Podcast
Questions and Answers
Which method would be the BEST way to send this information?
Which method would be the BEST way to send this information?
What should you do if someone asks to use your government issued mobile device?
What should you do if someone asks to use your government issued mobile device?
Decline to lend your phone/laptop.
Where should you store PII / PHI?
Where should you store PII / PHI?
Information should be secured in a cabinet or container while not in use.
Of the following, which is NOT an intelligence community mandate for passwords?
Of the following, which is NOT an intelligence community mandate for passwords?
Signup and view all the answers
Which of the following is NOT government computer misuse?
Which of the following is NOT government computer misuse?
Signup and view all the answers
Which is NOT a telework guideline?
Which is NOT a telework guideline?
Signup and view all the answers
What should you do if someone forgets their access badge?
What should you do if someone forgets their access badge?
Signup and view all the answers
What can you do to protect yourself against phishing?
What can you do to protect yourself against phishing?
Signup and view all the answers
What should you do to protect classified data?
What should you do to protect classified data?
Signup and view all the answers
What action is recommended when somebody calls you about your work environment?
What action is recommended when somebody calls you about your work environment?
Signup and view all the answers
If classified information were released, what classification level would result in 'Exceptionally grave damage to national security'?
If classified information were released, what classification level would result in 'Exceptionally grave damage to national security'?
Signup and view all the answers
Which of the following is NOT considered sensitive information?
Which of the following is NOT considered sensitive information?
Signup and view all the answers
Which of the following is NOT a criterion used to grant an individual access to classified data?
Which of the following is NOT a criterion used to grant an individual access to classified data?
Signup and view all the answers
Of the following, which is NOT a problem of an Internet hoax?
Of the following, which is NOT a problem of an Internet hoax?
Signup and view all the answers
Media containing Privacy Act information, PII, and PHI is not required to be labeled.
Media containing Privacy Act information, PII, and PHI is not required to be labeled.
Signup and view all the answers
Which of the following is NOT a home security best practice?
Which of the following is NOT a home security best practice?
Signup and view all the answers
Which of the following best describes wireless technology?
Which of the following best describes wireless technology?
Signup and view all the answers
You are leaving the building where you work. What should you do?
You are leaving the building where you work. What should you do?
Signup and view all the answers
Which of the following is a good practice to avoid email viruses?
Which of the following is a good practice to avoid email viruses?
Signup and view all the answers
What is considered a mobile computing device and therefore shouldn't be plugged into your government computer?
What is considered a mobile computing device and therefore shouldn't be plugged into your government computer?
Signup and view all the answers
Which is NOT a way to protect removable media?
Which is NOT a way to protect removable media?
Signup and view all the answers
What is NOT Personally Identifiable Information (PII)?
What is NOT Personally Identifiable Information (PII)?
Signup and view all the answers
Of the following, which is NOT a method to protect sensitive information?
Of the following, which is NOT a method to protect sensitive information?
Signup and view all the answers
There are many travel tips for mobile computing. Which of the following is NOT one?
There are many travel tips for mobile computing. Which of the following is NOT one?
Signup and view all the answers
The use of webmail is?
The use of webmail is?
Signup and view all the answers
What is considered ethical use of the government email system?
What is considered ethical use of the government email system?
Signup and view all the answers
Which of the following attacks target high-ranking officials and executives?
Which of the following attacks target high-ranking officials and executives?
Signup and view all the answers
What constitutes a strong password?
What constitutes a strong password?
Signup and view all the answers
You are logged on to your unclassified computer and just received an encrypted email from a co-worker. What should you do?
You are logged on to your unclassified computer and just received an encrypted email from a co-worker. What should you do?
Signup and view all the answers
Study Notes
Cyber Awareness Best Practices
- Use the government email system for transmitting sensitive information; it allows encryption and is secure on government-issued devices.
- Never lend your government-issued mobile devices, such as phones or laptops, to others.
- Personal Identifiable Information (PII) and Protected Health Information (PHI) should be securely stored and kept in cabinets or containers when not in use.
Password and Security Guidelines
- Intelligence community mandates require password updates every 45 days.
- Government computer misuse includes inappropriate use of devices, but checking work emails is acceptable.
- Classified documents should never be taken home during telework.
Access and Data Protection
- If an employee forgets their access badge, report it to the security office immediately.
- To protect against phishing, implement a range of defensive strategies.
- Classified data can only be accessed by individuals who meet specific criteria; being a senior government employee does not guarantee access.
Information Classification and Sensitivity
- "Top Secret" classification indicates information whose unauthorized disclosure could cause "Exceptionally grave damage" to national security.
- Sensitive information must be properly labeled; unmarked media containing Privacy Act-related data is considered mislabeled, even if sanitized.
- Hobby information is not classified as Personally Identifiable Information (PII).
Internet and Device Security
- Hoaxes can trick users through realistic-looking websites; discernment is essential in verifying information online.
- Ensure home security by conducting regular virus scans when devices are in use; scans should not be scheduled when devices are powered off.
- Wireless technology is inherently insecure and requires additional safeguard measures.
Mobile and Remote Office Protocol
- Always remove your security badge when leaving the office premises.
- To prevent email viruses, delete suspicious emails from unknown senders.
- Mobile computing devices should not be connected to government computers; this includes laptops, phones, etc.
Sensitivity and Ethical Use of Information
- Protect removable media by adequately labeling it; unknown unlabeled media cannot be assumed unclassified.
- Ethical usage of government email includes sharing organizational information like newsletters.
Cybersecurity Threats
- Whaling attacks specifically target high-ranking officials and executives for sensitive data extraction.
- Strong passwords encompass various elements, including length, complexity, and unpredictability.
- Upon receiving suspicious encrypted emails, especially with alarming attachments, contact the security Point of Contact (POC) immediately.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.
Description
Test your knowledge on cyber awareness best practices, including the secure transmission of sensitive information and proper handling of personal identifiable information (PII). This quiz also covers password guidelines and data protection protocols required for government employees. Ensure you understand the importance of security measures in maintaining data integrity.