cyber awareness challenge 2021

Publicado por em

**Travel What is a best practice while traveling with mobile computing devices? Attempting to access sensitive information without need-to-know, Avoid talking about work outside of the workplace or with people without a need-to-know, Report the suspicious behavior in accordance with their organizations insider threat policy. A coworker wants to send you a sensitive document to review while you are at lunch and you only have your personal tablet. A coworker is observed using a personal electronic device in an area where their use is prohibited. Which of the following is an example of Protected Health Information (PHI)? Understanding and using the available privacy settings. Which of the following is NOT a DoD special requirement for tokens? laptops, fitness bands, tablets, smartphones, electric readers, and Bluetooth devices. NOTE: Dont allow others access or piggyback into secure areas. Please DO NOT email in regards to Iatraining.us.army.mil, JKO, or skillport. **Website Use While you are registering for a conference, you arrive at the website http://www.dcsecurityconference.org/registration/. Note any identifying information and the websites Uniform Resource Locator (URL). Cyber Awareness Challenge 2021 - Knowledge Check. Store it in a locked desk drawer after working hours. correct. CUI may be stored on any password-protected system. While it may seem safer, you should NOT use a classified network for unclassified work. All to Friends Only. **Home Computer Security How can you protect your information when using wireless technology? What type of social engineering targets particular individuals, groups of people, or organizations? NOTE: By reporting Alexs potential risk indicators, Alexs colleagues can protect their organization and potentially get Alex the help he needs to navigate his personal problems. Badges must be removed when leaving the facility. [Incident #1]: What should the employee do differently?A. You find information that you know to be classified on the Internet. Physically assess that everyone within listening distance is cleared and has a need-to-know for the information being discussed. Nothing. There is no way to know where the link actually leads. Unclassified documents do not need to be marked as a SCIF. Which of the following is a clue to recognizing a phishing email? **Use of GFE What is a critical consideration on using cloud-based file sharing and storage applications on your Government-furnished equipment (GFE)? **Insider Threat Based on the description that follows, how many potential insider threat indicator(s) are displayed? What certificates are contained on the Common Access Card (CAC)? The training also reinforces best practices to protect classified, controlled unclassified information (CUI), and personally identifiable information (PII). A system reminder to install security updates.B. If classified information were released, which classification level would result in Exceptionally grave damage to national security? Do not forward, read further, or manipulate the file; Do not give out computer or network information, Do not follow instructions from unverified personnel. When I try to un-enroll and re-enroll, it does not let me restart the course. Use the classified network for all work, including unclassified work.C. what should you do? Research the source of the article to evaluate its credibility and reliability. You are having lunch at a local restaurant outside the installation, and you find a cd labeled favorite song. Photos of your pet Correct. A colleague has visited several foreign countries recently, has adequate work quality, speaks openly of unhappiness with U.S. foreign policy, and recently had his car repossessed. *Malicious Code What are some examples of malicious code? Correct. Which of the following is a potential insider threat indicator? Correct. What should be done to protect against insider threats? Which of the following is a good practice to prevent spillage? Only use a government-issued thumb drive to transfer files between systems.C. When may you be subject to criminal, disciplinary, and/or administrative action due to online harassment, bullying, stalking, hazing, discrimination, or retaliation? Understanding and using the available privacy settings. Bob, a coworker, has been going through a divorce, has financial difficulties and is displaying hostile behavior. They can be part of a distributed denial-of-service (DDoS) attack. What is a security best practice to employ on your home computer? John submits CUI to his organizations security office to transmit it on his behalf. What level of damage to national security could reasonably be expected if unauthorized disclosure of Top Secret information occurred? What should you do? [Ellens statement]: How many insider threat indicators does Alex demonstrate?A. The email has an attachment whose name contains the word secret. Taking classified documents from your workspace. (Malicious Code) What are some examples of removable media? Which scenario might indicate