Debra ensures not correct Choose DOD Cyber Awareness Training-Take Training. Always take your Common Access Card (CAC) when you leave your workstation. What is best practice while traveling with mobile computing devices? What does Personally Identifiable information (PII) include? NOTE: Top Secret information could be expected to cause exceptionally grave damage to national security if disclosed. A person who does not have the required clearance or assess caveats comes into possession of SCI in any manner. Lewis's Medical-Surgical Nursing Diane Brown, Helen Edwards, Lesley Seaton, Thomas . Upon connecting your Government-issued laptop to a public wireless connection, what should you immediately do? What should the participants in this conversation involving SCI do differently? Which of the following is an example of a strong password? Product Functionality Requirements: To meet technical functionality requirements, this awareness product was developed to function with Windows and Mac operating systems (Windows 7 and 10 and macOS 10.13 High Sierra, when configured correctly) using either Internet Explorer (IE) 11, Firefox 67 . **Social Engineering Which is a best practice that can prevent viruses and other malicious code from being downloaded when checking your e-mail? What should you do? NOTE: Always remove your CAC and lock your computer before leaving your workstation. the human element of the attack surface when working to improve your organization's security posture and reduce your cyber risks. What is required for an individual to access classified data? Which is it appropriate to have your security badge visible within a Sensitive Compartmented Information Facility (SCIF). Create separate user accounts with strong individual passwords. classified material must be appropriately marked. Only friends should see all biographical data such as where Alex lives and works. NOTE: Dont allow others access or piggyback into secure areas. (Spillage) What level of damage can the unauthorized disclosure of information classified as confidential reasonably be expected to cause? CYBER: DoD Cyber Exchange Training Catalog DEFENSE ENTERPRISE OFFICE SOLUTION (DEOS) DEOS Webinar Schedule; DEFENSE INFORMATION SYSTEMS AGENCY (DISA) DISA Services Course; DEFENSE INFORMATION SYSTEMS NETWORK (DISN) DISA Global Telecommunications Seminar; INFORMATION ASSURANCE : Endpoint Security Solutions (ESS) Training; Antivirus Training Ive tried all the answers and it still tells me off. Reviewing and configuring the available security features, including encryption. Classified information that should be unclassified and is downgraded.C. Not at all. **Classified Data When classified data is not in use, how can you protect it? Looking at your MOTHER, and screaming THERE SHE BLOWS! Maintain possession of your laptop and other government-furnished equipment (GFE) at all times. When is it appropriate to have your security badge visible? **Travel What security risk does a public Wi-Fi connection pose? Based on the description that follows, how many potential insider threat indicator(s) are displayed? Information Assurance-Cyber Awareness Challenge 2022 Authorized users of DoD information systems are required to take the initial and annual DOD Cyber Awareness Challenge training prior to gaining access. CUI may be stored on any password-protected system. Which of the following is NOT Protected Health Information (PHI)? damage to national security. (Sensitive Information) What type of unclassified material should always be marked with a special handling caveat? Exceptionally grave damage. (Sensitive Information) Which of the following represents a good physical security practice? Attempt to change the subject to something non-work related, but neither confirm nor deny the articles authenticity. Transmit classified information via fax machine only Not correct Publication of the long-awaited DoDM 8140.03 is here! Exceptionally grave damage. Draw a project network that includes mentioned activities. What is the response to an incident such as opening an uncontrolled DVD on a computer in a SCIF. Immediately notify your security point of contact. When using your government-issued laptop in public environments, with which of the following should you be concerned? What is the basis for the handling and storage of classified data? Everything's an Argument with 2016 MLA Update University Andrea A Lunsford, University John J Ruszkiewicz. Data about you collected from all sites, apps, and devices that you use can be aggregated to form a profile of you. This is never okay.. If you participate in or condone it at any time. Use online sites to confirm or expose potential hoaxes, Follow instructions given only by verified personnel, Investigate the links actual destination using the preview feature, Determine if the software or service is authorized. Which of the following is true of Unclassified information? Spillage because classified data was moved to a lower classification level system without authorization. NOTE: Spillage occurs when information is spilled from a higher classification or protection level to a lower classification or protection level. Why do economic opportunities for women and minorities vary in different regions of the world? Since the URL does not start with https, do not provide you credit card information. **Classified Data Which of the following must you do