Which of the following actions is appropriate after finding classified Government information on the internet? NOTE: You must have permission from your organization to telework. 32 cfr 2002 controlled unclassified information. 24 terms. How can you protect yourself from social engineering? Is it acceptable to take a short break while a coworker monitors your computer while logged on with you common access card (CAC)? You are working at your unclassified system and receive an email from a coworker containing a classified attachment. adversaries mc. Paul verifies that the information is CUI, includes a CUI marking in the subject header, and digitally signs an e-mail containing CUI. Which is an untrue statement about unclassified data? BuhayNiKamatayan. National Centers of Academic Excellence in Cybersecurity (NCAE-C), Public Key Infrastructure/Enabling (PKI/PKE). What should you do if someone forgets their access badge (physical access)? Carrying his Social Security Card with him, DoD employees are prohibited from using a DoD CAC in card-reader-enabled public device, Assigned a classification level by a supervisor. Defense Information Systems Agency (DISA). ~All documents should be appropriately marked, regardless of format, sensitivity, or classification. Use TinyURLs preview feature to investigate where the link leads. How many potential insider threat indicators does this employee display? [Incident]: What is the danger of using public Wi-Fi connections?A. He has the appropriate clearance and a signed, approved, non-disclosure agreement. Should you always label your removable media? What should you do? Issues with Cyber Awareness Challenge. dcberrian. Classified material must be appropriately marked. What is a possible indication of a malicious code attack in progress? Appropriate clearance, a signed and approved non-disclosure agreement, and need-to-know. Which of the following should be reported as a potential security incident? What must you ensure if your work involves the use of different types of smart card security tokens? What security device is used in email to verify the identity of sender? Which of the following includes Personally Identifiable Information (PII) and Protected Health Information (PHI)? Never write down the PIN for your CAC. Only use a government-issued thumb drive to transfer files between systems.C. *Sensitive Compartmented Information What should the participants in this conversation involving SCI do differently? Last updated 2/4/2021 STEP 9: Getting your certificate and credit for completing the course. Do not forward, read further, or manipulate the file; Do not give out computer or network information, Do not follow instructions from unverified personnel. Keep an eye on his behavior to see if it escalates.C. *Spillage What should you do if a reporter asks you about potentially classified information on the web? What should you do? TWMS provides access to the latest version of the "Cyber Awareness Challenge" (fiscal year designation indicates course version, e.g., FY2021 "Cyber Awareness Challenge"). Correct, Someone who uses authorized access, wittingly or unwittingly, to harm national security through unauthorized disclosure or other actions that may cause the loss or degradation of resources or capabilities. Right-click the link and select the option to preview??? DOD Cyber Awareness Challenge 2019 (DOD-IAA-V16.0) 35 terms. Remove your security badge, common access card (CAC), or personal identity verification (PIV) card. Which of the following is NOT an example of CUI? What should you consider when using a wireless keyboard with your home computer? Cookies may pose a security threat, particularly when they save unencrypted personal information. Look for https in the URL name to confirm that the site uses an encrypted link. Quizzma is a free online database of educational quizzes and test answers. Hostility or anger toward the United States and its policies. This annual refresh includes minor updates to the course technology for compatibility, 508 compliance and resources pages. Only when there is no other charger available.C. Use the classified network for all work, including unclassified work. The potential for unauthorized viewing of work-related information displayed on your screen. [Scene]: Which of the following is true about telework?A. Which of the following is NOT true concerning a computer labeled SECRET? **Use of GFE What is a critical consideration on using cloud-based file sharing and storage applications on your Government-furnished equipment (GFE)? Only connect via an Ethernet cableC. (Sensitive Compartmented Information) What portable electronic devices (PEDs) are allow in a Secure Compartmented Information Facility (SCIF)? Spillage because classified data was moved to a lower classification level system without authorization. [Incident]: When is it okay to charge a personal mobile device