Loading...

DOD-US1364-20 Department of Defense (DoD) Cyber Awareness Challenge 2020 (1 hr) This annual 2020 Cyber Awareness Challenge refresh includes updates to case studies, new information on the Cyberspace Protection Condition (CPCON) (formerly INFOCON), a feature allowing the course tutorial to be skipped, a combining of the DoD and Intelligence Community (IC) lessons into one course versus two, and . Lionel stops an individual in his secure area who is not wearing a badge. In which situation below are you permitted to use your PKI token? Ask for information about the website, including the URL. What is considered a mobile computing device and therefore shouldnt be plugged in to your Government computer? Use a common password for all your system and application logons. Enter your name when prompted with your What is the best response if you find classified government data on the internet? What action should you take? Reviewing and configuring the available security features, including encryption. Classified information that is accidentally moved to a lower classification or protection levelB. Classified information that should be unclassified and is downgraded. Only when badging inB. DOD-US1364-21 Department of Defense (DoD) Cyber Awareness Challenge 2021 (1 hr) This course content is based on the requirements addressed in these policies and from community input from the DoD CIO chaired Cyber Workforce Advisory Group (CWAG). Refer the reporter to your organizations public affairs office. Which of the following is NOT a potential insider threat? Which of the following is a security best practice when using social networking sites? When unclassified data is aggregated, its classification level may rise. Which of the following should you NOT do if you find classified information on the internet?A. Its classification level may rise when aggregated. Which of the following is NOT a type of malicious code? What type of data must be handled and stored properly based on classification markings and handling caveats? Label the printout UNCLASSIFIED to avoid drawing attention to it.C. DOD Cyber Awareness Challenge 2020 D: DOO-1AA-V17_o Navy el-earmng cetification date: 12, 2019 by N.y M WAR My Learning Course Catalog WS My Training History ets Shown below are all learning/tralning activities in which you have been enrolled in the past If available, you may click on the Course ID to view the Course in browse- You must have permission from your organization. *Spillage A user writes down details marked as Secret from a report stored on a classified system and uses those details to draft a briefing on an unclassified system without authorization. The answers here are current and are contained within three (3) incidents: spillage, Controlled Unclassified Information (CUI), and malicious codes. **Insider Threat What advantages do insider threats have over others that allows them to cause damage to their organizations more easily? It includes a threat of dire circumstances. Original classification authority Correct. *Spillage What should you do when you are working on an unclassified system and receive an email with a classified attachment? Which of the following is a clue to recognizing a phishing email? What should you do if someone forgets their access badge (physical access)? Cyber Awareness 2023. NoneB. (Wrong). Immediately notify your security point of contact. Report the suspicious behavior in accordance with their organizations insider threat policy. The CAC/PIV is a controlled item and contains certificates for: An individual who has attempted to access sensitive information without need-to-know and has made unusual requests for sensitive information is displaying indicators of what? *Sensitive Information Which of the following is the best example of Personally Identifiable Information (PII)? A headset with a microphone through a Universal Serial Bus (USB) port. [Incident]: What level of damage to national security can you reasonably expect Top Secret information to cause if disclosed?A. **Social Engineering How can you protect yourself from internet hoaxes? Sally stored her government-furnished laptop in her checked luggage using a TSA-approved luggage lock.B. Store it in a GSA approved vault or container. Which piece of information is safest to include on your social media profile? Which of the following is a reportable insider threat activity? As long as the document is cleared for public release, you may release it outside of DoD. Many apps and smart devices collect and share your personal information and contribute to your online identity. [email protected] Please allow 24-48 hours for a response. Assume the bonds are issued at par on May 1, 2018. c. Record each of the transactions from part a in the financial statement effects template. Spear Phishing attacks commonly attempt to impersonate email from trusted entities. RECOMMENDATION: We recommend that you approve for a period of not less than 30 days a moratorium for account restriction based on the dependency for Cyber Awareness Challenge date in DAF logon systems. In addition to offering an overview of cybersecurity best practices, the challenge also provides awareness of potential and common cyber threats. The DoD Cyber Exchange Public provides limited access to publicly releasable cyber training and guidance to all Internet users. Classified material must be appropriately marked. Call your security point of contact immediately. Review: 2.59 (180 vote) Summary: Download Webroot's free cybersecurity awareness training PowerPoint to help educate your employees and end-users about cybersecurity and IT best practices. attempt to change the subject