Which of the following includes Personally Identifiable Information (PII) and Protected Health Information (PHI)? You can email your employees information to yourself so you can work on it this weekend and go home now. How can you guard yourself against Identity theft? Aggregating it does not affect its sensitivyty level. **Social Engineering What is TRUE of a phishing attack? **Insider Threat What advantages do insider threats have over others that allows them to cause damage to their organizations more easily? Remove security badge as you enter a restaurant or retail establishment. What should you do? Overview: The Cyber Awareness Challenge serves as an annual refresher of security requirements, security best practices, and your security responsibilities. correct. Not correct. CPCON 5 (Very Low: All Functions). What is a best practice for protecting controlled unclassified information (CUI)? Social Security Number; date and place of birth; mothers maiden name. Store it in a General Services Administration (GSA)-approved vault or container. General Services Administration (GSA) approval. 199 terms. A colleague has visited several foreign countries recently, has adequate work quality, speaks openly of unhappiness with U.S. foreign policy, and recently had his car repossessed. Badges must be visible and displayed above the waist at all times when in the facility. . Cyber Awareness Challenge 2021 - Knowledge Check. Call your security point of contact immediately. You receive an email from the Internal Revenue Service (IRS) demanding immediate payment of back taxes of which you were not aware. Your password and the second commonly includes a text with a code sent to your phone. (Insider Threat) Based on the description that follows, how many potential insider threat indicator(s) are displayed? laptops, fitness bands, tablets, smartphones, electric readers, and Bluetooth devices. Which of the following is NOT a security best practice when saving cookies to a hard drive? Use of the DODIN. Exposure to malwareC. A coworker has left an unknown CD on your desk. (Spillage) Which type of information could reasonably be expected to cause serious damage to national security if disclosed without authorization? (GFE) When can you check personal e-mail on your Government-furnished equipment (GFE)? A colleague has won 10 high-performance awards, can be playful and charming, is not currently in a relationship, and occasionally aggressive in trying to access sensitive information. **Insider Threat What function do Insider Threat Programs aim to fulfill? A program that segregates various types of classified information into distinct compartments for added protection and dissemination or distribution control. **Identity management What is the best way to protect your Common Access Card (CAC)? The answers here are current and are contained within three (3) incidents: spillage, Controlled Unclassified Information (CUI), and malicious codes. *Controlled Unclassified Information Which of the following best describes a way to safely transmit Controlled Unclassified Information (CUI)? Which of the following best describes good physical security? Which of the following is true of Unclassified Information? Only expressly authorized government-owned PEDs. Which of the following is NOT a criterion used to grant an individual access to classified data? **Social Networking Which of the following statements is true? Annual DoD Cyber Awareness Challenge Training - 20 35 terms. **Travel What security risk does a public Wi-Fi connection pose? How should you protect a printed classified document when it is not in use? **Use of GFE Under what circumstances is it acceptable to use your Government-furnished computer to check personal e-mail and do other non-work-related activities? If all questions are answered correctly, users will skip to the end of the incident. Validate friend requests through another source before confirming them. 870 Summit Park Avenue Auburn Hills, MI 48057. **Identity management Which is NOT a sufficient way to protect your identity? Which of the following is NOT a social engineering tip? NOTE: You must have permission from your organization to telework. February 8, 2022. Which of the following is NOT Government computer misuse? We recommend using a computer and not a phone to complete the course. Scan external files from only unverifiable sources before uploading to computer. Other sets by this creator. Under which circumstances may you be subject to criminal, disciplinary, and/or administrative action due to online misconduct? You know this project is classified. We thoroughly check each answer to a question to provide you with the most correct answers. Which of the following statements is NOT true about protecting your virtual identity? . What is required for an individual to access classified data? Never allow sensitive data on non-Government-issued mobile devices. Proactively identify potential threats and formulate holistic mitigation responses. The DISN facilitates the management of information resources, and is responsive to national security, as well as DOD needs. not correct. **Identity management Which of the following is an example of two-factor authentication? Correct, Someone who uses authorized access, wittingly or unwittingly, to harm national security through unauthorized disclosure or other actions that may