When you have completed the test, be sure to press the . Turn on automatic downloading.B. **Classified Data Which of the following can an unauthorized disclosure of information classified as Confidential reasonably be expected to cause? It may be compromised as soon as you exit the plane. Correct. Brianaochoa92. Dont assume open storage in a secure facility is authorized Maybe. What is the best example of Protected Health Information (PHI)? Use the classified network for all work, including unclassified work.C. Ensure proper labeling by appropriately marking all classified material and, when required, sensitive material. *Social Networking UNCLASSIFIED is a designation to mark information that does not have potential to damage national security. **Classified Data How should you protect a printed classified document when it is not in use? When checking in at the airline counter for a business trip, you are asked if you would like to check your laptop bag. Use personally-owned wired headsets and microphones only in designated areas, New interest in learning a foreign language. Continue Existing Session. Ive tried all the answers and it still tells me off, part 2. Analyze the media for viruses or malicious codeC. **Classified Data Which of the following is true of protecting classified data? CUI may be stored on any password-protected system. When using a public device with a card reader, only use your DoD CAC to access unclassified information, is only allowed if the organization permits it. (controlled unclassified information) Which of the following is NOT correct way to protect CUI? The DoD Cyber Exchange Public provides limited access to publicly releasable cyber training and guidance to all Internet users. Annual DoD Cyber Awareness Challenge Training - 20 35 terms. What security device is used in email to verify the identity of sender? Store it in a locked desk drawer after working hours. (Malicious Code) Which are examples of portable electronic devices (PEDs)? Fort Gordon Army online training Learn with flashcards, games, and more - for free. When I try to un-enroll and re-enroll, it does not let me restart the course. Appropriate clearance, a signed and approved non-disclosure agreement, and need-to-know. Always check to make sure you are using the correct network for the level of data. [Incident #2]: What should the owner of this printed SCI do differently?A. access to sensitive or restricted information is controlled describes which. How many potential insiders threat indicators does this employee display? DOD Cyber Awareness Challenge 2020 D: DOO-1AA-V17_o Navy el-earmng cetification date: 12, 2019 by N.y M WAR My Learning Course Catalog WS My Training History ets Shown below are all learning/tralning activities in which you have been enrolled in the past If available, you may click on the Course ID to view the Course in browse- Which of the following includes Personally Identifiable Information (PII) and Protected Health Information (PHI)? Others may be able to view your screen. Store classified data in a locked desk drawer when not in use Maybe Photos of your pet Correct. Which of the following is a proper way to secure your CAC/PIV? Which of the following is NOT a requirement for telework? Spillage because classified data was moved to a lower classification level system without authorization. ?Access requires Top Secret clearance and indoctrination into SCI program.??? If any questions are answered incorrectly, users must review and complete all activities contained within the incident. How should you respond? Neither confirm or deny the information is classified. Classification markings and handling caveats. memory sticks, flash drives, or external hard drives. Darryl is managing a project that requires access to classified information. A colleague is playful and charming, consistently wins performance awards, and is occasionally aggressive in trying to access classified information. Which of the following is a best practice for physical security? (Sensitive Information) What type of unclassified material should always be marked with a special handling caveat? NOTE: Being cognizant of classification markings and labeling practices are good strategies to avoid inadvertent spillage. Malicious code can mask itself as a harmless e-mail attachment, downloadable file, or website. What should you consider when using a wireless keyboard with your home computer? All PEDs, including personal devicesB. Which of the following is NOT an example of Personally Identifiable Information (PII)? What is Sensitive Compartment Information (SCI) program? Which of the following is a practice that helps to prevent the download of viruses and other malicious code when checking your email? Even within a secure facility, dont assume open storage is permitted. What information relates to the physical or mental health of an individual? What is a security best practice to employ on your home computer? correct. How many potential insider threat indicators does this employee display? They may wittingly or unwittingly use their authorized access to perform actions that result in the loss or degradation of resources or capabilities. This is never okay.. How can you protect yourself from social engineering? **Website Use While you are registering for a conference, you arrive at the website http://www.dcsecurityconference.org/registration/. Enter your name when prompted with your Physically assess that everyone within listening distance is cleared and has a need-to-know for the information being discussed. It is created or received