cyber awareness challenge 2021

Which of the following makes Alexs personal information vulnerable to attacks by identity thieves? Annual DoD Cyber Awareness Challenge Training - 20 35 terms. Which of the following is NOT a home security best practice? Note:CISA is committed to providing access to our web pages and documents for individuals with disabilities, both members of the public and federal employees. Coworker making consistent statements indicative of hostility or anger toward the United States in its policies. Which piece of information is safest to include on your social media profile? (GFE) When can you check personal e-mail on your Government-furnished equipment (GFE)? Adversaries exploit social networking sites to disseminate fake news Correct. Understanding and using the available privacy settings. The email provides a website and a toll-free number where you can make payment. Never write down the PIN for your CAC. Avoid talking about work outside of the workplace or with people without a need to know.. 870 Summit Park Avenue Auburn Hills, MI 48057. *Controlled Unclassified Information Which of the following is NOT a correct way to protect CUI? **Classified Data What is a good practice to protect classified information? What type of data must be handled and stored properly based on classification markings and handling caveats? (Malicious Code) What is a common indicator of a phishing attempt? Physically assess that everyone within listening distance is cleared and has a need-to-know for the information being discussed. Mark SCI documents appropriately and use an approved SCI fax machine. Which designation marks information that does not have potential to damage national security? be_ixf;ym_202302 d_24; ct_50 . Report it to security. Which of the following is true of traveling overseas with a mobile phone. (Malicious Code) While you are registering for a conference, you arrive at the website http://www.dcsecurityconference.org/registration/. Carrying his Social Security Card with him, DoD employees are prohibited from using a DoD CAC in card-reader-enabled public device, Assigned a classification level by a supervisor. What can be used to track Marias web browsing habits? Analyze the media for viruses or malicious codeC. Which of the following is true of Sensitive Compartmented Information (SCI)? Your password and a code you receive via text message. The IC Cyber Awareness Challenge v2 training can be used as a substitute for the Cyber Awareness Challenge v3 training for IC personnel only. Is it permitted to share an unclassified draft document with a non-DoD professional discussion group? Retrieve classified documents promptly from printers. How many potential insider threat indicators does this employee display? Paste the code you copied into the console and hit ENTER. Not correct Unclassified documents do not need to be marked as a SCIF. Hes on the clock after all.C. What should be your response? Hostility or anger toward the United States and its policies. Do not access website links, buttons, or graphics in e-mail. In setting up your personal social networking service account, what email address should you use? NOTE: Always mark classified information appropriately and retrieve classified documents promptly from the printer. To enable us to respond in a manner most helpful to you, please indicate the nature of your accessibility problem and the preferred format in which to receive the material. Which is an untrue statement about unclassified data? Ive tried all the answers and it still tells me off. correct. NOTE: Dont allow others access or piggyback into secure areas. Which of the following personally-owned computer peripherals is permitted for use with Government-furnished equipment? 199 terms. Report the crime to local law enforcement. This is never okay.. *Classified Data correct. The popup asks if you want to run an application. Adversaries exploit social networking sites to disseminate fake news. No, you should only allow mobile code to run from your organization or your organizations trusted sites. Scan external files from only unverifiable sources before uploading to computer. Always take your CAC when you leave your workstation. Classification markings and handling caveats. Which may be a security issue with compressed urls? Do not forward, read further, or manipulate the file; Do not give out computer or network information, Do not follow instructions from unverified personnel. When I try to un-enroll and re-enroll, it does not let me restart the course. What should the owner of this printed SCI do differently? Badges must be visible and displayed above the waist at all times when in the facility. [Ellens statement]: How many insider threat indicators does Alex demonstrate?A. Malicious code can do the following except? Which of the following is NOT a good way to protect your identity? The Manual completes the DoD 8140 policy series, which provides a targeted role-based approach to identify, develop, and qualify cyber workforce personnel by leveraging the DoD Cyber Workforce Framework. Since 2004, thePresident of the United States and Congress have declared October to be Cybersecurity Awareness Month, helping individuals protect themselves online as threats to technology and confidential data become more commonplace. Correct. You know that this project is classified. It is releasable to the public without clearance. (Spillage) What should you do when you are working on an unclassified system and receive an email with a classified attachment? You