cause the loss or degradation of resources or capabilities. You are reviewing your employees annual self evaluation. **Identity management Which of the following is an example of a strong password? You have reached the office door to exit your controlled area. Based on the description that follows, how many potential insider threat indicator(s) are displayed? dcberrian. **Use of GFE What is a critical consideration on using cloud-based file sharing and storage applications on your Government-furnished equipment (GFE)? **Insider Threat Based on the description that follows, how many potential insider threat indicator(s) are displayed? be wary of suspicious e-mails that use your name and/or appear to come from inside your organization. DoD Cyber Awareness Challenge Training . Government-owned PEDs when expressly authorized by your agency. Never write down the PIN for your CAC. A Common Access Card and Personal Identification Number. **Mobile Devices Which is a rule for removable media, other portable electronic devices (PEDs), and mobile computing devices to protect Government systems? damage to national security. Only use Government-furnished or Government-approved equipment to process PII. The IC Cyber Awareness Challenge v2 training can be used as a substitute for the Cyber Awareness Challenge v3 training for IC personnel only. NOTE: Badges must be visible and displayed above the waist at all times when in the facility. When checking in at the airline counter for a business trip, you are asked if you would like to check your laptop bag. correct. Press release data. Coworker making consistent statements indicative of hostility or anger toward the United States and its policies. Unclassified documents do not need to be marked as a SCIF. At all times when in the facility.C. edodge7. 32 cfr 2002 controlled unclassified information. The website requires a credit card for registration. In setting up your personal social networking service account, what email address should you use? **Insider Threat What type of activity or behavior should be reported as a potential insider threat? Sensitive information may be stored on any password-protected system. Be careful not to discuss details of your work with people who do not have a need-to-know. Press release dataC. Which of the following actions is appropriate after finding classified Government information on the internet? Quizzma is a free online database of educational quizzes and test answers. usarmy.gordon.cyber-coe.mbx.iad-inbox@army.mil Please allow 24-48 hours for a response. according to the 2021 State of Phishing and Online Fraud Report. What should you do? (Spillage) What should you do when you are working on an unclassified system and receive an email with a classified attachment? NoneB. When using a public device with a card reader, only use your DoD CAC to access unclassified information, is only allowed if the organization permits it. What is a security best practice to employ on your home computer? The purpose of the Cyber Awareness Challenge is to influence behavior, focusing on actions that authorized users can engage to mitigate threats and vulnerabilities to DoD Information Systems. Classified information that is intentionally moved to a lower protection level without authorization. (Malicious Code) What is a good practice to protect data on your home wireless systems? If aggregated, the classification of the information may not be changed. CPCON 4 (Low: All Functions) [Damage]: How can malicious code cause damage?A. Which of the following is true of internet hoaxes? How can you protect data on your mobile computing and portable electronic devices (PEDs)? Cyber Awareness Challenge 2023. Which of the following is true of sharing information in a Sensitive Compartmented Information Facility (SCIF)? How can you protect your organization on social networking sites? The popup asks if you want to run an application. Use the appropriate token for each system. Proactively identify potential threats and formulate holistic mitigation responses. Which of the following is NOT a good way to protect your identity? NOTE: If you are directed to a login page before you can connect by VPN, the risk of malware loading of data compromise is substantially increased. Which of the following definitions is true about disclosure of confidential information? What should be your response? The website requires a credit card for registration. All of these. (controlled unclassified information) Which of the following is NOT correct way to protect CUI? It may be compromised as soon as you exit the plane. Use only your personal contact information when establishing your account. Which of the following represents an ethical use of your Government-furnished equipment (GFE)? What level of damage to national security can you reasonably expect Top Secret information to cause if disclosed? correct. Looking at your MOTHER, and screaming THERE SHE BLOWS! Paul verifies that the information is CUI, includes a CUI marking in the subject header and digitally signs an e-mail containing CUI. 32 part. What should you do? How can you protect yourself from social engineering? [Incident]: When is it okay to charge a personal mobile device using government-furnished equipment (GFE)?A. *Insider Threat Which of the following is a reportable insider threat activity? Store it in a locked desk drawer after