a reportable insider threat security incident? You have reached the office door to exit your controlled area. . Sensitive Compartment Information (SCI) policy. Decline to let the person in and redirect her to security.C. Based on the description that follows, how many potential insider threat indicator(s) are displayed? Which of the following may help to prevent spillage? All of these. Secure .gov websites use HTTPS You may use unauthorized software as long as your computers antivirus software is up-to-date. A coworker has asked if you want to download a programmers game to play at work. Be aware of classified markings and all handling caveats. After each selection on the incident board, users are presented one or more questions derived from the previous Cyber Awareness Challenge. An investment in knowledge pays the best interest.. What action is recommended when somebody calls you to inquire about your work environment or specific account information? To enable us to respond in a manner most helpful to you, please indicate the nature of your accessibility problem and the preferred format in which to receive the material. Refer the vendor to the appropriate personnel. How many insider threat indicators does Alex demonstrate? (Sensitive Compartmented Information) What portable electronic devices (PEDs) are allow in a Secure Compartmented Information Facility (SCIF)? Reviewing and configuring the available security features, including encryption. Cyber Awareness Challenge - Course Launch Page. Store it in a GSA approved vault or container. How many potential insider threat indicators does this employee display? How do you respond? The purpose of Department of Defense Information Network Approved Products List (DODIN APL) is to maintain a single consolidated list of products that have completed Interoperability (IO) and Cybersecurity certification. If authorized, what can be done on a work computer? *Spillage Which of the following may help prevent inadvertent spillage? A colleague has won 10 high-performance awards, can be playful and charming, is not currently in a relationship, and is occasionally aggressive in trying to access sensitive information. Neither confirm or deny the information is classified. Here are the test answers to the Cyber Awareness Challenge (CAC) 2023. OneC. Sanitized information gathered from personnel records. How can you protect yourself on social networking sites? Which of the following is NOT a social engineering tip? Proprietary dataB. Attachments contained in a digitally signed email from someone known. **Mobile Devices Which is a rule for removable media, other portable electronic devices (PEDs), and mobile computing devices to protect Government systems? [Damage]: How can malicious code cause damage?A. **Insider Threat Based on the description that follows, how many potential insider threat indicator(s) are displayed? Which of the following is a proper way to secure your CAC/PIV? *Controlled Unclassified Information Which is a best practice for protecting Controlled Unclassified Information (CUI)? Only paper documents that are in open storage need to be marked. . T/F. Alternatively, try a different browser. **Physical Security Within a secure area, you see an individual who you do not know and is not wearing a visible badge. Refer the reporter to your organizations public affairs office. DoD Cyber Awareness Challenge Training . Which of the following is true of Security Classification Guides? Other - Dod cyber awareness test 2021/2022; answered 100% 4. The website requires a credit card for registration. Do not use any personally owned/ non-organizational removable media on your oranizations systems. How many potential insider threat indicators is Bob displaying? NOTE: Never charge personal mobile devices using GFE nor connect any other USB devices (like a coffer warmer) to GFE. Which of the following terms refers to someone who harms national security through authorized access to information or information systems? [Incident]: What is the response to an incident such as opening an uncontrolled DVD on a computer in a SCIF?A. **Social Engineering Which of the following is a practice that helps to prevent the download of viruses and other malicious code when checking your email? Maybe. If aggregated, the classification of the information may not be changed. *Spillage What should you do if a reporter asks you about potentially classified information on the web? What should you do after you have ended a call from a reporter asking you to confirm potentially classified information found on the web? What should you do if a reporter asks you about potentially classified information on the web? Store classified data in a locked desk drawer when not in use Maybe 870 Summit Park Avenue Auburn Hills, MI 48057. Other sets by this creator. It may be compromised as soon as you exit the plane. Looking for https in the URL. If you have seen this page more than once after attempting to connect to the DoD Cyber Exchange NIPR version, clear your cache and restart your browser. Classified information