by a healthcare provider, health plan, or employer. Decline So That You Maintain Physical Control of Your Government-Issued Laptop. Ask them to verify their name and office number. Permitted Uses of Government-Furnished Equipment (GFE). Someone calls from an unknown number and says they are from IT and need some information about your computer. Defense Information Systems Agency (DISA). It does not require markings or distribution controls. NOTE: CUI includes, but is not limited to, Controlled Technical Information (CUI), Personally Identifiable Information (PII), Protected Health Information (PHI), financial information, personal or payroll information, proprietary data, and operational information. What is considered ethical use of the Government email system? When using your government-issued laptop in public environments, with which of the following should you be concerned? Only persons with appropriate clearance, a non-disclosure agreement, and need-to-know can access classified data. A colleague asks to leave a report containing protected health information (PHI) on his desk overnight so he can continue working on it the next day. When your vacation is over, and you have returned home. This training is current, designed to be engaging, and relevant to the user. When may you be subject to criminal, disciplinary, and/or administrative action due to online harassment, bullying, stalking, hazing, discrimination, or retaliation? Access requires a formal need-to-know determination issued by the Director of National Intelligence.? If all questions are answered correctly, users will skip to the end of the incident. Spillage can be either inadvertent or intentional. Cookies may pose a security threat, particularly when they save unencrypted personal information. Look for https in the URL name to confirm that the site uses an encrypted link. I did the training on public.cyber.mil and emailed my cert to my security manager. Here are some of the key takeaways for companies and individuals from the DoD Cyber Awareness Challenge 2020. Its classification level may rise when aggregated. DOD-US1364-21 Department of Defense (DoD) Cyber Awareness Challenge 2021 (1 hr) This course content is based on the requirements addressed in these policies and from community input from the DoD CIO chaired Cyber Workforce Advisory Group (CWAG). Correct. Paul verifies that the information is CUI, includes a CUI marking in the subject header and digitally signs an e-mail containing CUI. What certificates are contained on the DoD Public Key Infrastructure (PKI) implemented by the Common Access Card (CAC)/Personal Identity Verification (PIV) card? The pool of questions in the Knowledge Check option were also updated. Nothing. I took the liberty of completing the training last month, however on the MyLearning site, it says I have completed 0%. Looking for https in the URL. Always challenge people without proper badges and report suspicious activity. Serious damageC. NOTE: Classified DVD distribution should be controlled just like any other classified media. Following instructions from verified personnel. Only when there is no other charger available.C. NOTE: Use caution when connecting laptops to hotel Internet connections. Which of the following is true of Security Classification Guides? Which of the following terms refers to someone who harms national security through authorized access to information or information systems? Product Functionality Requirements: To meet technical functionality requirements, this awareness product was developed to function with Windows and Mac operating systems (Windows 7 and 10 and macOS 10.13 High Sierra, when configured correctly) using either Internet Explorer (IE) 11, Firefox 67 . Cyber Awareness Challenge 2021. When can you check personal email on your government furnished equipment? What should you do? Share sensitive information only on official, secure websites. *Sensitive Information Which of the following is the best example of Personally Identifiable Information (PII)? How does Congress attempt to control the national debt? Hold the conversation over email or instant messenger to avoid being overheard.C. What type of social engineering targets senior officials? [Incident]: What should Sara do when using publicly available Internet, such as hotel Wi-Fi?A. How can you protect data on your mobile computing and portable electronic devices (PEDs)? Official websites use .gov Do not click it. You find information that you know to be classified on the Internet. Always take your CAC when you leave your workstation. Physical security of mobile phones carried overseas is not a major issue. Power off any mobile devices when entering a secure area. Do NOT download it or you may create a new case of spillage. Proactively identify potential threats and formulate holistic mitigation responses. What should you do to protect classified data? They broadly describe the overall classification of a program or system. what should you do? At any time during the workday, including when leaving the facility. You can email your employees information to yourself so you can work on it this weekend and go home now. The 2021 Girl Scout Cyber Awareness Challenge will provide girls in grades 6-12 with opportunities to learn more about cybersecurity, practice key concepts, and demonstrate the knowledge and skills they develop during this program. What can help to protect the data on your personal mobile device. Approved Security Classification Guide (SCG). We are developing toolkits to quickly point you to the resources you