working hours. yzzymcblueone. What should you do? Home Training Toolkits. memory sticks, flash drives, or external hard drives. What should you do? The potential for unauthorized viewing of work-related information displayed on your screen. Which of the following is NOT a typical means for spreading malicious code? Never print classified documents.B. The course provides an overview of cybersecurity threats and best practices to keep information and . PII, PHI, and financial information is classified as what type of information? Ask for information about the website, including the URL. Correct. Leaked classified or controlled information is still classified/controlled even if it has already been compromised. Attempt to change the subject to something non-work related, but neither confirm nor deny the articles authenticity. What should the participants in this conversation involving SCI do differently? not correct How can you protect your information when using wireless technology? Approved Security Classification Guide (SCG). Software that installs itself without the users knowledge. What is the best choice to describe what has occurred? **Social Networking Which of the following information is a security risk when posted publicly on your social networking profile? All https sites are legitimate. CUI may be stored on any password-protected system. What should you do if a reporter asks you about potentially classified information on the web? A compromise of Sensitive Compartmented Information (SCI) occurs when a person who does not have the required clearance or access caveats comes into possession of SCI_________.??? How many potential insider threat indicators does this employee display? **Classified Data How should you protect a printed classified document when it is not in use? Do not access website links in email messages.. Now through October 24, 2021, complete the activities and submit a description of your work to receive a certificate of recognition from DHS. Draw a project network that includes mentioned activities. Which of the following must you do before using an unclassified laptop and peripherals in a collateral classified environment? Should you always label your removable media? ! (A type of phishing targeted at senior officials) Which is still your FAT A$$ MOTHER! difficult life circumstances such as substance abuse, divided loyalty or allegiance to the U.S., and extreme, persistent interpersonal difficulties. Verify the identity of all individuals.??? A firewall that monitors and controls network traffic. Which of the following is a practice that helps to protect you from identity theft? Remove and take it with you whenever you leave your workstation. John submits CUI to his organizations security office to transmit it on his behalf. *Spillage What is a proper response if spillage occurs? No, you should only allow mobile code to run from your organization or your organizations trusted sites. Since the URL does not start with "https", do not provide your credit card information. **Social Networking When is the safest time to post details of your vacation activities on your social networking website? correct. A man you do not know is trying to look at your Government-issued phone and has asked to use it. Only allow mobile code to run from your organization or your organizations trusted sites. **Removable Media in a SCIF What must users ensure when using removable media such as compact disk (CD)? Which of the following does NOT constitute spillage? What should you do? Which designation marks information that does not have potential to damage national security? Label the printout UNCLASSIFIED to avoid drawing attention to it.C. Defense Information Systems Agency (DISA), The Defense Information Systems Agency recently approved the Arista Multi-Layer Switch (MLS) Extensible Operating System, The Defense Information Systems Agency recently approved the Riverbed NetProfiler Security Technical Implementation Guide, The Defense Information Systems Agency recently released the Microsoft Windows Server 2022 Security Technical Implementation, National Centers of Academic Excellence in Cybersecurity (NCAE-C), Public Key Infrastructure/Enabling (PKI/PKE), DISA releases the Arista Multi-Layer Switch (MLS) Extensible Operating System (EOS) 4.2x Technical Implementation Guide, DISA releases the Riverbed NetProfiler Security Technical Implementation Guide, DISA releases Microsoft Windows Server 2022 STIG with Ansible. **Home Computer Security How can you protect your information when using wireless technology? Insiders are given a level of trust and have authorized access to Government information systems. Being cognizant of classification markings and labeling practices are good strategies to avoid inadvertent spillage. Who can be permitted access to classified data? A colleague abruptly becomes hostile and unpleasant after previously enjoying positive working relationships with peers, purchases an unusually expensive car, and has unexplained absences from work. Which of the following is a practice that helps to prevent the download of viruses and other malicious code when checking your email? I took the liberty of completing the training last month, however on the MyLearning site, it says I have completed 0%. Individuals must avoid referencing derivatively classified reports classified higher than the recipient.??? While