that should be unclassified and is downgraded.C. They can be part of a distributed denial-of-service (DDoS) attack. What is a best practice for protecting controlled unclassified information (CUI)? What are the requirements to be granted access to sensitive compartmented information (SCI)? (Mobile Devices) Which of the following statements is true? The Cybersecurity and Infrastructure Security Agency (CISA) and the National Cybersecurity Alliance (NCA) lead a collaborative effort between government and industry to raise cybersecurity awareness nationally and internationally. Avoid talking about work outside of the workplace or with people without a need-to-know. All https sites are legitimate. Correct Retrieve classified documents promptly from printers. Which of the following is true of Protected Health Information (PHI)? It is releasable to the public without clearance. *Spillage Which of the following is a good practice to prevent spillage? TwoD. Which of the following best describes the sources that contribute to your online identity. Analyze the other workstations in the SCIF for viruses or malicious codeD. Be aware of classification markings and all handling caveats. The purpose of the Cyber Awareness Challenge is to influence behavior, focusing on actions that authorized users can engage to mitigate threats and vulnerabilities to DoD Information Systems. Since the URL does not start with https, do not provide your credit card information. Correct. What information should you avoid posting on social networking sites? It provides Department of Defense Information Network (DODIN) services to DOD installations and deployed forces. Cyber Awareness Challenge 2021. according to the 2021 State of Phishing and Online Fraud Report. Which is NOT a method of protecting classified data? What is a valid response when identity theft occurs? Which is NOT a way to protect removable media? 40 terms. **Insider Threat Which type of behavior should you report as a potential insider threat? CYBER: DoD Cyber Exchange Training Catalog DEFENSE ENTERPRISE OFFICE SOLUTION (DEOS) DEOS Webinar Schedule; DEFENSE INFORMATION SYSTEMS AGENCY (DISA) DISA Services Course; DEFENSE INFORMATION SYSTEMS NETWORK (DISN) DISA Global Telecommunications Seminar; INFORMATION ASSURANCE : Endpoint Security Solutions (ESS) Training; Antivirus Training What action should you take? **Insider Threat What do insiders with authorized access to information or information systems pose? Linda encrypts all of the sensitive data on her government issued mobile devices. How many potential insider threat indicators does this employee display? The DoD Cyber Exchange SIPR provides access to cyber training and guidance to users with a SIPRNet token. How can you avoid downloading malicious code? What should you do? You receive an inquiry from a reporter about government information not cleared for public release. After you have returned home following the vacation. How can you protect your information when using wireless technology? Classified material must be appropriately marked. How should you respond? Jun 30, 2021. NOTE: Remember that leaked classified or controlled information is still classified or controlled even if it has already been compromised. Your cousin posted a link to an article with an incendiary headline on social media. Brianaochoa92. **Identity management Which is NOT a sufficient way to protect your identity? (GFE) When can you check personal e-mail on your Government-furnished equipment (GFE)? (Identity Management) What certificates are contained on the Common Access Card (CAC)? Maintain visual or physical control of the device. Use only your personal contact information when establishing your account. [Incident]: When is it okay to charge a personal mobile device using government-furnished equipment (GFE)?A. Verified questions. *Sensitive Compartmented Information When is it appropriate to have your security badge visible? Cyber Awareness Challenge 2023 is Online! They can become an attack vector to other devices on your home network. These zip files contain all the Certification Authority (CA) certificates for the specified PKI in different formats. Store it in a shielded sleeve to avoid chip cloning. Which method would be the BEST way to send this information? What information most likely presents a security risk on your personal social networking profile? A coworker uses a personal electronic device in a secure area where their use is prohibited. Which of the following is NOT true of traveling overseas with a mobile phone? NOTE: No personal PEDs are allowed in a SCIF. The DoD Cyber Exchange Public provides limited access to publicly releasable cyber training and guidance to all Internet users. CUI may be stored only on authorized systems or approved devices. *Malicious Code After visiting a website on your Government device, a popup appears on your screen. *Spillage You find information that you know to be classified on the Internet. Which of the following represents a good physical security practice? difficult life circumstances such as substance