cyber awareness challenge 2021

~All documents should be appropriately marked, regardless of format, sensitivity, or classification. Dont allow other access or to piggyback into secure areas. If an incident occurs, you must notify your security POC immediately. Media containing Privacy Act information, PII, and PHI is not required to be labeled. Essential Environment: The Science Behind the Stories Jay H. Withgott, Matthew Laposata. When is it okay to charge a personal mobile device using government-furnished equipment (GFE)? Exceptionally grave damage. Unusual interest in classified information. How can you protect yourself from social engineering? What should be your response? Based on the description that follows, how many potential insider threat indicator(s) are displayed? When leaving your work area, what is the first thing you should do? [Alexs statement]: In addition to avoiding the temptation of greed to betray his country, what should Alex do differently?A. A coworker removes sensitive information without authorization. Share sensitive information only on official, secure websites. **Classified Data Which of the following must you do before using and unclassified laptop and peripherals in a collateral environment? It contains certificates for identification, encryption, and digital signature. Paul verifies that the information is CUI, includes a CUI marking in the subject header, and digitally signs an e-mail containing CUI. What is the danger of using public Wi-Fi connections? Which must be approved and signed by a cognizant Original Classification Authority (OCA)? What action should you take? A Knowledge Check option is available for users who have successfully completed the previous version of the course. be wary of suspicious e-mails that use your name and/or appear to come from inside your organization. They can be part of a distributed denial-of-service (DDoS) attack. (Mobile Devices) Which of the following statements is true? Corrupting filesB. Contact the IRS using their publicly available, official contact information. Which of the following should be reported as potential security incident? Assume the bonds are issued at par on May 1, 2018. c. Record each of the transactions from part a in the financial statement effects template. They broadly describe the overall classification of a program or system. Linda encrypts all of the sensitive data on her government-issued mobile devices. **Insider Threat Which of the following should be reported as a potential security incident (in accordance with you Agencys insider threat policy)? Which of the following is NOT an appropriate way to protect against inadvertent spillage? What action should you take? Which of the following is true of the Common Access Card (CAC)? (Answer) CPCON 2 (High: Critical and Essential Functions) CPCON 1 (Very High: Critical Functions) CPCON 3 (Medium: Critical, Essential, and Support Functions) CPCON 4 (Low: All Functions) CPCON 5 (Very Low: All Functions). What should you do if someone asks to use your government issued mobile device (phone/laptop..etc)? Exposure to malwareC. What is the best choice to describe what has occurred? Coworker making consistent statements indicative of hostility or anger toward the United States in its policies. Which of these is true of unclassified data? 32 part. Using webmail may bypass built in security features. How should you respond? Which of the following includes Personally Identifiable Information (PII) and Protected Health Information (PHI)? Approved Security Classification Guide (SCG). Government-owned PEDs when expressly authorized by your agency. Please DO NOT email in regards to Iatraining.us.army.mil, JKO, or skillport. Government-owned PEDs, if expressly authorized by your agency. The telephone does not necessarily represent a security violation. The notepad does not necessarily represent a security violation. **Social Engineering Which of the following is a practice that helps to prevent the download of viruses and other malicious code when checking your email? In addition to avoiding the temptation of greed to betray his country, what should Alex do differently? A headset with a microphone through a Universal Serial Bus (USB) port. Even within a secure facility, dont assume open storage is permitted. It is created or received by a healthcare provider, health plan, or employer. Use only your personal contact information when establishing your account. What is the response to an incident such as opening an uncontrolled DVD on a computer in a SCIF. Which of the following statements is true? Ensure that any cameras, microphones, and Wi-Fi embedded in the laptop are physically disabled.- Correct. A colleague abruptly becomes hostile and unpleasant after previously enjoying positive working relationships with peers, purchases an unusually expensive new car, and has unexplained absences from work. STEPS TO COMPLETE THE CYBER AWARENESS CHALLENGE You can complete this course on any electronic device. **Social Networking Which of the following statements is true? Issues with Cyber Awareness Challenge. NOTE: Malicious code can cause damage by corrupting files, erasing your hard drive, and/or allowing hackers access. *Sensitive Compartmented Information Which must be approved and signed by a cognizant Original Classification Authority (OCA)? *Spillage .What should you do if a reporter asks you about potentially classified information on the web? Follow procedures for transferring data to and from outside agency and non-Government networks. The challenges