Cyber Awareness Challenge 2019
17 Questions
100 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What should you do if a reporter asks you about potentially classified information on the web?

Neither confirm nor deny the information is classified.

Which of the following may be helpful to prevent inadvertent spillage?

  • Send all files via email.
  • Share files without restrictions.
  • Store files in a non-secure location.
  • Label all files with appropriate classification markings. (correct)
  • What kind of information could reasonably be expected to cause serious damage to national security in the event of unauthorized disclosure?

    Secret

    A computer labeled SECRET may be used on an unclassified network.

    <p>False</p> Signup and view all the answers

    How many potential insider threat indicators does an employee displaying anxiety, excessive questions about classified projects, and complaints about credit card bills show?

    <p>3 or more indicators</p> Signup and view all the answers

    Which of the following should be reported as a potential security incident?

    <p>A coworker removes sensitive information without approval.</p> Signup and view all the answers

    Which of the following should be reported as a potential security incident in accordance with your Agency's insider threat policy?

    <p>A coworker brings a personal electronic device into prohibited areas.</p> Signup and view all the answers

    When would be a good time to post your vacation location and dates on your social networking website?

    <p>When you return from your vacation.</p> Signup and view all the answers

    In setting up your personal social networking service account, what email address should you use?

    <p>Your personal email address.</p> Signup and view all the answers

    Which of the following is NOT a correct way to protect sensitive information?

    <p>Sensitive information may be stored on any password-protected system.</p> Signup and view all the answers

    It's true that unclassified data's classification level may rise when aggregated.

    <p>True</p> Signup and view all the answers

    Is it permitted to share an unclassified draft document with a non-DoD professional discussion group?

    <p>True</p> Signup and view all the answers

    What is the best course of action if you see an individual you do not know within a secure area and her badge is not visible?

    <p>Ask the individual to identify herself.</p> Signup and view all the answers

    How should you protect your Common Access Card (CAC) or Personal Identity Verification (PIV) card?

    <p>Store it in a shielded sleeve to avoid chip cloning.</p> Signup and view all the answers

    In which situation are you permitted to use your PKI token for access to the NIPRNET?

    <p>On a NIPRNET system while using it for a PKI-required task.</p> Signup and view all the answers

    Is it okay to run an application after clicking on a link that prompts you on a website?

    <p>False</p> Signup and view all the answers

    What should you immediately do after connecting your Government-issued laptop to a public wireless connection?

    <p>Connect to the Government Virtual Private Network (VPN).</p> Signup and view all the answers

    Study Notes

    Cyber Awareness Challenge: Key Concepts

    • If approached by a reporter about classified information, do not confirm or deny its status.
    • To prevent inadvertent spillage of sensitive information, label files and media with appropriate classification markings.

    Information Classification

    • Secret information can cause serious damage to national security if disclosed without authorization.
    • A computer marked SECRET should not be used on unclassified networks.

    Insider Threat Indicators

    • A colleague showing anxiety, making excessive inquiries about classified projects, and voicing concerns about financial issues displays three or more potential insider threat indicators.

    Reporting Security Incidents

    • Report incidents such as unauthorized removal of sensitive information or bringing personal devices into restricted areas.

    Social Media Safety

    • Avoid posting vacation plans on social media until after returning home.
    • Use a personal email address for setting up social networking accounts.

    Sensitive Information Protection

    • Sensitive information cannot be stored on any password-protected system; it must be managed carefully.
    • Unclassified data can elevate in classification when aggregated with other information.

    Sharing Information

    • Unclassified documents can only be shared with non-DoD professionals if they are cleared for public release.

    Access Control in Secure Areas

    • If encountering an unknown individual in a secure area without visible identification, ask for their identification.

    Card Protection Protocol

    • Protect your Common Access Card (CAC) or Personal Identity Verification (PIV) card by storing it in a shielded sleeve to prevent unauthorized scanning.

    PKI Token Use

    • A PKI token from a DoD CAC can be used only on approved NIPRNET systems for tasks that require such authentication.

    Network Security Practices

    • If a pop-up prompts to run an application after clicking a link, do not execute it unless it is from a trusted source.
    • Immediately connect your Government-issued laptop to a Government Virtual Private Network (VPN) when using public wireless connections.

    Studying That Suits You

    Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

    Quiz Team

    Description

    Test your knowledge on cyber awareness practices with these flashcards. This quiz covers critical information handling, including responses to reporters and preventive measures against inadvertent information leaks. Challenge yourself to ensure you understand the best practices for maintaining security.

    More Like This

    Cyber Awareness 2023
    29 questions

    Cyber Awareness 2023

    RapturousSunflower avatar
    RapturousSunflower
    Cyber Awareness 2022 Knowledge Check
    54 questions
    Use Quizgecko on...
    Browser
    Browser