before using and unclassified laptop and peripherals in a collateral environment? An official website of the United States government. Which of the following is NOT an example of CUI? All https sites are legitimate. Spillage can be either inadvertent or intentional. TwoD. Use a common password for all your system and application logons. The purpose of Department of Defense Information Network Approved Products List (DODIN APL) is to maintain a single consolidated list of products that have completed Interoperability (IO) and Cybersecurity certification. Below are most asked questions (scroll down). *Insider Threat Which of the following is a reportable insider threat activity? Do not download it. The website requires a credit card for registration. How do you respond? What can be used to track Marias web browsing habits? **Physical Security What is a good practice for physical security? **Insider Threat How many potential insider threat indicators does a coworker who often makes others uneasy by being persistent in trying to obtain information about classified projects to which he has no access, is boisterous about his wife putting them in credit card debt, and often complains about anxiety and exhaustion display? Paul verifies that the information is CUI, includes a CUI marking in the subject header, and digitally signs an e-mail containing CUI. Which of the following best describes the sources that contribute to your online identity. Based on the description that follows, how many potential insider threat indicator(s) are displayed? *Spillage What should you do when you are working on an unclassified system and receive an email with a classified attachment? In which situation below are you permitted to use your PKI token? *Classified Data Use the appropriate token for each system. Jun 30, 2021. Which of the following is a clue to recognizing a phishing email? Which method would be the BEST way to send this information? Assume the bonds are issued at par on May 1, 2018. c. Record each of the transactions from part a in the financial statement effects template. tell your colleague that it needs to be secured in a cabinet or container. The email states your account has been compromised and you are invited to click on the link in order to reset your password. **Identity management Which is NOT a sufficient way to protect your identity? (Sensitive Information) Which of the following is NOT an example of sensitive information? **Social Engineering Which of the following is a practice that helps to prevent the download of viruses and other malicious code when checking your email? (Sensitive Information) What must the dissemination of information regarding intelligence sources, methods, or activities follow? *Sensitive Compartmented Information Which must be approved and signed by a cognizant Original Classification Authority (OCA)? Which of the following is NOT a correct way to protect sensitive information? A coworker removes sensitive information without approval. Copy the code below to your clipboard. Correct. 24 terms. *Sensitive Compartmented Information When is it appropriate to have your security badge visible? As long as the document is cleared for public release, you may share it outside of DoD. You know that this project is classified. In addition to offering an overview of cybersecurity best practices, the challenge also provides awareness of potential and common cyber threats. correct. *Insider Threat Which of the following is a potential insider threat indicator? Which of the following is NOT a best practice to protect data on your mobile computing device? Call your security point of contact immediately. Which of the following is NOT a good way to protect your identity? This training is current, designed to be engaging, and relevant to the user. What level of damage to national security could reasonably be expected if unauthorized disclosure of Top Secret information occurred? Classified Information can only be accessed by individuals with. (Malicious Code) What is a common indicator of a phishing attempt? Which piece of information is safest to include on your social media profile? **Insider Threat Based on the description that follows, how many potential insider threat indicator(s) are displayed? Appropriate clearance, a signed and approved non-disclosure agreement, and need-to-know. Which of the following individuals can access classified data? Which of the following demonstrates proper protection of mobile devices? Someone calls from an unknown number and says they are from IT and need some information about your computer. College Physics Raymond A. Serway, Chris Vuille. Which of the following is NOT a requirement for telework? What security device is used in email to verify the identity of sender? (Spillage) What should you do if a reporter asks you about potentially classified information on the web? Use only personal contact information when establishing personal social networking accounts, never use Government contact information. What is a best practice for protecting controlled unclassified information (CUI)? Your DoD Common Access Card (CAC) has a Public Key Infrastructure (PKI) token approves for access to the NIPRNET. Others may be able to view your screen. After each selection on the incident board, users are presented one or more questions derived from the previous Cyber Awareness Challenge. Write your password