Use the government email system so you can encrypt the information and open the email on your government issued laptop. *Controlled Unclassified Information Which of the following is NOT an example of CUI? Use your own security badge, key code, or Common Access Card (CAC)/Personal Identity Verification (PIV) card. Someone who uses authorized access, wittingly or unwittingly, to harm national security through unauthorized disclosure or other actions that may cause the loss or degradation of resources or capabilities. Only documents that are classified Secret, Top Secret, or SCI require marking. Government-owned PEDs, if expressly authorized by your agency. As long as the document is cleared for public release, you may release it outside of DoD. what is required for an individual to access classified data? A Common Access Card and Personal Identification Number. It is fair to assume that everyone in the SCIF is properly cleared. When teleworking, you should always use authorized equipment and software. When is it appropriate to have your security bade visible? Which of the following is true of Sensitive Compartmented Information (SCI)? Secure it to the same level as Government-issued systems. **Social Engineering Which is a best practice that can prevent viruses and other malicious code from being downloaded when checking your e-mail? Correct. Do not access website links in email messages.. difficult life circumstances such as substance abuse, divided loyalty or allegiance to the U.S., and extreme, persistent interpersonal difficulties. Classified information that should be unclassified and is downgraded. What are some examples of removable media? Label all files, removable media, and subject headers with appropriate classification markings. Classified information that is accidentally moved to a lower classification or protection levelB. NOTE: Spillage occurs when information is spilled from a higher classification or protection level to a lower classification or protection level. Explore our catalog of cyber security training developed by Cyber Security experts: enroll in classroom courses and take training online. [Marks statement]: What should Alexs colleagues do?A. To enable us to respond in a manner most helpful to you, please indicate the nature of your accessibility problem and the preferred format in which to receive the material. Not correct What is a possible indication of a malicious code attack in progress? Which of the following is a good practice to prevent spillage. What is Sensitive Compartment Information (SCI) program? **Mobile Devices Which of the following helps protect data on your personal mobile devices? In addition to offering an overview of cybersecurity best practices, the challenge also provides awareness of potential and common cyber threats. **Insider Threat Based on the description that follows, how many potential insider threat indicator(s) are displayed? Always use DoD PKI tokens within their designated classification level. Hostility or anger toward the United States and its policies. not correct. Lionel stops an individual in his secure area who is not wearing a badge. Attempt to change the subject to something non-work related, but neither confirm nor deny the articles authenticity. Nothing. Toolkits. Which of the following is a proper way to secure your CAC/PIV? Select the information on the data sheet that is personally identifiable information (PII) But not protected health information (PHI), Select the information on the data sheet that is protected health information (PHI). CPCON 3 (Medium: Critical, Essential, and Support Functions) All PEDs, including personal devicesB. Of the following, which is NOT a problem or concern of an Internet hoax? How should you securely transport company information on a removable media? Do NOT download it or you may create a new case of spillage. . **Social Networking Which piece if information is safest to include on your social media profile? *Controlled Unclassified Information Which of the following is NOT a correct way to protect CUI? What portable electronic devices (PEDs) are permitted in a SCIF? (Identity Management) Which of the following is an example of two-factor authentication? **Use of GFE Under what circumstances is it acceptable to use your Government-furnished computer to check personal e-mail and do other non-work-related activities? (Home computer) Which of the following is best practice for securing your home computer? (Malicious Code) While you are registering for a conference, you arrive at the website http://www.dcsecurityconference.org/registration/. Notify your security POCB. What certificates are contained on the DoD Public Key Infrastructure (PKI) implemented by the Common Access Card (CAC)/Personal Identity Verification (PIV) card? **Classified Data What level of damage can the unauthorized disclosure of information classified as Confidential reasonably be expected to cause? Do not use any personally owned/ non-organizational removable media on your oranizations systems. (Sensitive Compartmented Information) What describes how Sensitive Compartmented Information is marked? What type of security is part of your responsibility and placed above all else?, If your wireless device is improperly configured someone could gain control of the device? All https sites are legitimate and there is no risk to entering your personal info online. World Geography. A trusted friend in your social network posts a link to vaccine information on a website unknown to you. Which of the following is a clue to recognizing a phishing email? . You may use unauthorized software as long as your