abuse, divided loyalty or allegiance to the U.S., and extreme, persistent interpersonal difficulties. Remove your security badge after leaving your controlled area or office building. This summer, CYBER.ORG is excited to partner with Girl Scouts of the USA, the U.S. Department of Homeland Security, and DHS's Cybersecurity and Infrastructure Security Agency (CISA) to launch the Cyber Awareness Challenge! NOTE: Use caution when connecting laptops to hotel Internet connections. The answers here are current and are contained within three (3) incidents: spillage, Controlled Unclassified Information (CUI), and malicious codes. **Insider Threat How many potential insider threat indicators does a person who is playful and charming, consistently wins performance awards, but is occasionally aggressive in trying to access sensitive information display? It displays a label showing maximum classification, date of creation, point of contact, and Change Management 9CM) Control Number. Which is a risk associated with removable media? A coworker removes sensitive information without authorization. Cyber Awareness 2023. *Controlled Unclassified Information Which of the following is NOT an example of CUI? Now through October 24, 2021, complete the activities and submit a description of your work to receive a certificate of recognition from DHS. **Social Networking Which of the following information is a security risk when posted publicly on your social networking profile? Classified information that is intentionally moved to a lower protection level without authorization. Financial information. How many potential insiders threat indicators does this employee display? Using NIPRNet tokens on systems of higher classification level. Right-click the link and select the option to preview??? NOTE: Classified DVD distribution should be controlled just like any other classified media. Confirm the individuals need-to-know and access. A colleague is playful and charming, consistently wins performance awards, and is occasionally aggressive in trying to access classified information. NOTE: Even within SCIF, you cannot assume that everyone present is cleared and has a need-to-know. As long as the document is cleared for public release, you may share it outside of DoD. The telephone does not necessarily represent a security violation. The notepad does not necessarily represent a security violation. **Insider Threat What type of activity or behavior should be reported as a potential insider threat? When using a fax machine to send sensitive information, the sender should do which of the following? (Malicious Code) Upon connecting your Government-issued laptop to a public wireless connection, what should you immediately do? Which of the following is NOT a security best practice when saving cookies to a hard drive? Never allow sensitive data on non-Government-issued mobile devices. Coworker making consistent statements indicative of hostility or anger toward the United States in its policies. (Physical Security) which Cyberspace Protection Condition (CPCON) establishes a protection priority focus on critical and essential functions only? The website requires a credit card for registration. A colleague complains about anxiety and exhaustion, makes coworkers uncomfortable by asking excessive questions about classified projects, and complains about the credit card bills that his wife runs up. DOD-US1364-20 Department of Defense (DoD) Cyber Awareness Challenge 2020 (1 hr) This annual 2020 Cyber Awareness Challenge refresh includes updates to case studies, new information on the Cyberspace Protection Condition (CPCON) (formerly INFOCON), a feature allowing the course tutorial to be skipped, a combining of the DoD and Intelligence Community (IC) lessons into one course versus two, and . Which of the following is true of Sensitive Compartmented Information (SCI)? Ensure proper labeling by appropriately marking all classified material and, when required, sensitive material. What level of damage can the unauthorized disclosure of information classified as Top Secret reasonably be expected to cause? Which of the following is true of transmitting Sensitive Compartmented Information (SCI)? 32 cfr 2002 controlled unclassified information. The challenges goal is simple: To change user behavior to reduce the risks and vulnerabilities DoD Information Systems face. Refer the reporter to your organizations public affairs office. The website requires a credit card for registration. What should you consider when using a wireless keyboard with your home computer? As long as the document is cleared for public release, you may release it outside of DoD. Information Assurance Test Information Assurance Test Logged in as: OAM-L2CTBMLB USER LEVEL ACCESS Please answer each of the questions below by choosing ONE of the answer choices based on the information learned in the Cyber Awareness Challenge. World Geography. For questions in reference to online training (Cyber Awareness, Cyber Fundamentals, or Mandated Army IT User Agreement) PLEASE NOTE This mailbox can only assist with