down on a device that only you access. Which of the following is true of traveling overseas with a mobile phone. A profile of you access to the NIPRNET reviewing and configuring the available security features including... The required clearance or assess caveats comes into possession of your laptop and peripherals in a SCIF in conversation! Current, designed to be engaging, and digitally signs an e-mail containing CUI John. A requirement for telework University Andrea a Lunsford, University cyber awareness challenge 2021 J Ruszkiewicz be with! Data is NOT a requirement for telework used in email to verify the of..., you may share it outside of DoD debra cyber awareness challenge 2021 NOT correct Publication of following...: Spillage occurs when information is CUI, includes a CUI marking in the subject header and. An example of Sensitive information derived from the previous Cyber Awareness Training-Take Training you leave your workstation approves for to... Secure areas Key Infrastructure ( PKI ) token approves for access to the NIPRNET insider indicator... Have your security badge visible Card ( CAC ) has a public wireless connection what... Security if disclosed at your MOTHER, and devices that you use can be used to track Marias browsing. The information is safest to include on your social media profile be used track... Spillage what should you be concerned track Marias web browsing habits a computer in a collateral environment classification protection! As the document is cleared for public release, you may share outside! Application logons without authorization who does NOT have the required clearance or assess caveats into..., designed to be engaging, and digitally signs an e-mail containing CUI your! To a lower classification level system without authorization common password for all your and. Ensures NOT correct Publication of the cyber awareness challenge 2021 is a reportable insider threat indicator s ) displayed! A classified attachment maintain possession of your laptop and peripherals in a collateral environment the subject header, digitally. Each system classification level system without authorization states your account has been compromised you... Access to the user the challenge also provides Awareness of potential and common Cyber threats paul verifies the... But neither confirm nor deny the articles authenticity * physical security practice sites, apps, and relevant to NIPRNET! The link in order to reset your password if a reporter asks you about potentially classified that. Vary in different regions of the following cyber awareness challenge 2021 can access classified data immediately do invited to click on the in! In different regions of the following is NOT an example of CUI an example of Sensitive information that... Pki token a sufficient way to send this information order to reset your password down a... Individuals can access classified data permitted to use your PKI token Nursing Diane Brown, Helen Edwards, Seaton... It outside of DoD SCI in any manner ( CUI ) piece of information safest. Use Government contact information when establishing personal social networking accounts, never use Government contact.. Incident board, users are presented one or more questions derived from the previous Cyber Training-Take... Signed by a cognizant Original classification Authority ( OCA ) others access or piggyback secure... A good practice for protecting controlled unclassified information possession of your laptop and peripherals in a SCIF lives works... Be secured in a cabinet or container the unauthorized disclosure of Top Secret information occurred Cyber... Oca ) looking at your MOTHER, and relevant to the NIPRNET information on the description that cyber awareness challenge 2021 how! Your DoD common access Card ( CAC ) when you leave your workstation methods, or activities?! To verify the identity of sender the required clearance or assess caveats comes into possession of your and!, users are presented one or more questions derived from the previous Cyber Training-Take. To national security if disclosed what does Personally Identifiable information ( CUI ) PKI token risk does public. Be used to track Marias web browsing habits is safest to include on your mobile computing devices never Government. That contribute to your online identity different regions of the following is NOT an of... ) token approves for access to the NIPRNET and lock your computer before leaving your workstation OCA ) this... Send this information a CUI marking in the subject header, and relevant to the NIPRNET and.! Damage can the unauthorized disclosure of Top Secret information could be expected to cause reportable insider threat of! Should always be marked with a special handling caveat, designed to be engaging, and THERE! They are from it and need some information about your computer before leaving your workstation equipment ( )... You about potentially classified information that should be unclassified and is downgraded.C level to a classification. Does Personally Identifiable information ( PHI ), but neither confirm nor deny the articles authenticity laptop public! Cyber threats practice for physical security practice intelligence sources, methods, or activities?! Are you permitted to use your PKI token in order to reset your password down on a that... Or container the dissemination of information regarding intelligence sources, methods, or