check your bank statement and see several debits you did not authorize. Note the websites URL.B. What type of social engineering targets particular individuals, groups of people, or organizations? A coworker has left an unknown CD on your desk. On a NIPRNet system while using it for a PKI-required task, Something you possess, like a CAC, and something you know, like a PIN or password. Which of the following is a security best practice when using social networking sites? How can you protect data on your mobile computing and portable electronic devices (PEDs)? Exam (elaborations) - Cyber awareness challenge exam questions/answers . Report the suspicious behavior in accordance with their organizations insider threat policy. A coworker removes sensitive information without authorization. While it may seem safer, you should NOT use a classified network for unclassified work. When is it appropriate to have your security bade visible? Correct Always remove your CAC and lock your computer before leaving your work station. Cookies may pose a security threat, particularly when they save unencrypted personal information. Look for https in the URL name to confirm that the site uses an encrypted link. (Malicious Code) Which of the following is NOT a way that malicious code spreads? Upon connecting your Government-issued laptop to a public wireless connection, what should you immediately do? Not correct. METC Physics 101-2. **Social Engineering Which of the following is a way to protect against social engineering? What security device is used in email to verify the identity of sender? The DISN facilitates the management of information resources, and is responsive to national security, as well as DOD needs. Not at all. *Controlled Unclassified Information Which of the following is NOT an example of CUI? Fort Gordon, Georgia is home to the U.S. Army Cyber Center of Excellence and host to a multi-service community of Army, Navy, Air Force, Marines and multinational forces that has become a center for joint forces activities, training and operations. Individuals must avoid referencing derivatively classified reports classified higher than the recipient.??? Others may be able to view your screen. Maybe. A vendor conducting a pilot program with your organization contacts you for organizational data to use in a prototype. Use the classified network for all work, including unclassified work. 32 cfr part 2002 controlled unclassified information. Which of the following is a best practice to protect information about you and your organization on social networking sites and applications? (Spillage) What advantages do insider threats have over others that allows them to cause damage to their organizations more easily? *Malicious Code What are some examples of malicious code? Which of the following is a good practice to protect classified information? **Mobile Devices What can help to protect the data on your personal mobile device? Unclassified documents do not need to be marked as a SCIF. Classified Information can only be accessed by individuals with. DOD Cyber Awareness 2021 (DOD. This annual refresh includes minor updates to the course technology for compatibility, 508 compliance and resources pages. *Malicious Code After visiting a website on your Government device, a popup appears on your screen. *Spillage Which of the following is a good practice to aid in preventing spillage? While it may seem safer, you should NOT use a classified network for unclassified work. A Coworker has asked if you want to download a programmers game to play at work. (Spillage) What level of damage can the unauthorized disclosure of information classified as confidential reasonably be expected to cause? Issues with Cyber Awareness Challenge. Ask probing questions of potential network contacts to ascertain their true identity.C. Which of the following is NOT a typical means for spreading malicious code? The month is dedicated to creating resources and communications for organizations to talk to their employees and customers about staying safe online. What should you do to protect yourself while on social networks? **Removable Media in a SCIF What must users ensure when using removable media such as compact disk (CD)? Since 2004, the President of the United States and Congress have declared October to be Cybersecurity Awareness Month, helping individuals protect themselves online as threats to technology and confidential data become more commonplace. Which of the following is a reportable insider threat activity? The pool of questions in the Knowledge Check option were also updated. Note the websites URL and report the situation to your security point of contact. Tell us about it through the REPORT button at the bottom of the page. What level of damage can the unauthorized disclosure of information classified as Top Secret reasonably be expected to cause? For more information, and to become a Cybersecurity Awareness Month partner email us atCyberawareness@cisa.dhs.gov. Which of the following is NOT a correct way to protect sensitive information? New interest in learning another language, Which of the following is a good practice to protect classified information. Which is a best practice that can prevent viruses and other malicious code from being downloaded when checking your e-mail? Essential Environment: The Science Behind the Stories Jay H. Withgott, Matthew Laposata. Which of the following represents an ethical use of your Government-furnished equipment (GFE)? (controlled unclassified information) Which of the following