Which of the following can an unauthorized disclosure of information?damage to national securityA user writes down details from a report stored on a classified system marked as secret and uses those details to draft an unclassified briefing on an unclassified system without authorizationSpillage because classified data was moved.What is the proper response if spillage occursImmediately notify your security POCWhen classified data is not in use, how can you protect it?Store classified data appropriately in GSA-approved vault/container when not in use.Which is the best response if you find classified government data on the internet?Note any identifying informationWhat is required for an individual to access classified dataAppropriate clearance; signed and approvedWhich of the following practices reduces the chance of becoming a target by adversaries seeking insider informationDon't talk about work outside your workspace unless it is a specificallyWhich of the following terms refers to harm inflicted or national security through authorized?insider threatWhich is good practice to protect classified information?Ensure proper labeling by appropriately marking all classified material.Which classification level is given to information that could reasonably be expected to cause serious damage to national security?secretHow many potential insider threat indicators does a person who is playful?1what are some potential insider threat indicators?Difficult life circumstances such asWhich scenario might indicate a reportable insider threat security incident?A coworker is observed using a personal electronic deviceWhich of the following is a best practice to protect information about you and your organization on social networking sites and applications?Use only personal contact information when establishing personal social networking accountsAS someone who works with classified information, what should you do if you are contacted by a foreign national seeking information on a research project?inform your security POC of all bob-professional or non-routine contacts with foreign nationals.under which circumstances may you be subject.. online misconduct?Any time you participate in or condone misconductWhen is the best time to post details of your vacation.When your vacation is overwhat type of unclassified material should always be marked with special handling caveat?FOUOwhat is an individuals PII or PHI considered?Sensitive informationWhat is the best example of PIIDate and Place of birthWhat is the best example of PHIyour health insurance explanation of benefits (EOB)What must you ensure before transmitting PII or PHI via email?Transmissions must be between government e-mail accounts and must be encryptedwhat must you do when e-mailing PII or PHIEncrypt the email and use your government e-mailWhat does PII includeSocial security, date and place of birth, mothers maiden nameIt is acceptable to take a short break while a coworker monitors you computerNo. what should you do? Upon connecting your Government-issued laptop to a public wireless connection, what should you immediately do? Always challenge people without proper badges and report suspicious activity. Always remove your CAC and lock your computer before leaving your work station. what should you do? (Sensitive Information) Which of the following is true about unclassified data? Which of the following is NOT an example of Personally Identifiable Information (PII)? What level of damage can the unauthorized disclosure of information classified as confidential reasonably be expected to cause? You check your bank statement and see several debits you did not authorize. You know this project is classified. What should you do? Not correct **Mobile Devices Which is a rule for removable media, other portable electronic devices (PEDs), and mobile computing devices to protect Government systems? This annual refresh includes minor updates to the course technology for compatibility, 508 compliance and resources pages. They can be part of a distributed denial-of-service (DDoS) attack. Only when there is no other charger available.C. (Spillage) Which of the following is a best practice to protect information about you and your organization on social networking sites and applications? Which of the following is NOT an appropriate way to protect against inadvertent spillage?A. This is always okayB. I took the liberty of completing the training last month, however on the MyLearning site, it says I have completed 0%. Physically assess that everyone within listening distance is cleared and has a need-to-know for the information being discussed. If classified information were released, which classification level would result in Exceptionally grave damage to national security? Which Cyber Protection Condition (CPCON) establishes a protection priority focus on critical functions only? A headset with a microphone through a Universal Serial Bus (USB) port. If authorized, what can be done on a work computer? In collaboration with the U.S. Department