goal is simple: To change user behavior to reduce the risks and vulnerabilities DoD Information Systems face. Correct. In setting up your personal social networking service account, what email address should you use? So my training expires today. If you have a CAC with DoD certificates, go to the DoD Cyber Exchange NIPR version and try a different certificate: Click Here. Is this safe? The DISN facilitates the management of information resources, and is responsive to national security, as well as DOD needs. What should you do? Adversaries exploit social networking sites to disseminate fake news Correct. Between now and October 24, 6th- 12th grade girls can work through the Challenge Guide and complete 10 . Note any identifying information and the websites URL. Retrieve classified documents promptly from printers. At any time during the workday, including when leaving the facility. Let the person in but escort her back to her workstation and verify her badge. Erasing your hard driveC. Within a secure area, you see an individual you do not know. A colleague enjoys playing video games online, regularly use social media, and frequently forgets to secure her smartphone elsewhere before entering areas where it is prohibited. **Insider Threat Which type of behavior should you report as a potential insider threat? Here are some of the key takeaways for companies and individuals from the DoD Cyber Awareness Challenge 2020. **Insider Threat What advantages do insider threats have over others that allows them to cause damage to their organizations more easily? Classified information that should be unclassified and is downgraded. Not correct. Secure it to the same level as Government-issued systems. The annual Cyber Awareness Challenge is a course that helps authorized users learn how to best avoid and reduce threats and vulnerabilities in an organization's system. You know that this project is classified. You can email your employees information to yourself so you can work on it this weekend and go home now. For Government-owned devices, use approved and authorized applications only. What is considered a mobile computing device and therefore shouldnt be plugged in to your Government computer? Ensure proper labeling by appropriately marking all classified material and, when required, sensitive material. ~All documents should be appropriately marked, regardless of format, sensitivity, or classification. You receive an email from a company you have an account with. Which of the following is NOT a best practice to protect data on your mobile computing device? When I try to un-enroll and re-enroll, it does not let me restart the course. Looking for https in the URL. Avoid attending professional conferences.B. correct. Which of the following can an unauthorized disclosure of information.? If aggregated, the information could become classified. The website requires a credit card for registration. Publication of the long-awaited DoDM 8140.03 is here! Store your Common Access Card (CAC) or Personal Identity Verification (PIV) card in a shielded sleeve ~Write your password down on a device that only you access (e.g., your smartphone) Change your password at least every 3 months Enable two-factor authentication whenever available, even for personal accounts. Do not use any personally owned/ non-organizational removable media on your oranizations systems. NOTE: Classified DVD distribution should be controlled just like any other classified media. Which of the following is NOT a typical result from running malicious code? You are leaving the building where you work. (Sensitive Information) What must the dissemination of information regarding intelligence sources, methods, or activities follow? What is considered ethical use of the Government email system? *Controlled Unclassified Information Which of the following best describes a way to safely transmit Controlled Unclassified Information (CUI)? Always take your Common Access Card (CAC) when you leave your workstation. View email in plain text and dont view email in Preview Pane. You should remove and take your CAC/PIV card whenever you leave your workstation. Never write down the PIN for your CAC. These zip files contain all the Certification Authority (CA) certificates for the specified PKI in different formats. air force cyber awareness challenge The annual Cyber Awareness Challenge is a course that helps authorized users learn how to best avoid and reduce threats and vulnerabilities in an organizations system. (Sensitive Compartmented Information) What describes how Sensitive Compartmented Information is marked? You must have your organizations permission to telework. Annual DoD Cyber Awareness Challenge Training - 20 35 terms. correct. Other - Dod cyber awareness test 2021/2022; answered 100% 4. What should be your response? Nothing. Label the printout UNCLASSIFIED to avoid drawing attention to it.C. (Spillage) What level of damage can the unauthorized disclosure of information classified as confidential reasonably be expected to cause? not correct Before long she has also purchased shoes from several other websites. Three or more, NOTE: Alex demonstrates a lot of potential insider threat indicators, including difficult life circumstances, unexplained affluence, and unusual interest in classified information. You are logged on to your unclassified computer and just received an encrypted email from a co-worker. It is fair to assume that everyone in the SCIF is properly cleared. Explore our catalog of cyber security training developed by Cyber Security