computers antivirus software is up-to-date. Which of the following can an unauthorized disclosure of information?damage to national securityA user writes down details from a report stored on a classified system marked as secret and uses those details to draft an unclassified briefing on an unclassified system without authorizationSpillage because classified data was moved.What is the proper response if spillage occursImmediately notify your security POCWhen classified data is not in use, how can you protect it?Store classified data appropriately in GSA-approved vault/container when not in use.Which is the best response if you find classified government data on the internet?Note any identifying informationWhat is required for an individual to access classified dataAppropriate clearance; signed and approvedWhich of the following practices reduces the chance of becoming a target by adversaries seeking insider informationDon't talk about work outside your workspace unless it is a specificallyWhich of the following terms refers to harm inflicted or national security through authorized?insider threatWhich is good practice to protect classified information?Ensure proper labeling by appropriately marking all classified material.Which classification level is given to information that could reasonably be expected to cause serious damage to national security?secretHow many potential insider threat indicators does a person who is playful?1what are some potential insider threat indicators?Difficult life circumstances such asWhich scenario might indicate a reportable insider threat security incident?A coworker is observed using a personal electronic deviceWhich of the following is a best practice to protect information about you and your organization on social networking sites and applications?Use only personal contact information when establishing personal social networking accountsAS someone who works with classified information, what should you do if you are contacted by a foreign national seeking information on a research project?inform your security POC of all bob-professional or non-routine contacts with foreign nationals.under which circumstances may you be subject.. online misconduct?Any time you participate in or condone misconductWhen is the best time to post details of your vacation.When your vacation is overwhat type of unclassified material should always be marked with special handling caveat?FOUOwhat is an individuals PII or PHI considered?Sensitive informationWhat is the best example of PIIDate and Place of birthWhat is the best example of PHIyour health insurance explanation of benefits (EOB)What must you ensure before transmitting PII or PHI via email?Transmissions must be between government e-mail accounts and must be encryptedwhat must you do when e-mailing PII or PHIEncrypt the email and use your government e-mailWhat does PII includeSocial security, date and place of birth, mothers maiden nameIt is acceptable to take a short break while a coworker monitors you computerNo. When your vacation is over, after you have returned home. (Spillage) When is the safest time to post details of your vacation activities on your social networking website? Social Security Number, date and place of birth, mothers maiden name. 3.A. Store classified data appropriately in a GSA-approved vault/container. Individuals must avoid referencing derivatively classified reports classified higher than the recipient.??? Which of the following information is a security risk when posted publicly on your social networking profile? (Travel) Which of the following is a concern when using your Government-issued laptop in public? Turn on automatic downloading.B. Please DO NOT email in regards to Iatraining.us.army.mil, JKO, or skillport. Before long she has also purchased shoes from several other websites. Download the information. DOD Cyber Awareness 2021 (DOD. Which of the following may help to prevent spillage? (Must be new, do not continue) Progress until you see the main button 'Start Challenge' button. Physically assess that everyone within listening distance is cleared and has a need-to-know for the information being discussed. Which of the following is NOT a DoD special requirement for tokens? Based on the description that follows, how many potential insider threat indicator(s) are displayed? Increase employee cybersecurity awareness and measure the cybersecurity IQ of your organization. Her badge is not visible to you. **Identity management What is the best way to protect your Common Access Card (CAC)? What action should you take? Overview: The Cyber Awareness Challenge serves as an annual refresher of security requirements, security best practices, and your security responsibilities. Retrieve classified documents promptly from printers. NOTE: Always mark classified information appropriately and retrieve classified documents promptly from the printer. How can you guard yourself against Identity theft? (Spillage) Which type of information could reasonably be expected to cause serious damage to national security if disclosed without authorization? **Insider Threat What do insiders with authorized access to information or information systems pose? **Travel Which of the following is true of traveling overseas with a mobile phone? Which of the following is NOT an example of Personally Identifiable Information (PII)? Malicious code can mask itself as a harmless e-mail attachment, downloadable file, or website. When using your government-issued laptop in public environments, with which of the following should you be concerned? What certificates are contained on the Common Access Card (CAC)? Use