Aggregating it does not affect its sensitivyty level. What level of damage can the unauthorized disclosure of information classified as Top Secret reasonably be expected to cause? CUI may be stored only on authorized systems or approved devices. Defense Information Systems Agency (DISA). What is the danger of using public Wi-Fi connections? **Physical Security Within a secure area, you see an individual who you do not know and is not wearing a visible badge. Ensure proper labeling by appropriately marking all classified material and, when required, sensitive material. *Spillage .What should you do if a reporter asks you about potentially classified information on the web? Only use a government-issued thumb drive to transfer files between systems.C. Not correct Senior government personnel, military or civilian. (Spillage) What type of activity or behavior should be reported as a potential insider threat? As long as the document is cleared for public release, you may share it outside of DoD. Attempting to access sensitive information without need-to-know. Paste the code you copied into the console and hit ENTER. A coworker removes sensitive information without approval. Right-click the link and select the option to preview??? A coworker has left an unknown CD on your desk. memory sticks, flash drives, or external hard drives. (Spillage) What is required for an individual to access classified data? This summer, CYBER.ORG is excited to partner with Girl Scouts of the USA, the U.S. Department of Homeland Security, and DHS's Cybersecurity and Infrastructure Security Agency (CISA) to launch the Cyber Awareness Challenge! Others may be able to view your screen. **Insider Threat What is an insider threat? What is Sensitive Compartment Information (SCI) program? *Sensitive Compartmented Information What is a Sensitive Compartmented Information (SCI) program? *Spillage What should you do if you suspect spillage has occurred? A career in cyber is possible for anyone, and this tool helps you learn where to get started. Which of the following is NOT a best practice to protect data on your mobile computing device? Only when badging inB. Access requires a formal need-to-know determination issued by the Director of National Intelligence.? What should you do? Using NIPRNet tokens on systems of higher classification level. CUI may be stored on any password-protected system. What is considered a mobile computing device and therefore shouldnt be plugged in to your Government computer? Connect to the Government Virtual Private Network (VPN). Remove and take it with you whenever you leave your workstation. *Spillage A user writes down details marked as Secret from a report stored on a classified system and uses those details to draft a briefing on an unclassified system without authorization. NoneB. *Spillage After reading an online story about a new security project being developed on the military installation where you work, your neighbor asks you to comment about the article. Appropriate clearance, a signed and approved non-disclosure agreement, and need-to-know. [Incident]: What is the danger of using public Wi-Fi connections?A. Follow procedures for transferring data to and from outside agency and non-Government networks. A colleague vacations at the beach every year, is married and a father of four, sometimes has poor work quality, and works well with his team. All of these.. Which of the following statements is NOT true about protecting your virtual identity? What should be your response? The training also reinforces best practices to protect classified, controlled unclassified information (CUI), and personally identifiable information (PII). Which of the following is a clue to recognizing a phishing email? He has the appropriate clearance and a signed, approved, non-disclosure agreement. what should you do? **Identity management What is the best way to protect your Common Access Card (CAC)? Which of the following is an example of a strong password? The challenges goal is simple: To change user behavior to reduce the risks and vulnerabilities DoD Information Systems face. What type of attack might this be? This bag contains your government-issued laptop. *Spillage After reading an online story about a new security project being developed on the military installation where you work, your neighbor asks you to comment about the article. It is permissible to release unclassified information to the public prior to being cleared. How should you securely transport company information on a removable media? T/F. Use of the DODIN. Which of the following is true of the Common Access Card (CAC)? 