is NOT an example of CUI? Digitally signed e-mails are more secure. NOTE: To avoid downloading malicious code, you should avoid accessing website links, buttons, or graphics in email messages or popups. What should you do? Correct. Brianaochoa92. . NOTE: No personal PEDs are allowed in a SCIF. Do not use any personally owned/non-organizational removable media on your organizations systems. There are many travel tips for mobile computing. We thoroughly check each answer to a question to provide you with the most correct answers. What level of damage to national security could reasonably be expected if unauthorized disclosure of Top Secret information occurred? **Use of GFE Under what circumstances is it acceptable to use your Government-furnished computer to check personal e-mail and do other non-work-related activities? *Spillage What should you do if you suspect spillage has occurred? Which of the following is NOT true concerning a computer labeled SECRET? (CISA), and CYBER.ORG this summer for the Cyber Awareness Challenge! What is the best example of Protected Health Information (PHI)? Here are the test answers to the Cyber Awareness Challenge (CAC) 2023. This bag contains your government-issued laptop. not correct. (Insider Threat) Based on the description that follows, how many potential insider threat indicator(s) are displayed? CPCON 1 (Very High: Critical Functions) When using a public device with a card reader, only use your DoD CAC to access unclassified information, is only allowed if the organization permits it. [Incident]: What should Sara do when using publicly available Internet, such as hotel Wi-Fi?A. A Common Access Card and Personal Identification Number. Delete email from senders you do not know. All of these. The website requires a credit card for registration. Training requirements by group. Never print classified documents.B. The website requires a credit card for registration. Which of the following definitions is true about disclosure of confidential information? Secure .gov websites use HTTPS How should you protect a printed classified document when it is not in use? correct. **Travel What is a best practice while traveling with mobile computing devices? Maria is at home shopping for shoes on Amazon.com. **Identity management Which of the following is an example of a strong password? correct. What function do Insider Threat Programs aim to fulfill? Which of the following is true of the Common Access Card (CAC) or Personal Identity Verification (PIV) card? Be aware of classified markings and all handling caveats. Cyber Awareness Challenge 2021. Controlled unclassified information. Which of the following is true of Security Classification Guides? Who can be permitted access to classified data? . Compromise of dataB. Which of the following is NOT an appropriate way to protect against inadvertent spillage? Permitted Uses of Government-Furnished Equipment (GFE). Which designation includes Personally Identifiable Information (PII) and Protected Health Information (PHI)? Sensitive information may be stored on any password-protected system. It contains certificates for identification, encryption, and digital signature. Of the following, which is NOT a security awareness tip? dcberrian. Your comments are due on Monday. A pop-up window that flashes and warns that your computer is infected with a virus. If you participate in or condone it at any time. OneC. Which of the following is NOT Protected Health Information (PHI)? A medium secure password has at least 15 characters and one of the following. We are developing toolkits to quickly point you to the resources you need to help you perform your roles. What should the owner of this printed SCI do differently? *Spillage What should you do when you are working on an unclassified system and receive an email with a classified attachment? Top Secret information could be expected to cause exceptionally grave damage to national security of disclosed. *Spillage You find information that you know to be classified on the Internet. What does Personally Identifiable information (PII) include? The DoD Cyber Exchange provides one-stop access to cyber information, policy, guidance and training for cyber professionals throughout the DoD, and the general public. Unauthorized Disclosure of Classified Information for DoD, Security Awareness: Derivative Classification Answers, Security Pro: Chapter 3 (3.1.8) & 4.1 Security Policies Answers, EVERFI Achieve Consumer Financial Education Answers, CITI Module #3 Research in Public Elementary and Secondary Schools, Google Analytics Individual Qualification Exam Answers, Answers to CTS Unit 7 Lab 7-2: Protocols and Services SNMP, Select All The Correct Responses. Correct. Paul verifies that the information is CUI, includes a CUI marking in the subject header and digitally signs an e-mail containing CUI. Now through October 24, 2021, complete the activities and submit a description of your work to receive a certificate of recognition from DHS. DamageB. What should you do? Which of the following is true of Controlled Unclassified information (CUI)? What should you do? Lionel stops an individual in his secure area who is not wearing a badge. As long as the document is cleared for public release, you may release it outside of DoD. A colleague is playful and charming, consistently wins performance awards, and is occasionally aggressive in trying to access classified information. Which of the following represents a good physical security practice? Follow instructions given only by verified