experts: enroll in classroom courses and take training online. Maybe. Telework is only authorized for unclassified and confidential information. UNCLASSIFIED is a designation to mark information that does not have potential to damage national security. *Spillage What should you do if you suspect spillage has occurred? Make note of any identifying information and the website URL and report it to your security office. Hes on the clock after all.C. [Prevalence]: Which of the following is an example of malicious code?A. A Cyber Awareness Challenge is a type of training and security certification that helps authorized users understand the actions required to avoid and reduce threats and vulnerabilities in an organization's system. How does Congress attempt to control the national debt? **Removable Media in a SCIF What action should you take when using removable media in a Sensitive Compartmented Information Facility (SCIF)? What should you do? Be aware of classified markings and all handling caveats. NOTE: To avoid downloading malicious code, you should avoid accessing website links, buttons, or graphics in email messages or popups. Store classified data in a locked desk drawer when not in use Maybe Is it acceptable to take a short break while a coworker monitors your computer while logged on with you common access card (CAC)? Prudence faxes CUI using an Unclassified cover sheet via a Secret fax machine. We thoroughly check each answer to a question to provide you with the most correct answers. *Spillage After reading an online story about a new security project being developed on the military installation where you work, your neighbor asks you to comment about the article. edodge7. *Sensitive Information What is the best example of Personally Identifiable Information (PII)? Please DO NOT email in regards to Iatraining.us.army.mil, JKO, or skillport. What should you do? Which of the following is NOT a correct way to protect sensitive information? usarmy.gordon.cyber-coe.mbx.iad-inbox@army.mil Please allow 24-48 hours for a response. DOD Cyber Awareness Challenge 2019 (DOD-IAA-V16.0) 35 terms. When unclassified data is aggregated, its classification level may rise. Darryl is managing a project that requires access to classified information. Physically assess that everyone within listening distance is cleared and has a need-to-know for the information being discussed. Acquisition. CPCON 3 (Medium: Critical, Essential, and Support Functions) Which of the following information is a security risk when posted publicly on your social networking profile? [Scene]: Which of the following is true about telework?A. What is a best practice to protect data on your mobile computing device? Use your own security badge, key code, or Common Access Card (CAC)/Personal Identity Verification (PIV) card. Correct **Travel Which of the following is true of traveling overseas with a mobile phone? How many potential insider threat indicators does this employee display? What should you consider when using a wireless keyboard with your home computer? You will need to answer all questions correctly (100%) in order to get credit for the training. Hold the conversation over email or instant messenger to avoid being overheard.C. The purpose of the Cyber Awareness Challenge is to influence behavior, focusing on actions that authorized users can engage to mitigate threats and vulnerabilities to DoD Information Systems. Which of the following should be reported as a potential security incident? **Mobile Devices Which of the following helps protect data on your personal mobile devices? How should you respond? You are having lunch at a local restaurant outside the installation, and you find a cd labeled favorite song. A program that segregates various type of classified information into distinct compartments for added protection and dissemination for distribution control. *Sensitive Compartmented Information What must the dissemination of information regarding intelligence sources, methods, or activities follow? Someone calls from an unknown number and says they are from IT and need some information about your computer. A colleague asks to leave a report containing protected health information (PHI) on his desk overnight so he can continue working on it the next day. **Social Networking When is the safest time to post details of your vacation activities on your social networking website? Correct. **Insider Threat Based on the description that follows, how many potential insider threat indicator(s) are displayed? Any time you participate in or condone misconduct, whether offline or online. CYBER: DoD Cyber Exchange Training Catalog DEFENSE ENTERPRISE OFFICE SOLUTION (DEOS) DEOS Webinar Schedule; DEFENSE INFORMATION SYSTEMS AGENCY (DISA) DISA Services Course; DEFENSE INFORMATION SYSTEMS NETWORK (DISN) DISA Global Telecommunications Seminar; INFORMATION ASSURANCE : Endpoint Security Solutions (ESS) Training; Antivirus Training Assess your surroundings to be sure no one overhears anything they shouldnt. Which of the following individuals can access classified data? Of the following, which is NOT a characteristic of a phishing attempt? (Malicious Code) What are some examples of malicious code? Biology Mary Ann Clark, Jung Choi, Matthew Douglas. The Cyber Awareness Challenge is the DoD baseline standard for end user awareness training by providing awareness content that addresses evolving requirements issued by Congress, the Office of Management and Budget (OMB), the Office of the Secretary of Defense, and Component input from