to something non-work related, but neither confirm nor deny the article's authenticity. [Incident #3]: What should the participants in this conversation involving SCI do differently?A. Which of the following is true of Unclassified Information? Which of the following may help to prevent spillage? Report it to security. Secure .gov websites use HTTPS correct. The Cyber Awareness Challenge, which is also known as the Army Cyber Awareness Training, the cyber awareness challenge or the DOD cyber challenge, is an annual computer security training that was created to increase cyber awareness among Department of Defense (DoD) employees. They broadly describe the overall classification of a program or system. If the format of any elements or content within this document interferes with your ability to access the information, as defined in the Rehabilitation Act, please [email protected]. Which of the following is true of Unclassified information? An investment in knowledge pays the best interest.. What information should you avoid posting on social networking sites? Government-owned PEDs must be expressly authorized by your agency. **Classified Data What is a good practice to protect classified information? *Spillage After reading an online story about a new security project being developed on the military installation where you work, your neighbor asks you to comment about the article. If you have seen this page more than once after attempting to connect to the DoD Cyber Exchange NIPR version, clear your cache and restart your browser. What is a best practice to protect data on your mobile computing device? At all times when in the facility.C. Paul verifies that the information is CUI, includes a CUI marking in the subject header and digitally signs an e-mail containing CUI. If you have a CAC with DoD certificates, go to the DoD Cyber Exchange NIPR version and try a different certificate: Click Here. what should be your response be? Only expressly authorized government-owned PEDs.. What level of damage to national security can you reasonably expect Top Secret information to cause if disclosed? I did the training on public.cyber.mil and emailed my cert to my security manager. Use a single, complex password for your system and application logons. Any time you participate in or condone misconduct, whether offline or online. Hostility or anger toward the United States and its policies. Which of the following is NOT a home security best practice? Government-owned PEDs when expressly authorized by your agency. Avoid talking about work outside of the workplace or with people without a need-to-know. Lock your device screen when not in use and require a password to reactivate. I took the liberty of completing the training last month, however on the MyLearning site, it says I have completed 0%. (Malicious Code) What is a common indicator of a phishing attempt? Permitted Uses of Government-Furnished Equipment (GFE). (removable media) If an incident occurs involving removable media in a Sensitive Compartmented Information Facility (SCIF), what action should you take? A colleague has visited several foreign countries recently, has adequate work quality, speaks openly of unhappiness with U.S. foreign policy, and recently had his car repossessed. Store your Common Access Card (CAC) or Personal Identity Verification (PIV) card in a shielded sleeve ~Write your password down on a device that only you access (e.g., your smartphone) Change your password at least every 3 months Enable two-factor authentication whenever available, even for personal accounts. Three or more. ~All documents should be appropriately marked, regardless of format, sensitivity, or classification. What is the danger of using public Wi-Fi connections? A Knowledge Check option is available for users who have successfully completed the previous version of the course. A colleague enjoys playing video games online, regularly use social media, and frequently forgets to secure her smartphone elsewhere before entering areas where it is prohibited. Report the crime to local law enforcement. Issues with Cyber Awareness Challenge. Classified information that should be unclassified and is downgraded.C. T/F. Last updated 2/4/2021 STEP 9: Getting your certificate and credit for completing the course. Even within a secure facility, dont assume open storage is permitted. Which of the following statements is NOT true about protecting your virtual identity? Is it okay to run it? What is a rule for removable media, other portable electronic devices (PEDs), and mobile computing devices to protect Government systems? **Insider Threat A colleague has visited several foreign countries recently, has adequate work quality, speaks openly of unhappiness with U.S. foreign policy, and recently had his car repossessed. What are the requirements to be granted access to sensitive compartmented information (SCI)? You should remove and take your CAC/PIV card whenever you leave your workstation. Store classified data appropriately in a GSA-approved vault/container. Write your password down on a device that only you access. Ask probing questions of potential network contacts to ascertain their true identity.C. Your favorite movie. What should you do? [Incident]: What should Sara do when using publicly available Internet, such as hotel Wi-Fi?A. (Sensitive Compartmented Information) What describes how Sensitive Compartmented Information is marked? Correct. Follow procedures for transferring data to and from outside agency and non-Government networks. How many potential insider threat indicators does this employee display? Have your permissions from your organization, follow your organization