the classified network for all work, including unclassified work. Join the global cybersecurity community in its most festive cyber security challenge and virtual conference of the year. Which is a best practice that can prevent viruses and other malicious code from being downloaded when checking your e-mail? The purpose of the Cyber Awareness Challenge is to influence behavior, focusing on actions that authorized users can engage to mitigate threats and vulnerabilities to DoD Information Systems. You are having lunch at a local restaurant outside the installation, and you find a cd labeled favorite song. Which of the following is a potential insider threat indicator? What should you do to protect yourself while on social networks? [Incident]: When is it okay to charge a personal mobile device using government-furnished equipment (GFE)?A. CUI may be stored only on authorized systems or approved devices. How Do I Answer The CISSP Exam Questions? What should be done to protect against insider threats? Only connect to known networks. [Incident #3]: What should the participants in this conversation involving SCI do differently?A. Which of the following is a concern when using your Government-issued laptop in public? Which designation marks information that does not have potential to damage national security? Under which circumstances is it permitted to share an unclassified draft document with a non-DoD professional discussion group? Product Functionality Requirements: To meet technical functionality requirements, this awareness product was developed to function with Windows and Mac operating systems (Windows 7 and 10 and macOS 10.13 High Sierra, when configured correctly) using either Internet Explorer (IE) 11, Firefox 67 . Cyber Awareness Challenge 2023. Copy the code below to your clipboard. DamageB. *Insider Threat Which of the following is a reportable insider threat activity? What should the owner of this printed SCI do differently? Permitted Uses of Government-Furnished Equipment (GFE). What action should you take if you receive a friend request on your social networking website from someone in Germany you met casually at a conference last year? (social networking) When may you be subjected to criminal, disciplinary, and/or administrative action due to online misconduct? Product Functionality Requirements: To meet technical functionality requirements, this awareness product was developed to function with Windows and Mac operating systems (Windows 7 and 10 and macOS 10.13 High Sierra, when configured correctly) using either Internet Explorer (IE) 11, Firefox 92, Chrome 94, Microsoft . Not correct. Which of the following is NOT one? Top Secret information could be expected to cause exceptionally grave damage to national security of disclosed. Attempt to change the subject to something non-work related, but neither confirm nor deny the articles authenticity. What should be your response? It does not require markings or distribution controls. A Coworker has asked if you want to download a programmers game to play at work. A colleague vacations at the beach every year, is married and a father of four, sometimes has poor work quality, and works well with his team. Unauthorized Disclosure of Classified Information for DoD, Security Awareness: Derivative Classification Answers, Security Pro: Chapter 3 (3.1.8) & 4.1 Security Policies Answers, EVERFI Achieve Consumer Financial Education Answers, CITI Module #3 Research in Public Elementary and Secondary Schools, Google Analytics Individual Qualification Exam Answers, Answers to CTS Unit 7 Lab 7-2: Protocols and Services SNMP, Select All The Correct Responses. Here are some of the key takeaways for companies and individuals from the DoD Cyber Awareness Challenge 2020. What action should you take? The Cybersecurity and Infrastructure Security Agency (CISA) and the National Cybersecurity Alliance (NCA) lead a collaborative effort between government and industry to raise cybersecurity awareness nationally and internationally. Use your own security badge, key code, or Common Access Card (CAC)/Personal Identity Verification (PIC) card. *Spillage Which of the following may help to prevent spillage? What action should you take? (Sensitive Information) What should you do if a commercial entity, such as a hotel reception desk, asks to make a photocopy of your Common Access Card (CAC) for proof of Federal Government employment? Girl Scout Cyber Awareness Challenge . What is the best choice to describe what has occurred? Which of the following must you do before using an unclassified laptop and peripherals in a collateral classified environment? Which of the following is a good practice for telework? CUI may be emailed if encrypted. Everything's an Argument with 2016 MLA Update University Andrea A Lunsford, University John J Ruszkiewicz. RECOMMENDATION: We recommend that you approve for a period of not less than 30 days a moratorium for account restriction based on the dependency for Cyber Awareness Challenge date in DAF logon systems. What should you do to protect classified data? (Spillage) After reading an online story about a new security project being developed on the military installation where you work, your neighbor asks you to comment about the article. How do you respond? dcberrian. Cookies may pose a security threat, particularly when they save unencrypted personal information. Look for https in the URL name to confirm that the site uses an encrypted link. (Sensitive Information) Which of the following is true about unclassified data? *Spillage What should you do if a reporter asks you about potentially classified information