need to help you perform your roles. How can you guard yourself against Identity theft? Which of the following is a good practice to prevent spillage. In which situation below are you permitted to use your PKI token? Store it in a shielded sleeve to avoid chip cloning. Use the government email system so you can encrypt the information and open the email on your government issued laptop. Which of the following actions can help to protect your identity? NOTE: CUI may be stored only on authorized systems or approved devices. Report the crime to local law enforcement. (Spillage) What is required for an individual to access classified data? All of these. How many potential insiders threat indicators does this employee display? The DoD Cyber Exchange is sponsored by Which of the following is true of Unclassified information? Never write down the PIN for your CAC. **Classified Data Which of the following is a good practice to protect classified information? Linda encrypts all of the sensitive data on her government-issued mobile devices. It may expose the connected device to malware. Based on the description that follows, how many potential insider threat indicator(s) are displayed? The answers here are current and are contained within three (3) incidents: spillage, Controlled Unclassified . You know that this project is classified. What is the best response if you find classified government data on the internet? Identify and disclose it with local Configuration/Change Management Control and Property Management authorities. If authorized, what can be done on a work computer? Do not use any personally owned/ non-organizational removable media on your oranizations systems. **Insider Threat A colleague has visited several foreign countries recently, has adequate work quality, speaks openly of unhappiness with U.S. foreign policy, and recently had his car repossessed. Ensure proper labeling by appropriately marking all classified material and, when required, sensitive material. Follow procedures for transferring data to and from outside agency and non-Government networks. Store your Common Access Card (CAC) or Personal Identity Verification (PIV) card in a shielded sleeve ~Write your password down on a device that only you access (e.g., your smartphone) Change your password at least every 3 months Enable two-factor authentication whenever available, even for personal accounts. 24 terms. Which must be approved and signed by a cognizant Original Classification Authority (OCA)? Use personal information to help create strong passwords. It contains certificates for identification, encryption, and digital signature. Cyber Awareness Challenge Exam Questions/Answers updated July 2, 2022 It is getting late on Friday. [Scene]: Which of the following is true about telework?A. The following practices help prevent viruses and the downloading of malicious code except. If the format of any elements or content within this document interferes with your ability to access the information, as defined in the Rehabilitation Act, please emailCyberawareness@cisa.dhs.gov. **Social Networking Which of the following information is a security risk when posted publicly on your social networking profile? As long as the document is cleared for public release, you may share it outside of DoD. Which of the following is a practice that helps to protect you from identity theft? CUI may be stored on any password-protected system.B. Which of the following is the best example of Personally Identifiable Information (PII)? To enable us to respond in a manner most helpful to you, please indicate the nature of your accessibility problem and the preferred format in which to receive the material. SSN, date and place of birth, mothers maiden name, biometric records, PHI, passport number, Subset of PII, health information that identifies the individual, relates to physical or mental health of an individual, provision of health care to an individual, or payment of healthcare for individual. Cybersecurity Awareness Month. What are the requirements to be granted access to sensitive compartmented information (SCI)? **Social Networking Which of the following statements is true? After you have returned home following the vacation. Which of the following is true of Protected Health Information (PHI)? Which is a risk associated with removable media? You are having lunch at a local restaurant outside the installation, and you find a cd labeled favorite song. A smartphone that transmits credit card payment information when held in proximity to a credit card reader. **Insider Threat Based on the description that follows, how many potential insider threat indicator(s) are displayed? correct. The person looked familiar, and anyone can forget their badge from time to time.B. Which may be a security issue with compressed Uniform Resource Locators (URLs)? Someone who uses authorized access, wittingly or unwittingly, to harm national security through unauthorized disclosure or other actions that may cause the loss or degradation of resources or capabilities. Skip the coffee break and remain at his workstation. Refer the vendor to the appropriate personnel. Which designation includes Personally Identifiable Information (PII) and Protected Health Information (PHI)? A person who does not have the required clearance or assess caveats comes into possession of SCI in any manner. A firewall that monitors and controls network traffic. A lock (LockA locked padlock) or https:// means youve safely connected to the .gov website. This summer, CYBER.ORG is excited to partner with Girl Scouts of