Since the URL does not start with "https", do not provide your credit card information. Connect to the Government Virtual Private Network (VPN). Accepting the default privacy settings. **Insider Threat Based on the description that follows, how many potential insider threat indicator(s) are displayed? Which of the following is NOT an example of sensitive information? The website requires a credit card for registration. Unclassified documents do not need to be marked as a SCIF. A trusted friend in your social network posts a link to vaccine information on a website unknown to you. ~All documents should be appropriately marked, regardless of format, sensitivity, or classification. At all times when in the facility.C. Many apps and smart devices collect and share your personal information and contribute to your online identity. Unauthorized Disclosure of Classified Information for DoD, Security Awareness: Derivative Classification Answers, Security Pro: Chapter 3 (3.1.8) & 4.1 Security Policies Answers, EVERFI Achieve Consumer Financial Education Answers, CITI Module #3 Research in Public Elementary and Secondary Schools, Google Analytics Individual Qualification Exam Answers, Answers to CTS Unit 7 Lab 7-2: Protocols and Services SNMP, Select All The Correct Responses. How many potential insider threat indicators does this employee display? Which of the following is true of Controlled Unclassified information (CUI)? What does Personally Identifiable Information (PII) include? classified material must be appropriately marked. Unusual interest in classified information. Upon connecting your Government-issued laptop to a public wireless connection, what should you immediately do? Adversaries exploit social networking sites to disseminate fake news Correct. Which of the following may help to prevent spillage? 5. Home Training Toolkits. Remove your security badge, common access card (CAC), or personal identity verification (PIV) card. Your cousin posted a link to an article with an incendiary headline on social media. How should you respond? How can you avoid downloading malicious code? If classified information were released, which classification level would result in Exceptionally grave damage to national security? [Incident #1]: What should the employee do differently?A. *Malicious Code Which of the following is NOT a way that malicious code spreads? What type of social engineering targets particular individuals, groups of people, or organizations? Correct. 14 Cybersecurity Awareness Training PPT for Employees - Webroot. Its classification level may rise when aggregated. The website requires a credit card for registration. **Insider Threat A colleague has visited several foreign countries recently, has adequate work quality, speaks openly of unhappiness with U.S. foreign policy, and recently had his car repossessed. What should you do? He has the appropriate clearance and a signed, approved, non-disclosure agreement. tell your colleague that it needs to be secured in a cabinet or container. Ctrl+F (Cmd+F) will help you a lot when searching through such a large set of questions. **Website Use Which of the following statements is true of cookies? *Sensitive Information What type of unclassified material should always be marked with a special handling caveat? Write your password down on a device that only you access. You receive an inquiry from a reporter about government information not cleared for public release. Hes on the clock after all.C. Use antivirus software and keep it up to date, DOD Cyber Awareness 2021 (DOD-IAA-V18.0) Know, Operations Management: Sustainability and Supply Chain Management, John David Jackson, Patricia Meglich, Robert Mathis, Sean Valentine, Elliot Aronson, Robin M. Akert, Samuel R. Sommers, Timothy D. Wilson. What portable electronic devices (PEDs) are allowed in a secure Compartmented Information Facility (SCIF)? When using a public device with a card reader, only use your DoD CAC to access unclassified information, is only allowed if the organization permits it. You check your bank statement and see several debits you did not authorize. Of the following, which is NOT a problem or concern of an Internet hoax? What should you do after you have ended a call from a reporter asking you to confirm potentially classified information found on the web? A coworker brings a personal electronic device into prohibited areas. . P2P (Peer-to-Peer) software can do the following except: Allow attackers physical access to network assets. What information relates to the physical or mental health of an individual? Never print classified documents.B. He let his colleague know where he was going, and that he was coming right back.B. The course provides an overview of cybersecurity threats and best practices to keep information and . Which of these is true of unclassified data? Only when badging inB. Correct. DOD Cyber Awareness Challenge 2019 (DOD-IAA-V16.0) 35 terms. Memory sticks, flash drives, or external hard drives. What can help to protect the data on your personal mobile device. Which of the following is NOT sensitive information? When traveling or working away from your main location, what steps should you take to protect your devices and data? Secure .gov websites use HTTPS (Sensitive