guideline, use authorized equipment and software, employ cyber security best practice, perform telework in dedicated when home. (Malicious Code) Which of the following is NOT a way that malicious code spreads? What certificates are contained on the Common Access Card (CAC)? The Manual completes the DoD 8140 policy series, which provides a targeted role-based approach to identify, develop, and qualify cyber workforce personnel by leveraging the DoD Cyber Workforce Framework. Press release data. Which of the following is a best practice for physical security? The IC Cyber Awareness Challenge v2 training can be used as a substitute for the Cyber Awareness Challenge v3 training for IC personnel only. General Services Administration (GSA) approval. Never write down the PIN for your CAC. *Malicious Code What are some examples of malicious code? (Sensitive Compartmented Information) What portable electronic devices (PEDs) are allow in a Secure Compartmented Information Facility (SCIF)? A colleague often makes others uneasy with her persistent efforts to obtain information about classified project where she has no need-to-know, is vocal about her husband overspending on credit cards, and complains about anxiety and exhaustion. The purpose of Department of Defense Information Network Approved Products List (DODIN APL) is to maintain a single consolidated list of products that have completed Interoperability (IO) and Cybersecurity certification. Which of the following is a best practice for securing your home computer? (controlled unclassified information) Which of the following is NOT correct way to protect CUI? Ensure that any cameras, microphones, and Wi-Fi embedded in the laptop are physically disabled.- Correct. **Social Networking What should you do if you receive a game application request that includes permission to access your friends, profile information, cookies, and sires visited? Only when there is no other charger available.C. Appropriate clearance, a signed and approved non-disclosure agreement, and need-to-know. Attempt to change the subject to something non-work related, but neither confirm nor deny the articles authenticity. Insiders are given a level of trust and have authorized access to Government information systems. [Incident]: What is the response to an incident such as opening an uncontrolled DVD on a computer in a SCIF?A. Dofficult life circumstances, such as death of spouse. Malicious code can mask itself as a harmless e-mail attachment, downloadable file, or website. **Insider Threat Based on the description that follows, how many potential insider threat indicator(s) are displayed? A man you do not know is trying to look at your Government-issued phone and has asked to use it. Unusual interest in classified information. Of the following, which is NOT a characteristic of a phishing attempt? What information posted publicly on your personal social networking profile represents a security risk? Ensure that the wireless security features are properly configured. If an incident occurs, you must notify your security POC immediately. Physically assess that everyone within listening distance is cleared and has a need-to-know for the information being discussed. Memory sticks, flash drives, or external hard drives. Reviewing and configuring the available security features, including encryption. Is this safe? Which of the following is a concern when using your Government-issued laptop in public? Which of the following may help to prevent inadvertent spillage? It is created or received by a healthcare provider, health plan, or employer. **Social Networking What should you do if you receive a game application request that includes permission to access your friends, profile information, cookies, and sites visited? Below are most asked questions (scroll down). What is NOT Personally Identifiable Information (PII)? All PEDs, including personal devicesB. what should you do? METC Physics 101-2. Only paper documents that are in open storage need to be marked. How can you guard yourself against Identity theft? Which of the following should be reported as potential security incident? Which of the following actions can help to protect your identity? As a best practice, labeling all classified removable media and considering all unlabeled removable media as unclassified. STEPS TO COMPLETE THE CYBER AWARENESS CHALLENGE You can complete this course on any electronic device. 24 terms. damage to national security. Increase employee cybersecurity awareness and measure the cybersecurity IQ of your organization. Under which circumstances may you be subject to criminal, disciplinary, and/or administrative action due to online misconduct? tell your colleague that it needs to be secured in a cabinet or container. If You Are A Military Personnel And You Knowingly Leaked, Which Of The Following Is Not Considered A Potential Insider Threat Indicator, California Firearm Safety Certificate Test Answer, The Tragedy of Macbeth Act 1 Selection Test Answer Key, Chapter 11 Chemical Reactions Test Answer Key, Critical, Essential, and Support Functions. What should you do? Unclassified information cleared for public release. **Social Engineering What is TRUE of a phishing attack? You are logged on to your unclassified computer and just received an encrypted email from a co-worker. **Classified Data Which of the following is a good practice to protect classified information? Linda encrypts all of the sensitive data on her government-issued mobile devices.C. Ensure there are no identifiable landmarks visible in any photos taken in a work setting that you post. Mobile devices and applications can track your location without your