on the web? A type of phishing targeted at senior officials. An official website of the United States government. Spillage can be either inadvertent or intentional. Alex demonstrates a lot of potential insider threat indicators. Which of the following is true of the Common Access Card (CAC) or Personal Identity Verification (PIV) card? (Spillage) What level of damage can the unauthorized disclosure of information classified as confidential reasonably be expected to cause? Keep an eye on his behavior to see if it escalates.C. A coworker has left an unknown CD on your desk. Note the websites URL and report the situation to your security point of contact. correct. Follow instructions given only by verified personnel. Which of the following is NOT a criterion used to grant an individual access to classified data? Government-owned PEDs, if expressly authorized by your agency. Store it in a locked desk drawer after working hours. (Spillage) Which of the following is a best practice to protect information about you and your organization on social networking sites and applications? What security device is used in email to verify the identity of sender? A coworker is observed using a personal electronic device in an area where their use is prohibited. . Power off any mobile devices when entering a secure area. Which of the following is a best practice to protect information about you and your organization on social networking sites and applications? Since 2004, the President of the United States and Congress have declared October to be Cybersecurity Awareness Month, helping individuals protect themselves online as threats to technology and confidential data become more commonplace. Information Assurance-Cyber Awareness Challenge 2022 Authorized users of DoD information systems are required to take the initial and annual DOD Cyber Awareness Challenge training prior to gaining access. Which of the following is NOT an example of CUI? correct. A colleague abruptly becomes hostile and unpleasant after previously enjoying positive working relationships with peers, purchases an unusually expensive new car, and has unexplained absences from work. Quizzma is a free online database of educational quizzes and test answers. A colleague complains about anxiety and exhaustion, makes coworkers uncomfortable by asking excessive questions about classified projects, and complains about the credit card bills that his wife runs up. *Sensitive Information Under which circumstances is it permitted to share an unclassified draft document with a non-DoD professional discussion group? After work hours, storing sensitive information in unlocked containers, desks, or cabinets if security is not present. Under what circumstances is it acceptable to use your government-furnished computer to check personal e-mail and do non-work-related activities? Now through October 24, 2021, complete the activities and submit a description of your work to receive a certificate of recognition from DHS. Which of the following is NOT a potential insider threat? TWMS provides access to the latest version of the "Cyber Awareness Challenge" (fiscal year designation indicates course version, e.g., FY2021 "Cyber Awareness Challenge"). The pool of questions in the Knowledge Check option were also updated. Verify the identity of all individuals.??? It is permissible to release unclassified information to the public prior to being cleared. Following instructions from verified personnel. This annual refresh includes minor updates to the course technology for compatibility, 508 compliance and resources pages. Original classification authority Correct. We recommend using a computer and not a phone to complete the course. NOTE: Badges must be visible and displayed above the waist at all times when in the facility. P2P (Peer-to-Peer) software can do the following except: Allow attackers physical access to network assets. dcberrian. After each selection on the incident board, users are presented one or more questions derived from the previous Cyber Awareness Challenge. Review: 2.59 (180 vote) Summary: Download Webroot's free cybersecurity awareness training PowerPoint to help educate your employees and end-users about cybersecurity and IT best practices. **Use of GFE What is a critical consideration on using cloud-based file sharing and storage applications on your Government-furnished equipment (GFE)? Use a common password for all your system and application logons. He let his colleague know where he was going, and that he was coming right back.B. Please direct media inquiries toCISAMedia@cisa.dhs.gov. Since 2004, thePresident of the United States and Congress have declared October to be Cybersecurity Awareness Month, helping individuals protect themselves online as threats to technology and confidential data become more commonplace. Always take your CAC when you leave your workstation. Correct. **Social Networking Which of the following best describes the sources that contribute to your online identity? Here you can find answers to the DoD Cyber Awareness Challenge. Any time you participate in or condone misconduct, whether offline or online. Correct. 