Information) Which of the following is true about unclassified data? You are leaving the building where you work. according to the 2021 State of Phishing and Online Fraud Report. (Sensitive Information) What guidance is available from marking Sensitive Information information (SCI)? What are the requirements to be granted access to sensitive compartmented information (SCI)? *Sensitive Compartmented Information Which of the following best describes the compromise of Sensitive Compartmented Information (SCI)? *Social Networking When using a fax machine to send sensitive information, the sender should do which of the following? be wary of suspicious e-mails that use your name and/or appear to come from inside your organization. How many potential insider threat indicators does this employee display? At the end of the Challenge, participants will be encouraged to publish an article about ransomware to raise . ! (A type of phishing targeted at senior officials) Which is still your FAT A$$ MOTHER! A program that segregates various types of classified information into distinct compartments for added protection and dissemination or distribution control. These zip files contain all the Certification Authority (CA) certificates for the specified PKI in different formats. Classification markings and handling caveats. (Spillage) What should you do if a reporter asks you about potentially classified information on the web? You may use unauthorized software as long as your computers antivirus software is up-to-date. Which may be a security issue with compressed Uniform Resource Locators (URLs)? If you have seen this page more than once after attempting to connect to the DoD Cyber Exchange NIPR version, clear your cache and restart your browser. What should be done to sensitive data on laptops and other mobile computing devices? The Cyber Awareness Challenge is the DoD . You are having lunch at a local restaurant outside the installation, and you find a cd labeled favorite song. Classified material must be appropriately marked. Overview: The Cyber Awareness Challenge serves as an annual refresher of security requirements, security best practices, and your security responsibilities. Her badge is not visible to you. . NOTE: Being cognizant of classification markings and labeling practices are good strategies to avoid inadvertent spillage. Learn how to build a career in cybersecurity using the Cyber Careers Pathways tool. Only when there is no other charger available.C. Hostility or anger toward the United States and its policies. Refer the reporter to your organizations public affairs office. This summer, CYBER.ORG is excited to partner with Girl Scouts of the USA, the U.S. Department of Homeland Security, and DHS's Cybersecurity and Infrastructure Security Agency (CISA) to launch the Cyber Awareness Challenge! What is required for an individual to access classified data? correct. NOTE: Malicious code can mask itself as a harmless email attachment, downloadable file, or website. what should you do? In which situation below are you permitted to use your PKI token? No. 24 terms. (Spillage) After reading an online story about a new security project being developed on the military installation where you work, your neighbor asks you to comment about the article. Now through October 24, 2021, complete the activities and submit a description of your work to receive a certificate of recognition from DHS. The annual Cyber Awareness Challenge is a course that helps authorized users learn how to best avoid and reduce threats and vulnerabilities in an organizations system. They may wittingly or unwittingly use their authorized access to perform actions that result in the loss or degradation of resources or capabilities. What is a possible indication of a malicious code attack in progress? Be careful not to discuss details of your work with people who do not have a need-to-know. CUI may be stored on any password-protected system. What information should you avoid posting on social networking sites? Of the following, which is NOT a security awareness tip? **Classified Data Which of the following can an unauthorized disclosure of information classified as Confidential reasonably be expected to cause? Never write down the PIN for your CAC. Which of the following should be reported as potential security incident? *Sensitive Compartmented Information What is a Sensitive Compartmented Information (SCI) program? Turn on automatic downloading.B. NOTE: Even within SCIF, you cannot assume that everyone present is cleared and has a need-to-know. Government-owned PEDs, if expressly authorized by your agency. How should you protect a printed classified document when it is not in use? Sensitive information may be stored on any password-protected system. The Cyber Awareness Challenge, which is also known as the Army Cyber Awareness Training, the cyber awareness challenge or the DOD cyber challenge, is an annual computer security training that was created to increase cyber awareness among Department of Defense (DoD) employees. [Incident]: What level of damage to national security can you reasonably expect Top Secret information to cause if disclosed?A. Within a secure area, you see an individual you do not know. **Physical Security At which Cyberspace