the DoD CIO chaired Cyber Workforce Advisory Group (CWAG). Cyber Awareness Challenge - Course Launch Page. Badges must be removed when leaving the facility. Since the URL does not start with https, do not provide your credit card information. Which of the following is a concern when using your Government-issued laptop in public? **Use of GFE What is a critical consideration on using cloud-based file sharing and storage applications on your Government-furnished equipment (GFE)? If you receive a phone call from a stranger asking for information about your invoice payment process, you should: Crucial information about a user or organization can be gained through. What should be done to protect against insider threats? CPCON 5 (Very Low: All Functions). Accepting the default privacy settings. Power off any mobile devices when entering a secure area. Which of the following represents an ethical use of your Government-furnished equipment (GFE)? Which of the following is NOT Protected Health Information (PHI)? This annual refresh includes minor updates to the course technology for compatibility, 508 compliance and resources pages. Correct. Cyber Awareness Challenge 2023 - Answer. Ensure proper labeling by appropriately marking all classified material and, when required, sensitive material. (Malicious Code) What is a good practice to protect data on your home wireless systems? Since the URL does not start with https, do not provide you credit card information. When using your government-issued laptop in public environments, with which of the following should you be concerned? Refer the vendor to the appropriate personnel. 24 terms. How many potential insider threat indicators does this employee display? What does Personally Identifiable Information (PII) include? For questions in reference to online training (Cyber Awareness, Cyber Fundamentals, or Mandated Army IT User Agreement) PLEASE NOTE This mailbox can only assist with Cs.signal.army.mil. *Sensitive Compartmented Information What is a Sensitive Compartmented Information (SCI) program? The DoD Cyber Exchange Public provides limited access to publicly releasable cyber training and guidance to all Internet users. Nothing. **Social Networking Which piece if information is safest to include on your social media profile? **Social Networking As someone who works with classified information, what should you do if you are contacted by a foreign national seeking information on a research project? (social networking) Which of the following is a security best practice when using social networking sites? A compromise of Sensitive Compartmented Information (SCI) occurs when a person who does not have the required clearance or access caveats comes into possession of SCI_________.??? How many potential insider threat indicators does this employee display? When is it appropriate to have your security bade visible? Data about you collected from all sites, apps, and devices that you use can be aggregated to form a profile of you. Increase employee cybersecurity awareness and measure the cybersecurity IQ of your organization. It is releasable to the public without clearance. Quizzma is a free online database of educational quizzes and test answers. A coworker brings a personal electronic device into prohibited areas. Which of the following is NOT an example of sensitive information? Which of the following is NOT an example of CUI? Found a mistake? **Social Engineering What is TRUE of a phishing attack? (Spillage) What should you do when you are working on an unclassified system and receive an email with a classified attachment? correct. Store it in a General Services Administration (GSA)-approved vault or container. Which of the following is a good practice to avoid email viruses? Your cousin posted a link to an article with an incendiary headline on social media. Your password and the second commonly includes a text with a code sent to your phone. Overview: The Cyber Awareness Challenge serves as an annual refresher of security requirements, security best practices, and your security responsibilities. Only when there is no other charger available.C. Classified information that is intentionally moved to a lower protection level without authorization. Ask probing questions of potential network contacts to ascertain their true identity.C. It is getting late on Friday. Which is a best practice that can prevent viruses and other malicious code from being downloaded when checking your e-mail? Which of the following should you NOT do if you find classified information on the internet? Product Functionality Requirements: To meet technical functionality requirements, this awareness product was developed to function with Windows and Mac operating systems (Windows 7 and 10 and macOS 10.13 High Sierra, when configured correctly) using either Internet Explorer (IE) 11, Firefox 67 . Validate friend requests through another source before confirming them. Use a common password for all your system and application logons. Always use DoD PKI tokens within their designated classification level. Sensitive information may be stored on any password-protected system. What can you do to protect yourself against phishing? Please email theCISATeamwith any questions. what should you do? What should the participants in this conversation involving SCI do differently? John submits CUI to his organizations security office to transmit it on his behalf. CPCON 2 (High: Critical and Essential Functions) Is it okay to run it? In reality, once you select one of these, it typically installs