Podcast
Questions and Answers
What do you do if spillage occurs?
What do you do if spillage occurs?
Immediately notify your security point of contact.
What should you do after you have ended a call from a reporter asking you to confirm potentially classified information found on the web?
What should you do after you have ended a call from a reporter asking you to confirm potentially classified information found on the web?
Alert your security point of contact.
Which of the following is NOT a requirement for telework?
Which of the following is NOT a requirement for telework?
Who can be permitted access to classified data?
Who can be permitted access to classified data?
Signup and view all the answers
How many potential insider threat indicators does a colleague who has won 10 high-performance awards, can be playful and charming, is not currently in a relationship, and is occasionally aggressive in trying to access sensitive information display?
How many potential insider threat indicators does a colleague who has won 10 high-performance awards, can be playful and charming, is not currently in a relationship, and is occasionally aggressive in trying to access sensitive information display?
Signup and view all the answers
How many potential insider threat indicators does a colleague who has visited several foreign countries recently and speaks openly of unhappiness with U.S. foreign policy display?
How many potential insider threat indicators does a colleague who has visited several foreign countries recently and speaks openly of unhappiness with U.S. foreign policy display?
Signup and view all the answers
How many potential insider threat indicators does a colleague who complains about anxiety and exhaustion and makes coworkers uncomfortable by asking excessive questions about classified projects display?
How many potential insider threat indicators does a colleague who complains about anxiety and exhaustion and makes coworkers uncomfortable by asking excessive questions about classified projects display?
Signup and view all the answers
In setting up your personal social networking service account, what email address should you use?
In setting up your personal social networking service account, what email address should you use?
Signup and view all the answers
What information most likely presents a security risk on your personal social networking profile?
What information most likely presents a security risk on your personal social networking profile?
Signup and view all the answers
Which of the following is NOT an example of sensitive information?
Which of the following is NOT an example of sensitive information?
Signup and view all the answers
Is it permitted to share an unclassified draft document with a non-DoD professional discussion group?
Is it permitted to share an unclassified draft document with a non-DoD professional discussion group?
Signup and view all the answers
Which of the following is an example of Protected Health Information (PHI)?
Which of the following is an example of Protected Health Information (PHI)?
Signup and view all the answers
Which of the following represents a good physical security practice?
Which of the following represents a good physical security practice?
Signup and view all the answers
Which of the following is NOT a good way to protect your identity?
Which of the following is NOT a good way to protect your identity?
Signup and view all the answers
Which of the following statements is TRUE about the use of DoD Public Key Infrastructure (PKI) tokens?
Which of the following statements is TRUE about the use of DoD Public Key Infrastructure (PKI) tokens?
Signup and view all the answers
Which of the following is NOT a typical means for spreading malicious code?
Which of the following is NOT a typical means for spreading malicious code?
Signup and view all the answers
Which of the following is a practice that helps to protect you from identity theft?
Which of the following is a practice that helps to protect you from identity theft?
Signup and view all the answers
Which of the following is a practice that helps to prevent the download of viruses and other malicious code when checking your email?
Which of the following is a practice that helps to prevent the download of viruses and other malicious code when checking your email?
Signup and view all the answers
You receive an unexpected email from a friend: "I think you'll like this: https://tinyurl.com/2fcbvy." What action should you take?
You receive an unexpected email from a friend: "I think you'll like this: https://tinyurl.com/2fcbvy." What action should you take?
Signup and view all the answers
You receive an email from the Internal Revenue Service (IRS) demanding immediate payment of back taxes of which you were not aware. What action should you take?
You receive an email from the Internal Revenue Service (IRS) demanding immediate payment of back taxes of which you were not aware. What action should you take?
Signup and view all the answers
When using your government-issued laptop in public environments, with which of the following should you be concerned?
When using your government-issued laptop in public environments, with which of the following should you be concerned?
Signup and view all the answers
Under what circumstances is it acceptable to check personal email on Government-furnished equipment (GFE)?
Under what circumstances is it acceptable to check personal email on Government-furnished equipment (GFE)?
Signup and view all the answers
Study Notes
Incident Reporting
- Notify your security point of contact immediately if a spillage occurs.
- After receiving inquiries from reporters about classified information, alert your security point of contact.
Telework and Clearance
- Security clearance eligibility is a requirement for telework.
- Access to classified data is limited to individuals with appropriate clearance, non-disclosure agreements, and a need to know.
Insider Threat Indicators
- A colleague who won 10 awards, is charming, and occasionally aggressive displays 1 potential insider threat indicator.
- A colleague who has traveled recently, vocalizes unhappiness with U.S. foreign policy, and had their car repossessed shows 3 or more indicators.
- A colleague expressing anxiety, excessively questioning coworkers about classified projects, and mentioning financial stress exhibits 3 or more threat indicators.
Personal Information Security
- Use your personal email address for personal social networking accounts.
- The place of birth is a significant security risk if disclosed on social networking profiles.
Sensitive and Classified Information
- Press release data is NOT considered sensitive information.
- Unclassified draft documents may be shared with non-DoD professionals if they are cleared for public release.
- Protected Health Information (PHI) includes patient names, Social Security numbers, and other personal identifiers.
Physical Security Practices
- A good physical security practice includes using your own security badge or access card.
- Avoid using a single complex password for all logins as it is NOT a good identity protection strategy.
Cybersecurity Practices
- Utilize DoD Public Key Infrastructure (PKI) tokens appropriately according to their classification.
- Risk can arise from untrusted sources, whereas patching from trusted sources is safe.
- Secure identity theft prevention practices include ordering an annual credit report.
- To prevent virus downloads while checking emails, refrain from accessing hyperlinks in emails.
Email Safety
- Investigate unexpected email links using preview features before clicking.
- If you receive a suspicious email from the IRS regarding unpaid taxes, contact the IRS directly.
Government Equipment Usage
- Always be cautious of unauthorized viewing of information when using government-issued laptops in public spaces.
- Checking personal email on Government-furnished equipment is acceptable only if organizational policy permits it.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.
Description
Test your knowledge with flashcards that cover essential protocols for handling security incidents and telework requirements. This quiz is designed for individuals seeking to enhance their cybersecurity awareness. Review your responses and reinforce best practices in cybersecurity.