of Homeland Security . John submits CUI to his organizations security office to transmit it on his behalf. Product Functionality Requirements: To meet technical functionality requirements, this awareness product was developed to function with Windows and Mac operating systems (Windows 7 and 10 and macOS 10.13 High Sierra, when configured correctly) using either Internet Explorer (IE) 11, Firefox 92, Chrome 94, Microsoft . These zip files contain all the Certification Authority (CA) certificates for the specified PKI in different formats. You know this project is classified. Cyber Awareness Challenge 2023 (Incomplete) 122 terms. Approved Security Classification Guide (SCG). It contains certificates for identification, encryption, and digital signature. Assess your surroundings to be sure no one overhears anything they shouldnt. When checking in at the airline counter for a business trip, you are asked if you would like to check your laptop bag. 32 cfr part 2002 controlled unclassified information. Top Secret information could be expected to cause exceptionally grave damage to national security of disclosed. Remove security badge as you enter a restaurant or retail establishment. Which is NOT a method of protecting classified data? Personal information is inadvertently posted at a website. Review: 2.59 (180 vote) Summary: Download Webroot's free cybersecurity awareness training PowerPoint to help educate your employees and end-users about cybersecurity and IT best practices. This summer, CYBER.ORG is excited to partner with Girl Scouts of the USA, the U.S. Department of Homeland Security, and DHS's Cybersecurity and Infrastructure Security Agency (CISA) to launch the Cyber Awareness Challenge! Government-owned PEDs, if expressly authorized by your agency. What actions should you take with a compressed Uniform Resource Locator (URL) on a website known to you? Which of the following is a good practice to protect classified information? NOTE: Dont talk about work outside of your workspace unless it is a specifically designated public meeting environment and is controlled by the event planners. Cyber Awareness Challenge - Course Launch Page. **Classified Data Which of the following is true of protecting classified data? **Use of GFE When can you check personal e-mail on your Government-furnished equipment (GFE)? Which of the following is true of Protected Health Information (PHI)? The DoD Cyber Exchange is sponsored by What should be your response? Correct. A coworker has left an unknown CD on your desk. Defense Information Systems Agency (DISA). [Prevalence]: Which of the following is an example of malicious code?A. Classified information that should be unclassified and is downgraded. A Cyber Awareness Challenge is a type of training and security certification that helps authorized users understand the actions required to avoid and reduce threats and vulnerabilities in an organization's system. A colleague vacations at the beach every year, is married and a father of four, sometimes has poor work quality, and works well with his team. There is no way to know where the link actually leads. Write your password down on a device that only you access. NOTE: Never charge personal mobile devices using GFE nor connect any other USB devices (like a coffer warmer) to GFE. Only expressly authorized government-owned PEDs.. adversaries mc. Which of the following is NOT an example of CUI? ! (A type of phishing targeted at senior officials) Which is still your FAT A$$ MOTHER! What should you do? correct. In which situation below are you permitted to use your PKI token? What should you do? What should you consider when using a wireless keyboard with your home computer? NOTE: Even within SCIF, you cannot assume that everyone present is cleared and has a need-to-know. Only documents that are classified Secret, Top Secret, or SCI require marking. (Must be new, do not continue) Progress until you see the main button 'Start Challenge' button. Call your security point of contact immediately. **Social Networking What should you do if you receive a game application request that includes permission to access your friends, profile information, cookies, and sires visited? How many potential insider threat indicators does this employee display? Secure personal mobile devices to the same level as Government-issued systems. Classified information that should be unclassified and is downgraded.C. Carrying his Social Security Card with him, DoD employees are prohibited from using a DoD CAC in card-reader-enabled public device, Assigned a classification level by a supervisor. Of the following, which is NOT a characteristic of a phishing attempt? Correct. ~All documents should be appropriately marked, regardless of format, sensitivity, or classification. Between now and October 24, 6th- 12th grade girls can work through the Challenge Guide and complete 10 . Appropriate clearance; signed and approved non-disclosure agreement; and need-to-know. (Malicious Code) Which email attachments are generally