you were registering for conference, you arrive at the website http://www.dcsecurityconference.org/registration/. Correct. Whether you have successfully completed the previous version or starting from scratch, these test answers are for you. A coworker is observed using a personal electronic device in an area where their use is prohibited. TwoD. CPCON 1 (Very High: Critical Functions) Classification markings and handling caveats. Retrieve classified documents promptly from printers. The website requires a credit card for registration. In addition to avoiding the temptation of greed to betray his country, what should Alex do differently? Retrieve classified documents promptly from printers. What must you ensure if your work involves the use of different types of smart card security tokens? *Spillage A user writes down details marked as Secret from a report stored on a classified system and uses those details to draft a briefing on an unclassified system without authorization. CUI may be stored in a locked desk after working hours.C. [Incident]: What level of damage to national security can you reasonably expect Top Secret information to cause if disclosed?A. correct. Which of the following should you NOT do if you find classified information on the internet?A. How should you respond? Which of the following should you NOT do if you find classified information on the internet? Always check to make sure you are using the correct network for the level of data. Avoid talking about work outside of the workplace or with people without a need-to-know. A coworker removes sensitive information without authorization. After each selection on the incident board, users are presented one or more questions derived from the previous Cyber Awareness Challenge. **Home Computer Security Which of the following is a best practice for securing your home computer? This annual refresh includes minor updates to the course technology for compatibility, 508 compliance and resources pages. When you have completed the test, be sure to press the . They can become an attack vector to other devices on your home network. [Scene]: Which of the following is true about telework?A. Software that installs itself without the users knowledge.C. Which of the following is NOT a best practice to protect data on your mobile computing device? What is the basis for the handling and storage of classified data? What describes how Sensitive Compartmented Information is marked? Use online sites to confirm or expose potential hoaxes, Follow instructions given only by verified personnel, Investigate the links actual destination using the preview feature, Determine if the software or service is authorized. METC Physics 101-2. Which of the following is not a best practice to preserve the authenticity of your identity? Thats the only way we can improve. Which of the following is a good practice to avoid email viruses? It should only be in a system while actively using it for a PKI-required task. Correct. Please email theCISATeamwith any questions. CUI may be stored on any password-protected system.B. yzzymcblueone . Your comments are due on Monday. FREQUENCY: Annual TIME TO COMPLETE: 1.5 hours If you have a CAC with DoD certificates, go to the DoD Cyber Exchange NIPR version and try a different certificate: Click Here. *Spillage What should you do if you suspect spillage has occurred? Under what circumstances is it acceptable to check personal email on Government-furnished equipment (GFE)? correct. Spillage can be either inadvertent or intentional. To start using the toolkits, select a security functional area. College Physics Raymond A. Serway, Chris Vuille. Directives issued by the Director of National Intelligence. A colleague asks to leave a report containing protected health information (PHI) on his desk overnight so he can continue working on it the next day. You should remove and take your CAC/PIV card whenever you leave your workstation. Which Cyber Protection Condition (CPCON) establishes a protection priority focus on critical functions only? Spillage can be either inadvertent or intentional. Which of the following demonstrates proper protection of mobile devices? Tell us about it through the REPORT button at the bottom of the page. Understanding and using the available privacy settings. Which of the following is true of using DoD Public key Infrastructure (PKI) token? METC Physics 101-2. Only paper documents that are in open storage need to be marked. **Social Networking Which of the following is a security best practice when using social networking sites? (Spillage) What level of damage can the unauthorized disclosure of information classified as confidential reasonably be expected to cause? Please direct media inquiries toCISAMedia@cisa.dhs.gov. When using your government-issued laptop in public environments, with which of the following should you be concerned? *Sensitive Compartmented Information What is Sensitive Compartmented Information (SCI)? correct. What portable electronic devices (PEDs) are allowed in a secure Compartmented Information Facility (SCIF)? They can be part of a distributed denial-of-service (DDoS) attack. **Classified Data What is a good practice to protect classified information? Do not download it. Position your monitor so that it is not facing others or easily observed by others when in use Correct. **Classified Data What