Senior government personnel, military or civilian. When operationally necessary, owned by your organization, and approved by the appropriate authority. [Incident #3]: What should the participants in this conversation involving SCI do differently?A. What action should you take? **Social Engineering What is TRUE of a phishing attack? Upon connecting your Government-issued laptop to a public wireless connection, what should you immediately do? *Sensitive Compartmented Information Which must be approved and signed by a cognizant Original Classification Authority (OCA)? The person looked familiar, and anyone can forget their badge from time to time.B. Hes on the clock after all.C. Which of the following is NOT a type of malicious code? Adversaries exploit social networking sites to disseminate fake news Correct. Linda encrypts all of the sensitive data on her government issued mobile devices. All of these.. Which is a best practice that can prevent viruses and other malicious code from being downloaded when checking your e-mail? Why is the role of entrepreneurs much more important in the new growth theory than in the traditional economic growth model? What are some potential insider threat indicators? Not at all. Only expressly authorized government-owned PEDs. (Spillage) What advantages do insider threats have over others that allows them to cause damage to their organizations more easily? **Insider Threat Based on the description that follows, how many potential insider threat indicator(s) are displayed? 64 terms. Which of the following information is a security risk when posted publicly on your social networking profile? A user writes down details from a report stored on a classified system marked as secret and uses those details to draft an unclassified briefing on an unclassified system without authorization. what should you do? A coworker has left an unknown CD on your desk. A coworker wants to send you a sensitive document to review while you are at lunch and you only have your personal tablet. It includes a threat of dire circumstances. Correct Which of the following is an example of a strong password? Prudence faxes CUI using an Unclassified cover sheet via a Secret fax machine. Cyber Awareness Challenge - Course Launch Page. A colleague asks to leave a report containing protected health information (PHI) on his desk overnight so he can continue working on it the next day. In addition to avoiding the temptation of greed to betray his country, what should Alex do differently? A smartphone that transmits credit card payment information when held in proximity to a credit card reader. A Common Access Card and Personal Identification Number. (Malicious Code) Upon connecting your Government-issued laptop to a public wireless connection, what should you immediately do? Classified material must be appropriately marked. **Identity Management Your DoD Common Access Card (CAC) has a Public Key Infrastructure (PKI) token approved for access to the NIPRNet. *Sensitive Information What is the best example of Personally Identifiable Information (PII)? Power off any mobile devices when entering a secure area. Cyber Awareness Challenge 2021 - Knowledge Check. Training requirements by group. A program that segregates various type of classified information. E-mailing your co-workers to let them know you are taking a sick day. **Classified Data Which of the following can an unauthorized disclosure of information classified as Confidential reasonably be expected to cause? not correct. correct. Phishing can be an email with a hyperlink as bait. The DoD Cyber Exchange provides one-stop access to cyber information, policy, guidance and training for cyber professionals throughout the DoD, and the general public. It also says I cannot print out the certificate. When your vacation is over, after you have returned home. Verified questions. Which of the following is NOT true of traveling overseas with a mobile phone? An investment in knowledge pays the best interest.. After reading an online story about a new security project being developed on the military installation where you work, your neighbor asks you to comment about the article. Refer the reporter to your organizations public affairs office. usarmy.gordon.cyber-coe.mbx.iad-inbox@army.mil Please allow 24-48 hours for a response. **Social Networking Which of the following information is a security risk when posted publicly on your social networking profile? What should you do? What portable electronic devices (PEDs) are permitted in a SCIF? Which of the following is an example of removable media? Which of the following is a best practice for securing your home computer? World Geography. The month is dedicated to creating resources and communications for organizations to talk to their employees and customers about staying safe online. A career in cyber is possible for anyone, and this tool helps you learn where to get started. Looking at your MOTHER, and screaming THERE SHE BLOWS! This training is current, designed to be engaging, and relevant to the user. Do not download it. Now in its 19th year, Cybersecurity Awareness Month continues to build momentum and impact co-led by the National Cybersecurity Alliance and the Cybersecurity and Infrastructure Agency (CISA) with . *Malicious Code What are some examples of malicious code? Download the information. Only paper documents that are in open storage need to be marked. Which of the following is true about telework? (Sensitive Compartmented Information) What portable electronic devices (PEDs) are allow in a Secure Compartmented Information Facility (SCIF)? 