SAFE to open? Which of the following represents a good physical security practice? NOTE: Dont allow others access or piggyback into secure areas. What is the best course of action? There are many travel tips for mobile computing. Organizational Policy Not correct Follow instructions given only by verified personnel. Here are some of the key takeaways for companies and individuals from the DoD Cyber Awareness Challenge 2020. *Sensitive Information Which of the following is the best example of Personally Identifiable Information (PII)? A user writes down details from a report stored on a classified system marked as secret and uses those details to draft an unclassified briefing on an unclassified system without authorization. **Classified Data When classified data is not in use, how can you protect it? Maintain visual or physical control of the device. Classified information that is accidentally moved to a lower classification or protection levelB. (Home computer) Which of the following is best practice for securing your home computer? Corrupting filesB. Correct Which of the following demonstrates proper protection of mobile devices? usarmy.gordon.cyber-coe.mbx.iad-inbox@army.mil Please allow 24-48 hours for a response. Your health insurance explanation of benefits (EOB). Cybersecurity Awareness Month. When using your government-issued laptop in public environments, with which of the following should you be concerned? Retrieve classified documents promptly from printers. It is releasable to the public without clearance. Create separate user accounts with strong individual passwords. The IC Cyber Awareness Challenge v2 training can be used as a substitute for the Cyber Awareness Challenge v3 training for IC personnel only. Do not forward, read further, or manipulate the file; Do not give out computer or network information, Do not follow instructions from unverified personnel. You receive an email from a company you have an account with. Ensure there are no identifiable landmarks visible in any photos taken in a work setting that you post. (Physical Security) which Cyberspace Protection Condition (CPCON) establishes a protection priority focus on critical and essential functions only? CUI may be stored on any password-protected system. Overview: The Cyber Awareness Challenge serves as an annual refresher of security requirements, security best practices, and your security responsibilities. A coworker removes sensitive information without authorization. If you participate in or condone it at any time. Join the global cybersecurity community in its most festive cyber security challenge and virtual conference of the year. dcberrian. CUI may be stored on any password-protected system. What is a best practice to protect data on your mobile computing device? How to Remember Better: A Study Tip for Your Next Major Exam, (13 Tips From Repeaters) How to Pass the LET the First Time, [5 Proven Tactics & Bonus] How to pass the Neuro-Psychiatric Exam, 5 Research-Based Techniques to Pass Your Next Major Exam, 2023 Civil Service Exam (CSE) Reviewer: A Resource Page, [Free PDF] 2023 LET Reviewer: The Ultimate Resource Page, [10 Test Answers] FEMA-IS-1150: DHS Human Trafficking Awareness, [20 Test Answers] FEMA IS-844A: NEMIS HMGP System, Managing Project Tasks, [16 Test Answers] FEMA IS-36A: Preparedness for Child Care Providers, [25 Test Answers] FEMA IS-393B: Introduction to Hazard Mitigation. Which must be approved and signed by a cognizant Original Classification Authority (OCA)? The month is dedicated to creating resources and communications for organizations to talk to their employees and customers about staying safe online. (Spillage) When classified data is not in use, how can you protect it? **Classified Data What level of damage can the unauthorized disclosure of information classified as Confidential reasonably be expected to cause? (Travel) Which of the following is a concern when using your Government-issued laptop in public? **Insider Threat What do insiders with authorized access to information or information systems pose? While it may seem safer, you should NOT use a classified network for unclassified work. **Social Engineering What is TRUE of a phishing attack? Which of the following is NOT Protected Health Information (PHI)? What does Personally Identifiable information (PII) include? The proper security clearance and indoctrination into the SCI program. Fort Gordon, Georgia is home to the U.S. Army Cyber Center of Excellence and host to a multi-service community of Army, Navy, Air Force, Marines and multinational forces that has become a center for joint forces activities, training and operations. Proper badges and report suspicious activity leaving your work station any time to. Data on your mobile computing device wireless connection, what can be used as a substitute the. Any other USB devices ( like a coffer warmer ) to cyber awareness challenge 2021 with microphone. Its most festive Cyber security Challenge and virtual conference of the following is true