24 terms. What action should you take if you receive a friend request on your social networking website from someone in Germany you met casually at a conference last year? Security Classification Guides (SCGs).??? Which of the following demonstrates proper protection of mobile devices? Which of the following is NOT a DoD special requirement for tokens? It is created or received by a healthcare provider, health plan, or employer. How many potential insiders threat indicators does this employee display? After you have returned home following the vacation. You may use your personal computer as long as it is in a secure area in your home.B. Correct We recommend using a computer and not a phone to complete the course. Do not access website links, buttons, or graphics in e-mail. Classified Information can only be accessed by individuals with. As a best practice, labeling all classified removable media and considering all unlabeled removable media as unclassified. A program that segregates various type of classified information into distinct compartments for added protection and dissemination for distribution control. not correct Always remove your cac what certificates are contained on the DOD PKI implemented by the CAC/PIVIdentification, Encryption, digital signatureWhat is a good practice when it is necessary to use a password to access a system or an application?Avoid using the same password between systems or applicationsWhich is not sufficient to protect your identity?use a common password for all your system and application logons.Which term describes an event where a person who does not have the required clearance or access caveats comes into possession of sensitive compartmented information?compromiseWhat are the requirements to be granted access to SCI material?The proper security clearance and indoctrination into the SCI programWhat is a SCI program?a program that segregates various information.what organization issues directives concerning the dissemination of information?OCAwhat portable electronic devices are allowed in a SCIFGovernment- owned PEDSWhat must users do when using removable media within a SCIF?User shall comply with site CM polices and proceduresWhat is an indication that malicious code is running on your system?File corruptionWhat can malicious code do?It can cause damage by corrupting filesWhich is true of cookies?Text fileWhat is a valid response when identity theft occurs?Report the crime to local law enforcementWhat are some actions you can take to try to protect your identity?Shred personal documents; never share password; and order a credit report annually.What is whaling?A type of phishing targeted at high level personnel such as senior officialsWhat is a common method used in social engineering?Telephone surveysWhich of the following is an appropriate use of government e-mail?Digitally signing e-mails that contain attachment or hyperlinks.What is a protection against internet hoaxes?Use online sites to confirm or expose potential hoaxes.Which may be a security issue with compressed URLs?They may be used to mask malicious intentwhat is best practice while traveling with mobile computing devices?Maintain possession of your laptop and otherupon connecting your Government-issued laptop to a public wireless connection, what should you immediately do?Connect to the Government Virtual Private Network (VPN)When conducting a private money- making venture using your government?It is never permittedWhich of the following helps protect data on your personal mobile devices?Secure personal mobile devices to the same level as government issued systemsWhich is a wireless technology that enables your electronic devices to establish communications and exchange information when placed next to each other called?NFCWhat are some examples of removable media?Memory sticks, flash drives, or external hard drivesWhich is best practice to protect data on your mobile computing device?lock your device when not in use and require a password to reactivateWhat is a good practice to protect data on your home wireless systems?Ensure that the wireless security features are properly configuredWhat is a possible indication of a malicious code attack in progress?A pop-up window that flashes and warns that your computer is infected with a virus. A colleague has won 10 high-performance awards, can be playful and charming, is not currently in a relationship, and occasionally aggressive in trying to access sensitive information. You may use unauthorized software as long as your computers antivirus software is up-to-date. Based on the description that follows, how many potential insider threat indicator(s) are displayed? (social networking) When may you be subjected to criminal, disciplinary, and/or administrative action due to online misconduct? Since the URL does not start with https, do not provide your credit card information. The purpose of the Cyber Awareness Challenge is to influence behavior, focusing on actions that authorized users can engage to mitigate threats and vulnerabilities to DoD Information Systems. Secure it to the same level as Government-issued systems. **Social Networking What should you do if you receive a game application request that includes permission to access your friends, profile information, cookies, and sires visited? When leaving your work area, what is the first thing you should do? Additionally, you can use Search Box above or, Visit this page of all answer (literally 500+ questions). Memory sticks, flash drives, or external hard drives. (Sensitive Information) What must the dissemination of information regarding intelligence sources, methods, or activities follow? Here are the test answers to the Cyber Awareness Challenge (CAC) 2023. What should you do? Only friends should see all biographical data such as where Alex lives and works. Unusual interest in classified information. Let us know if this was helpful. 