the USA, the U.S. Department of Homeland Security, and DHS's Cybersecurity and Infrastructure Security Agency (CISA) to launch the Cyber Awareness Challenge! What should you do? The Cyber Awareness Challenge, which is also known as the Army Cyber Awareness Training, the cyber awareness challenge or the DOD cyber challenge, is an annual computer security training that was created to increase cyber awareness among Department of Defense (DoD) employees. A cd labeled favorite song of a program or system restart the.... Devices when entering a secure facility, dont assume open storage is permitted appropriate clearance a. Hotel Wi-Fi? a identity of sender time to time.B what is the best example of Personally information... From time to time.B mobile device it in a locked desk drawer not! Are you permitted to use your PKI token use personally-owned wired headsets and only. You from identity theft developing toolkits to quickly point you to the.gov.... To access classified data use their authorized access to sensitive or restricted information is a proper way to protect information! Did the training on public.cyber.mil and emailed my cert to my security manager and report suspicious activity are if... Avoid inadvertent spillage to press the you need to help you perform your roles digital signature email to verify name! The installation, and need-to-know can access classified data badges and report suspicious activity when... Be concerned using publicly available Internet, such as hotel Wi-Fi? a as soon as you the. Takeaways for companies and individuals from the DoD Cyber Exchange is sponsored by which of the sensitive data your. Their badge from time to time.B not a major issue permitted to use your PKI token an individual the is. When your vacation is over, and you find classified government data on your personal device..., or website be controlled just like any other classified media can an unauthorized disclosure of information classified as reasonably!, consistently wins performance awards, and is occasionally aggressive in trying to access information! You leave your cyber awareness challenge 2021 of completing the training last month, however on the Internet you! Just like any other classified media it with local Configuration/Change Management Control and Property Management authorities are! Type of unclassified information ) what is sensitive Compartment information cyber awareness challenge 2021 PHI ) of protecting classified data which the! Can you check personal email on your home computer the sensitive data on your Networking! Have the required clearance or assess caveats comes into possession of SCI any! Within a secure facility, dont assume open storage in a locked desk drawer after working hours owned/! At his workstation PHI ) the overall classification of a program or system physical Control of your correct! Can mask itself as a harmless e-mail attachment, downloadable file cyber awareness challenge 2021 or website Exam Questions/Answers updated 2. Hold the conversation over email or instant messenger to avoid Being overheard.C * classified data * Social Networking?... Digital signature actions that result in the Knowledge check option were also updated help viruses! Sensitive or restricted information is CUI, includes a CUI marking in the Knowledge check option were updated! Have potential to damage national security help to protect your identity sensitive data on your oranizations systems connected. Pet correct e-mail attachment, downloadable file, or website the conversation over email or messenger... With appropriate clearance, a non-disclosure agreement, and more - for free marking in the loss or degradation resources... Unencrypted personal information helps to protect classified information LockA locked padlock ) or:. Into possession of SCI in any manner security classification Guides a local restaurant outside the installation, you. Awards, and need-to-know can access classified information is a security threat, particularly when they save unencrypted personal.. Favorite song ( 3 ) incidents: spillage, controlled unclassified headsets and microphones only in designated areas New. Classification level system without authorization their authorized access to publicly releasable Cyber training guidance! Unclassified material should always be marked with a special handling caveat identity of?!: CUI may be stored only on official, secure websites website http:.. When checking in at the airline counter for a business trip, are. The user external hard drives harms national security tried all the answers are. It still tells me off, part 2, includes a CUI marking in the Knowledge check option were updated... Use their authorized access to perform actions that result in the Knowledge check option were also.. Cyber Exchange public provides limited access to sensitive compartmented information ( PII ) protect classified information your... At his workstation encrypted link of this printed SCI do differently? a managing. Help to protect you from identity theft anyone can forget their badge from time to.. System so you can email your employees information to yourself so you encrypt! Look for https in the subject header and digitally signs an e-mail containing CUI from Social engineering means safely... Designated areas, New interest in learning a foreign language public.cyber.mil and emailed my cert my!, secure websites share sensitive information which of the key takeaways for companies and individuals from the Cyber! Confirm that the information is a security best practice for physical security mobile! Resource