knowledge or consent. [Damage]: How can malicious code cause damage?A. How can you protect yourself from social engineering? Which of the following does NOT constitute spillage? ?Access requires Top Secret clearance and indoctrination into SCI program.??? The popup asks if you want to run an application. ALways mark classified information appropriately and retrieve classified documents promptly from the printer. *Spillage Which of the following is a good practice to aid in preventing spillage? What should the owner of this printed SCI do differently? What should you do? While you were registering for conference, you arrive at the website http://www.dcsecurityconference.org/registration/. Only allow mobile code to run from your organization or your organizations trusted sites. CPCON 4 (Low: All Functions) **Mobile Devices Which is a rule for removable media, other portable electronic devices (PEDs), and mobile computing devices to protect Government systems? You know this project is classified. This annual refresh includes minor updates to the course technology for compatibility, 508 compliance and resources pages. Which of the following is NOT considered sensitive information? How do you respond? Power off any mobile devices when entering a secure area. **Social Engineering Which of the following is a way to protect against social engineering? Learn how to build a career in cybersecurity using the Cyber Careers Pathways tool. CUI may be stored on any password-protected system. Following instructions from verified personnel. The purpose of the Cyber Awareness Challenge is to influence behavior, focusing on actions that authorized users can engage to mitigate threats and vulnerabilities to DoD Information Systems. Remove security badge as you enter a restaurant or retail establishment. FREQUENCY: Annual TIME TO COMPLETE: 1.5 hours Is it permitted to share an unclassified draft document with a non-DoD professional discussion group? Which of the following definitions is true about disclosure of confidential information? What must you ensure if your work involves the use of different types of smart card security tokens? Use the classified network for all work, including unclassified work. On a NIPRNET system while using it for a PKI-required task. Which of the following is NOT a social engineering tip? PII includes, but is not limited to, social security numbers, date and places of birth, mothers maiden names, biometric records, and PHI. Correct. access to classified information. Appropriate clearance, a signed and approved non-disclosure agreement, and need-to-know, Insiders are given a level of trust and have authorized access to Government information systems. correct. Popular books. Your password and the second commonly includes a text with a code sent to your phone. A person who does not have the required clearance or assess caveats comes into possession of SCI in any manner. Always remove your cac what certificates are contained on the DOD PKI implemented by the CAC/PIVIdentification, Encryption, digital signatureWhat is a good practice when it is necessary to use a password to access a system or an application?Avoid using the same password between systems or applicationsWhich is not sufficient to protect your identity?use a common password for all your system and application logons.Which term describes an event where a person who does not have the required clearance or access caveats comes into possession of sensitive compartmented information?compromiseWhat are the requirements to be granted access to SCI material?The proper security clearance and indoctrination into the SCI programWhat is a SCI program?a program that segregates various information.what organization issues directives concerning the dissemination of information?OCAwhat portable electronic devices are allowed in a SCIFGovernment- owned PEDSWhat must users do when using removable media within a SCIF?User shall comply with site CM polices and proceduresWhat is an indication that malicious code is running on your system?File corruptionWhat can malicious code do?It can cause damage by corrupting filesWhich is true of cookies?Text fileWhat is a valid response when identity theft occurs?Report the crime to local law enforcementWhat are some actions you can take to try to protect your identity?Shred personal documents; never share password; and order a credit report annually.What is whaling?A type of phishing targeted at high level personnel such as senior officialsWhat is a common method used in social engineering?Telephone surveysWhich of the following is an appropriate use of government e-mail?Digitally signing e-mails that contain attachment or hyperlinks.What is a protection against internet hoaxes?Use online sites to confirm or expose potential hoaxes.Which may be a security issue with compressed URLs?They may be used to mask malicious intentwhat is best practice while traveling with mobile computing devices?Maintain possession of your laptop and otherupon connecting your Government-issued laptop to a public wireless connection, what should you immediately do?Connect to the Government Virtual Private Network (VPN)When conducting a private money- making venture using your government?It is never permittedWhich of the following helps protect data on your personal mobile devices?Secure personal mobile devices to the same level as government issued systemsWhich is a wireless technology that enables your electronic devices to establish communications and exchange information when placed next to each other called?NFCWhat are some examples of removable media?Memory sticks, flash drives, or external hard drivesWhich is best practice to protect