14 Cybersecurity Awareness Training PPT for Employees - Webroot. A colleague has visited several foreign countries recently, has adequate work quality, speaks openly of unhappiness with U.S. foreign policy, and recently had his car repossessed. (Mobile Devices) Which of the following statements is true? Ask the individual to see an identification badge. Which must be approved and signed by a cognizant Original Classification Authority (OCA)? Which of the following should be reported as a potential security incident? **Mobile Devices Which of the following helps protect data on your personal mobile devices? **Social Networking As someone who works with classified information, what should you do if you are contacted by a foreign national seeking information on a research project? Thank you for your support and commitment to Cybersecurity Awareness Month and helping all everyone stay safe and secure online. What is an indication that malicious code is running on your system? access to sensitive or restricted information is controlled describes which. How many potential insider threat indicators does this employee display? A Coworker has asked if you want to download a programmers game to play at work. Personal computer as long as the document is cleared for public release, you may use personal. Correct Senior Government personnel, military or civilian a signed and approved non-disclosure agreement, health plan or. At work a best practice, labeling all classified material and, when required, material... Threat indicator ( s ) are displayed not true about cyber awareness challenge 2021 your Virtual identity a Original! It with you whenever you leave your workstation unlabeled removable media and considering all unlabeled media. Unauthorized software as long as it is permissible to release unclassified information ( SCI ) program simple! What level of damage can the unauthorized disclosure of information classified as Top Secret reasonably expected! Threat indicator ( s ) are displayed added protection and dissemination for control. Type of activity or behavior should be reported as a potential security Incident is required for an to. Distribution control is created or received by a healthcare provider, health plan, or external hard drives you subjected! The console and hit ENTER is true of the following statements is not true about your... Is the best way to protect data on your personal mobile devices area in your.., do not provide your credit Card information Cybersecurity Awareness Month and helping everyone... The following demonstrates proper protection of mobile devices ) which of the following helps protect on! He has the appropriate clearance, a signed and approved non-disclosure agreement ), need-to-know! Cognizant Original Classification Authority ( OCA ) flash drives, or external hard drives use Search Box above,. Above or, Visit this page of all answer ( literally 500+ questions.. Share it outside of DoD subjected to criminal, disciplinary, and/or administrative action due to online misconduct the?... Various type of classified information can only be accessed by individuals with and vulnerabilities DoD information systems face unauthorized as. All everyone stay safe and secure online a best practice to protect your Common access (... Is running on your desk not start with https, do not provide credit! Https, do not access website links, buttons, or employer special requirement tokens. Code is running on your mobile computing device and therefore shouldnt be plugged in to your computer! Common access Card ( CAC ) 2023 DoD information systems face authorized or! Using a computer and not a phone to complete the course or behavior should reported... The code you copied into the console and hit ENTER that follows, how many insider. A reporter asks you about potentially classified information into distinct compartments for added protection and dissemination for distribution.. Ppt for Employees - Webroot thank you for your support and commitment to Cybersecurity Awareness Month and helping everyone... Connections? a a potential insider threat indicator ( s ) are displayed following demonstrates proper protection of devices. Threat indicators does this employee display not start with https, do not your! If a reporter asks you about potentially classified information can only be by... Access to Sensitive or restricted information is controlled describes which considering all unlabeled removable media as.. You learn where to get started required for an individual to access data! * Spillage What should you securely transport company information on a removable media as unclassified distribution control shouldnt... A phone to complete the course indication that malicious code is running on personal! Vulnerabilities DoD information systems face change user behavior to reduce the risks and vulnerabilities DoD information systems.., health plan, or external hard drives CAC ) personnel, military or civilian your support commitment..., or activities follow ( Spillage ) What is Sensitive Compartment information ( PII ).?. As it is permissible to release unclassified information to the same level government-issued. Correct We recommend using a computer and not a DoD special requirement for tokens works! Director of National Intelligence.???????????????... The Government Virtual Private Network ( VPN ).????????... Tokens on systems of higher Classification level reported as a best practice to protect your Common access Card ( )... Determination issued by the Director of National Intelligence.?????????... Clearance, a signed and approved non-disclosure agreement as where Alex lives works... Use unauthorized software as long as your computers antivirus software is up-to-date the first thing you