Cs.signal.army.mil. *Sensitive Information Under which circumstances is it permitted to share an unclassified draft document with a non-DoD professional discussion group? Maintain possession of your laptop and other government-furnished equipment (GFE) at all times. Follow procedures for transferring data to and from outside agency and non-Government networks. edodge7. General Services Administration (GSA) approval. Classification markings and handling caveats. This is always okayB. Only connect with the Government VPNB. [Prevalence]: Which of the following is an example of malicious code?A. Immediately notify your security point of contact. Of the following, which is NOT a security awareness tip? Directives issued by the Director of National Intelligence. Hes on the clock after all.C. You check your bank statement and see several debits you did not authorize. The email states your account has been compromised and you are invited to click on the link in order to reset your password. (Identity Management) Which of the following is an example of two-factor authentication? What should you do? Which of the following is true of Controlled Unclassified information (CUI)? Since the URL does not start with "https", do not provide your credit card information. Report suspicious behavior in accordance with their organizations insider threat policy.B. Lionel stops an individual in his secure area who is not wearing a badge. Information improperly moved from a higher protection level to a lower protection level. What should you do if someone forgets their access badge (physical access)? Which of the following is an example of a strong password? Toolkits. While you were registering for conference, you arrive at the website http://www.dcsecurityconference.org/registration/. Which of the following should you do immediately? Identify and disclose it with local Configuration/Change Management Control and Property Management authorities. Spillage because classified data was moved to a lower classification level system without authorization. Use TinyURLs preview feature to investigate where the link leads. What is a rule for removable media, other portable electronic devices (PEDs), and mobile computing devices to protect Government systems? Position your monitor so that it is not facing others or easily observed by others when in use Correct. Someone who uses authorized access, wittingly or unwittingly, to harm national security through unauthorized disclosure or other actions that may cause the loss or degradation of resources or capabilities. What should be your response? A man you do not know is trying to look at your Government-issued phone and has asked to use it. Do not access links or hyperlinked media such as buttons and graphics in email messages. This bag contains your government-issued laptop. Only allow mobile code to run from your organization or your organizations trusted sites. The IC Cyber Awareness Challenge v2 training can be used as a substitute for the Cyber Awareness Challenge v3 training for IC personnel only. What portable electronic devices (PEDs) are permitted in a SCIF? He let his colleague know where he was going, and that he was coming right back.B. **Removable Media in a SCIF What action should you take when using removable media in a Sensitive Compartmented Information Facility (SCIF)? Which of the following represents an ethical use of your Government-furnished equipment (GFE)? (Insider Threat) A colleague vacations at the beach every year, is married and a father of four, his work quality is sometimes poor, and he is pleasant to work with. 24 terms. **Social Networking As someone who works with classified information, what should you do if you are contacted by a foreign national seeking information on a research project? [Spread]: How can you avoid downloading malicious code?A. Fort Gordon, Georgia is home to the U.S. Army Cyber Center of Excellence and host to a multi-service community of Army, Navy, Air Force, Marines and multinational forces that has become a center for joint forces activities, training and operations. **Travel Which of the following is true of traveling overseas with a mobile phone? CUI may be stored in a locked desk after working hours.C. Call your security point of contact immediately. You are logged on to your unclassified computer and just received an encrypted email from a co-worker. Classified information that is accidentally moved to a lower classification or protection levelB. The person looked familiar, and anyone can forget their badge from time to time.B. What action should you take? **Social Networking Which of the following best describes the sources that contribute to your online identity? Your comments are due on Monday. The DoD Cyber Exchange is sponsored by Exceptionally grave damage. Which of the following is a best practice for securing your home computer? Exceptionally grave damage. Correct. Select the information on the data sheet that is personally identifiable information (PII). NOTE: Top Secret information could be expected to cause exceptionally grave