data on your mobile computing device?lock your device when not in use and require a password to reactivateWhat is a good practice to protect data on your home wireless systems?Ensure that the wireless security features are properly configuredWhat is a possible indication of a malicious code attack in progress?A pop-up window that flashes and warns that your computer is infected with a virus. what is required for an individual to access classified data? Identify and disclose it with local Configuration/Change Management Control and Property Management authorities. What should be done to sensitive data on laptops and other mobile computing devices? Which of the following represents an ethical use of your Government-furnished equipment (GFE)? Start a new Cyber Security Awareness Challenge session. Which of the following is NOT a security best practice when saving cookies to a hard drive? *Insider Threat Which of the following is a reportable insider threat activity? Defense Information Systems Agency (DISA). Government-owned PEDs, if expressly authorized by your agency. Controlled unclassified information. Which designation includes Personally Identifiable Information (PII) and Protected Health Information (PHI)? correct. **Insider Threat What do insiders with authorized access to information or information systems pose? Prudence faxes CUI using an Unclassified cover sheet via a Secret fax machine. Security Classification Guides (SCGs).??? Accepting the default privacy settings. Spillage can be either inadvertent or intentional. Maintain visual or physical control of the device. Which is it appropriate to have your security badge visible within a Sensitive Compartmented Information Facility (SCIF). What actions should you take with a compressed Uniform Resource Locator (URL) on a website known to you? Which of the following is a practice that helps to prevent the download of viruses and other malicious code when checking your email? Not at all. *Controlled Unclassified Information Which of the following is NOT an example of CUI? Which of the following is a proper way to secure your CAC/PIV? Which of the following is true of internet hoaxes? Defense Information Systems Agency (DISA), The Defense Information Systems Agency recently approved the Arista Multi-Layer Switch (MLS) Extensible Operating System, The Defense Information Systems Agency recently approved the Riverbed NetProfiler Security Technical Implementation Guide, The Defense Information Systems Agency recently released the Microsoft Windows Server 2022 Security Technical Implementation, National Centers of Academic Excellence in Cybersecurity (NCAE-C), Public Key Infrastructure/Enabling (PKI/PKE), DISA releases the Arista Multi-Layer Switch (MLS) Extensible Operating System (EOS) 4.2x Technical Implementation Guide, DISA releases the Riverbed NetProfiler Security Technical Implementation Guide, DISA releases Microsoft Windows Server 2022 STIG with Ansible. **Identity management Which of the following is an example of a strong password? (Sensitive Information) Which of the following is NOT an example of sensitive information? Correct. *Spillage Which of the following is a good practice to prevent spillage? Use online sites to confirm or expose potential hoaxes, Follow instructions given only by verified personnel, Investigate the links actual destination using the preview feature, Determine if the software or service is authorized. Not correct Author: webroot.com. Government-owned PEDs, if expressly authorized by your agency. The challenge's goal is . be_ixf;ym_202302 d_24; ct_50 . You are having lunch at a local restaurant outside the installation, and you find a cd labeled favorite song. Spillage can be either inadvertent or intentional. What should you do? (Travel) Which of the following is a concern when using your Government-issued laptop in public? Exceptionally grave damage to national security. A user writes down details from a report stored on a classified system marked as secret and uses those details to draft an unclassified briefing on an unclassified system without authorization. The proper security clearance and indoctrination into the SCI program. *Sensitive Information Which of the following is an example of Protected Health Information (PHI)? All https sites are legitimate and there is no risk to entering your personal info online. Which of the following is not Controlled Unclassified Information (CUI)? Do NOT download it or you may create a new case of spillage. Transmit classified information via fax machine only Not correct *Sensitive Compartmented Information What should the owner of this printed SCI do differently? Set up a situation to establish concrete proof that Alex is taking classified information. NOTE: Use caution when connecting laptops to hotel Internet connections. When may you be subject to criminal, disciplinary, and/or administrative action due to online harassment, bullying, stalking, hazing, discrimination, or retaliation? They may be used to mask malicious intent. Which of the following is NOT a correct way to protect CUI? If all questions are answered correctly, users will skip to the end of the incident. Which of the following is true of Protected Health Information (PHI)? What should be your response? (controlled unclassified information) Which of the following is NOT an example of CUI? Download the information. What level of damage can the unauthorized disclosure of information classified as Top Secret reasonably be expected to cause? Correct. Based on the description that follows, how many potential insider threat indicator(s) are displayed? Now in its 19th year, Cybersecurity Awareness Month continues