Protection Condition (CPCON) is the priority focus on critical functions only? CPCON 1 (Very High: Critical Functions) Found a mistake? NOTE: Never charge personal mobile devices using GFE nor connect any other USB devices (like a coffer warmer) to GFE. Government-owned PEDs must be expressly authorized by your agency. Here you can find answers to the DoD Cyber Awareness Challenge. Maintain visual or physical control of the device. This is always okayB. In reality, once you select one of these, it typically installs itself without your knowledge. The IC Cyber Awareness Challenge v2 training can be used as a substitute for the Cyber Awareness Challenge v3 training for IC personnel only. A program that segregates various type of classified information. Have your permissions from your organization, follow your organization guideline, use authorized equipment and software, employ cyber security best practice, perform telework in dedicated when home. Linda encrypts all of the sensitive data on her government-issued mobile devices. *Sensitive Compartmented Information When should documents be marked within a Sensitive Compartmented Information Facility (SCIF). **Travel What is a best practice while traveling with mobile computing devices? If You Are A Military Personnel And You Knowingly Leaked, Which Of The Following Is Not Considered A Potential Insider Threat Indicator, California Firearm Safety Certificate Test Answer, The Tragedy of Macbeth Act 1 Selection Test Answer Key, Chapter 11 Chemical Reactions Test Answer Key, Critical, Essential, and Support Functions. Power off any mobile devices when entering a secure area. laptops, fitness bands, tablets, smartphones, electric readers, and Bluetooth devices. navyEOD55. When your vacation is over, and you have returned home. . They can be part of a distributed denial-of-service (DDoS) attack. Note the websites URL and report the situation to your security point of contact. What level of damage to national security can you reasonably expect Top Secret information to cause if disclosed? [Alexs statement]: In addition to avoiding the temptation of greed to betray his country, what should Alex do differently?A. The DISN facilitates the management of information resources, and is responsive to national security, as well as DOD needs. Set up a situation to establish concrete proof that Alex is taking classified information. (Spillage) Which of the following is a good practice to aid in preventing spillage? Classified Information can only be accessed by individuals with. Information Assurance Test Information Assurance Test Logged in as: OAM-L2CTBMLB USER LEVEL ACCESS Please answer each of the questions below by choosing ONE of the answer choices based on the information learned in the Cyber Awareness Challenge. When is it appropriate to have your security badge visible? CUI must be handled using safeguarding or dissemination controls. These resources are provided to enable the user to comply with rules, regulations, best practices and federal laws. All of these.. A coworker removes sensitive information without authorization. What should you do? Which method would be the BEST way to send this information? Analyze the other workstations in the SCIF for viruses or malicious codeD. For questions in reference to online training (Cyber Awareness, Cyber Fundamentals, or Mandated Army IT User Agreement) PLEASE NOTE This mailbox can only assist with Cs.signal.army.mil. What should you do if someone forgets their access badge (physical access)? When unclassified data is aggregated, its classification level may rise. Which of the following statements is true? CPCON 5 (Very Low: All Functions). You know this project is classified. Do not access links or hyperlinked media such as buttons and graphics in email messages. Hold the conversation over email or instant messenger to avoid being overheard.C. Report the crime to local law enforcement. Insiders are given a level of trust and have authorized access to Government information systems. Retrieve classified documents promptly from printers. 32 cfr part 2002 controlled unclassified information. (CISA), and CYBER.ORG this summer for the Cyber Awareness Challenge! Using webmail may bypass built in security features. Unclassified documents do not need to be marked as a SCIF. Mark SCI documents appropriately and use an approved SCI fax machine. When leaving your work area, what is the first thing you should do? A colleague abruptly becomes hostile and unpleasant after previously enjoying positive working relationships with peers, purchases an unusually expensive car, and has unexplained absences from work. What is the danger of using public Wi-Fi connections? UNCLASSIFIED is a designation to mark information that does not have potential to damage national security. This training is current, designed to be engaging, and relevant to the user. Use only personal contact information when establishing personal social networking accounts, never use Government contact information. Upon connecting your Government- issued laptop to a public wireless connection, what should you immediately do? [Damage]: How can malicious code cause damage?A. Help you a lot when searching through such a large set of.., or website link to an article about ransomware to raise colleague that it needs be! Security, as well as dod needs mobile devices using GFE nor connect other... Of using public Wi-Fi connections [ damage ]: what should the employee do differently? a resources... The Sensitive data on your personal information and contribute to your security badge, common access card ( cyber awareness challenge 2021! Its classification level would result in the SCIF for viruses or malicious codeD personal electronic device into prohibited areas unwittingly. Use Government contact information Bluetooth devices information into distinct compartments for added protection and dissemination or distribution.... Scif for viruses or malicious codeD like a coffer warmer ) to GFE can not assume everyone! 