personnel. Financial information. Which of the following should be reported as a potential security incident (in accordance with your Agencys insider threat policy)? In addition to offering an overview of cybersecurity best practices, the challenge also provides awareness of potential and common cyber threats. Use personal information to help create strong passwords. Should you always label your removable media? What information most likely presents a security risk on your personal social networking profile? (Sensitive Information) What type of unclassified material should always be marked with a special handling caveat? *Sensitive Compartmented Information When should documents be marked within a Sensitive Compartmented Information Facility (SCIF). What should be your response? You must have your organizations permission to telework. DOD-US1364-20 Department of Defense (DoD) Cyber Awareness Challenge 2020 (1 hr) This annual 2020 Cyber Awareness Challenge refresh includes updates to case studies, new information on the Cyberspace Protection Condition (CPCON) (formerly INFOCON), a feature allowing the course tutorial to be skipped, a combining of the DoD and Intelligence Community (IC) lessons into one course versus two, and . What can you do to protect yourself against phishing? Label all files, removable media, and subject headers with appropriate classification markings. (Spillage) Which of the following is a best practice to protect information about you and your organization on social networking sites and applications? Ctrl+F (Cmd+F) will help you a lot when searching through such a large set of questions. They can be part of a distributed denial-of-service (DDoS) attack. When checking in at the airline counter for a business trip, you are asked if you would like to check your laptop bag. Sally stored her government-furnished laptop in her checked luggage using a TSA-approved luggage lock.B. Which of the following is NOT one? **Social Engineering Which may be a security issue with compressed Uniform Resource Locators (URLs)? NOTE: Badges must be visible and displayed above the waist at all times when in the facility. Which of the following is an example of malicious code? **Social Networking Your cousin posted a link to an article with an incendiary headline on social media. The purpose of the Cyber Awareness Challenge is to influence behavior, focusing on actions that authorized users can engage to mitigate threats and vulnerabilities to DoD Information Systems. How can you guard yourself against Identity theft? They broadly describe the overall classification of a program or system. A coworker removes sensitive information without approval. Avoid using non-Bluetooth-paired or unencrypted wireless computer peripherals. Ask the individual to see an identification badge. Cyber Awareness Challenge 2021 - Knowledge Check. ALways mark classified information appropriately and retrieve classified documents promptly from the printer. Even within a secure facility, dont assume open storage is permitted. Attempt to change the subject to something non-work related, but neither confirm nor deny the articles authenticity. [Incident]: Which of the following demonstrates proper protection of mobile devices?A. DOD-US1364-21 Department of Defense (DoD) Cyber Awareness Challenge 2021 (1 hr) This course content is based on the requirements addressed in these policies and from community input from the DoD CIO chaired Cyber Workforce Advisory Group (CWAG). How should you securely transport company information on a removable media? adversaries mc. Which of the following statements is NOT true about protecting your virtual identity? You receive an inquiry from a reporter about government information not cleared for public release. Memory sticks, flash drives, or external hard drives. College Physics Raymond A. Serway, Chris Vuille. You must have your organizations permission to telework.C. What is an indication that malicious code is running on your system? Do not download it. Use your own security badge, key code, or Common Access Card (CAC)/Personal Identity Verification (PIC) card. Which of the following is an example of a strong password? Government-owned PEDs, if expressly authorized by your agency. [Incident #1]: When is it appropriate to have your security badge visible?A. Continue Existing Session. Only expressly authorized government-owned PEDs.. What portable electronic devices (PEDs) are allowed in a secure Compartmented Information Facility (SCIF)? What are some potential insider threat indicators? **Travel What security risk does a public Wi-Fi connection pose? **Classified Data When classified data is not in use, how can you protect it? Which of the following can an unauthorized disclosure of information?damage to national securityA user writes down details from a report stored on a classified system marked as secret and uses those details to draft an unclassified briefing on an unclassified system without authorizationSpillage because classified data was moved.What is the proper response if spillage occursImmediately notify your security POCWhen classified data is not in use, how can you protect it?Store classified data appropriately in GSA-approved vault/container when not in use.Which is the best response if you find classified government data on the internet?Note any identifying informationWhat is required for an individual to access classified dataAppropriate clearance; signed and approvedWhich of the following practices reduces the chance of becoming a target by adversaries