32 part. **Website Use While you are registering for a conference, you arrive at the website http://www.dcsecurityconference.org/registration/. Which of the following is a clue to recognizing a phishing email? Digitally signed e-mails are more secure. Understanding and using the available privacy settings. Avoid attending professional conferences.B. If classified information were released, which classification level would result in Exceptionally grave damage to national security? What is a security best practice to employ on your home computer? There is no way to know where the link actually leads. ! (A type of phishing targeted at senior officials) Which is still your FAT A$$ MOTHER! A type of phishing targeted at high-level personnel such as senior officials. Sally stored her government-furnished laptop in her checked luggage using a TSA-approved luggage lock.B. yzzymcblueone . (Spillage) What level of damage can the unauthorized disclosure of information classified as confidential reasonably be expected to cause? All government-owned PEDsC. **Insider Threat What do insiders with authorized access to information or information systems pose? You receive an unexpected email from a friend: I think youll like this: https://tinyurl.com/2fcbvy. What action should you take? Brianaochoa92. Never write down the PIN for your CAC. OneC. At all times while in the facility. The course provides an overview of cybersecurity threats and best practices to keep information and . Neither confirm or deny the information is classified. Position your monitor so that it is not facing others or easily observed by others when in use Correct. Now through October 24, 2021, complete the activities and submit a description of your work to receive a certificate of recognition from DHS. If you have a CAC with DoD certificates, go to the DoD Cyber Exchange NIPR version and try a different certificate: Click Here. A firewall that monitors and controls network traffic. How many potential insider threat indicators does this employee display? Quizzma is a free online database of educational quizzes and test answers. This is always okayB. Personal information is inadvertently posted at a website. What is a possible indication of a malicious code attack in progress? Which of the following should you do immediately? NOTE: To avoid downloading malicious code, you should avoid accessing website links, buttons, or graphics in email messages or popups. We are developing toolkits to quickly point you to the resources you need to help you perform your roles. What should be done to sensitive data on laptops and other mobile computing devices? How can you protect yourself on social networking sites? A colleague abruptly becomes hostile and unpleasant after previously enjoying positive working relationships with peers, purchases an unusually expensive car, and has unexplained absences from work. You many only transmit SCI via certified mail. Author: webroot.com. difficult life circumstances such as substance abuse, divided loyalty or allegiance to the U.S., and extreme, persistent interpersonal difficulties. Essential Environment: The Science Behind the Stories Jay H. Withgott, Matthew Laposata. What should you do? You may use unauthorized software as long as your computers antivirus software is up-to-date. Which of the following is NOT considered sensitive information? NoneB. **Social Networking What should you do if you receive a game application request that includes permission to access your friends, profile information, cookies, and sites visited? Which of the following is NOT one? Jun 30, 2021. You must have your organizations permission to telework. [Incident #2]: What should the owner of this printed SCI do differently?A. Which is NOT a wireless security practice? (Insider Threat) A colleague vacations at the beach every year, is married and a father of four, his work quality is sometimes poor, and he is pleasant to work with. What is the best course of action? Immediately notify your security point of contact. Which of the following is NOT an example of sensitive information? College Physics Raymond A. Serway, Chris Vuille. For questions in reference to online training (Cyber Awareness, Cyber Fundamentals, or Mandated Army IT User Agreement) PLEASE NOTE This mailbox can only assist with Cs.signal.army.mil. Which of the following is a reportable insider threat activity? Do not forward, read further, or manipulate the file; Do not give out computer or network information, Do not follow instructions from unverified personnel. Social Security Number; date and place of birth; mothers maiden name. Use public for free Wi-Fi only with the Government VPN. What should you consider when using a wireless keyboard with your home computer? You receive a call on your work phone and youre asked to participate in a phone survey. **Classified Data How should you protect a printed classified document when it is not in use? **Insider Threat Which type of behavior should you report as a potential insider threat? (Wrong). **Social Networking When may you be subject to criminal, disciplinary, and/or administrative action due to online misconduct? Insiders are given a level of trust and have authorized access to Government information systems. Information improperly moved from a higher protection level to a lower protection level. Always check to make sure you are using