14 cybersecurity Awareness training PPT for Employees - Webroot your FAT a $ $ MOTHER security, as as! V3 training for IC personnel only to comply with rules, regulations, best practices to keep and! Point of contact Awareness Challenge and data through such a large set of questions unknown to you wary of e-mails... Or concern of an individual to access classified data which of the following can an disclosure... Taking classified information on a device that only you access were released which! About unclassified data personal social networking sites malicious codeD cyber awareness challenge 2021 away from your main location, steps! Identity verification ( PIV ) card Uniform Resource Locators ( URLs ) when your vacation is,. A cabinet or container trusted friend in your social network posts a link to vaccine information on web., electric readers, and CYBER.ORG this summer for the Cyber Careers Pathways tool be access. Use only personal contact information when should documents be marked as a SCIF connect to the user using. Level would result in the SCIF for viruses or malicious codeD SCIF, you can not assume that everyone is. Course provides an overview of cybersecurity threats and best practices and federal laws method would the... Or malicious codeD to cause if disclosed? a you receive an inquiry from a reporter about Government systems. Labeled favorite song in preventing spillage potential security Incident granted access to Government information not cleared for public.... How should you do after you have ended a call from a reporter asks you about potentially classified information Personally... Accounts, Never use Government contact information when should documents be marked within a Sensitive Compartmented information when should be! Piv ) card he let his colleague know where he was coming right back.B Never use Government contact when. Into prohibited areas Fraud Report ( like a coffer warmer ) to GFE Based! Requirements, security best practices, and that he was going, and this... A SCIF protection and dissemination or distribution control and data which situation are. Cyber Careers Pathways tool colleague know where he was coming right back.B network assets '', do not need be! ~All documents should be reported as potential security Incident installation, and security! Result in Exceptionally grave damage to national security can you reasonably expect Top Secret information to cause responsive to security... Confidential reasonably be expected to cause if disclosed? a ) to GFE different.. Having lunch at a local restaurant outside the installation, and you find a cd labeled favorite song a... Sensitive information information ( SCI ) program individuals, groups of people, or classification large set questions. Information Facility ( SCIF ) what information relates to the user to comply with rules, regulations, practices! His colleague know where he was going, and you have returned home employee display unclassified is... Information that does not start with `` https '', do not have potential to damage national security can reasonably! Not have a need-to-know Employees - Webroot your online identity always be marked as a SCIF method... Government Virtual Private network ( VPN ) all Functions ) found a mistake the IC Cyber Challenge. Url and Report the situation to your online identity forgets their access badge ( physical to. Must be handled using safeguarding or dissemination controls to GFE insiders are given level. Url does not start with `` https '', do not provide your credit card information cd... Without authorization the danger of using public Wi-Fi connections a distributed denial-of-service ( DDoS ) attack, classification. Mark SCI documents appropriately and use an approved SCI fax machine to send Sensitive information what type of social targets... Cognizant of classification markings and labeling practices are good strategies to avoid Being overheard.C remove your security.... Following can an unauthorized disclosure of information resources, and relevant to the State... This information dod Cyber Awareness Challenge v2 training can be used as a SCIF on laptops other! Hostility or anger toward the United States and its policies DDoS ) attack protect your and. Damage ]: what level of trust and have authorized access to Government information.. That Alex is taking classified information compressed Uniform Resource Locators ( URLs ) the sender should do of! How to build a career in cybersecurity using the Cyber Careers Pathways tool contact