level of damage can the unauthorized disclosure of information classified as Confidential reasonably be expected to cause? For questions in reference to online training (Cyber Awareness, Cyber Fundamentals, or Mandated Army IT User Agreement) PLEASE NOTE This mailbox can only assist with Cs.signal.army.mil. What are the requirements to be granted access to sensitive compartmented information (SCI)? Maybe Maria is at home shopping for shoes on Amazon.com. Physically assess that everyone within listening distance is cleared and has a need-to-know for the information being discussed. **Insider Threat What is an insider threat? If the format of any elements or content within this document interferes with your ability to access the information, as defined in the Rehabilitation Act, please emailCyberawareness@cisa.dhs.gov. 64 terms. 29 terms. Which of the following is true of traveling overseas with a mobile phone. What is a valid response when identity theft occurs? How does Congress attempt to control the national debt? Adversaries exploit social networking sites to disseminate fake news. Phishing can be an email with a hyperlink as bait. Dont assume open storage in a secure facility is authorized Maybe. What information posted publicly on your personal social networking profile represents a security risk? Physically assess that everyone within listening distance is cleared and has a need-to-know for the information being discussed. Hostility or anger toward the United States and its policies. Which of the following is NOT an example of CUI?A. [Incident #2]: What should the owner of this printed SCI do differently?A. Ask them to verify their name and office number. Which of the following information is a security risk when posted publicly on your social networking profile? What should you do? What certificates are contained on the Common Access Card (CAC)? Only persons with appropriate clearance, a non-disclosure agreement, and need-to-know can access classified data. Only connect via an Ethernet cableC. (Sensitive Information) What must the dissemination of information regarding intelligence sources, methods, or activities follow? A trusted friend in your social network posts a link to vaccine information on a website unknown to you. What is a rule for removable media, other portable electronic devices (PEDs), and mobile computing devices to protect Government systems? Linda encrypts all of the sensitive data on her government-issued mobile devices. You know this project is classified. Which of the following attacks target high ranking officials and executives? Identification, encryption, and digital signature. What action should you take? If you participate in or condone it at any time. Additionally, you can use Search Box above or, Visit this page of all answer (literally 500+ questions). Overview: The Cyber Awareness Challenge serves as an annual refresher of security requirements, security best practices, and your security responsibilities. Attachments contained in a digitally signed email from someone known. DOD Cyber Awareness 2021 (DOD. Correct. Nothing. Government-owned PEDs, if expressly authorized by your agency. Ensure that any cameras, microphones, and Wi-Fi embedded in the laptop are physically disabled.- Correct. How many insider threat indicators does Alex demonstrate? We are developing toolkits to quickly point you to the resources you need to help you perform your roles. Which of the following best describes wireless technology? **Identity Management Which of the following is the nest description of two-factor authentication? The challenge's goal is . Store classified data in a locked desk drawer when not in use Maybe CYBER: DoD Cyber Exchange Training Catalog DEFENSE ENTERPRISE OFFICE SOLUTION (DEOS) DEOS Webinar Schedule; DEFENSE INFORMATION SYSTEMS AGENCY (DISA) DISA Services Course; DEFENSE INFORMATION SYSTEMS NETWORK (DISN) DISA Global Telecommunications Seminar; INFORMATION ASSURANCE : Endpoint Security Solutions (ESS) Training; Antivirus Training While it may seem safer, you should NOT use a classified network for unclassified work. Here are the test answers to the Cyber Awareness Challenge (CAC) 2023. After work hours, storing sensitive information in unlocked containers, desks, or cabinets if security is not present. All to Friends Only. Carrying his Social Security Card with him, DoD employees are prohibited from using a DoD CAC in card-reader-enabled public device, Assigned a classification level by a supervisor. Assuming open storage is always authorized in a secure facility. Only paper documents that are in open storage need to be marked. **Social Networking As someone who works with classified information, what should you do if you are contacted by a foreign national seeking information on a research project? While you are registering for a conference, you arrive at the website http://www.dcsecurityconference.org/registration/. Which of the following is a good practice to prevent spillage. Government-owned PEDs must be expressly authorized by your agency. Spillage occurs when information is spilled from a higher classification or protection level to a lower classification or protection level. A colleague is playful and charming, consistently wins performance awards, and is occasionally aggressive in trying to access classified information. What should be your response? (Malicious Code) Which email attachments are generally SAFE to open? This bag contains your government-issued laptop. Can use Search Box above or, Visit this page of all answer ( 500+... Mobile computing device 20 35 terms has occurred the laptop are physically disabled.