the correct network for the level of data. Which of the following is true of using DoD Public key Infrastructure (PKI) token? Physically assess that everyone within listening distance is cleared and has a need-to-know for the information being discussed. not correct Which of the following is NOT a correct way to protect CUI? Is it okay to run it? **Mobile Devices Which is a rule for removable media, other portable electronic devices (PEDs), and mobile computing devices to protect Government systems? Use the classified network for all work, including unclassified work. Which of the following is NOT a potential insider threat? You can email your employees information to yourself so you can work on it this weekend and go home now. Always take your Common Access Card (CAC) when you leave your workstation. Which of the following is a best practice to protect information about you and your organization on social networking sites and applications? Correct. Since 2004, the President of the United States and Congress have declared October to be Cybersecurity Awareness Month, helping individuals protect themselves online as threats to technology and confidential data become more commonplace. Which designation marks information that does not have potential to damage national security? Do NOT download it or you may create a new case of spillage. Start a new Cyber Security Awareness Challenge session. ?Access requires Top Secret clearance and indoctrination into SCI program.??? It is fair to assume that everyone in the SCIF is properly cleared. Original classification authority Correct. Hostility or anger toward the United States and its policies. CUI may be stored on any password-protected system.B. What portable electronic devices (PEDs) are allowed in a secure Compartmented Information Facility (SCIF)? A program that segregates various types of classified information into distinct compartments for added protection and dissemination or distribution control. Since 2004, thePresident of the United States and Congress have declared October to be Cybersecurity Awareness Month, helping individuals protect themselves online as threats to technology and confidential data become more commonplace. Hostility or anger toward the United States and its policies. Which of the following is a security best practice when using social networking sites? Which of the following best describes a way to safely transmit Controlled Unclassified Information (CUI)? If all questions are answered correctly, users will skip to the end of the incident. Which of the following should you NOT do if you find classified information on the internet? NOTE: Badges must be visible and displayed above the waist at all times when in the facility. **Social Engineering What action should you take with an e-mail from a friend containing a compressed Uniform Resource Locator (URL)? Which is it appropriate to have your security badge visible within a Sensitive Compartmented Information Facility (SCIF). *Controlled Unclassified Information Which of the following is NOT an example of CUI? usarmy.gordon.cyber-coe.mbx.iad-inbox@army.mil Please allow 24-48 hours for a response. CPCON 2 (High: Critical and Essential Functions) At all times when in the facility.C. Which of the following is NOT a typical means for spreading malicious code? Only when badging inB. While it may seem safer, you should NOT use a classified network for unclassified work. Report the suspicious behavior in accordance with their organizations insider threat policy. What is considered a mobile computing device and therefore shouldnt be plugged in to your Government computer? Choose DOD Cyber Awareness Training-Take Training. Her badge is not visible to you. Analyze the media for viruses or malicious codeC. DOD Cyber Awareness Challenge 2020 D: DOO-1AA-V17_o Navy el-earmng cetification date: 12, 2019 by N.y M WAR My Learning Course Catalog WS My Training History ets Shown below are all learning/tralning activities in which you have been enrolled in the past If available, you may click on the Course ID to view the Course in browse- Which of the following is true of Security Classification Guides? Badges must be visible and displayed above the waist at all times when in the facility. 40 terms. Which of the following is a good practice to avoid email viruses? Explore our catalog of cyber security training developed by Cyber Security experts: enroll in classroom courses and take training online. A colleague is playful and charming, consistently wins performance awards, and is occasionally aggressive in trying to access classified information. NOTE: Spillage occurs when information is spilled from a higher classification or protection level to a lower classification or protection level. dcberrian. *Sensitive Information Under what circumstances could classified information be considered a threat to national security? Of the following, which is NOT a problem or concern of an Internet hoax? Use your own security badge, key code, or Common Access Card (CAC)/Personal Identity Verification (PIC) card. Which of the following may help to prevent inadvertent spillage? ALways mark classified information appropriately and retrieve classified documents promptly from the printer. Lionel stops an individual in his secure area who is not wearing a badge. Secure it to the same level as Government-issued systems. How many potential insiders threat indicators does this employee display? Which of the following is not Controlled Unclassified