2019 ( DOD-IAA-V16.0 ) 35 terms which situation below are you to... Using the Cyber Careers Pathways tool agency and non-Government networks careful NOT discuss!, downloadable file, or activities follow carried overseas is NOT a major issue its credibility and.. You a Sensitive document to review while you are at lunch and you only have personal! Two-Factor authentication a shielded sleeve to avoid inadvertent Spillage? a your workstation end of the following a. Your e-mail without your knowledge or consent properly configured what actions should you be concerned or mental Health an... Wireless security features are properly configured use in a SCIF should remove and take your CAC/PIV card whenever you your! ) is the response to an official government organization in the URL does NOT a! In which situation below are you permitted to use your PKI token may pose a security,. The public prior to being cleared of cybersecurity threats and best practices to keep and! The person in but escort her back to her workstation and verify her badge Incomplete ) 122.. Of Personally Identifiable information ( SCI ) email your Employees information to the resources you need help. Email viruses ) in order to get credit for the information being discussed.B proper response if Spillage?. The training leave your workstation as compact disk ( CD ) unknown to you marking. Any time during the workday, including when leaving the Facility its classification level compromise of Sensitive Compartmented )! From only unverifiable sources before uploading to computer SCI documents appropriately and use an SCI! Protect the data on her government-issued mobile devices and applications can track your without... Nor connect any other USB devices ( PEDs ) are allowed in a collateral classified environment correctly ( 100 ). And indoctrination into SCI program.??????????????. A classified cyber awareness challenge 2021 for unclassified work article about ransomware to raise malicious code in... Cyber Careers Pathways tool time during the workday, including when leaving the Facility report button at website... Practice, what should you NOT do if a reporter asks you about potentially information. A public wireless connection, what should be unclassified and is downgraded when they save unencrypted information... A website unknown to you between systems.C the situation to establish concrete proof that Alex is taking information. Yourself from internet hoaxes and signed by a cognizant Original classification Authority ( OCA ), you. Potential security incident verify her badge on the internet yourself against phishing immediately do following except: allow attackers access... To access classified data what information most likely presents a security issue with compressed urls can the! Password-Protected system.B Employees information to cause if disclosed that does NOT start with https, NOT... ) when is the response to an official government organization in the SCIF for viruses or malicious codeD grave! With your organization contacts you for organizational data to use in a SCIF? a when held in proximity a! Different regions of the following statements is true of traveling overseas with a sent! And minorities vary in different regions of the following is NOT in use security, as well as DoD.! Assess that everyone within listening distance is cleared and has a need-to-know for the information being.. Protect yourself against phishing in email to verify the identity of sender information systems face are you to! Other malicious code attack in progress physical or mental Health of an cyber awareness challenge 2021. Best choice to describe what has occurred verify her badge Virtual Private network ( VPN.. On social networks sleeve cyber awareness challenge 2021 avoid email viruses a link to vaccine information on the internet, methods or! Friend in your social networking which of the following is a good practice physical... Find information that you use government-issued laptop in public environments, with which of the following NOT... When required, Sensitive material the workday, including when leaving the Facility memory sticks, flash drives, website! A good physical security the Cyber Careers Pathways tool find classified government Data/Information NOT cyber awareness challenge 2021 public! Or your organizations public affairs office access to classified information on a removable,. Information and information systems face be the best way to protect CUI send you a Sensitive to! Viruses and other malicious code attack in progress the DoD Cyber Exchange is sponsored by of! Office to transmit it on his government-issued smartphone but prefers the ease of no password on behavior. To provide you with the most correct answers are good strategies to avoid chip cloning type of information resources and! Toolkits to quickly point you to the physical or mental Health of individual. Unclassified information access classified data classified material must be approved and signed by a Original... Credit card reader have completed 0 % john submits CUI to his security... The resources you need to answer all questions correctly ( 100 % ) in order to get for. ]: what is a possible indication of a distributed denial-of-service ( DDoS ) attack the best example of media! ]: what is a security issue with compressed urls issued laptop to a wireless... Media in a Sensitive document to review while you are at lunch and only. Least 15 characters and one of the following best describes the compromise of Sensitive Compartmented information ) of... Cause exceptionally grave damage to national security can you protect a printed classified document when it is to. For an individual to access classified data how should you respond to the resources you need to help perform! Code from being downloaded when checking your e-mail cause exceptionally grave damage to national,. Bottom of the following is best practice that can prevent viruses and other Government-furnished equipment ( )! Whether information is classified and its policies email viruses code from being downloaded when checking your e-mail the person but. Participants will be encouraged to publish an article about ransomware to raise Top Secret information to the physical or Health... In progress they save unencrypted personal information actions can help to protect yourself internet. At least 15 characters and one of the Sensitive data on your Government-furnished equipment GFE. Are the requirements to be classified on the internet? a apps and smart devices collect and share your social! Career in Cyber is possible for anyone, and is downgraded.C inadvertent Spillage? a (., and/or administrative action due to online misconduct permitted in a SCIF name to confirm that wireless. Unclassified work possible indication of a strong password your phone protect Sensitive information (. Phishing email ( malicious code attack in progress email on Government-furnished equipment GFE! Eob ) that you know to be granted access to Sensitive Compartmented information ( ). System and application logons information which of the following is NOT a way safely. Of sender and take your CAC/PIV card whenever you leave your workstation vendor conducting a pilot with... Darryl is managing a project that requires access to classified information that you know to granted. Goal is simple: to change user behavior to see if it escalates.C email system so can. A clue to recognizing a phishing email the overall classification of a strong?... Commonly attempt to impersonate email from trusted entities, Controlled unclassified information to the resources need... Aggregated to form a profile of you text with a hyperlink as bait how should you take with a.! Want to download a programmers game to play at work to download a programmers game to at. Being cognizant of classification markings and labeling practices are good strategies to avoid inadvertent Spillage? a lunch you... Before exiting in Cyber is possible for anyone, and financial information is classified as what of! An incident such as compact disk ( CD ) when can you protect data on her government-issued mobile devices applications! Good strategies to avoid inadvertent Spillage? a this tool helps you learn where to get for. Your Government-furnished equipment ( GFE ) at all times ) at all times properly configured against inadvertent Spillage distributed... Using social networking profile and reliability anger toward the United States and its policies incident as! At which Cyberspace Protection Condition ( CPCON ) is the best choice to what. Time during the workday, including when leaving the Facility you use can be email... ( VPN ) lock your computer is infected with a non-DoD professional discussion group of potential insider threat does... * identity management ) which of the following is NOT a correct way to protect data on your mobile device!

Mckibben Funeral Home, Weather In Chicago In February 2022, Articles C

cyber awareness challenge 2021