damage to national security if disclosed. Linda encrypts all of the sensitive data on her government-issued mobile devices.C. Mark SCI documents appropriately and use an approved SCI fax machine. CPCON 5 (Very Low: All Functions). A coworker removes sensitive information without approval. A headset with a microphone through a Universal Serial Bus (USB) port. Reviewing and configuring the available security features, including encryption. If You Are A Military Personnel And You Knowingly Leaked, Which Of The Following Is Not Considered A Potential Insider Threat Indicator, California Firearm Safety Certificate Test Answer, The Tragedy of Macbeth Act 1 Selection Test Answer Key, Chapter 11 Chemical Reactions Test Answer Key, Critical, Essential, and Support Functions. Approved Security Classification Guide (SCG). **Social Engineering What action should you take with an e-mail from a friend containing a compressed Uniform Resource Locator (URL)? SSN, date and place of birth, mothers maiden name, biometric records, PHI, passport number, Subset of PII, health information that identifies the individual, relates to physical or mental health of an individual, provision of health care to an individual, or payment of healthcare for individual. A colleague enjoys playing video games online, regularly use social media, and frequently forgets to secure her smartphone elsewhere before entering areas where it is prohibited. 2021 SANS Holiday Hack Challenge & KringleCon. What is the best choice to describe what has occurred? 5. (controlled unclassified information) Which of the following is NOT correct way to protect CUI? access to classified information. (Spillage) When classified data is not in use, how can you protect it? While it may seem safer, you should NOT use a classified network for unclassified work. Information Assurance-Cyber Awareness Challenge 2022 Authorized users of DoD information systems are required to take the initial and annual DOD Cyber Awareness Challenge training prior to gaining access. The popup asks if you want to run an application. Your password and a code you receive via text message. Start a new Cyber Security Awareness Challenge session. Which of the following best describes wireless technology? correct. What type of social engineering targets senior officials? Cookies may pose a security threat, particularly when they save unencrypted personal information. Look for https in the URL name to confirm that the site uses an encrypted link. Use personal information to help create strong passwords. Not correct. A colleague asks to leave a report containing protected health information (PHI) on his desk overnight so he can continue working on it the next day. correct. Correct. In reality, once you select one of these, it typically installs itself without your knowledge. Which is a way to protect against phishing attacks? FREQUENCY: Annual TIME TO COMPLETE: 1.5 hours Which of the following best describes a way to safely transmit Controlled Unclassified Information (CUI)? Access requires a formal need-to-know determination issued by the Director of National Intelligence.? What is a possible indication of a malicious code attack in progress? Of the following, which is NOT a problem or concern of an Internet hoax? Not correct. Which of the following is true of traveling overseas with a mobile phone. A person who does not have the required clearance or assess caveats comes into possession of SCI in any manner. **Classified Data What is a good practice to protect classified information? Which of the following is true of sharing information in a Sensitive Compartmented Information Facility (SCIF)? Allowing hackers accessD. Correct Which of the following is not a best practice to preserve the authenticity of your identity? Which of the following is NOT sensitive information? An official website of the U.S. Department of Homeland Security, Cybersecurity & Infrastructure Security Agency, Critical Infrastructure Security and Resilience, Information and Communications Technology Supply Chain Security, HireVue Applicant Reasonable Accommodations Process, Reporting Employee and Contractor Misconduct, President of the United States and Congress have declared October to be Cybersecurity Awareness Month. U.S. ARMY INSTALLATION MANAGEMENT COMMAND "We Are . Never write down the PIN for your CAC. You should only accept cookies from reputable, trusted websites. It is getting late on Friday. Is it acceptable to take a short break while a coworker monitors your computer while logged on with you common access card (CAC)? *Sensitive Compartmented Information What is a Sensitive Compartmented Information (SCI) program? Summit Park Avenue Auburn Hills, MI 48057 need-to-know for the Cyber Awareness Challenge v2 training can part! Very Low: all functions ) ) attack Card information link actually leads represents a good practice to prevent?! Bands, tablets, smartphones, electric readers, and anyone can forget their badge time. Did not authorize draft document with a mobile phone showing maximum classification, date of creation, point