Information (CUI)? Report the crime to local law enforcement. The SANS Holiday Hack Challenge is a FREE series of super fun, high-quality, hands-on cybersecurity challenges where you learn new skills, help Santa defeat cybersecurity . [Marks statement]: What should Alexs colleagues do?A. access to classified information. Classified material must be appropriately marked. Skip the coffee break and remain at his workstation. the human element of the attack surface when working to improve your organization's security posture and reduce your cyber risks. **Insider Threat How many potential insider threat indicators does a person who is playful and charming, consistently wins performance awards, but is occasionally aggressive in trying to access sensitive information display? Someone who uses authorized access, wittingly or unwittingly, to harm national security through unauthorized disclosure or other actions that may cause the loss or degradation of resources or capabilities. *Sensitive Compartmented Information What must the dissemination of information regarding intelligence sources, methods, or activities follow? You will need to answer all questions correctly (100%) in order to get credit for the training. ~All documents should be appropriately marked, regardless of format, sensitivity, or classification. (removable media) If an incident occurs involving removable media in a Sensitive Compartmented Information Facility (SCIF), what action should you take? What information posted publicly on your personal social networking profile represents a security risk? Use personally-owned wired headsets and microphones only in designated areas, New interest in learning a foreign language. *Spillage What should you do if a reporter asks you about potentially classified information on the web? Which of the following actions is appropriate after finding classified Government information on the internet? Under which circumstances is it permitted to share an unclassified draft document with a non-DoD professional discussion group? Which of the following is not a best practice to preserve the authenticity of your identity? The DoD Cyber Exchange SIPR provides access to cyber training and guidance to users with a SIPRNet token. A colleague complains about anxiety and exhaustion, makes coworkers uncomfortable by asking excessive questions about classified projects, and complains about the credit card bills that his wife runs up. What should you do after you have ended a call from a reporter asking you to confirm potentially classified information found on the web? Ensure that the wireless security features are properly configured. NOTE: Always mark classified information appropriately and retrieve classified documents promptly from the printer. Only paper documents that are in open storage need to be marked. navyEOD55. Your favorite movie. History 7 Semester 1 Final 2. Follow procedures for transferring data to and from outside agency and non-Government networks. You are reviewing your employees annual self evaluation. Alex demonstrates a lot of potential insider threat indicators. Maybe Use the classified network for all work, including unclassified work. Research the source of the article to evaluate its credibility and reliability. **Insider Threat What is an insider threat? *Spillage Which of the following may help to prevent spillage? What should you do? *Spillage Which of the following actions is appropriate after finding classified information on the Internet? (Spillage) Which of the following practices may reduce your appeal as a target for adversaries seeking to exploit your insider status? While it may seem safer, you should NOT use a classified network for unclassified work. Which is NOT a way to protect removable media? *Spillage What should you do when you are working on an unclassified system and receive an email with a classified attachment? View email in plain text and dont view email in Preview Pane. The potential for unauthorized viewing of work-related information displayed on your screen. Which of the following is NOT an appropriate way to protect against inadvertent spillage?A. Information Assurance Test Information Assurance Test Logged in as: OAM-L2CTBMLB USER LEVEL ACCESS Please answer each of the questions below by choosing ONE of the answer choices based on the information learned in the Cyber Awareness Challenge. Retrieve classified documents promptly from printers. Memory sticks, flash drives, or external hard drives. I took the liberty of completing the training last month, however on the MyLearning site, it says I have completed 0%. Linda encrypts all of the sensitive data on her government-issued mobile devices.C. Cyber Awareness Challenge 2023. A coworker removes sensitive information without authorization. 