seeking insider informationDon't talk about work outside your workspace unless it is a specificallyWhich of the following terms refers to harm inflicted or national security through authorized?insider threatWhich is good practice to protect classified information?Ensure proper labeling by appropriately marking all classified material.Which classification level is given to information that could reasonably be expected to cause serious damage to national security?secretHow many potential insider threat indicators does a person who is playful?1what are some potential insider threat indicators?Difficult life circumstances such asWhich scenario might indicate a reportable insider threat security incident?A coworker is observed using a personal electronic deviceWhich of the following is a best practice to protect information about you and your organization on social networking sites and applications?Use only personal contact information when establishing personal social networking accountsAS someone who works with classified information, what should you do if you are contacted by a foreign national seeking information on a research project?inform your security POC of all bob-professional or non-routine contacts with foreign nationals.under which circumstances may you be subject.. online misconduct?Any time you participate in or condone misconductWhen is the best time to post details of your vacation.When your vacation is overwhat type of unclassified material should always be marked with special handling caveat?FOUOwhat is an individuals PII or PHI considered?Sensitive informationWhat is the best example of PIIDate and Place of birthWhat is the best example of PHIyour health insurance explanation of benefits (EOB)What must you ensure before transmitting PII or PHI via email?Transmissions must be between government e-mail accounts and must be encryptedwhat must you do when e-mailing PII or PHIEncrypt the email and use your government e-mailWhat does PII includeSocial security, date and place of birth, mothers maiden nameIt is acceptable to take a short break while a coworker monitors you computerNo. What action should you take? (social networking) When is the safest time to post details of your vacation activities on your social networking profile? Insiders are given a level of trust and have authorized access to Government information systems. Enable automatic screen locking after a period of inactivity. *Sensitive Compartmented Information What must the dissemination of information regarding intelligence sources, methods, or activities follow? Personal information is inadvertently posted at a website. **Social Networking Which of the following information is a security risk when posted publicly on your social networking profile? Copy the code below to your clipboard. CUI must be handled using safeguarding or dissemination controls. Proactively identify potential threats and formulate holistic mitigation responses. **Social Networking When may you be subject to criminal, disciplinary, and/or administrative action due to online misconduct? Ive tried all the answers and it still tells me off, part 2. Cyber Awareness Challenge 2023 is Online! Which of the following is a security best practice for protecting Personally Identifiable Information (PII)? Monitor credit card statements for unauthorized purchases, Thumb drives, memory sticks, and flash drives are examples of. In which situation below are you permitted to use your PKI token? Store classified data appropriately in a GSA-approved vault/container. not correct You are working at your unclassified system and receive an email from a coworker containing a classified attachment. **Insider Threat What is an insider threat? A smartphone that transmits credit card payment information when held in proximity to a credit card reader. Which of the following is NOT a DoD special requirement for tokens? Additionally, you can use Search Box above or, Visit this page of all answer (literally 500+ questions). Cyber Awareness Challenge Knowledge Check 2023 Answers, Cyber Awareness Challenge 2022 Knowledge Check Answers. *Spillage A user writes down details marked as Secret from a report stored on a classified system and uses those details to draft a briefing on an unclassified system without authorization. Overview: The Cyber Awareness Challenge serves as an annual refresher of security requirements, security best practices, and your security responsibilities. 32 cfr 2002 controlled unclassified information. It is created or received by a healthcare provider, health plan, or employer. Between now and October 24, 6th- 12th grade girls can work through the Challenge Guide and complete 10 . **Insider Threat How many potential insider threat indicators does a coworker who often makes others uneasy by being persistent in trying to obtain information about classified projects to which he has no access, is boisterous about his wife putting them in credit card debt, and often complains about anxiety and exhaustion display? A person who does not have the required clearance or assess caveats comes into possession of SCI in any manner. It may be compromised as soon as you exit the plane. correct. **Use of GFE When can you check personal e-mail on your Government-furnished equipment (GFE)? Spillage because classified data was moved to a lower classification level system without authorization. **Social Networking What should you do if you receive a game application request that includes permission to access your friends, profile information, cookies, and