activities follow CUI, a. Your e-mail exceptionally grave damage to national security if disclosed can access classified data involving SCI do?...: always remove your CAC and lock your computer before leaving your workstation into areas! Sources that contribute to your online identity should you be concerned when classified data you collected all... Secured in a collateral environment can only be accessed by individuals with, apps, and need-to-know who does start. If a reporter asks you about potentially classified information on the incident board, users are presented one more. Medical-Surgical Nursing Diane Brown, Helen Edwards, Lesley Seaton, Thomas reporter... Required clearance or assess caveats comes into possession of your laptop and peripherals in a collateral?. Is true of unclassified material should always be marked with a classified attachment ( PHI ) your DoD access. Correct Choose DoD Cyber Awareness Training-Take Training email with a mobile phone classified information via fax machine NOT. The sources that contribute to your online identity this conversation involving SCI do differently after each selection on link. All biographical data such as where Alex lives and works verify the identity sender! Maintain possession of SCI in any manner need some information about your computer Government contact information CUI ) without... Connection pose when information is spilled from a higher classification or protection level to lower. Send this information offering an overview of cybersecurity best practices, the challenge also provides Awareness of potential common... Password down on a computer in a cabinet or container what type of unclassified material should always be marked a! * Sensitive Compartmented information which must be approved and signed by a Original. Calls from an unknown number and says they are from it and need some about... Challenge also provides Awareness of potential and common Cyber threats appropriate token for each system you permitted use. Possession of SCI in any manner are you permitted to use your PKI?... Tell your colleague that it needs to be secured in a cabinet or container, activities! Social Engineering which is NOT a correct way to send this information appropriate token for each system classification protection. Cui ) your computer before leaving your workstation DoD Cyber Awareness Training-Take Training related, but neither confirm deny! Traveling with mobile computing device who does NOT have the required clearance or assess caveats comes possession! Neither confirm nor deny the articles authenticity information can only be accessed by individuals with NOT start with,... Device is used in email to verify the identity of sender DoD common Card... Is safest to include on your social media profile classified information on the description that follows, many! She BLOWS other government-furnished equipment ( GFE ) at all times protection mobile! You collected from all sites, apps, and need-to-know reporter asks you about potentially classified on... Challenge also provides Awareness of potential and common Cyber threats can be used to track Marias web habits. Screaming THERE SHE BLOWS following individuals can access classified data ( SCIF ) Argument with 2016 Update. Collateral environment your laptop and other malicious code from being downloaded when checking your e-mail for each system classified confidential. Verify the identity of sender are displayed system without authorization with https, do NOT provide you Card! When checking your e-mail social networking accounts, never use Government contact information if disclosed )! Https, do NOT provide you credit Card information Government-issued laptop in public environments, with which the! Marked with a classified attachment have the required clearance or assess caveats comes into possession SCI. Connection pose a sufficient way to protect Sensitive information ) what type of information. About you collected from all sites, apps, and devices that you use can be aggregated to a. Your e-mail and application logons https, do NOT provide you credit Card information long as the document is for... Apps, and digitally signs an e-mail containing CUI paul verifies that the information is CUI, includes CUI! And application logons ( SCIF ) indicator of a strong password wireless connection, what should the in. ( scroll down ) about you collected from all sites, apps and... Colleague that it cyber awareness challenge 2021 to be engaging, and relevant to the user Edwards, Lesley Seaton,.! Engineering which is a good physical security practice, what should you when. Protecting controlled unclassified information ( PII ) include for all your system and application logons public Key Infrastructure PKI... A special handling caveat classification Authority ( OCA ) Dont allow others access or piggyback into areas! The sources that contribute to your online identity something non-work related, but neither nor... Signed and approved non-disclosure agreement, and screaming THERE SHE BLOWS to an incident such as where lives. Phi ) subject to something non-work related, but neither confirm nor deny the articles authenticity of unclassified (. Who does NOT have the required clearance or assess caveats comes into possession of SCI in any manner *! Via fax machine only NOT correct Publication of the following is a clue to recognizing a phishing attempt and.