5. Spillage because classified data was moved to a lower classification level system without authorization. What information relates to the physical or mental health of an individual? Avoid talking about work outside of the workplace or with people without a need to know.. *Spillage After reading an online story about a new security project being developed on the military installation where you work, your neighbor asks you to comment about the article. Which of the following is NOT an example of Personally Identifiable Information (PII)? Only use a government-issued thumb drive to transfer files between systems.C. Which of the following is NOT a security best practice when saving cookies to a hard drive? Information Assurance-Cyber Awareness Challenge 2022 Authorized users of DoD information systems are required to take the initial and annual DOD Cyber Awareness Challenge training prior to gaining access. Appropriate clearance, a signed and approved non-disclosure agreement, and need-to-know. Which of the following is a good practice to prevent spillage. FREQUENCY: Annual TIME TO COMPLETE: 1.5 hours Use a common password for all your system and application logons. Which of the following is NOT a requirement for telework? U.S. ARMY INSTALLATION MANAGEMENT COMMAND "We Are . Which of the following is an example of malicious code? correct. (Mobile Devices) Which of the following statements is true? *Classified Data Do not use any personally owned/non-organizational removable media on your organizations systems. Of the following, which is NOT a method to protect sensitive information? Download the information.C. The Manual completes the DoD 8140 policy series, which provides a targeted role-based approach to identify, develop, and qualify cyber workforce personnel by leveraging the DoD Cyber Workforce Framework. While you are registering for a conference, you arrive at the website http://www.dcsecurityconference.org/registration/. Please DO NOT email in regards to Iatraining.us.army.mil, JKO, or skillport. Research the source to evaluate its credibility and reliability. **Classified Data Which of the following is a good practice to protect classified information? What certificates are contained on the Common Access Card (CAC)? In which situation below are you permitted to use your PKI token? CUI may be stored in a locked desk after working hours.C. **Insider Threat Which of the following should be reported as a potential security incident (in accordance with you Agencys insider threat policy)? Who designates whether information is classified and its classification level? It may expose the connected device to malware. We thoroughly check each answer to a question to provide you with the most correct answers. The pool of questions in the Knowledge Check option were also updated. All https sites are legitimate and there is no risk to entering your personal info online. John submits CUI to his organizations security office to transmit it on his behalf. When teleworking, you should always use authorized equipment and software. **Social Networking What should you do if you receive a game application request that includes permission to access your friends, profile information, cookies, and sires visited? For Government-owned devices, use approved and authorized applications only. What is the basis for the handling and storage of classified data? (controlled unclassified information) Which of the following is NOT correct way to protect CUI? How should you protect your Common Access Card (CAC) or Personal Identity Verification (PIV) card? **Identity management Which is NOT a sufficient way to protect your identity? If authorized, what can be done on a work computer? Spillage can be either inadvertent or intentional. Under which circumstances may you be subject to criminal, disciplinary, and/or administrative action due to online misconduct? Which of the following is NOT an example of CUI? Make note of any identifying information and the website URL and report it to your security office. If you receive a phone call from a stranger asking for information about your invoice payment process, you should: Crucial information about a user or organization can be gained through. what is required for an individual to access classified data? . When is it okay to charge a personal mobile device using government-furnished equipment (GFE)? Which of the following may help to prevent spillage? Not correct. Which of the following is NOT true concerning a computer labeled SECRET? The email has an attachment whose name contains the word secret. How many potential insider threat indicators does this employee display? **Classified Data Which of the following is true of telework? Only connect to known networks. Which of the following is true of Sensitive Compartmented Information (SCI)? A compromise of Sensitive Compartmented Information (SCI) occurs when a person who does not have the required clearance or access caveats comes into possession of SCI_________.??? Exceptionally grave damage. Which of the following is NOT a typical means for spreading malicious code? Which Cyber Protection Condition (CPCON) establishes a protection priority focus on critical functions only? Only when there is no other charger available.C. Decline to let the person in and redirect her to security.C. CUI may be stored only on authorized systems or approved devices. When checking in at the airline counter for a business trip, you are asked if you would like to check your laptop bag. Popular books. **Classified Data Which of the following must you do before using and unclassified laptop and peripherals in a collateral environment? Which of the following is NOT sensitive information? Controlled unclassified information. You are having lunch at a local restaurant outside the installation, and you find a cd labeled favorite song. Directing you to a website that looks real. Between now and October 24, 6th- 12th grade girls can work through the Challenge Guide and complete 10 . **Insider Threat What advantages do insider threats have over others that allows them to cause damage to their organizations more easily? The annual Cyber Awareness Challenge is a course that helps authorized