Podcast
Questions and Answers
What should you do if a reporter asks you about potentially classified information on the web?
What should you do if a reporter asks you about potentially classified information on the web?
Neither confirm nor deny the information is classified.
Which of the following may be helpful to prevent inadvertent spillage?
Which of the following may be helpful to prevent inadvertent spillage?
What kind of information could reasonably be expected to cause serious damage to national security in the event of unauthorized disclosure?
What kind of information could reasonably be expected to cause serious damage to national security in the event of unauthorized disclosure?
Secret
A computer labeled SECRET may be used on an unclassified network.
A computer labeled SECRET may be used on an unclassified network.
Signup and view all the answers
How many potential insider threat indicators does an employee displaying anxiety, excessive questions about classified projects, and complaints about credit card bills show?
How many potential insider threat indicators does an employee displaying anxiety, excessive questions about classified projects, and complaints about credit card bills show?
Signup and view all the answers
Which of the following should be reported as a potential security incident?
Which of the following should be reported as a potential security incident?
Signup and view all the answers
Which of the following should be reported as a potential security incident in accordance with your Agency's insider threat policy?
Which of the following should be reported as a potential security incident in accordance with your Agency's insider threat policy?
Signup and view all the answers
When would be a good time to post your vacation location and dates on your social networking website?
When would be a good time to post your vacation location and dates on your social networking website?
Signup and view all the answers
In setting up your personal social networking service account, what email address should you use?
In setting up your personal social networking service account, what email address should you use?
Signup and view all the answers
Which of the following is NOT a correct way to protect sensitive information?
Which of the following is NOT a correct way to protect sensitive information?
Signup and view all the answers
It's true that unclassified data's classification level may rise when aggregated.
It's true that unclassified data's classification level may rise when aggregated.
Signup and view all the answers
Is it permitted to share an unclassified draft document with a non-DoD professional discussion group?
Is it permitted to share an unclassified draft document with a non-DoD professional discussion group?
Signup and view all the answers
What is the best course of action if you see an individual you do not know within a secure area and her badge is not visible?
What is the best course of action if you see an individual you do not know within a secure area and her badge is not visible?
Signup and view all the answers
How should you protect your Common Access Card (CAC) or Personal Identity Verification (PIV) card?
How should you protect your Common Access Card (CAC) or Personal Identity Verification (PIV) card?
Signup and view all the answers
In which situation are you permitted to use your PKI token for access to the NIPRNET?
In which situation are you permitted to use your PKI token for access to the NIPRNET?
Signup and view all the answers
Is it okay to run an application after clicking on a link that prompts you on a website?
Is it okay to run an application after clicking on a link that prompts you on a website?
Signup and view all the answers
What should you immediately do after connecting your Government-issued laptop to a public wireless connection?
What should you immediately do after connecting your Government-issued laptop to a public wireless connection?
Signup and view all the answers
Study Notes
Cyber Awareness Challenge: Key Concepts
- If approached by a reporter about classified information, do not confirm or deny its status.
- To prevent inadvertent spillage of sensitive information, label files and media with appropriate classification markings.
Information Classification
- Secret information can cause serious damage to national security if disclosed without authorization.
- A computer marked SECRET should not be used on unclassified networks.
Insider Threat Indicators
- A colleague showing anxiety, making excessive inquiries about classified projects, and voicing concerns about financial issues displays three or more potential insider threat indicators.
Reporting Security Incidents
- Report incidents such as unauthorized removal of sensitive information or bringing personal devices into restricted areas.
Social Media Safety
- Avoid posting vacation plans on social media until after returning home.
- Use a personal email address for setting up social networking accounts.
Sensitive Information Protection
- Sensitive information cannot be stored on any password-protected system; it must be managed carefully.
- Unclassified data can elevate in classification when aggregated with other information.
Sharing Information
- Unclassified documents can only be shared with non-DoD professionals if they are cleared for public release.
Access Control in Secure Areas
- If encountering an unknown individual in a secure area without visible identification, ask for their identification.
Card Protection Protocol
- Protect your Common Access Card (CAC) or Personal Identity Verification (PIV) card by storing it in a shielded sleeve to prevent unauthorized scanning.
PKI Token Use
- A PKI token from a DoD CAC can be used only on approved NIPRNET systems for tasks that require such authentication.
Network Security Practices
- If a pop-up prompts to run an application after clicking a link, do not execute it unless it is from a trusted source.
- Immediately connect your Government-issued laptop to a Government Virtual Private Network (VPN) when using public wireless connections.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.
Description
Test your knowledge on cyber awareness practices with these flashcards. This quiz covers critical information handling, including responses to reporters and preventive measures against inadvertent information leaks. Challenge yourself to ensure you understand the best practices for maintaining security.