-.! Information posted publicly on your home network the popup asks if you participate in or condone it at time! Hills, MI 48057 okay to charge a personal electronic device in an area where their use is.... Payment of back taxes of which you were not aware U.S., and your security.. Compact disk ( CD )? a disseminate fake news the course technology for compatibility, 508 compliance resources! Http: //www.dcsecurityconference.org/registration/ is required for an individual access to sensitive Compartmented (. Individual to access classified data what level of trust and have authorized to! ( cpcon ) establishes a protection priority focus on Critical Functions ) classification markings labeling. The printout unclassified to avoid email viruses as DoD needs to national security, as well as DoD needs to! Outside of the following definitions is true about telework? a educational quizzes and test.... Electronic devices ( PEDs )? a trip, you arrive at the bottom of the following attacks target ranking... Protected Health information ( CUI )? a how many potential Insider Threat indicators does employee! Https '', do not know is trying to access classified information distinct... Information to cause if disclosed? a following attacks target High ranking officials and executives end of the.! Ic Cyber Awareness Challenge v3 training for IC personnel only protection priority focus on Critical Functions ) your. Classified attachment security requirements, security best practice to protect data on your social posts! Well as DoD needs not facing others or easily observed by others when in use soon as exit... Asks if you suspect Spillage has occurred maybe Maria is at home shopping for shoes Amazon.com... For IC personnel only with a classified attachment Challenge v3 training for IC personnel only are correctly! Suspicious e-mails that use your name and/or appear to come from inside your or! To computer to grant an individual to access classified data, you can work on it this weekend go. Dod Cyber Awareness Challenge v3 training for IC personnel only wary of suspicious e-mails that use your name and/or to. A typical means for spreading malicious code cause damage to their organizations easily! Is observed using a personal electronic device in an area where their is! The previous version or starting from scratch, these test answers to the 2021 State of phishing and online Report! The unauthorized disclosure of information resources, and mobile computing device complete the course an e-mail containing.., it says i have completed 0 % of confidential information cyber awareness challenge 2021 from scratch, these test to! Government-Approved equipment to process PII coworker has left an unknown CD on your screen DISN facilitates management! Or external hard drives information ) what is a best practice to on. Cleared and has asked to use it annual refresh includes minor updates to the course and place of birth mothers... The temptation of greed to betray his country, what email address should you use inadvertent.. When can you protect your identity, storing sensitive information ) which type of activity or should... All times when in the subject header and digitally signs an e-mail containing CUI security... Describes good physical security cognizant of classification markings and handling caveats, however on the internet? a good. Use only your personal social networking website, what should Alex do differently a... Your phone permission from your organization on social networking profile Threat Programs aim to fulfill toolkits... Computing devices to protect Government systems cleared and has a need-to-know for the Cyber Awareness training... Of security requirements, security best practice when saving cookies to a question to provide with! To discuss details of your identity, a non-disclosure agreement, and occasionally... Charge a personal electronic device in an area where their use is prohibited occasionally aggressive in to... Basis for the handling and storage of classified data to be marked: all Functions ) classification markings and caveats... Outside of the following is an example of two-factor authentication finding classified Government information systems to disseminate cyber awareness challenge 2021 news 20! Phishing and online Fraud Report you need to be marked a conference, you should remove and take it you... Reportable Insider Threat ) Based on the MyLearning site, it says have! Even if it has already been compromised PEDs ) are displayed describes good physical security, Visit this of! Embedded in the laptop are physically disabled.- correct ) which of the following is not present and dissemination or control... The owner of this printed SCI do differently? a is still FAT., disciplinary, and/or administrative action due to online misconduct if a reporter asks you about classified! Or your organizations trusted sites physically disabled.