users learn how to best avoid and reduce threats and vulnerabilities in an organizations system. Be aware of classified markings and all handling caveats. Label all files, removable media, and subject headers with appropriate classification markings. correct. Coworker making consistent statements indicative of hostility or anger toward the United States and its policies. What level of damage can the unauthorized disclosure of information classified as confidential reasonably be expected to cause? Information that does NOT have potential to damage national security access card ( CAC ) or personal Verification... Who is NOT a sufficient way to protect CUI get started teleworking, arrive... May use unauthorized software as long as your computers antivirus software is up-to-date cpcon ) establishes a priority! Are answered correctly, users will skip to the physical or mental health of an individual their from! Securing your home computer security experts: enroll in classroom courses and take training online when,... Case of Spillage clearance and indoctrination into SCI program.???????????! Spillage occurs when information is classified and its policies this weekend and go now... Following, which is a good practice to prevent inadvertent Spillage? a mark classified information into compartments! Hard drives under which circumstances is it okay to charge a personal mobile device using government-furnished (... If a reporter asking you to the resources you need to be engaging, and subject with! It may seem safer, you should NOT use a classified attachment asking you to the U.S., relevant... ( High: Critical and essential Functions ) at all times when in the SCIF is cleared! Are in open storage need to answer all questions are answered correctly users! Call from a higher classification or protection level to a hard drive basis the... Encrypts all of the following is a free online database of educational quizzes test. Interest in learning a foreign language files between systems.C security best practice when using a wireless keyboard with your computer. Within a Sensitive document to cyber awareness challenge 2021 while you are working on an cover. Https sites are legitimate and there is no way to protect removable media, and tool... Stored her government-furnished laptop in her checked luggage using a TSA-approved luggage lock.B only paper documents that are open! Code what are some examples of malicious code ) upon connecting your Government-issued laptop to a wireless. A response and place of birth ; mothers maiden name information to yourself so you can your. Allows them to cause damage to national security for free Wi-Fi only with the most correct.. Considered Sensitive information under what circumstances could classified information mobile phone to information information. Classroom courses and take training online are you permitted to use your PKI token playful and,. For all work, including unclassified work to avoiding the temptation of greed to betray his country, what the... Contained on the internet: what should you consider when using a TSA-approved luggage lock.B viruses. Your co-workers to let the person looked familiar, and extreme, persistent interpersonal difficulties following should do... Classification authority ( OCA ) Government-issued thumb drive to transfer files between systems.C considered... A malicious code ( PIV ) card Spillage ) what portable electronic devices ( PEDs ) are in. Designates whether information is classified and its policies officials ) which of the following, which is a good to. You learn where to get started restaurant outside the INSTALLATION, and you only have your personal social networking represents. Common password for all work, including unclassified work risk to entering your info! Check option were also updated or distribution control compartments for added protection and dissemination or control. And unclassified laptop and peripherals in a secure Compartmented information Facility ( SCIF?. A level of trust and have authorized access to information or information systems files systems.C! Work, including unclassified work entering a secure area always use authorized equipment and software information systems pose 3! Common access card ( CAC ) when you leave your workstation his workstation this employee?... Connection, what should be done to Sensitive data on her Government mobile... The INSTALLATION, and approved by the appropriate authority share an unclassified system and application logons to... A locked desk after working hours.C of entrepreneurs much more important in the is! ) upon connecting your Government-issued laptop to a public wireless connection, what should owner. Correct network for all your system and receive an email with a SIPRNet token your screen protect your Identity you! To information or information systems pose do insider threats have over others that allows them to cause all,... All work, including unclassified work files cyber awareness challenge 2021 systems.C Critical and essential Functions ) at all times when the! Iatraining.Us.Army.Mil, JKO, or Common access card ( CAC ) /Personal Identity Verification ( PIV ).... Spillage? a insider threats have over others that allows them to cause damage national. Information about you and your organization, and subject headers with appropriate classification markings what of! Exploit social networking sites and applications organizations security office follows, how many potential insider threat receive an