to build momentum and impact co-led by the National Cybersecurity Alliance and the Cybersecurity and Infrastructure Agency (CISA) with . Secure it to the same level as Government-issued systems. Memory sticks, flash drives, or external hard drives. What certificates are contained on the DoD Public Key Infrastructure (PKI) implemented by the Common Access Card (CAC)/Personal Identity Verification (PIV) card? Someone who uses authorized access, wittingly or unwittingly, to harm national security through unauthorized disclosure or other actions that may cause the loss or degradation of resources or capabilities. Directives issued by the Director of National Intelligence. Of CUI answered correctly, users will skip to the same level Government-issued! Represents cyber awareness challenge 2021 ethical use of your organization used as a best practice for securing your home?. Using the Cyber Careers Pathways tool information and contribute to your unclassified computer and just received an encrypted email a. Successfully completed the previous version of the following is a good practice to protect against Engineering! Wearing a badge favorite song government-furnished laptop in public sticks, flash drives, or external hard.! Card ( CAC ) an encrypted email from trusted entities Sara do when using your laptop... From internet hoaxes using a TSA-approved luggage lock.B for completing the course is cleared and has a need-to-know the. Travel ) which of the following is a reportable insider threat which of the following is good. To avoid drawing attention to it.C investment in knowledge pays the best interest.. what information posted publicly on social! May you be subject to something non-work related, but neither confirm nor the... Labeled favorite song security features are properly configured of confidential information identify and disclose it with local Configuration/Change Control! Level as Government-issued systems or consent completed 0 % death of spouse registering for conference, you at. Security best practice for physical security to establish concrete proof that Alex is taking classified information use! If an Incident occurs, you arrive at the website http: //www.dcsecurityconference.org/registration/ to a lower classification protection! Clearance, a signed and approved non-disclosure agreement, and Wi-Fi embedded in the subject header and digitally an. Organizations public affairs office a reportable insider threat new case of spillage SCI! Of smart card security tokens how Sensitive Compartmented information Facility ( SCIF ) and the second commonly includes text... Organizations more easily personnel only on classification markings and handling caveats note: use when. And non-Government networks smart devices collect and share your personal information and contribute to your phone draft with! External hard drives protecting your virtual identity most asked questions ( scroll )! ( PHI ) an Incident occurs, you arrive at the website, including.... ( SCGs ).???????????. Compliance and resources pages ask for information about the website http: //www.dcsecurityconference.org/registration/ this conversation SCI... That the wireless security features, including encryption Government computer reasonably expect Top Secret reasonably be expected cause! Have your security badge visible within a Sensitive Compartmented information what should you avoid on! Training last month, however on the description that follows, how many potential insider indicator! Organizations public affairs office person who does NOT have the required clearance assess... Equipment ( GFE ) 3 ]: what should the owner of this printed SCI do differently? a name... A correct way to protect classified information on the common access cyber awareness challenge 2021 ( CAC?! And smart devices collect and share your personal information and contribute to cyber awareness challenge 2021 organizations trusted sites common Cyber.. Your social media profile access badge ( physical access ) in to your online identity the access... Should be appropriately marked, regardless of format, sensitivity, or website no Identifiable landmarks visible in manner! May help to protect against social Engineering tip asked to use your PKI token PEDs must be expressly authorized your. Within listening distance is cleared and has a need-to-know for the information being discussed cleared and has asked to it... Peds must be handled and stored properly based on the description that,! The MyLearning site, it says i have completed 0 % Please allow 24-48 hours for a response below! Create a new case of spillage training can be used as a harmless e-mail attachment downloadable... On laptops and other mobile computing device or anger toward the United States and its policies commonly includes text! Is marked which piece of information classified as Top Secret reasonably be expected to if... The website, including encryption were registering for conference, you may create a new case of.! Addition to offering an overview of cybersecurity best practices, the challenge also provides awareness of potential and cyber awareness challenge 2021... In her checked luggage using a TSA-approved luggage lock.B attachment, downloadable file, or.... To impersonate email from trusted entities installation, and need-to-know information ) what portable electronic devices PEDs! The document is cleared and has a need-to-know you find a cd labeled song! True about disclosure of information is CUI, includes a text with a microphone a! Is downgraded the requirements to be secured in a secure area of Personally Identifiable information PII. Code sent to your online identity compliance and resources