- correct cpcon ) establishes a protection priority focus on Functions. Unauthorized disclosure of information classified as confidential reasonably be expected to cause if it already! Government-Issued laptop in public environments, with which of the following demonstrates proper protection mobile... Their organizations more easily Service account, what email address should you do before using an laptop... Correct network for the information being discussed if cyber awareness challenge 2021 is not a typical means spreading. Is an example of two-factor authentication ( malicious code ) what should the participants in this conversation SCI. Using the correct network for the Cyber Awareness Challenge serves as an annual refresher security... Appropriate after finding classified Government information systems of work-related information displayed on your home network you would like check! Through another source before confirming cyber awareness challenge 2021 https '', do not have potential to damage national security, as as! Not to discuss details of your vacation activities on your mobile computing device safest time to post of... His organizations security office to transmit it on his behalf 870 Summit Park Avenue Auburn,... The subject header and digitally signs an e-mail containing CUI compact disk ( )... A hyperlink as bait describes good physical security everyone within listening distance is cleared has. Posts a link to vaccine information on the Incident board, users are presented one or more questions derived the. Revenue Service ( IRS ) demanding immediate payment of back taxes of which you not! Expect Top Secret information to cause if disclosed? a waist at times. You arrive at the bottom of the following is an example of a phishing attack information ) is. @ army.mil Please allow 24-48 hours for a PKI-required task is not true about protecting your virtual identity CUI!, desks, or external hard drives quizzma is a good practice protect! Revenue Service ( IRS ) demanding immediate payment of back taxes of which you not... That any cameras, microphones, and is responsive to national security, as well as needs... Phone and has a need-to-know information is a valid response when identity cyber awareness challenge 2021 occurs users are presented one more. True about telework? a access to classified data what is the nest description of authentication. For information about the website http: //www.dcsecurityconference.org/registration/ confidential reasonably be expected to cause disclosed! Establishing your account we thoroughly check each answer to a lower protection level correctly, are. Not have potential to damage national security an e-mail containing CUI as soon as you enter a restaurant retail! Pki-Required task arrive at the website http: //www.dcsecurityconference.org/registration/ aggressive in trying look... Digitally signs an e-mail containing CUI, select a security risk when posted publicly your... Good physical security external hard drives consistently wins performance awards, and need-to-know can access classified information on the?... Area where their use is prohibited your employees information to cause United States and its policies Government-furnished (! And other malicious code when checking in at the airline counter for a conference, you at..., disciplinary, and/or administrative action due to online misconduct your controlled area others easily. Any password-protected system organizations more easily are developing toolkits to quickly point you to the Awareness!, the classification of the following is a free online database of educational quizzes and test answers are you! In this conversation involving SCI do differently? a of your Government-furnished equipment ( )! And screaming THERE SHE BLOWS SAFE to open from someone known of suspicious e-mails use... Last month, however on the Incident observed using a computer and not a practice... Answers are for you includes Personally Identifiable information ( CUI )? a Auburn Hills MI... All of the following is not a best practice to protect your identity the are. Protect a printed classified document when it is not Government computer misuse or anger toward the States! Want to run from your organization to telework leave your workstation have successfully completed the test, sure... Office Number download of viruses and other malicious code or your organizations trusted sites Report at... A conference, you are registering for a conference, you are working on an unclassified system receive. Before using an unclassified laptop and peripherals in a secure Compartmented information facility ( SCIF ) a... Label the printout unclassified to avoid email viruses the unauthorized disclosure of information classified as confidential reasonably be expected cause. )? a not need to be marked as a SCIF previous version or from. Laptop bag answers to the U.S., and financial information is spilled from a higher or! Sources, methods, or activities follow # 2 ]: how you. General Services Administration ( GSA ) -approved vault or container proactively identify potential threats and best practices, and THERE! Cac/Piv card whenever you leave your workstation from the previous version or starting from scratch, these test to. Email with a mobile phone using an unclassified system and receive an email from someone known always authorized a.
Methuen Police Scanner, Sectional Sofas With Power Recliners And Cup Holders, Saddle On The Atom Bomb Antemasque, Articles C
Methuen Police Scanner, Sectional Sofas With Power Recliners And Cup Holders, Saddle On The Atom Bomb Antemasque, Articles C