itself without your knowledge. Correct. The purpose of Department of Defense Information Network Approved Products List (DODIN APL) is to maintain a single consolidated list of products that have completed Interoperability (IO) and Cybersecurity certification. What information should you avoid posting on social networking sites? Not correct RECOMMENDATION: We recommend that you approve for a period of not less than 30 days a moratorium for account restriction based on the dependency for Cyber Awareness Challenge date in DAF logon systems. Digitally signed e-mails are more secure. Based on the description that follows, how many potential insider threat indicator(s) are displayed? Which of the following is NOT true concerning a computer labeled SECRET? Which of the following is NOT one? Attempt to change the subject to something non-work related, but neither confirm nor deny the articles authenticity. You have reached the office door to exit your controlled area. What is the best response if you find classified government data on the internet? Not correct. A program that segregates various types of classified information into distinct compartments for added protection and dissemination or distribution control. The Cyber Awareness Challenge, which is also known as the Army Cyber Awareness Training, the cyber awareness challenge or the DOD cyber challenge, is an annual computer security training that was created to increase cyber awareness among Department of Defense (DoD) employees. Directing you to a website that looks real. **Home Computer Security How can you protect your information when using wireless technology? At all times while in the facility. What can help to protect the data on your personal mobile device. This training is current, designed to be engaging, and relevant to the user. Set up a situation to establish concrete proof that Alex is taking classified information. Product Functionality Requirements: To meet technical functionality requirements, this awareness product was developed to function with Windows and Mac operating systems (Windows 7 and 10 and macOS 10.13 High Sierra, when configured correctly) using either Internet Explorer (IE) 11, Firefox 92, Chrome 94, Microsoft . Updates also include revised or new content covering areas such as customized scams, protecting government-furnished equipment at home, and indicators of a potential cyber incident. Cyber Awareness Challenge 2021. **Social Networking What should you do if you receive a game application request that includes permission to access your friends, profile information, cookies, and sires visited? Store it in a locked desk drawer after working hours. Linda encrypts all of the sensitive data on her government-issued mobile devices.C. **Physical Security What is a good practice for physical security? There is no way to know where the link actually leads. A colleague often makes others uneasy with her persistent efforts to obtain information about classified project where she has no need-to-know, is vocal about her husband overspending on credit cards, and complains about anxiety and exhaustion. 4. 5. Which of the following is true of using DoD Public key Infrastructure (PKI) token? All to Friends Only. Which of the following may be helpful to prevent inadvertent spillage? Taking classified documents from your workspace. They can be part of a distributed denial-of-service (DDoS) attack. Ensure there are no identifiable landmarks visible in any photos taken in a work setting that you post. Alex demonstrates a lot of potential insider threat indicators. New interest in learning another language, Which of the following is a good practice to protect classified information. Security Classification Guides (SCGs).??? Which of the following is true of telework? The email states your account has been compromised and you are invited to click on the link in order to reset your password. **Mobile Devices What should you do when going through an airport security checkpoint with a Government-issued mobile device? Correct. Analyze the other workstations in the SCIF for viruses or malicious codeD. Which of the following is an example of two-factor authentication? Which of the following best describes wireless technology? (Malicious Code) Which are examples of portable electronic devices (PEDs)? Thats the only way we can improve. A colleague is playful and charming, consistently wins performance awards, and is occasionally aggressive in trying to access classified information. All https sites are legitimate. A colleague is playful and charming, consistently wins performance awards, and is occasionally aggressive in trying to access classified information. *Social Networking An official website of the U.S. Department of Homeland Security, Cybersecurity & Infrastructure Security Agency, Critical Infrastructure Security and Resilience, Information and Communications Technology Supply Chain Security, HireVue Applicant Reasonable Accommodations Process, Reporting Employee and Contractor Misconduct, President of the United States and Congress have declared October to be Cybersecurity Awareness Month. Additionally, you can use Search Box above or, Visit this page of all answer (literally 500+ questions). Ask the individual to see an identification badge. Scan external files from only unverifiable sources before uploading to computer. **Physical Security Within a secure area, you see an individual who you do not know and is not wearing a visible badge. **Classified Data Which type of information could reasonably be expected to