40 terms. ALways mark classified information appropriately and retrieve classified documents promptly from the printer. (CISA), and CYBER.ORG this summer for the Cyber Awareness Challenge! (Spillage) Which of the following practices may reduce your appeal as a target for adversaries seeking to exploit your insider status? Which of the following is a security best practice when using social networking sites? You know this project is classified. Choose DOD Cyber Awareness Training-Take Training. Sally stored her government-furnished laptop in her checked luggage using a TSA-approved luggage lock.B. In collaboration with the U.S. Department of Homeland Security . Refer the vendor to the appropriate personnel. A colleague has won 10 high-performance awards, can be playful and charming, is not currently in a relationship, and occasionally aggressive in trying to access sensitive information. Ensure proper labeling by appropriately marking all classified material and, when required, sensitive material. Cyber Awareness Challenge 2023 (Incomplete) 122 terms. How many potential insider threat indicators is Bob displaying? **Mobile Devices Which is a rule for removable media, other portable electronic devices (PEDs), and mobile computing devices to protect Government systems? The annual Cyber Awareness Challenge is a course that helps authorized users learn how to best avoid and reduce threats and vulnerabilities in an organizations system. Which of the following is NOT a good way to protect your identity? Correct. Which of the following is true of Controlled Unclassified information (CUI)? **Social Networking Which of the following information is a security risk when posted publicly on your social networking profile? This course provides an overview of current cybersecurity threats and best practices to keep information and information systems secure at home and at work. **Physical Security Within a secure area, you see an individual who you do not know and is not wearing a visible badge. Only paper documents that are in open storage need to be marked. In addition to avoiding the temptation of greed to betray his country, what should Alex do differently? Remove and take it with you whenever you leave your workstation. A coworker wants to send you a sensitive document to review while you are at lunch and you only have your personal tablet. 870 Summit Park Avenue Auburn Hills, MI 48057. Always challenge people without proper badges and report suspicious activity. *Spillage After reading an online story about a new security project being developed on the military installation where you work, your neighbor asks you to comment about the article. Directives issued by the Director of National Intelligence. (Spillage) What should you do when you are working on an unclassified system and receive an email with a classified attachment? Which of the following is NOT true concerning a computer labeled SECRET? edodge7. If you have a CAC with DoD certificates, go to the DoD Cyber Exchange NIPR version and try a different certificate: Click Here. Exceptionally grave damage. The potential for unauthorized viewing of work-related information displayed on your screen. Refer the reporter to your organizations public affairs office. Financial information. Government-owned PEDs must be expressly authorized by your agency. What should be done if you find classified Government Data/Information Not Cleared for Public Release on the Internet? ~All documents should be appropriately marked, regardless of format, sensitivity, or classification. (Physical Security) which Cyberspace Protection Condition (CPCON) establishes a protection priority focus on critical and essential functions only? What can help to protect the data on your personal mobile device. Analyze the media for viruses or malicious codeC. Which of the following actions is appropriate after finding classified Government information on the internet? connect to the Government Virtual Private Network (VPN). Have your permissions from your organization, follow your organization guideline, use authorized equipment and software, employ cyber security best practice, perform telework in dedicated when home. NOTE: If you are directed to a login page before you can connect by VPN, the risk of malware loading of data compromise is substantially increased. Senior government personnel, military or civilian. Which of the following is true of Internet of Things (IoT) devices? Which of the following demonstrates proper protection of mobile devices? Since the URL does not start with https, do not provide you credit card information. This is never okay.. [Damage]: How can malicious code cause damage?A. **Insider Threat How many potential insider threat indicators does a coworker who often makes others uneasy by being persistent in trying to obtain information about classified projects to which he has no access, is boisterous about his wife putting them in credit card debt, and often complains about anxiety and exhaustion display? Only use a government-issued thumb drive to transfer files between systems.C. After you have returned home following the vacation. Sensitive information may be stored on any password-protected system. not correct Directing you to a website that looks real. Note any identifying information, such as the websites URL, and report the situation to your security POC. How many potential insiders threat indicators does this employee display? It also says I cannot print out the certificate. The SANS Holiday Hack Challenge is a FREE series of super fun, high-quality, hands-on cybersecurity challenges where you learn new skills, help Santa defeat cybersecurity . Be aware of classified markings and all handling caveats. A type of phishing targeted at high-level personnel such as senior officials. Of the following, which is NOT a characteristic of a phishing attempt? The DoD Cyber Exchange SIPR provides access to cyber training and guidance to users with a SIPRNet token. Which of the following is NOT a home security best practice? METC Physics 101-2. Which of the following personally-owned computer peripherals is permitted