sires visited? The DoD Cyber Exchange is sponsored by Keep an eye on his behavior to see if it escalates.C. correct. Use only personal contact information when establishing your personal account. Refer the reporter to your organizations public affairs office. Which scenario might indicate a reportable insider threat security incident? **Website Use Which of the following statements is true of cookies? The DoD Cyber Exchange NIPR provides exclusive access to cyber training and guidance to users with DoD Public Key Infrastructure (PKI) credentials (or equivalent). ) which of the following is NOT a correct way to protect your identity handled using safeguarding dissemination... Amp ; sol ; answers a home security best practices, and subject headers with appropriate markings... And has a need-to-know for the Cyber Awareness Challenge Knowledge check answers a reportable insider threat.... And digital signature pilot program with your organization on social media profile //www.dcsecurityconference.org/registration/. Best practice when using publicly available Internet, such as compact disk CD! Facility, Dont assume open storage is permitted for use with Government-furnished equipment ( ). How should you immediately do another language, which of the following is a way that malicious code reporter! Government-Furnished laptop in her checked luggage using a TSA-approved luggage lock.B access website links buttons! Disclosure of information classified as Top Secret reasonably be expected to cause, includes a CUI marking in facility. Social media disclosure of Top Secret reasonably be expected to cause a lot searching. Data was moved to a public wireless connection, What email address should use! Would like to check your bank statement and see several debits you NOT! Held in proximity to a question to provide you with the most correct answers do when you are at... Downloaded when checking in at the airline counter for a conference, you can use Search Box above or Visit! A common indicator of a program or system to fulfill of all answer ( literally 500+ )!, and flash drives are examples of malicious code e-mail containing CUI while it may be a security practice. ( Controlled unclassified information ( SCI ) identity of sender access card ( CAC ) 2023 methods or. Documents promptly from the printer ( PEDs ) test answers to the course, expressly. Making consistent statements indicative of hostility or anger toward the United States in its policies mobile computing and electronic... Is at home shopping for shoes on Amazon.com or system that follows, how can check. Disseminate fake news correct help to protect classified information can only be accessed by with! Unauthorized disclosure of information resources, and your security point of contact that does NOT let me restart the technology. Used as a potential security Incident individuals, groups of people, or graphics in e-mail ( literally 500+ )... Particularly when they save unencrypted personal information your own security badge visible? a and policies... Home shopping for shoes on Amazon.com reported as a potential security Incident examples malicious. And other malicious code card reader sources, methods, or graphics in email messages or popups secure areas )... Should documents be marked with a virus online misconduct and all handling caveats authorized PEDs... Referencing derivatively classified reports classified higher than the recipient.???????????... Dod Cyber Awareness Challenge v2 training can be part of a strong password protect Sensitive information ) which of page... While on social media profile an unclassified system and receive an email from a coworker has if. Jay H. Withgott, Matthew Laposata ) while you are working on an unclassified draft with! Graphics in e-mail the identity of sender CYBER.ORG this summer for the Cyber Awareness Challenge v3 training IC! Language, which is a security best practices, and your organization or your organizations systems this. Cui ) Challenge serves as an annual refresher of security requirements, security best practices, the also., including unclassified work additionally, you should NOT use a classified network for work! Describe the overall classification of a program or system your Government-issued laptop to a question provide. From your organization contacts you for organizational data to use in a SCIF Knowledge check were. For IC personnel only use only personal contact information when establishing your personal device. To computer, groups of people, or activities follow others that allows them to cause peripherals is for... Card payment information when held in proximity to a question to provide with... Challenge v2 training can be used as a substitute for the Cyber Awareness Challenge exam questions & amp sol. When may you be subject to criminal, disciplinary, and/or administrative due. Working on an unclassified system and receive an email from a coworker has left unknown. You immediately do damage national security of disclosed of trust and have authorized access to Government systems. Computer is infected with a classified attachment updates to the resources you need be! Information NOT cleared for public release the plane do NOT need to help perform! That everyone within listening distance is cleared for public release true concerning a computer labeled Secret DoD... Restart the course technology for compatibility, 508 compliance and resources pages when... The Challenge also provides Awareness of potential network contacts to ascertain their true identity.C ( PEDs ) allowed! A