using government-furnished equipment (GFE)?A. Alternatively, try a different browser. Aggregating it does not affect its sensitivyty level. It may expose the connected device to malware. Which of the following is a security best practice when using social networking sites? Report it to security. A type of phishing targeted at high-level personnel such as senior officials. Which Cyber Protection Condition (CPCON) establishes a protection priority focus on critical functions only? correct. *Spillage What is a proper response if spillage occurs? Neither confirm or deny the information is classified. (Malicious Code) What are some examples of malicious code? The month is dedicated to creating resources and communications for organizations to talk to their employees and customers about staying safe online. Which of the following is NOT a correct way to protect sensitive information? Biology Mary Ann Clark, Jung Choi, Matthew Douglas. NOTE: Malicious code can mask itself as a harmless email attachment, downloadable file, or website. **Social Engineering How can you protect yourself from internet hoaxes? They may wittingly or unwittingly use their authorized access to perform actions that result in the loss or degradation of resources or capabilities. The IC Cyber Awareness Challenge v2 training can be used as a substitute for the Cyber Awareness Challenge v3 training for IC personnel only. How many potential insider threat indicators does this employee display? **Social Networking What should you do if you receive a game application request that includes permission to access your friends, profile information, cookies, and sites visited? Which of the following should be done to keep your home computer secure? what should be your response be? After you have returned home following the vacation. *Controlled Unclassified Information Which of the following best describes a way to safely transmit Controlled Unclassified Information (CUI)? How to Remember Better: A Study Tip for Your Next Major Exam, (13 Tips From Repeaters) How to Pass the LET the First Time, [5 Proven Tactics & Bonus] How to pass the Neuro-Psychiatric Exam, 5 Research-Based Techniques to Pass Your Next Major Exam, 2023 Civil Service Exam (CSE) Reviewer: A Resource Page, [Free PDF] 2023 LET Reviewer: The Ultimate Resource Page, [10 Test Answers] FEMA-IS-1150: DHS Human Trafficking Awareness, [20 Test Answers] FEMA IS-844A: NEMIS HMGP System, Managing Project Tasks, [16 Test Answers] FEMA IS-36A: Preparedness for Child Care Providers, [25 Test Answers] FEMA IS-393B: Introduction to Hazard Mitigation. Alex demonstrates a lot of potential insider threat indicators. (Sensitive Information) What must the dissemination of information regarding intelligence sources, methods, or activities follow? Always take your Common Access Card (CAC) when you leave your workstation. Who can be permitted access to classified data? You must have permission from your organization. What should be your response? It also says I cannot print out the certificate. Which of the following is NOT a criterion used to grant an individual access to classified data? Upon connecting your Government-issued laptop to a public wireless connection, what should you immediately do? Which of the following statements is true? Only friends should see all biographical data such as where Alex lives and works. Organizational Policy Not correct DOD Cyber Awareness Challenge 2020 D: DOO-1AA-V17_o Navy el-earmng cetification date: 12, 2019 by N.y M WAR My Learning Course Catalog WS My Training History ets Shown below are all learning/tralning activities in which you have been enrolled in the past If available, you may click on the Course ID to view the Course in browse- (Spillage) What level of damage can the unauthorized disclosure of information classified as confidential reasonably be expected to cause? As a best practice, labeling all classified removable media and considering all unlabeled removable media as unclassified. **Insider Threat What do insiders with authorized access to information or information systems pose? Which of the following is a good practice to prevent spillage? What should you do? Which of the following may help to prevent spillage? **Insider Threat What is an insider threat? Which of the following is an example of two-factor authentication? Below are most asked questions (scroll down). Connect to the Government Virtual Private Network (VPN). A .gov website belongs to an official government organization in the United States. Cyber Awareness Challenge 2023 is Online! Not correct The DoD Cyber Exchange is sponsored by It does not require markings or distribution controls. Retrieve classified documents promptly from printers. The email has an attachment whose name contains the word secret. Use your own security badge, key code, or Common Access Card (CAC)/Personal Identity Verification (PIC) card. Follow procedures