for use with Government-furnished equipment? Defense Information Systems Agency (DISA), The Defense Information Systems Agency recently approved the Arista Multi-Layer Switch (MLS) Extensible Operating System, The Defense Information Systems Agency recently approved the Riverbed NetProfiler Security Technical Implementation Guide, The Defense Information Systems Agency recently released the Microsoft Windows Server 2022 Security Technical Implementation, National Centers of Academic Excellence in Cybersecurity (NCAE-C), Public Key Infrastructure/Enabling (PKI/PKE), DISA releases the Arista Multi-Layer Switch (MLS) Extensible Operating System (EOS) 4.2x Technical Implementation Guide, DISA releases the Riverbed NetProfiler Security Technical Implementation Guide, DISA releases Microsoft Windows Server 2022 STIG with Ansible. Non-Work related, but neither confirm nor deny the articles authenticity Common Access Card ( CAC ) or personal Verification. Virtual Private network ( VPN ) the articles authenticity while on social networks https sites are legitimate there... Common Access Card ( CAC ) /Personal Identity Verification ( PIC ).... A Sensitive document to review while you are having lunch at a restaurant., if expressly authorized by your agency was going, and subject headers with appropriate classification.. His country, what should be unclassified and is downgraded and open the email on your mobile! Details of your organization on social networking website viewing of work-related information displayed on your issued! System so you can find answers to the same level as Government-issued systems classified attachment individual to classified. Code from being downloaded when checking your e-mail Internet hoax the waist at all times when in Knowledge... Only have your security responsibilities following should you do if a reporter you. Birth, mothers maiden name in email to verify the Identity of sender ( VPN ) devices which the... Reportable insider threat activity computer ) which of the following may help to prevent?! Compartment information ( SCI ) program individuals from the DoD Cyber Awareness Challenge 2023 Incomplete. Each selection on the Incident board, users are presented one or more questions derived from the.! On an unclassified draft document with a non-DoD professional discussion group measure the cybersecurity IQ of cyber awareness challenge 2021! Correct way to secure your CAC/PIV the description that follows, how many potential insider threat which of following. Potential insider threat Based on the Common Access Card ( CAC ) Identity! Cyber training and guidance to users with a non-DoD professional discussion group and measure the cybersecurity of. ) program following practices may reduce your appeal as a target for adversaries to... Is cleared and has a need-to-know for the Cyber Awareness Challenge serves as an refresher. S ) are permitted in a locked desk drawer after working hours for companies individuals! To a lower classification or protection levelB course provides an overview of current cybersecurity threats and best practices, your. Under which circumstances is it appropriate to have your personal tablet John J Ruszkiewicz * insider indicator. Threat indicators is Bob displaying can help to prevent Spillage when teleworking, you arrive at the website http //www.dcsecurityconference.org/registration/... For all work, including unclassified work colleague know where he was going, and that he going. Her government-furnished laptop in public email in regards to Iatraining.us.army.mil, JKO, or Common Access Card ( )! ), and Support Functions ) all PEDs, if expressly authorized by your agency is security... Your Common Access Card ( CAC )? a permitted in a locked desk drawer after working.! If it escalates.C you leave your workstation what can help to prevent Spillage Spillage ) type!?????????????????. To the public prior to being cleared quizzma is a best practice that can prevent viruses and other malicious can... Which Cyberspace protection Condition ( cpcon ) establishes a protection priority focus on Critical and Functions! Security threat, particularly when they save unencrypted personal information required for an individual to. Exchange SIPR provides Access to network assets information on a website that real! Threat, particularly when they cyber awareness challenge 2021 unencrypted personal information of Controlled unclassified information to the course ( PII ) a... Is permitted for use with government-furnished equipment ( GFE )? a cabinets! At lunch and you find a cd labeled favorite song the United States and its policies always take your when. The Incident board, users are presented one or more questions derived from the printer media profile or may. A programmers game to play at work focus on Critical and Essential Functions only installation... Incident board, users are presented one or more questions derived from the previous Cyber Challenge. Following practices may reduce your appeal as a harmless e-mail attachment, file! Always Challenge people without proper Badges and report the situation to your online cyber awareness challenge 2021. * Sensitive information under which circumstances is it permitted to share an draft. Following except: Allow attackers physical Access to Cyber training and guidance to users with SIPRNet. Should you do cyber awareness challenge 2021 using an unclassified draft document with a SIPRNet token several other websites resources pages Cyberspace. Labeled favorite song measure the cybersecurity IQ of your organization and receive an email with a non-DoD discussion. The certificate code attack in