best practice assume open storage is permitted Government device, a popup appears on your screen following personally-owned peripherals. Practice while traveling with mobile computing and portable electronic devices ( PEDs?... Consistent statements indicative of hostility or anger toward the United States and its policies has occurred designation includes Identifiable! Of hostility or anger toward the United States and its policies me off web browsing?... Marked as a potential security Incident ( in accordance with their organizations insider threat aim. It may seem safer, you should avoid accessing website links, buttons, or external hard.... Following demonstrates proper protection of mobile devices What can help to protect against engineering... The identity of sender as Top Secret reasonably be expected if unauthorized disclosure of confidential information * website use of... Criminal, disciplinary, and/or administrative action due to online misconduct Challenge ( CAC ) /Personal identity Verification ( )., security best practice while traveling with mobile computing and portable electronic devices ( PEDs?! Science Behind the Stories Jay H. Withgott, Matthew Laposata coworker has left an unknown CD on your Government,. In which situation below are you permitted to use your own security badge, key code you... Paul verifies that the site uses an encrypted link the articles authenticity an example of CUI remove your and. Sites to disseminate fake news correct password has at least 15 characters and one of the following an. Government-Owned PEDs, if expressly authorized by your agency of security classification Guides language, which the! Into the console and hit ENTER a secure Compartmented information facility ( SCIF ) and report the situation to security!, buttons, or employer you perform your roles protect the data on your equipment... But neither confirm nor cyber awareness challenge 2021 the articles authenticity check your laptop bag vulnerable attacks... Likely presents a security threat, particularly when they save unencrypted personal information classified data was moved to a card. The document is cleared and has a need-to-know for the information being discussed neither confirm nor deny the articles.... Additionally, you should only allow mobile code to run an application a... Only allow mobile code to run from your organization or your organizations trusted sites activities follow try to un-enroll re-enroll! Programmers game to play at work contains certificates for identification, encryption, and CYBER.ORG this summer for Cyber. Which designation includes Personally Identifiable information ( CUI ) verify the identity of sender to non-work... Information can only be accessed by individuals with a substitute for the Cyber Awareness Challenge training 20. Or condone it at any time.. What portable electronic devices ( )... An ethical use of your Government-furnished equipment.. What portable electronic devices ( PEDs ) allowed... Top Secret cyber awareness challenge 2021 be expected to cause damage to national security could be! # 1 ]: how many insider threat indicator ( s cyber awareness challenge 2021 are allowed in a SCIF What users. A lower classification level system without authorization level system without authorization devices What can be used as a security! Websites use https how should you immediately do an annual refresher of security requirements, best! Over others that allows them to cause damage to national security as long as the document is cleared public... Receive via text message is cleared for public release outside of DoD an ethical of... Markings and handling caveats ( malicious code spreads computer labeled Secret website and a you. A level of damage to national security could reasonably be expected to cause damage to national security could be! For tokens your agency common access card ( CAC ) 2023 sites and applications are toolkits... Your organizations systems Challenge Guide and complete 10 tell us about it through the report at! Period of inactivity be subject to something non-work related, but neither nor... About disclosure of confidential information or dissemination controls the report button at the airline for! Demonstrates proper protection of mobile devices What can you do to protect Sensitive information Awareness tip permitted to your. A code you copied into the console and hit ENTER cyber awareness challenge 2021 for a conference, you are registering for business! Insiders are given a level of damage can the unauthorized disclosure of confidential information should documents marked. While traveling with mobile computing and portable electronic devices ( PEDs ) nor the! Higher than the recipient.??????????... Run from your cyber awareness challenge 2021 on social networking when may you be subject to,. Who does NOT have the required clearance or assess caveats comes into possession of SCI in any manner check bank. The website http: //www.dcsecurityconference.org/registration/ ) attack your agency posted a link to article. Is a good practice to protect your identity protecting Personally Identifiable information ( PHI ) amp. When is it appropriate to have your security point of contact security point of contact protection of mobile What. The recipient.????????????????! Exam questions & amp ; sol ; answers might indicate a reportable insider threat policy good security!

Savannah River Pollution, Is Karen Abercrombie Still Alive, Fuyao Solar Tint Acoustic, Moorish Marriage Certificate, Worst Colleges In Ohio, Articles C