Cyber Awareness Best Practices Quiz
29 Questions
100 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

Which method would be the BEST way to send this information?

  • Send it through personal email
  • Write it down on paper
  • Use the government email system so you can encrypt the information and open the email on your government issued laptop (correct)
  • Use instant messaging
  • What should you do if someone asks to use your government issued mobile device?

    Decline to lend your phone/laptop.

    Where should you store PII / PHI?

    Information should be secured in a cabinet or container while not in use.

    Of the following, which is NOT an intelligence community mandate for passwords?

    <p>Maximum password age of 45 days</p> Signup and view all the answers

    Which of the following is NOT government computer misuse?

    <p>Checking work email</p> Signup and view all the answers

    Which is NOT a telework guideline?

    <p>Taking classified documents from your workspace</p> Signup and view all the answers

    What should you do if someone forgets their access badge?

    <p>Alert the security office.</p> Signup and view all the answers

    What can you do to protect yourself against phishing?

    <p>All of the above</p> Signup and view all the answers

    What should you do to protect classified data?

    <p>Answer 1 and 2 are correct</p> Signup and view all the answers

    What action is recommended when somebody calls you about your work environment?

    <p>Ask them to verify their name and office number.</p> Signup and view all the answers

    If classified information were released, what classification level would result in 'Exceptionally grave damage to national security'?

    <p>Top Secret.</p> Signup and view all the answers

    Which of the following is NOT considered sensitive information?

    <p>Sanitized information gathered from personnel records</p> Signup and view all the answers

    Which of the following is NOT a criterion used to grant an individual access to classified data?

    <p>Senior government personnel, military or civilian</p> Signup and view all the answers

    Of the following, which is NOT a problem of an Internet hoax?

    <p>Enhancing public awareness</p> Signup and view all the answers

    Media containing Privacy Act information, PII, and PHI is not required to be labeled.

    <p>False</p> Signup and view all the answers

    Which of the following is NOT a home security best practice?

    <p>Setting weekly time for virus scan when you are not on the computer and it is powered off</p> Signup and view all the answers

    Which of the following best describes wireless technology?

    <p>It is inherently not a secure technology.</p> Signup and view all the answers

    You are leaving the building where you work. What should you do?

    <p>Remove your security badge.</p> Signup and view all the answers

    Which of the following is a good practice to avoid email viruses?

    <p>Delete email from senders you do not know</p> Signup and view all the answers

    What is considered a mobile computing device and therefore shouldn't be plugged into your government computer?

    <p>All of the above</p> Signup and view all the answers

    Which is NOT a way to protect removable media?

    <p>Storing them in unlocked containers</p> Signup and view all the answers

    What is NOT Personally Identifiable Information (PII)?

    <p>Hobby.</p> Signup and view all the answers

    Of the following, which is NOT a method to protect sensitive information?

    <p>After work hours, storing sensitive information in unlocked containers</p> Signup and view all the answers

    There are many travel tips for mobile computing. Which of the following is NOT one?

    <p>When using a public device with a card reader, only use your DoD CAC to access unclassified information</p> Signup and view all the answers

    The use of webmail is?

    <p>Only allowed if the organization permits it.</p> Signup and view all the answers

    What is considered ethical use of the government email system?

    <p>Distributing company newsletter.</p> Signup and view all the answers

    Which of the following attacks target high-ranking officials and executives?

    <p>Whaling</p> Signup and view all the answers

    What constitutes a strong password?

    <p>All of the above</p> Signup and view all the answers

    You are logged on to your unclassified computer and just received an encrypted email from a co-worker. What should you do?

    <p>Contact your security POC right away.</p> Signup and view all the answers

    Study Notes

    Cyber Awareness Best Practices

    • Use the government email system for transmitting sensitive information; it allows encryption and is secure on government-issued devices.
    • Never lend your government-issued mobile devices, such as phones or laptops, to others.
    • Personal Identifiable Information (PII) and Protected Health Information (PHI) should be securely stored and kept in cabinets or containers when not in use.

    Password and Security Guidelines

    • Intelligence community mandates require password updates every 45 days.
    • Government computer misuse includes inappropriate use of devices, but checking work emails is acceptable.
    • Classified documents should never be taken home during telework.

    Access and Data Protection

    • If an employee forgets their access badge, report it to the security office immediately.
    • To protect against phishing, implement a range of defensive strategies.
    • Classified data can only be accessed by individuals who meet specific criteria; being a senior government employee does not guarantee access.

    Information Classification and Sensitivity

    • "Top Secret" classification indicates information whose unauthorized disclosure could cause "Exceptionally grave damage" to national security.
    • Sensitive information must be properly labeled; unmarked media containing Privacy Act-related data is considered mislabeled, even if sanitized.
    • Hobby information is not classified as Personally Identifiable Information (PII).

    Internet and Device Security

    • Hoaxes can trick users through realistic-looking websites; discernment is essential in verifying information online.
    • Ensure home security by conducting regular virus scans when devices are in use; scans should not be scheduled when devices are powered off.
    • Wireless technology is inherently insecure and requires additional safeguard measures.

    Mobile and Remote Office Protocol

    • Always remove your security badge when leaving the office premises.
    • To prevent email viruses, delete suspicious emails from unknown senders.
    • Mobile computing devices should not be connected to government computers; this includes laptops, phones, etc.

    Sensitivity and Ethical Use of Information

    • Protect removable media by adequately labeling it; unknown unlabeled media cannot be assumed unclassified.
    • Ethical usage of government email includes sharing organizational information like newsletters.

    Cybersecurity Threats

    • Whaling attacks specifically target high-ranking officials and executives for sensitive data extraction.
    • Strong passwords encompass various elements, including length, complexity, and unpredictability.
    • Upon receiving suspicious encrypted emails, especially with alarming attachments, contact the security Point of Contact (POC) immediately.

    Studying That Suits You

    Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

    Quiz Team

    Description

    Test your knowledge on cyber awareness best practices, including the secure transmission of sensitive information and proper handling of personal identifiable information (PII). This quiz also covers password guidelines and data protection protocols required for government employees. Ensure you understand the importance of security measures in maintaining data integrity.

    More Like This

    Use Quizgecko on...
    Browser
    Browser