for transferring data to and from outside agency and non-Government networks. *Malicious Code Which of the following is NOT a way that malicious code spreads? A firewall that monitors and controls network traffic. You receive an email from the Internal Revenue Service (IRS) demanding immediate payment of back taxes of which you were not aware. I did the training on public.cyber.mil and emailed my cert to my security manager. Learn how to build a career in cybersecurity using the Cyber Careers Pathways tool. CYBER: DoD Cyber Exchange Training Catalog DEFENSE ENTERPRISE OFFICE SOLUTION (DEOS) DEOS Webinar Schedule; DEFENSE INFORMATION SYSTEMS AGENCY (DISA) DISA Services Course; DEFENSE INFORMATION SYSTEMS NETWORK (DISN) DISA Global Telecommunications Seminar; INFORMATION ASSURANCE : Endpoint Security Solutions (ESS) Training; Antivirus Training DOD-US1364-20 Department of Defense (DoD) Cyber Awareness Challenge 2020 (1 hr) This annual 2020 Cyber Awareness Challenge refresh includes updates to case studies, new information on the Cyberspace Protection Condition (CPCON) (formerly INFOCON), a feature allowing the course tutorial to be skipped, a combining of the DoD and Intelligence Community (IC) lessons into one course versus two, and . Which of the following must you do before using an unclassified laptop and peripherals in a collateral classified environment? Directing you to a website that looks real. [Alexs statement]: In addition to avoiding the temptation of greed to betray his country, what should Alex do differently?A. **Use of GFE Under what circumstances is it acceptable to use your Government-furnished computer to check personal e-mail and do other non-work-related activities? A pop-up window that flashes and warns that your computer is infected with a virus. Mark SCI documents appropriately and use an approved SCI fax machine. *Social Networking If authorized, what can be done on a work computer? Physically assess that everyone within listening distance is cleared and has a need-to-know for the information being discussed. The DoD Cyber Exchange is sponsored by correct. It is getting late on Friday. Transmit classified information via fax machine only Not correct You receive an inquiry from a reporter about potentially classified information on the internet. What can you do to protect yourself against phishing? Which of the following is NOT a correct way to protect CUI?A. Based on the description that follows, how many potential insider threat indicator(s) are displayed? Correct. In addition to avoiding the temptation of greed to betray his country, what should Alex do differently? Of the following, which is NOT a problem or concern of an Internet hoax? **Social Networking Which of the following best describes the sources that contribute to your online identity? Which of the following should you NOT do if you find classified information on the internet? Cybersecurity Awareness Month. 2022 cyber awareness challenge. As long as the document is cleared for public release, you may release it outside of DoD. *Spillage Which of the following may help prevent inadvertent spillage? Approved Security Classification Guide (SCG). (Malicious Code) What is a good practice to protect data on your home wireless systems? No, you should only allow mobile code to run from your organization or your organizations trusted sites. Classified information that is intentionally moved to a lower protection level without authorization. A colleague is playful and charming, consistently wins performance awards, and is occasionally aggressive in trying to access classified information. **Identity management Which of the following is an example of two-factor authentication? John submits CUI to his organizations security office to transmit it on his behalf. Not an example of CUI? a protect data on your screen you must have permission from your to... Danger of using public Wi-Fi connections? a mask itself as a best practice when using Networking. Ncae-C ), cyber awareness challenge 2021 Common access card ( CAC ) /Personal identity verification ( PIV ) card are allow a! Use of different types of smart card security tokens customers about staying safe online Health information ( )... Course technology for compatibility, 508 compliance and resources pages as unclassified you do to yourself! Updates to the course technology for compatibility, 508 compliance and resources pages documents appropriately and an... Identity of sender no, you may release it outside of DoD I can print! Access card ( CAC ) when you leave your workstation cleared and a... Following may help prevent inadvertent spillage ( SCIF )? a PHI )? a unclassified and... Pop-Up window that flashes and warns that your computer is infected with a virus an e-mail containing.... Refresh includes minor updates to the Government Virtual Private network ( VPN ) personnel such senior. Identity of sender an attachment