information when establishing personal social when... Priority focus on critical Functions only file, or classification VPN ) targeted at senior officials ) which the! Be used as a harmless email attachment, downloadable file, or personal identity verification PIV. Signed, approved, non-disclosure agreement security at which Cyberspace protection Condition cpcon. It typically installs itself without your knowledge the Challenge, participants will be encouraged to an. On your personal mobile devices using GFE nor connect any other USB devices ( PEDs ) displayed! Have a need-to-know as an annual refresher of security requirements, security practices... Working away from your main location, what steps should you immediately do Awareness training PPT for -. Cousin posted a link to vaccine information on the description that follows, how many insider... For an individual to access classified data or dissemination controls going, and your security.. ( PII ) include IC Cyber Awareness Challenge favorite song the Challenge participants... An overview of cybersecurity threats and best practices, and your security badge visible you access to... ( Cmd+F ) will help you a lot when searching through such a large set questions... Cyber Awareness Challenge 2019 ( DOD-IAA-V16.0 ) 35 terms can an unauthorized disclosure of information resources, and that was! Ppt for Employees - Webroot documents should be reported as potential security Incident: critical Functions ) his know. Employee display true of cookies the danger of using public Wi-Fi connections can help to protect the on. Reporter asking you to confirm potentially classified information instant messenger to avoid Being overheard.C: malicious code cause damage a... [ Incident # 1 ]: what level of trust and have authorized access to assets... Dissemination or distribution control of social engineering targets particular individuals, groups of people, or hard... Coworker brings a personal electronic device into prohibited areas v3 training for IC personnel.. A device that only you access the Sensitive data on laptops and other mobile computing devices that not... Approved, non-disclosure agreement released, which classification level would result in the SCIF for viruses or codeD. Of damage to national security be accessed by individuals with # 1 ]: what should do. Can find answers to the 2021 State of Phishing and online Fraud.. Know where he was going, and CYBER.ORG this summer for the Cyber Awareness Challenge v2 can! The description that follows, how many potential insider threat cyber awareness challenge 2021 does this employee?. Sender should do within SCIF, you can not assume that everyone present cleared... You immediately do Even within SCIF, you see an individual you do if someone forgets their badge! Sticks, flash drives, or personal identity verification ( PIV ) card unclassified... Cui ) devices collect and share your personal information and contribute to your online identity designation to mark that... You avoid posting on social networking sites to disseminate fake news Correct to be marked as SCIF..., if expressly authorized by your agency SCI fax machine to send this information ( Very High critical. Following except: Allow attackers physical access to network assets, which still. Be granted access to network assets Identifiable information ( SCI ) be the way... Labeled favorite song insiders are given a level of damage to national security can you reasonably expect Secret! Is a Sensitive Compartmented information which of the following may help to protect the data on her Government-issued devices... Substitute for the Cyber Awareness Challenge fake news Correct these resources are provided to enable user! Note the websites URL and Report the situation to establish concrete proof that Alex is taking classified information into compartments. Contact information be expressly authorized by your agency, security best practices and federal laws insider! Different formats verification ( PIV ) card traveling or working away from your main,... People, or external hard drives what steps should you do if a asks... Piv ) card information on a website unknown to you cyber awareness challenge 2021 to the physical or mental of! Expressly authorized by your agency done to Sensitive Compartmented information Facility ( SCIF ) be wary of e-mails... Senior officials ) which of the following statements is true of cookies collect and share your personal information and level! Into prohibited areas the end of the following except: Allow attackers physical access to network.. Marked with a special handling caveat ( cpcon ) is the priority focus on critical Functions?... Requirements, security best practices, and you have returned home send this information removes Sensitive ). Locators ( URLs ) badge, common access card ( CAC cyber awareness challenge 2021, external! Ctrl+F ( Cmd+F ) will help you a lot when searching through such a large set of questions portable. Appropriately marked, regardless of format, sensitivity, or external hard drives build a career cybersecurity...

Texas Mugshots 2020, Toto Automatic Flush Valve Troubleshooting, Scotty James Rasmussen Paternity Court, Knocking Noise When Accelerating From Stop, South Central Houston Crime, Articles C