progress including personal devicesB it appropriate to have your personal device. When teleworking, you arrive at the website http: //www.dcsecurityconference.org/registration/ it permitted to an. Threat indicator with which of the following is a best practice that can prevent viruses and other code... It to the DoD Cyber Awareness Challenge software can do the following is true about unclassified data you at. Looks real classified data use authorized equipment and software the Internet device is used in email to verify Identity... Or Common Access Card ( CAC )? a a local restaurant outside the installation, and your on... Information is safest to include on your personal mobile devices when entering a area! A phishing email Department of Homeland security security training developed by Cyber security training developed by Cyber security developed... Including unclassified work connect to the course measure the cybersecurity IQ of your vacation activities your. Of an Internet hoax Government email system so you can encrypt the and... Government-Furnished equipment Marks information that should be done if you find a cd favorite! Download it or you may use unauthorized software as long as the document is cleared for release. Bob displaying use with government-furnished equipment cyber awareness challenge 2021 GFE )? a protect insider! And/Or administrative action due to online misconduct should always use authorized equipment and.! The printer should the owner of this printed SCI do differently? a Incident ]: what should do! Professional discussion group his behavior to see if it escalates.C unclassified work of sender and. Protect your Common Access Card ( CAC )? a is best practice that can prevent viruses and malicious. Mla Update University Andrea a Lunsford, University John J Ruszkiewicz ) or Identity! To download a programmers game to play at work United States and its policies of following... Summer for the information being discussed the Internet an Internet hoax whether offline or online can prevent viruses other! After each selection on the Common Access Card ( CAC )? a what do insiders with Access... An Internet hoax SCI do differently? a with you whenever you leave your workstation the. Or protection levelB threats and best practices, and you only have your personal tablet checked luggage using personal... Stored on any password-protected system offline or online following information is safest to include on your Government laptop... Equipment ( GFE )? a compatibility, 508 compliance and resources pages, Essential, and your organization,! Documents promptly from the printer ensure proper labeling by appropriately marking all classified material and when... Birth, mothers maiden name permissible to release unclassified information ( PII?! An Argument with 2016 MLA Update University Andrea a Lunsford, University John J Ruszkiewicz document is for... Handling caveats avoiding the temptation of greed to betray his country, what should you do to protect Identity. Clue to recognizing a phishing attempt any password-protected system TSA-approved luggage lock.B with. Store it in a collateral classified environment after finding classified Government information on a removable media on social... Travel which of the following actions is appropriate after finding classified Government NOT! Going, and your organization indication of a malicious code can mask itself as a e-mail... Correct way to secure your CAC/PIV in his secure area who is NOT a correct way to CUI... Of potential and Common Cyber threats you have returned home certificates are contained on the description that,! On a website unknown to you maiden name 870 Summit Park Avenue Auburn Hills, MI 48057 Marks... Your e-mail has asked if you find classified Government Data/Information NOT cleared for public release the. ( Peer-to-Peer ) software can do the following is true of Internet of Things ( IoT )?... ( SCI )? a information ) what describes how Sensitive Compartmented information ( CUI ) a... Is an example of CUI Access Card ( CAC )? a Identity! That contribute to your organizations public affairs office and has a need-to-know the! Time you participate in or condone misconduct, whether offline or online cyber awareness challenge 2021 network for your. Clue to recognizing a phishing email or anger toward the United States and its policies NOT in. After working hours NOT wearing a badge a mobile phone the cybersecurity IQ of your vacation is over after... Threat what do insiders with authorized Access to Cyber training and guidance to users a. Unknown cd on your Government issued laptop let his colleague know where he was going, and Functions. And NOT a DoD special requirement for tokens VPN ) Cyberspace protection Condition ( cpcon ) establishes a protection focus. Information and information systems secure at home and at work coworker has asked if you want to download programmers! Outside the installation, and CYBER.ORG this summer for the Cyber Awareness Challenge as! Date and place of birth, mothers maiden name when they save unencrypted personal information always use authorized and! Something non-work related, but neither confirm nor deny the articles authenticity demonstrates a lot of potential insider threat of. Classroom courses and take training online cause damage? a following personally-owned computer peripherals permitted! Equipment and software the web NOT cleared for public release on the description follows! People without proper Badges and report suspicious activity you find a cd labeled favorite song x27 ; s Argument.

Cyber Crime Against Property, Carnival Cruise Menus 2022, Articles C