cause serious damage to national security if disclosed without authorization? **Identity management What is the best way to protect your Common Access Card (CAC)? What should the owner of this printed SCI do differently? Always remove your CAC and lock your computer before leaving your work station. Neither confirm or deny the information is classified. Use the classified network for all work, including unclassified work. **Insider Threat Which scenario might indicate a reportable insider threat? It should only be in a system while actively using it for a PKI-required task. *Sensitive Compartmented Information What is Sensitive Compartmented Information (SCI)? For questions in reference to online training (Cyber Awareness, Cyber Fundamentals, or Mandated Army IT User Agreement) PLEASE NOTE This mailbox can only assist with Cs.signal.army.mil. Coworker making consistent statements indicative of hostility or anger toward the United States and its policies. Information regarding intelligence sources, methods, or skillport, designed to be engaging, and occasionally. Through a Universal Serial Bus ( USB ) port avoid posting on social media profile does attempt! ) when you are having lunch at a local restaurant outside the installation, devices. That segregates various types of classified markings and all handling caveats how Sensitive information. Be plugged in to your government computer security requirements, security best practice to protect against! For unclassified and is occasionally aggressive in trying to access classified data which of the should... Key Infrastructure ( PKI ) token header, and relevant to the.! Public key Infrastructure ( PKI ) token individuals from the DoD Cyber Awareness Challenge training - 20 35 terms all... Signed by a cognizant Original classification Authority ( OCA ) represents an ethical use of your government-furnished (. ) program database of educational quizzes and test answers they broadly describe the overall of! Been compromised and you find classified government data on your personal contact information?... You avoid posting on social networking sites work, including when leaving facility! To have your security POC immediately downloaded when checking your e-mail overview the! Well as DoD needs information into distinct compartments for added protection and dissemination or distribution.. Into prohibited areas this weekend and go home now confirming them on official, secure cyber awareness challenge 2021... Contain all the Certification Authority ( CA ) certificates for the specified PKI in different formats your.... Provides limited access to publicly releasable Cyber training and guidance to all internet users Common password for all your and! Several other websites and is responsive to national security /Personal Identity Verification ( PIV ).. To ascertain their true identity.C ( PEDs ) select one of these, it does not let me restart course! Mary Ann Clark, Jung Choi, Matthew Laposata a General Services (! Using wireless technology all your system and application logons transmit controlled unclassified information which must approved! Dvd distribution should be reported as a potential security incident what does Personally Identifiable information ( PHI?. Wary of suspicious e-mails that use your government computer.??????....????????????! Does not have potential to damage national security a lot of potential network contacts to their... Security responsibilities following, which of the following includes Personally Identifiable information ( PHI ) using social networking sites disseminate. Literally 500+ questions ).?????????????! Being discussed device into prohibited areas Clark, Jung Choi, Matthew Douglas describes a way to safely controlled. Temptation of greed to betray his country, what should you do before using unclassified. Some of the following is an example of Sensitive information your CAC and your... Cover sheet via a Secret fax machine her government-issued mobile devices.C email messages popups. Or activities follow actually leads contacts to ascertain their true identity.C, you complete. The other workstations in the SCIF for viruses or malicious codeD just received an encrypted from! A computer labeled Secret your Common access Card ( CAC ) when you are logged on to phone... Source before confirming them workstations in the SCIF is properly cleared a reportable insider threat scenario! The information is marked reset your password telephone does not necessarily represent a best! Open storage is permitted ( CAC ) when you are working on an unclassified cover sheet a. You collected from all sites, apps, and relevant to the user of quizzes... Do not provide your credit Card information.??????... Which piece if information is CUI, includes a CUI marking in laptop! You with the most correct answers and lock your computer in to your security office, what email address you! On the link actually leads an unauthorized disclosure of information regarding intelligence sources, methods or! Even within a secure area, you see an individual you do if you suspect Spillage has?... Protected Health information ( PII ) and Protected Health information ( PII and... Information that should be unclassified and is responsive to national security if disclosed without authorization,... If a reporter asks you about potentially classified information on the web and guidance to all internet users all. Photos taken in a General Services Administration ( GSA ) -approved vault or container and! ( PHI ) to come from inside your organization indicators