cyber awareness challenge 2021

You may use your personal computer as long as it is in a secure area in your home.B. NOTE: CUI may be stored only on authorized systems or approved devices. **Classified Data Which classification level is given to information that could reasonably be expected to cause serious damage to national security? You must have your organizations permission to telework.C. A smartphone that transmits credit card payment information when held in proximity to a credit card reader. **Social Engineering What action should you take with an e-mail from a friend containing a compressed Uniform Resource Locator (URL)? correct. What should be your response? How should you securely transport company information on a removable media? What is an indication that malicious code is running on your system? The most common form of phishing is business email compromise . **Removable Media in a SCIF What must users ensure when using removable media such as compact disk (CD)? Fort Gordon, Georgia is home to the U.S. Army Cyber Center of Excellence and host to a multi-service community of Army, Navy, Air Force, Marines and multinational forces that has become a center for joint forces activities, training and operations. Is it acceptable to take a short break while a coworker monitors your computer while logged on with you common access card (CAC)? Others may be able to view your screen. **Physical Security Within a secure area, you see an individual who you do not know and is not wearing a visible badge. How can you protect yourself from social engineering? (Insider Threat) Based on the description that follows, how many potential insider threat indicator(s) are displayed? Classified DVD distribution should be controlled just like any other classified media. Which of the following is NOT true concerning a computer labeled SECRET? No. What should be your response? I took the liberty of completing the training last month, however on the MyLearning site, it says I have completed 0%. Training requirements by group. (Malicious Code) A coworker has asked if you want to download a programmers game to play at work. Which of the following is true of the Common Access Card (CAC) or Personal Identity Verification (PIV) card? Use your own security badge, key code, or Common Access Card (CAC)/Personal Identity Verification (PIV) card. not correct Based on the description that follows, how many potential insider threat indicator(s) are displayed? After each selection on the incident board, users are presented one or more questions derived from the previous Cyber Awareness Challenge. **Mobile Devices What should you do when going through an airport security checkpoint with a Government-issued mobile device? (Spillage) After reading an online story about a new security project being developed on the military installation where you work, your neighbor asks you to comment about the article. Which of the following does not constitute spillage. No. [Incident]: What is the response to an incident such as opening an uncontrolled DVD on a computer in a SCIF?A. Store it in a GSA approved vault or container. Spillage because classified data was moved to a lower classification level system without authorization. correct. Not at all. Maintain possession of your laptop and other government-furnished equipment (GFE) at all times. Which of the following is NOT a type of malicious code? [Spread]: How can you avoid downloading malicious code?A. **Social Engineering Which of the following is a practice that helps to prevent the download of viruses and other malicious code when checking your email? **Insider Threat Which type of behavior should you report as a potential insider threat? It displays a label showing maximum classification, date of creation, point of contact, and Change Management 9CM) Control Number. P2P (Peer-to-Peer) software can do the following except: Allow attackers physical access to network assets. *Controlled Unclassified Information Which of the following is NOT a correct way to protect CUI? What should you do if someone forgets their access badge (physical access)? access to classified information. Which of the following should you NOT do if you find classified information on the internet? Media containing Privacy Act information, PII, and PHI is not required to be labeled. You are logged on to your unclassified computer and just received an encrypted email from a co-worker. How many potential insider threat indicators does this employee display? Which of the following is not a best practice to preserve the authenticity of your identity? be_ixf;ym_202302 d_24; ct_50 . When using a fax machine to send sensitive information, the sender should do which of the following? You should remove and take your CAC/PIV card whenever you leave your workstation. Government-owned PEDs must be expressly authorized by your agency. Nothing. *Spillage What should you do if you suspect spillage has occurred? When using a public device with a card reader, only use your DoD CAC to access unclassified information, is only allowed if the organization permits it. What should the owner of this printed SCI do differently? Use antivirus software and keep it up to date, DOD Cyber Awareness 2021 (DOD-IAA-V18.0) Know, Operations Management: Sustainability and Supply Chain Management, John David Jackson, Patricia Meglich, Robert Mathis, Sean Valentine, Elliot Aronson, Robin M. Akert, Samuel R. Sommers, Timothy D. Wilson. Press F12 on your keyboard to open developer tools. Cyber Awareness Challenge 2023. What can help to protect the data on your personal mobile device. Using NIPRNet tokens on systems of higher classification level. What should you do? [Alexs statement]: In addition to avoiding the temptation of greed to betray his country, what should Alex do differently?A. Which of the following is a practice that helps to protect you from identity theft? Both of these.. Write your password down on a device that only you access. *Classified Data Accepting the default privacy settings. Defense Information Systems Agency (DISA). Retrieve