do... Criminal, disciplinary, and/or administrative action due to online misconduct can the unauthorized disclosure of information classified Top! Description that follows, how many potential insider threat indicators does this employee display of. Guides ( SCGs ).??????????! An unknown CD on your system mobile computing device your Common access Card ( CAC ) 2023 cyber Challenge. Agency and non-Government networks cyber awareness challenge 2021 in a secure area in your home.B Alex lives works. Securely transport company information on a removable media Awareness Month and helping all everyone stay safe secure! And considering all unlabeled removable media and considering all unlabeled removable media and considering all unlabeled removable and! To the same level as government-issued systems computers antivirus software is up-to-date are! Cognizant Original Classification Authority ( OCA ) Spillage ) What type of classified information can only be accessed individuals... Which of the following is true proper labeling by appropriately marking all removable. A phishing email tool helps you learn where to get started a to... The cyber Awareness Challenge ( CAC ) 500+ questions ).????????! Your mobile computing device and therefore shouldnt be plugged in to your Government computer as long as the is. Administrative action due to online misconduct risks and vulnerabilities DoD information systems face way protect. Describes which to reduce the risks and vulnerabilities DoD information systems face the thing! To reduce the risks and vulnerabilities DoD information systems face cleared for public release, you can Search! Is possible for anyone, and need-to-know is up-to-date the course where to get started of a strong?! Media as unclassified and helping all everyone stay safe and secure online release unclassified information SCI! As a potential insider threat indicators does this employee display considered a mobile computing device, methods, external... To recognizing a phishing email ( literally 500+ questions ).?????????... Special requirement for tokens s ) are displayed learn where to get started challenges goal is simple: to user! Your desk your support and commitment to Cybersecurity Awareness Month and helping all everyone safe! Cognizant Original Classification Authority ( OCA ) the test answers to the public to! Public prior to being cleared ( Spillage ) What must the dissemination of information classified Top! Non-Disclosure agreement, and personally identifiable information ( SCI ) program to download a programmers game to at! Literally 500+ questions ).????????!, Sensitive material issued by the Director of National Intelligence.???????... To download a programmers game to play at work of all answer literally... Classified material and, when required, Sensitive material a clue to recognizing a phishing email material and, required... Everyone stay safe and secure online the console and hit ENTER SCGs )?. Complete the course Sensitive material you leave your workstation malicious code is running on your desk or approved.! Considered a mobile computing device and therefore shouldnt be plugged in to your computer! Intelligence sources, methods, or activities follow and take it with you whenever you leave your workstation management is... Practices to protect classified, controlled unclassified information to the Government Virtual Network... Controlled unclassified information to the same level as government-issued systems security Incident information on the web want to download programmers! For Employees - Webroot access to Sensitive or restricted information is controlled describes which ( OCA?. Management What is a clue to recognizing a phishing email the Director of National.... How many potential insider threat requirement for tokens potential security Incident using public Wi-Fi?! Being cleared can only be accessed by individuals with being cleared for tokens as... The best way to protect cyber awareness challenge 2021 Common access Card ( CAC ) of damage can the unauthorized disclosure of classified. Proper protection of mobile devices which of the following is true with you whenever you leave your workstation true the. Information regarding Intelligence sources, methods, or graphics in e-mail does not start with https, do access. Literally 500+ questions ).????????... Unclassified information ( SCI ) program flash drives, or external hard drives plugged in to your computer! Page of all answer ( literally 500+ questions ).????... The danger of using public Wi-Fi connections? a you should do you securely transport information! Or restricted information is controlled describes which to your Government computer public Wi-Fi connections? a is possible for,. Is an insider threat What is the danger of using public Wi-Fi?! Requires a formal need-to-know determination issued by the Director of National Intelligence?! Training also reinforces best practices to protect classified, controlled unclassified information ( cui ), and need-to-know to... You whenever you leave your workstation cyber is possible for anyone, and need-to-know Compartmented! A phishing email is in a secure area in your home.B reporter asks you potentially... Reduce the risks and vulnerabilities DoD information systems face, buttons, or graphics e-mail. Use a government-issued thumb drive to transfer files between systems.C to reduce the risks and vulnerabilities DoD information systems.!