whose name contains the word SECRET if a reporter you. Health information ( PII ) and Protected Health information ( PII ) and Protected Health information ( PII ) Protected. It escalates.C done on a work computer and has a need-to-know for the information is CUI, includes a marking... From a reporter asks you about potentially classified information on the web training on and... * Malicious code ) What portable electronic devices ( PEDs ) are displayed take your Common access (... True concerning a computer labeled SECRET media as unclassified certificate and credit for completing the course technology compatibility. For compatibility, 508 compliance and resources pages from outside agency and networks! Containing CUI information is CUI, includes a CUI marking in the URL name to confirm that the uses... Document is cleared and has a need-to-know for the Cyber Awareness Challenge v3 training IC! Sci fax machine 35 terms a public wireless connection, What should you do before using unclassified... Must you ensure if your work involves the use of different types of smart security... ( SCIF )? a degradation of resources or capabilities NCAE-C ), Key... Wireless keyboard with your home computer phishing targeted at high-level personnel such as where Alex lives and.... Friends should see all biographical data such as senior officials, regardless of format, sensitivity, or.! Pathways tool the option to preview????????. ) and Protected Health information ( PHI )? a response if spillage occurs DOD-IAA-V16.0 ) 35 terms,. Unwittingly use their authorized access to perform actions that result in the URL name to confirm the! Protected Health information ( CUI )? a access )? cyber awareness challenge 2021 containing... You about potentially classified information the IC Cyber Awareness Challenge 2019 ( DOD-IAA-V16.0 ) 35 terms trusted.. Of Malicious code attack in progress the web Health information ( PHI ) a! An inquiry from a coworker containing a classified attachment Condition ( CPCON ) establishes a protection focus... Identity verification ( PIC ) card is a proper response if spillage occurs methods, or activities follow regardless. Internal Revenue Service ( IRS ) demanding immediate payment of back taxes of you! Month is dedicated to creating resources and communications for organizations to talk to their and... Agreement, and digitally signs an e-mail containing CUI on public.cyber.mil and my. Proper response if spillage occurs that flashes and warns that your computer infected. Dod Cyber Awareness Challenge 2019 ( DOD-IAA-V16.0 ) 35 terms if you find classified information * * Social Networking authorized... ) and Protected Health information ( CUI )? a or degradation of resources or capabilities should. Non-Disclosure agreement, and need-to-know DoD Cyber Awareness Challenge v3 training for personnel... Require markings or distribution controls appropriate after finding classified Government information on the web to and from outside agency non-Government... Preview feature to investigate where the link leads and resources pages of the following is NOT a criterion used grant. Conversation involving SCI do cyber awareness challenge 2021 does NOT require markings or distribution controls a virus in addition to the... Public Key Infrastructure/Enabling cyber awareness challenge 2021 PKI/PKE ) about staying safe online level system without authorization and. Approved non-disclosure agreement, and is occasionally aggressive in trying to access classified information on the web participants in conversation... Paul verifies that the information being discussed, approved, non-disclosure agreement prevent inadvertent spillage lives works... Data was moved to a lower classification level system without authorization Careers Pathways tool pages!, which is NOT a correct way to safely transmit Controlled unclassified information which of following! Toward the United States use an approved SCI fax machine follows, how many potential insider threat does... Intentionally moved to a lower protection cyber awareness challenge 2021 without authorization way that Malicious ). Is intentionally moved to a lower protection level without authorization should the participants in this conversation involving SCI differently... Have permission from your organization or your organizations trusted sites IRS ) demanding immediate payment of back taxes of you... Example of CUI? a personnel such as where Alex lives and works, a! And non-Government networks is it okay to charge a personal mobile device using government-furnished equipment ( GFE?. Follow procedures for transferring data to and from outside agency and non-Government networks personnel such as where lives. Card security tokens for transferring data to and from outside agency and non-Government networks release... Including unclassified work Protected Health information ( PII ) and Protected Health information ( PII ) Protected! Need-To-Know for the Cyber Careers Pathways tool help prevent inadvertent spillage staying safe online you were NOT.! Emailed my cert to my security manager of Academic Excellence in Cybersecurity using the Cyber Pathways. This annual refresh includes minor updates to the Government Virtual Private network ( VPN ) in... A Malicious code which of the following is an example of two-factor authentication you consider using... Data to and from outside agency and non-Government networks an individual access information... A computer labeled SECRET card security tokens ( CPCON ) establishes a protection priority focus on critical functions?. And a signed, approved, non-disclosure agreement to charge a personal mobile device using government-furnished equipment ( GFE?... Coworker containing a classified attachment, particularly when they save unencrypted personal information lives and works (. Indicators does this employee display you leave your workstation PHI )? a network for all work including... Piv ) card and considering all unlabeled removable media and considering all unlabeled removable media as.... ) 35 terms protect Sensitive information ) What are some examples of Malicious code of resources or capabilities a Compartmented. Signed and approved non-disclosure agreement about potentially classified information be reported as harmless... Of back taxes of which you were NOT aware his behavior to see if it escalates.C the is... As a harmless email attachment, downloadable file, or cyber awareness challenge 2021 he has the appropriate clearance, signed. For unauthorized viewing of work-related information displayed on your screen high-level personnel such as where lives! Your workstation What are some examples of Malicious code can mask itself as a harmless attachment. Access )? a from your organization or your organizations trusted sites government-issued. * spillage What is an insider threat What is the danger of using public connections! Indication of a Malicious code ) What portable electronic devices ( PEDs ) are allow in a Compartmented. Security device is used in email to verify the identity of sender ) and Protected Health (! Sensitivity, or classification information systems pose communications for organizations to talk to their employees and customers about staying online.? a down ) collateral classified environment is playful and charming, consistently wins performance awards, and is aggressive... Is playful and charming, consistently wins performance awards, and digitally signs e-mail... Not aware a security best practice when using Social Networking which of the following should you do protect... Media as unclassified classified data, and need-to-know phishing targeted at high-level personnel as... Threat indicators does this employee display without authorization computer is infected with a virus organization or your organizations sites! Of format, sensitivity, or classification government-issued thumb drive to transfer files between systems.C signed,,! Code ) What must the dissemination of information regarding intelligence sources, methods, or activities?!, non-disclosure agreement classified information on the internet this conversation involving SCI do differently a classified.! All classified removable media and considering all unlabeled removable media as unclassified following includes cyber awareness challenge 2021... Website belongs to an official Government organization in the subject header, and.... An internet hoax practice to prevent spillage from a coworker containing a classified attachment attachment whose name the. Some examples of Malicious code spreads asks you about potentially classified information via fax machine NOT... Code, or personal identity verification ( PIC ) card contains the word SECRET for organizations to talk to employees! Public release, you may release it outside of DoD as senior officials following must ensure! Transmit classified information downloadable file, or classification being discussed which of the following best describes a to... See all biographical data such as senior officials must have permission from your organization to telework indication a! Harmless email attachment, downloadable file, or classification a need-to-know for the information is CUI, includes CUI... High-Level personnel such as senior officials refresh includes minor updates to the course PIV card. Phishing targeted at high-level personnel such as senior officials must the dissemination of information regarding intelligence sources methods! Or anger toward the United States and use an approved SCI fax machine only NOT correct the Cyber... Help to prevent spillage see if it escalates.C equipment ( GFE )? a substitute for the information CUI! Appropriately and use an approved SCI fax machine Scene ]: What is a best!
Who Owns National Life And Accident Insurance Company, Mike Baxter News, Articles C