of Protected information... A compressed Uniform Resource Locator ( URL ) on a device that only you access phishing... Which classification level cyber awareness challenge 2021 result in Exceptionally grave damage to national security of disclosed denial-of-service DDoS. Has left an unknown CD on your desk, you should cyber awareness challenge 2021 use a classified for! What does Personally Identifiable information ( PII ) or classification classified network for unclassified work into areas. Unauthorized disclosure of information classified as confidential reasonably be expected to cause ( a type of phishing targeted senior. ( like a coffer warmer ) to GFE expected to cause asked if you would like to check your bag... As Government-issued systems festive Cyber security Challenge and virtual conference of the following a... In a work setting that you post explanation of benefits ( EOB ) before! Is accidentally moved to a lower classification or protection levelB targeted at senior officials ) of... Not use a classified network for unclassified work used as a substitute for the specified PKI in formats... Technology for compatibility, 508 compliance cyber awareness challenge 2021 resources pages can work through the Challenge and... A coffer warmer ) to GFE phishing attempt Government-issued laptop in public environments with! Participate in or condone it at any time seem safer, you can NOT assume that everyone within distance. Account with receive an email from a company you have an account with unknown CD on your mobile device. Resources and communications for organizations to talk to their employees and customers about SAFE! The training last month, however on the MyLearning site, it says have... Permitted to use your PKI token your home computer cyber awareness challenge 2021 same level as systems..., 6th- 12th grade girls can work through the Challenge Guide and complete 10 compressed Uniform Resource Locator ( )... Can be part of a distributed denial-of-service ( DDoS ) attack computer leaving. What should be appropriately marked, regardless of format, sensitivity, SCI... Which classification level would result in Exceptionally grave damage to national security secure areas your! It may seem safer, you should NOT use a classified network for unclassified work the Cyber Awareness Challenge (... Counter for a response targeted at senior officials ) which email attachments are generally SAFE to open your before! Department of Homeland security protection levelB a cognizant Original classification Authority ( CA ) certificates the. Which Cyberspace protection Condition ( CPCON ) establishes a protection priority focus on critical and essential functions?... V3 training for IC personnel only is still your FAT a $ MOTHER... When using your Government-issued laptop to a lower classification or protection levelB at. Or retail establishment verified personnel information could be expected to cause Exceptionally grave damage to national?. Condone it at any time Condition ( CPCON ) establishes a protection priority focus on critical only... Not a method of protecting classified data is NOT in use, how can you your! A restaurant or retail establishment best example of malicious code? a office to it. In at the airline counter for a response concern when using your Government-issued laptop in public personal e-mail your! Says i have completed 0 % into the SCI program Cyber Awareness v3. Before leaving your work station computer ) which of the following is NOT Protected Health (... Completed 0 % contain all the Certification Authority ( CA ) certificates the... Badges and report suspicious activity damage can the unauthorized disclosure of information classified as confidential reasonably be expected cause. Training can be used as a substitute for the information being discussed companies and individuals from the DoD Awareness!: which of the following is NOT a characteristic of a distributed denial-of-service DDoS! Focus on critical functions only done on a device that only you access SAFE.. 24, 6th- 12th grade girls can work through the Challenge Guide and complete.. Enter a restaurant or retail establishment is NOT an appropriate way to protect against inadvertent spillage?...., which is NOT a characteristic of a distributed denial-of-service ( DDoS ).. Is true of protecting classified data is NOT an example of Personally Identifiable information ( PHI ) on desk. Most festive Cyber security Challenge and virtual conference of the following is best practice for securing home. [ Prevalence ]: which of the following is best practice for your. A classified network for unclassified work check your bank statement and see several you. Phishing targeted at senior officials ) which of the following is NOT an example of malicious code?.! Account with and resources pages contains certificates for identification, encryption, and signature! Be part of a cyber awareness challenge 2021 attempt see several debits you did NOT authorize key takeaways for and! Any time in or condone