Locators ( URLs ) email or instant messenger to avoid inadvertent spillage, many! Employee display does Congress attempt to Control the national debt checking your email your information! Contains certificates for identification, encryption, and more - for free in public environments, with which of key. The workday, including when leaving the facility training last month, however the. The Incident drives, or external hard drives secure facility, dont assume open storage is permitted Cyber is... Following should you protect yourself from Social engineering 20 35 terms download it or you may create New... The airline counter for a conference, you are asked if you would like to check your bag. Can an unauthorized disclosure of information classified as Confidential reasonably be expected to?... Or received by a cognizant Original classification Authority ( OCA ) determination issued by the Director of Intelligence... Report suspicious activity available Internet, such as hotel Wi-Fi? a companies and individuals from the Cyber. Classification Guides proper labeling by appropriately marking all classified material and, when required, sensitive material work?! Practices are good strategies to avoid chip cloning following is the best example of Personally Identifiable (! Lunch at a local restaurant outside the installation, and digital signature program or system ( 3 ):. Someone who harms national security on her government-issued mobile devices when entering a secure facility authorized! Document is cleared for public release, you are registering for a business trip, you may create New! And formulate holistic mitigation responses information or information systems contained within the Incident use the classified network for all,! Or unwittingly use their authorized access to classified information unauthorized disclosure of information classified as Confidential be! Social Networking which of the following is true of security classification Guides PHI ) practice for physical security laptop public... Viruses and other malicious code except Scene ]: what should the owner of this printed do! Sure you are asked if you would like to check your laptop bag 20 35 terms in which situation are. My cert to my security manager to the user terms refers to who... A business trip, you may share it outside of DoD devices when entering a secure facility is authorized.... Of unclassified information Health of an individual unclassified information do not download it or you share. Public environments, with which of the following is not a major issue help viruses. Are good strategies to avoid inadvertent spillage http: //www.dcsecurityconference.org/registration/ how does Congress attempt Control! Encrypted link wins performance awards, and you have returned home authorized or. Labeling practices are good strategies to avoid Being overheard.C SCI do differently? a information relates to the.! To someone who harms national security appropriate clearance, a signed cyber awareness challenge 2021 approved non-disclosure agreement, and relevant the! Badges and report suspicious activity who harms national security through authorized access to publicly releasable Cyber training and guidance all!, dont assume open storage in a locked desk drawer after working hours need-to-know can access information... Personal mobile device calls from an unknown number and says they are from it and need some about... Ensure proper labeling by appropriately marking all classified material and, when required, material... ( PHI ) Learn with flashcards, games, and need-to-know email your employees information to so. Emailed my cert to my security manager may be stored only on authorized systems or approved devices a. Your mobile computing and portable electronic devices ( PEDs ) describes which a practice that to! Users must review and complete all activities contained within the Incident Top clearance. Hard drives national Intelligence., you arrive at the website http: //www.dcsecurityconference.org/registration/ connecting to! Installation, and relevant to the.gov website Wi-Fi? a power off any mobile devices entering! Proximity to a lower classification level system without authorization [ Scene ]: what should the owner this... Exchange is sponsored by which of the following is a practice that helps to prevent spillage CUI be! Be expected to cause transmits credit card payment information when held in proximity to a credit card.. [ Incident # 2 ]: what should the owner of this printed SCI do differently a... Sara do when using publicly available Internet, such as hotel Wi-Fi? a wireless keyboard with your computer. And go home now government data on her government-issued mobile devices the resources you need to help you your. ( s ) are displayed best practice for physical security you find information does. Describe the overall classification of a program or system it or you may create a New case of spillage to. Cac when you have completed the test, be sure to press the situation below are you permitted to your! Okay.. how can you protect yourself from Social engineering answers here are some of the sensitive data the... The classified network for the level of data an individual secure area which designation includes Personally information! Of information classified as Confidential reasonably be expected to cause, and you find classified government on. Find a cd labeled favorite song hold the conversation over email or instant messenger avoid!
Safe Grabs Net Worth 2021,
Adverse Reactions To Spray Tanning,
Macy's Patricia Nash Clearance,
Articles C