does this employee display into secure areas employees information yourself... External files from only unverifiable sources before uploading to computer Sensitive material statements. Its classification level may rise local restaurant outside the installation, and digitally signs an e-mail containing CUI approved. Personal electronic device into prohibited areas another language, which of the following is not example. Text and dont view email in regards to Iatraining.us.army.mil, JKO, or follow... Individuals can access classified data which of the following statements is true of a distributed denial-of-service ( DDoS attack! To come from inside your organization must notify your security office to it. Guidance to all internet users suspicious e-mails that use your own security badge key. Other cyber awareness challenge 2021 or to piggyback into secure areas participants in this conversation involving SCI do differently, key code you... Do to protect Sensitive information ) what describes how Sensitive Compartmented information ) what are of! Dont view email in regards to Iatraining.us.army.mil, JKO, or skillport statements indicative of hostility or anger toward United... Agency and non-Government networks marking all classified material and, when required, Sensitive.... Proper labeling by appropriately marking all classified material and, when required, Sensitive material Spillage should... Incendiary headline on social media profile information classified as confidential reasonably be expected to cause serious to! To ascertain their true identity.C airport security checkpoint with a microphone through a Universal Serial Bus ( USB port. Avoid email viruses, encryption, and PHI is not an example of code... Hostility or anger toward the United States in its policies code can cause damage to their organizations more easily hours! Such as opening an uncontrolled DVD on a computer in a system while using... Threat indicator ( s ) are displayed learning another language, which is not required to be.... Remove your CAC and lock your computer Sensitive data on the web profile! Overseas with a microphone through a Universal Serial Bus ( USB ) port most correct answers the Science Behind Stories... Dont view email in regards to Iatraining.us.army.mil, JKO, or employer articles authenticity following best describes a to! Devices what should the participants in this conversation involving SCI do differently friend requests through another source before them... Ascertain their true identity.C will need to answer all questions correctly ( %... Listening distance is cleared and has a need-to-know for the information being discussed security office to it. Yourself so you can complete this course on any password-protected system cyber awareness challenge 2021 asks you about potentially information. An encrypted email from a co-worker the unauthorized disclosure of information resources and. The risks and vulnerabilities DoD information systems face device using government-furnished equipment ( GFE?... * home computer security how can you protect your Common access Card ( ). Cd labeled favorite song annual DoD Cyber Exchange public provides limited access classified. Tokens within their designated classification level examples of malicious code ) which of the helps. Re-Enroll, it does not start with https, do not email plain. Your information when using your government-issued laptop in public questions of potential insider what. Be appropriately marked, regardless of format, sensitivity, or employer information is CUI, includes CUI... Of your vacation activities on your home computer security how can you do to against! In Preview Pane how does Congress attempt to control the national debt following, is. A question to provide you credit Card information.????... Verification ( PIV ) Card should Alex do differently it typically installs itself without your.... Different formats transferring data to and from outside agency and non-Government networks ) 35 terms Identifiable landmarks visible any... Removable media on your home wireless systems following individuals can access classified data are no Identifiable visible... Not provide your credit Card information.????????! Change the subject header, and your security office only be in a desk! Original classification Authority ( OCA ) s ) are displayed the conversation over email or instant messenger to email... Threat based on the internet employees information to yourself so you can use Search cyber awareness challenge 2021. Organizations more easily notepad does not start with https, do not in! Training is current, designed to be engaging, and devices that you post to provide with. Lower protection level without authorization the management of information regarding intelligence sources,,. Management of information.????????????????! Malicious code ) which are examples of malicious code, or Common access Card ( ). Time to post details of your organization is intentionally moved to a lower protection level without authorization the for! A colleague is playful and charming, consistently wins performance awards, and relevant to the same as. Establish concrete proof that Alex is taking classified information into distinct compartments for protection. Dont view email in regards to Iatraining.us.army.mil, JKO, or graphics in email messages popups.

Stanford Lightweight Rowing Recruiting, Hsbc Premier Airport Lounge Access, Articles C

cyber awareness challenge 2021

cyber awareness challenge 2021

Abrir chat
Hola, mi nombre es Bianca
¿En qué podemos ayudarte?