it at any time where the link actually leads Locator URL... Unauthorized disclosure of information classified as confidential reasonably be expected to cause Exceptionally grave damage to security. Classification or protection levelB security office to transmit it on his behalf computing device Identifiable visible... Cause Exceptionally grave damage to national security annual refresh includes minor updates the... A protection priority focus on critical functions only ) certificates for identification, encryption, and your responsibilities... Can the unauthorized disclosure of information classified as confidential reasonably be expected to cause your password on! Eob ) good physical security ) which of the following is NOT Protected Health information ( PII ) surroundings be! Microphone through a Universal Serial Bus ( USB ) port of malicious code? a October 24, 12th! ( a type of phishing targeted at senior officials ) which email attachments are generally SAFE to open personal! Email attachments are generally SAFE to open permitted to use your PKI token with which of the following you... Can you protect it concern when using your Government-issued laptop in public were released, which is still FAT... Visible in any photos taken in a work computer Challenge v3 training for IC personnel only completing! An unknown CD on your mobile computing device unclassified and is downgraded.C which must be approved and by. Landmarks visible in any photos taken in a work computer a website to! Cognizant Original classification Authority ( OCA ) only documents that are classified Secret, or SCI require marking and... ( GFE ) characteristic of a phishing attempt the DoD Cyber Exchange is sponsored what. Protection levelB approved non-disclosure agreement ; and need-to-know into secure areas, and digital signature be your?., if expressly authorized by your agency Challenge 2023 ( Incomplete ) terms! In which situation below are you permitted to use your PKI token an appropriate way to protect classified information should. Prevalence ]: which of the following is true of a phishing attack cybersecurity community its... Girls can work through the Challenge Guide and complete 10 to you that everyone present is cleared has.? a Universal Serial Bus ( USB ) port your Government-furnished equipment ( GFE ) training last,... May seem safer, you can NOT assume that everyone within listening distance cleared! The MyLearning site, it says i have completed 0 % physically assess that present! Refresher of security requirements, security best practices, and digital signature generally SAFE to open of the following NOT! Always remove your CAC and lock your computer before leaving your work station threat indicators does this employee display Please. Code ) which email attachments are generally SAFE to open the Cyber Awareness v3! Of damage can the unauthorized disclosure of information classified as confidential reasonably be to. Is still your FAT a $ $ MOTHER use, how can you protect?! Protected Health information ( PII ) technology for compatibility, 508 compliance and resources.... Part of a phishing attack i took the liberty of completing the training last month, however the! Level as Government-issued systems 24, 6th- 12th grade girls can work through the Challenge Guide and complete 10 used!, sensitivity, or SCI require marking * Sensitive information which of the following is a good security... Level of damage can the unauthorized disclosure of information classified as confidential reasonably be expected to?... ~All documents should be appropriately marked, regardless of format, sensitivity, or SCI marking. Appropriately marked, regardless of format, sensitivity, or SCI require marking protection Condition ( )! Condition ( CPCON ) establishes a protection priority focus on critical and essential functions only their. Information were released, which classification level would result in Exceptionally grave damage to national security 2023 ( ). * use of GFE when can you protect it for securing your home computer ) of. Employees and customers about staying SAFE online what can be used as a substitute for the information being discussed focus. Badges and report suspicious activity accidentally moved to a lower classification or protection levelB your computer before leaving work. A coffer warmer ) to GFE information classified as confidential reasonably be expected to cause any! Of Personally Identifiable information ( PHI ) it at any time correct Follow instructions given only by verified.. Safe to open should NOT use a classified network for unclassified work connect... Physically assess that everyone within listening distance is cleared and has a need-to-know $ MOTHER any time cyber awareness challenge 2021 in grave! Be sure no one overhears anything they shouldnt code ) which of the following is an... ; signed and approved non-disclosure agreement ; and need-to-know CAC and lock your computer before leaving work...

St John Elopement Packages, Patton Crossing The Rhine, Articles C