Cyber Awareness 2024 Quiz
27 Questions
106 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What type of information does this personnel roster represent?

Controlled unclassified information

When emailing this personnel roster, which of the following should you do? (Select all that apply)

  • Send without encryption
  • Use your government email account (correct)
  • Encrypt the PII (correct)
  • Digitally sign the email (correct)
  • What does it mean if your meeting notes are unclassified?

    They do not have the potential to damage national security

    Which of the following poses a physical security risk?

    <p>Posting an access roster in public view</p> Signup and view all the answers

    What must you do when using an unclassified laptop in a collateral classified environment? (Select all that apply)

    <p>Use government-issued wired peripherals</p> Signup and view all the answers

    What must you do when working in a SCIF? (Select all that apply)

    <p>Escort uncleared personnel</p> Signup and view all the answers

    Is this an appropriate use of government-furnished equipment?

    <p>False</p> Signup and view all the answers

    This is not an appropriate use of GFE. Why?

    <p>You should not use government email to sell anything, use unauthorized services, or not use a digital signature when sending hyperlinks.</p> Signup and view all the answers

    How can malicious code spread? (Select all that apply)

    <p>Downloading files</p> Signup and view all the answers

    How can you prevent the download of malicious code? (Select all that apply)

    <p>Scan external files before uploading</p> Signup and view all the answers

    Which payment method poses the least risk?

    <p>Cash</p> Signup and view all the answers

    Which method of getting online poses the least risk?

    <p>Approved mobile hotspot</p> Signup and view all the answers

    Which action will keep DoD data the safest?

    <p>Leave the coffee shop</p> Signup and view all the answers

    What step should be taken next to securely telework?

    <p>Secure the area so others cannot view your monitor</p> Signup and view all the answers

    Which of these personally owned computer peripherals may be used with government-furnished equipment? (Select all that apply)

    <p>HDMI monitor</p> Signup and view all the answers

    Does this action pose a potential security risk?

    <p>False</p> Signup and view all the answers

    Select an action to take in response to compartmented information.

    <p>Call your security point of contact (POC)</p> Signup and view all the answers

    DR. Dove printed a classified document and retrieved it promptly from the printer. Does this behavior represent a security concern?

    <p>False</p> Signup and view all the answers

    COL. Cockatiel worked on an unmarked document on the classified network. Does this behavior represent a security concern?

    <p>False</p> Signup and view all the answers

    MR. Macaw and a colleague had a conversation about a shared project in the SCIF after verifying no one was nearby. Does this behavior represent a security concern?

    <p>False</p> Signup and view all the answers

    Which of these individuals demonstrated behavior that could lead to the compromise of SCI?

    <p>COL. Cockatiel</p> Signup and view all the answers

    You find an unlabeled thumb drive in the parking area outside your workplace. What should you do?

    <p>Turn it in to your security officer</p> Signup and view all the answers

    True or false? Voice-activated smart devices can collect and share your personal information.

    <p>True</p> Signup and view all the answers

    True or false? The best way to keep your passport safe is to carry it with you.

    <p>False</p> Signup and view all the answers

    True or false? You should monitor your credit card statements for unauthorized purchases.

    <p>True</p> Signup and view all the answers

    Does Bob demonstrate potential insider threat indicators?

    <p>False</p> Signup and view all the answers

    How should Bob's colleagues respond?

    <p>Report Bob</p> Signup and view all the answers

    Study Notes

    Controlled Unclassified Information

    • A personnel roster is categorized as controlled unclassified information (CUI).

    Email Security

    • When emailing a personnel roster, ensure to encrypt personally identifiable information (PII), digitally sign the email, and use a government email account for security.

    Unclassified Meeting Notes

    • Unclassified meeting notes do not have the potential to harm national security.

    Physical Security Risks

    • Posting an access roster in public view poses a physical security risk.

    Using Unclassified Laptops

    • In a collateral classified environment, unclassified laptops require disabling the embedded camera, microphone, and Wi-Fi, and utilizing government-issued wired peripherals.

    Working in SCIF

    • In a Sensitive Compartmented Information Facility (SCIF), verify personnel have a need-to-know, ensure monitors have obstructed views, and escort uncleared personnel.

    Appropriate Use of Government Equipment

    • Using government-furnished equipment (GFE) for personal or unauthorized purposes is inappropriate.

    Email Usage Policies

    • Using government email for selling and unauthorized services, like file-sharing, breaches acceptable GFE conduct. Digital signatures are necessary for hyperlinks.

    Spread of Malicious Code

    • Malicious code can spread through email attachments, downloading files, and visiting infected websites.

    Prevention of Malicious Code

    • Safeguard against malicious code by scanning external files before uploading and researching apps for vulnerabilities before downloading.

    Secure Payment Methods

    • Cash transactions present the least risk when making payments.

    Internet Access Risks

    • Utilizing an approved mobile hotspot poses the least risk for online access.

    Data Security Best Practices

    • The safest action to protect DoD data is to leave a public space such as a coffee shop.

    Secure Teleworking

    • To securely telework, ensure the workspace is private so that others cannot see the monitor.

    Personal Peripherals with GFE

    • It is acceptable to use HDMI monitors and USB keyboards with government-furnished equipment.

    Potential Security Risks

    • Certain actions may pose potential security risks, necessitating caution.

    Compartmented Information Response

    • In response to sensitive compartmented information (SCI), contact your security point of contact (POC).

    Security Concerns in Document Handling

    • Printing and promptly retrieving a classified document does not typically represent a security issue.

    Document Handling on Classified Network

    • Working on unmarked documents in classified environments, like COL. Cockatiel's actions, raises security concerns.

    Conversations in SCIF

    • Discussing shared projects in a SCIF after verifying no one is nearby is not a security concern, as seen with MR. Macaw.

    Behavior Leading to Security Compromise

    • COL. Cockatiel’s behavior may risk compromising sensitive compartmented information (SCI).

    Handling Found USB Drives

    • Unlabeled thumb drives found in public areas should be turned in to a security officer for proper handling.

    Voice-Activated Smart Devices

    • Voice-activated smart devices can collect and share personal information, confirming the need for privacy awareness.

    Passport Safety

    • Carrying a passport is not the best method for keeping it safe; secure storage is recommended.

    Monitoring Credit Card Activity

    • Regularly monitoring credit card statements for unauthorized purchases is essential for financial security.

    Insider Threat Indicators

    • Bob exhibits potential insider threat indicators, requiring vigilance from colleagues.

    Reporting Suspicious Behavior

    • Bob’s colleagues should report any concerning behavior to maintain security protocols.

    Studying That Suits You

    Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

    Quiz Team

    Description

    Test your knowledge on cyber awareness concepts for 2024. This quiz covers essential terms and definitions related to controlled unclassified information and best practices for handling personnel data. Prepare for secure communication and protect sensitive information.

    More Like This

    Use Quizgecko on...
    Browser
    Browser