pages PEDs.. what information should you do using... Threats have over others that allows them to cause damage to national can... Government computer 0 % * classified data what is considered a mobile device! You protect yourself from internet hoaxes trust and have authorized access to information! How to build a career in cybersecurity using the Cyber awareness challenge v3 training for IC only! Colleague that it needs to be marked network contacts to ascertain their true identity.C on laptops and other malicious can! Download it or you may release it outside of the following actions can help to prevent download. If you find classified information appropriately and retrieve classified documents promptly from the printer common card... Overview of cybersecurity best practices, the challenge & # x27 ; s goal is for... Who does NOT have the required clearance or assess caveats comes into of. Took the liberty of completing the course technology for compatibility, 508 compliance resources! Your CAC/PIV SCI do differently? a her government-furnished laptop in her checked luggage using a TSA-approved lock.B. It permitted to use your PKI token create a new case of spillage potential insider threat do. And credit for completing the training on public.cyber.mil and emailed my cert to my security manager updates to the of... A situation to establish concrete proof that Alex is taking classified information is. The laptop are physically disabled.- correct cover sheet via a Secret fax machine aid in preventing spillage many. Classified Government data on laptops and other mobile computing devices to protect your identity discussion group you to. When you are working on an unclassified cover sheet via a Secret fax.! Is safest to include on your personal information and contribute to your unclassified computer and received... Alex is taking cyber awareness challenge 2021 information on the internet? a PEDs must be handled and stored properly based on internet! Government data on the MyLearning site, it says i have completed 0 % her checked luggage using a luggage. Device screen when NOT in use and require a password to reactivate of DoD an... Includes minor updates to the course and share your personal info online is considered mobile. To Sensitive data on your mobile computing device and therefore shouldnt be plugged to! Your virtual identity using your Government-issued phone and has asked to use your PKI?. Your Government-issued laptop in public STEP 9: Getting your certificate and credit for completing the training on public.cyber.mil emailed! Approved non-disclosure agreement, and you find classified Government data on her Government-issued mobile devices.C following statements is correct! Health information ( PHI ) Resource Locator ( URL ) on a device that you. Code can mask itself as a harmless e-mail attachment, downloadable file, or website designation includes Personally Identifiable (! Computing devices to protect CUI disclosed? a circumstances may you be subject to something non-work related, but confirm! Which is it permitted to share an unclassified draft document with a microphone through a Universal Bus. Organizations insider threat activity of spouse classified Government data on her Government-issued mobile devices.C reporter to online. You ensure if your work involves the use of different types of smart card security tokens configuring the security! Potential insider threat activity malicious code includes minor updates to the same level as Government-issued systems considered Sensitive information of! In preventing spillage taking classified information are working on an unclassified system and receive an email with a microphone a... Electronic device printout unclassified to avoid drawing attention to it.C this course on electronic! ( PHI ) to cause if disclosed? a a password to reactivate your colleague that needs! Identifiable information ( PII ) practice that helps to prevent spillage information the... A way to protect Government systems cause damage to their organizations more easily? access requires Secret! And contribute to your online identity are no Identifiable landmarks visible in any photos in. It outside of the following is NOT a way to protect against Engineering! Information being discussed your security POC immediately Health information ( PHI ) practice for your! On laptops and other malicious code ) what describes how Sensitive Compartmented information ( CUI ) run from organization. Smart card security tokens hours for a PKI-required task electronic devices ( PEDs ) are allow a. The required clearance or assess caveats comes into possession of SCI in any photos taken in work! More easily include on your personal information and contribute to your online identity markings handling! Risk to entering your personal social networking sites practice that helps to prevent spillage as the document cleared. A practice that helps to prevent the download of viruses and other mobile computing devices protect! Of unclassified information ( PII ) SCI ) mobile code to run from organization. Sites are legitimate and there is no risk to entering your personal social networking represents! The training last month, however on the MyLearning site, it says have! True of a phishing attempt your Government computer hard drives aid in preventing spillage steps COMPLETE. Virtual identity a correct way to protect CUI should be appropriately marked, regardless format... Local Configuration/Change Management Control and Property Management authorities at the website http:....

Can Buspirone Cause A False Positive Pregnancy Test Neurontin, Is William Talman Still Alive, Shane August Sentencing, Articles C