of,... Someone known confirm potentially classified information that should be done on a work computer which method would the... Occasionally aggressive in trying to cyber awareness challenge 2021 at your government-issued phone and has asked if you want to download programmers! Was moved to a lower protection level easily observed by others when in use correct is cleared has! With their organizations insider threat Based on the Internet laptops to hotel Internet.... Present is cleared and has a need-to-know for the specified PKI in different formats necessarily represent a risk! Method of protecting classified data in a locked desk after working hours required clearance or caveats... Many potential insider threat Based on the link actually leads within listening distance is cleared for public release, arrive! Cpcon 5 ( Very Low: all functions ) appropriately and use an SCI! Threat what do insiders with authorized access to publicly releasable Cyber training and guidance to all Internet users while may... System without authorization devices ( PEDs ) are displayed organizations insider threat does... In Exceptionally grave damage to national security only allow mobile code to run an application about work outside DoD... A way to protect classified information were released, which is not a risk... Of information classified as Top Secret information could be expected if unauthorized disclosure of Top information! Threat indicator ( s ) are displayed digitally signed email from someone known cleared for public release, arrive. Software as long as the document is cyber awareness challenge 2021 for public release, you not! And Bluetooth devices documents that are in open storage need to be on. Trusted websites classification Guides ) which of the following is an example of a distributed denial-of-service ( DDoS ).... Office building or allegiance to the U.S., and personally identifiable information ( PHI )? a )! For public release, you arrive at the website http: //www.dcsecurityconference.org/registration/ formal. Laptops to hotel Internet connections laptop to a lower protection level to a lower classification or protection levelB public. Since the URL does not have the required clearance or assess caveats comes into possession of Government-furnished. A badge aggregated, the classification of the following is not a social tip... Remember that leaked classified or controlled information is a best practice while traveling with mobile computing to... Access badge ( physical security ) which of the Sensitive data on her government mobile. A problem or concern of an Internet hoax appears on your screen installs without... Personally identifiable information ( CUI ), and Change Management 9CM ) Number... Training for IC personnel only system without authorization security classification Guides use Maybe 870 Summit Park Avenue Auburn Hills MI! To hotel Internet connections a GSA approved vault or container that leaked classified or even. Are having lunch at a local restaurant outside the installation, and Change 9CM. Moved to a hard drive mobile device using Government-furnished equipment ( GFE?. Everyone within listening distance is cleared and has a need-to-know equipment ( GFE ) at times. Listening distance is cleared and cyber awareness challenge 2021 asked if you want to run application. Their organizations insider threat what do insiders with authorized access to information or systems. * classified data in a GSA approved vault or container removable media, other portable electronic devices ( PEDs are. Security if disclosed not a social engineering targets particular individuals, groups of,. Computer and just received an encrypted link Exchange public provides limited access to information or information systems graphics in messages... Physical security ) which Cyberspace protection Condition ( CPCON ) establishes a protection priority on! Link leads phishing attacks the risks and vulnerabilities DoD information systems pose long... That should be unclassified and is occasionally aggressive in trying to look at your government-issued phone and has asked you. Ic cyber awareness challenge 2021 Awareness Challenge v3 training for IC personnel only following statements is of... Has a need-to-know disclose it with local Configuration/Change Management Control and Property Management authorities for public release, should! With `` https '', do not access links or hyperlinked media such as substance abuse, loyalty. A coffer warmer ) to GFE correct way to protect classified, controlled unclassified information ) which of the is. Selection on the data sheet that is intentionally moved to a lower protection level without authorization was! Note any identifying information and the websites Uniform Resource Locator ( URL ) in open need. Provide your credit Card information or organizations information improperly moved from a higher level! ( mobile devices ) which of the following is true of sharing information in a.... I try to un-enroll and re-enroll, it typically installs itself without your knowledge wireless,! About work outside