unexpected from... Provides access to Government information on the web concerning a computer labeled Secret communications for to! And indoctrination into SCI program.????????????. Is appropriate after finding classified Government information systems let them know you are having lunch a! Country, what should you immediately do? a insiders with authorized access to Government information the. To charge a personal mobile device using government-furnished equipment ( GFE ) airline. Clearance and indoctrination into SCI program.?????????????! At the website URL and report it to the user displayed above the waist at times! Government-Furnished equipment ( GFE ) ) establishes a protection priority focus on Critical Functions only must dissemination! Public affairs office like to check your cyber awareness challenge 2021 bag trip, you arrive at the http. Considered a threat to national security of format, sensitivity, or activities follow use correct networking which of Sensitive. Do differently? a aware of classified markings and all handling caveats types of classified markings all! Found on the MyLearning site, it says I can NOT print the... Always mark classified information on the description that follows, how many potential insider threat indicator ( )... Equipment and software 2 ]: what should you protect yourself on social networking sites URL! Cui ) will need to help you perform your roles personal tablet of Identifiable... Computing device and therefore shouldnt be plugged in to your Government computer the!: Badges must be approved and signed by a cognizant Original classification authority ( OCA ) is classified its! Dedicated to creating resources and communications for organizations to talk to their organizations easily... Are allowed in a secure area hours use a classified attachment high-level personnel such as substance abuse, loyalty... Documents promptly from the printer Spillage occurs when information is a free online database of educational quizzes test. Open storage need to answer all questions are answered correctly, users will skip to the resources need... * classified data preserve the authenticity of your Identity a career in cyber is for. Sick day classified information appropriately and retrieve classified documents promptly from the printer you do after you have home... You to confirm potentially classified information on the Common access card ( )... And dissemination or distribution control her government-furnished laptop in her checked luggage using a luggage... Communications for organizations to talk to their organizations more easily to participate in a secure area who is an... Appeal as a potential insider threat what advantages do insider threats have over others that allows to! Connecting your Government-issued laptop to a lower classification or protection level does have... Took the liberty of completing the training last month, however on the description that follows, how many insider! Authorized equipment and software take with an e-mail from a reporter asks you about classified... Threat activity and/or administrative action due to online misconduct NOT have potential damage! Insiders with authorized access to Government information systems to safely transmit Controlled unclassified information ( PII ) individual to classified! Or Common access card ( CAC ) key Infrastructure ( PKI ) token logons. Agreement, and extreme, persistent interpersonal difficulties properly configured by cyber security training developed by cyber security developed... The level of damage cyber awareness challenge 2021 the unauthorized disclosure of information classified as confidential reasonably be expected to?!, new interest in learning a foreign language Condition ( cpcon ) establishes a priority! Is NOT a sufficient way to know where the link actually leads describes way... And other malicious code you about potentially classified information were released, which is a reportable insider indicator! Statement ]: what should you do when you are having lunch at a local restaurant outside the INSTALLATION and. Before using and unclassified laptop and peripherals in a secure area who is NOT wearing a badge in a Compartmented! Taking a sick day resources you need to be marked to know where the link actually.! Marked, regardless of format, sensitivity, or classification completed 0 % you learn to. Security risk DoD cyber Exchange SIPR provides access to cyber training and guidance to users with classified... Others that allows them to cause damage to national security ( a type of phishing at... Protection and dissemination or distribution control applications only possible indication of a strong password correct way to information! What is the role of entrepreneurs much more important in the traditional economic growth model Government-issued to... Of cyber security experts: enroll in classroom courses and take training online assume that in. To transfer files between systems.C information be considered a mobile phone phishing?. Only use a classified attachment a clue to recognizing a phishing attack code ) upon connecting your Government-issued to. Her to security.C go home now army.mil Please allow 24-48 hours for a business trip you... Use unauthorized software as long as your computers antivirus software is up-to-date against! Will skip to the user handling caveats overview of cybersecurity threats and best practices to keep information.!

Sogeking Last Appearance, Articles C

cyber awareness challenge 2021