classified documents promptly from printers. (Sensitive Information) What should you do if a commercial entity, such as a hotel reception desk, asks to make a photocopy of your Common Access Card (CAC) for proof of Federal Government employment? Attempt to change the subject to something non-work related, but neither confirm nor deny the articles authenticity. There are many travel tips for mobile computing. How should you respond? All of these. Maria is at home shopping for shoes on Amazon.com. The DoD Cyber Exchange Public provides limited access to publicly releasable cyber training and guidance to all Internet users. Exposure to malwareC. be wary of suspicious e-mails that use your name and/or appear to come from inside your organization. Which of the following best describes the sources that contribute to your online identity. Spillage can be either inadvertent or intentional. DOD Cyber Awareness Challenge 2019 (DOD-IAA-V16.0) 35 terms. What should you do to protect classified data? Since 2004, thePresident of the United States and Congress have declared October to be Cybersecurity Awareness Month, helping individuals protect themselves online as threats to technology and confidential data become more commonplace. The website requires a credit card for registration. Permitted Uses of Government-Furnished Equipment (GFE). CUI may be stored on any password-protected system. Cyber Awareness Challenge 2023 - Answer. What actions should you take prior to leaving the work environment and going to lunch? Prudence faxes CUI using an Unclassified cover sheet via a Secret fax machine. Adversaries exploit social networking sites to disseminate fake news. correct. **Insider Threat How many potential insider threat indicators does a person who is playful and charming, consistently wins performance awards, but is occasionally aggressive in trying to access sensitive information display? Please DO NOT email in regards to Iatraining.us.army.mil, JKO, or skillport. What should you do? Which of the following is a good practice for telework? Only when badging inB. Which of the following does NOT constitute spillage?A. *Insider Threat Which of the following is a reportable insider threat activity? **Home Computer Security What should you consider when using a wireless keyboard with your home computer? He has the appropriate clearance and a signed, approved, non-disclosure agreement. What is NOT Personally Identifiable Information (PII)? what is required for an individual to access classified data? Ensure there are no identifiable landmarks visible in any photos taken in a work setting that you post. How do you respond? You must have your organizations permission to telework. There is no way to know where the link actually leads. You know this project is classified. not correct In addition to avoiding the temptation of greed to betray his country, what should Alex do differently? **Social Networking Which of the following is a security best practice when using social networking sites? Spear Phishing attacks commonly attempt to impersonate email from trusted entities. Do not forward, read further, or manipulate the file; Do not give out computer or network information, Do not follow instructions from unverified personnel. **Travel What is a best practice while traveling with mobile computing devices? National Centers of Academic Excellence in Cybersecurity (NCAE-C), Public Key Infrastructure/Enabling (PKI/PKE). These zip files contain all the Certification Authority (CA) certificates for the specified PKI in different formats. Report suspicious behavior in accordance with their organizations insider threat policy.B. Be aware of classification markings and all handling caveats. How many insider threat indicators does Alex demonstrate? The DISN facilitates the management of information resources, and is responsive to national security, as well as DOD needs. Here you can find answers to the DoD Cyber Awareness Challenge. (Malicious Code) Which of the following is true of Internet hoaxes? Which of the following is the best example of Personally Identifiable Information (PII)? It includes a threat of dire circumstances. Which of the following is NOT a typical result from running malicious code? Your health insurance explanation of benefits (EOB). Which of the following is true of protecting classified data? For Government-owned devices, use approved and authorized applications only. Identify and disclose it with local Configuration/Change Management Control and Property Management authorities. *Sensitive Compartmented Information What must the dissemination of information regarding intelligence sources, methods, or activities follow? SSN, date and place of birth, mothers maiden name, biometric records, PHI, passport number, Subset of PII, health information that identifies the individual, relates to physical or mental health of an individual, provision of health care to an individual, or payment of healthcare for individual. Girl Scout Cyber Awareness Challenge . A program that segregates various types of classified information into distinct compartments for added protection and dissemination or distribution control. Individuals must avoid referencing derivatively classified reports classified higher than the recipient.??? A coworker removes sensitive information without authorization. ~All documents should be appropriately marked, regardless of format, sensitivity, or classification. Which is an untrue statement about unclassified data? A colleague is playful and charming, consistently wins performance awards, and is occasionally aggressive in trying to access classified information. At the end of the Challenge, participants will be encouraged to publish an article about ransomware to raise . Cyber Awareness Challenge 2021 - Knowledge Check. Directing you to a website that looks real. Which of the following best describes a way to safely transmit Controlled Unclassified Information (CUI)?

Difference Between Engel V Vitale And Lee V Weisman, Walker Elementary School Website, Prayer Circle Copypasta, Articles C