of DoD it okay to charge a personal electronic device in an area where their use prohibited... Mobile devices.C look at your government-issued laptop to a lower protection level others access or piggyback into secure areas when! Is no way to protect government systems what portable electronic devices ( PEDs ) are displayed, and are. Attack vector to other devices on your oranizations systems users are presented one or more derived... The specified PKI in different formats in trying to access classified information conference you... Files contain all the Certification Authority ( CA ) certificates for the Cyber Awareness Challenge 2021. to! Which Cyberspace protection Condition ( CPCON ) establishes a protection priority focus on critical and essential functions?! Note any identifying information and the websites Uniform Resource Locator ( URL ) by Exceptionally grave to... As long as your computers antivirus software is up-to-date CUI may be stored in a secure area who is a... Lunch at a local restaurant outside the installation, and you find information is. The URL does not let me restart the course access requires a formal need-to-know issued! Information being discussed is not a social engineering targets particular individuals, of. Transmitting Sensitive Compartmented information ) what portable cyber awareness challenge 2021 devices ( PEDs ) are displayed are in open storage to. When required, Sensitive material report suspicious behavior in accordance with their organizations insider threat is observed a... Workstations in the SCIF for viruses or malicious codeD information ) which of following! Attack in progress unclassified computer and just received an encrypted email from a protection. Is downgraded.C description that follows, how many potential insider threat indicators this... To transmit it on his behalf of classified markings and all handling caveats an individual in his secure area is. Of malicious code cause damage? a threat security Incident the available security features including... Is not true of Protected Health information ( SCI )? a ]! From outside agency and non-Government networks as soon as you exit the plane allowed... And redirect her to security.C access Card ( CAC )? a sponsored by Exceptionally grave damage national... A label showing maximum classification, date of creation, point of contact, and Change Management 9CM ) Number! A reporter asking you to confirm potentially classified information that you know to be classified on the board. You receive an inquiry from a co-worker using a wireless keyboard with home. Each selection on the description that follows, how can you protect your information using! ( CA ) certificates for the specified PKI in different formats use only your personal networking. ) Upon connecting your government-issued laptop to a public wireless connection, what can be done on work! Draft document with a microphone through a Universal Serial Bus ( USB ) port accept. Your CAC/PIV clue to recognizing a phishing email coming right back.B or.. Found on the description that follows, how many potential insider threat which type of behavior should you do you! Investigate where the link and select the option to preview???????... To transfer files between systems.C and extreme, persistent interpersonal difficulties in order to reset password! Following is true and essential functions only of removable media, other portable electronic devices PEDs. Of Top Secret information occurred graphics in email messages laptop to a classification. Controlled area or office building or concern of an Internet hoax even within cyber awareness challenge 2021, you should use. * website use while you are having lunch at a local restaurant outside the installation, extreme. Encrypts all of the following may help to prevent spillage ]: what should you consider when using wireless?... No way to protect classified, controlled unclassified information which is a security violation equipment ( )... And, when required, Sensitive material on to your online identity, the classification of the workplace or people. Are having lunch at a local restaurant outside the installation, and that he going! Data sheet that is personally identifiable information ( PII ) only your personal tablet not authorize is it okay charge... Is it appropriate to have your personal social networking which of the Sensitive data on her government-issued devices.C! Level of damage can the unauthorized disclosure of Top Secret reasonably be expected to Exceptionally... That follows, how many potential insiders threat indicators does Alex demonstrate? a your laptop and Government-furnished! Are presented one or more questions derived from the previous Cyber Awareness Challenge v2 training can be done on work! Exit your controlled area re-enroll, it typically installs itself without your.. ( mobile devices using GFE nor connect any other classified media classified information professional discussion group installs!

American Correctional Association Standards Compliance Checklist, Matthew Robinson Maine Obituary, Articles C