Podcast
Questions and Answers
Which of the following is a good practice to prevent spillage?
Which of the following is a good practice to prevent spillage?
How should you respond to an inquiry about government information not cleared for public release?
How should you respond to an inquiry about government information not cleared for public release?
Refer to PA
Which of the following is a good practice for telework?
Which of the following is a good practice for telework?
What level of damage can the unauthorized disclosure of information classified as Top Secret reasonably be expected to cause?
What level of damage can the unauthorized disclosure of information classified as Top Secret reasonably be expected to cause?
Signup and view all the answers
Which of the following is a potential insider threat indicator?
Which of the following is a potential insider threat indicator?
Signup and view all the answers
What is an insider threat?
What is an insider threat?
Signup and view all the answers
Based on the description, how many potential insider threat indicator(s) are displayed?
Based on the description, how many potential insider threat indicator(s) are displayed?
Signup and view all the answers
Which of the following is a security best practice when using social networking sites?
Which of the following is a security best practice when using social networking sites?
Signup and view all the answers
Adversaries exploit social networking sites to disseminate fake news.
Adversaries exploit social networking sites to disseminate fake news.
Signup and view all the answers
Many apps and smart devices collect and share your personal information and contribute to your online identity.
Many apps and smart devices collect and share your personal information and contribute to your online identity.
Signup and view all the answers
Which of the following best describes a way to safely transmit Controlled Unclassified Information (CUI)?
Which of the following best describes a way to safely transmit Controlled Unclassified Information (CUI)?
Signup and view all the answers
Protected Health Information (PHI) is not classified information.
Protected Health Information (PHI) is not classified information.
Signup and view all the answers
Which designation includes Personally Identifiable Information (PII) and PHI?
Which designation includes Personally Identifiable Information (PII) and PHI?
Signup and view all the answers
Which of the following best describes good physical security?
Which of the following best describes good physical security?
Signup and view all the answers
You should remove and take your CAC/PIV card whenever you leave your workstation.
You should remove and take your CAC/PIV card whenever you leave your workstation.
Signup and view all the answers
You may only transport sensitive compartmented information (SCI) if you have been courier-briefed for SCI.
You may only transport sensitive compartmented information (SCI) if you have been courier-briefed for SCI.
Signup and view all the answers
All personal and government-owned portable electronic devices are prohibited in a Sensitive Compartmented Information Facility (SCIF).
All personal and government-owned portable electronic devices are prohibited in a Sensitive Compartmented Information Facility (SCIF).
Signup and view all the answers
Which of the following is NOT a type of malicious code?
Which of the following is NOT a type of malicious code?
Signup and view all the answers
Which of the following actions can help to protect your identity?
Which of the following actions can help to protect your identity?
Signup and view all the answers
What action should you take with a compressed URL on a known website?
What action should you take with a compressed URL on a known website?
Signup and view all the answers
How can you protect yourself from social engineering?
How can you protect yourself from social engineering?
Signup and view all the answers
What is a common indicator of a phishing attempt?
What is a common indicator of a phishing attempt?
Signup and view all the answers
What security risk does a public Wi-Fi connection pose?
What security risk does a public Wi-Fi connection pose?
Signup and view all the answers
Which of the following is NOT a permitted way to connect a personally-owned monitor to your GFE?
Which of the following is NOT a permitted way to connect a personally-owned monitor to your GFE?
Signup and view all the answers
Which of the following best describes the conditions under which mobile devices and applications can track your location?
Which of the following best describes the conditions under which mobile devices and applications can track your location?
Signup and view all the answers
How can you protect data on your mobile computing and portable electronic devices?
How can you protect data on your mobile computing and portable electronic devices?
Signup and view all the answers
What should you do if you find classified information on the Internet?
What should you do if you find classified information on the Internet?
Signup and view all the answers
How should you secure your home wireless network for teleworking?
How should you secure your home wireless network for teleworking?
Signup and view all the answers
Which of the following may help to prevent spillage?
Which of the following may help to prevent spillage?
Signup and view all the answers
Who designates whether information is classified and its classification level?
Who designates whether information is classified and its classification level?
Signup and view all the answers
Study Notes
SPILLAGE
- Good practices to prevent spillage include following procedures for transferring data to and from external agencies and non-government networks.
- Upon discovering classified information online, immediately note the URL and report it to your security point of contact.
CLASSIFIED DATA
- Teleworking requires the use of a VPN to securely access classified data.
- Unauthorized disclosure of Top Secret information can lead to exceptionally grave damage.
- Classification levels and designations of information are determined by the original classification authority.
INSIDER THREAT
- Potential indicators of insider threats may include unusual interests, such as learning a foreign language.
- An insider threat is defined as anyone utilizing their authorized access, knowingly or unknowingly, to cause harm.
SOCIAL NETWORKING
- To enhance security on social media, avoid sharing personally identifiable information, like your mother's maiden name.
- Adversaries can exploit social networking sites to spread misinformation.
- Many applications and smart devices collect personal data, impacting your online identity.
CONTROLLED UNCLASSIFIED INFORMATION (CUI)
- Sensitive information includes both Personally Identifiable Information (PII) and Protected Health Information (PHI).
- Safely transmitting CUI involves adherence to specified guidelines (details not provided).
PHYSICAL SECURITY
- Effective physical security practices include ensuring individuals in secure areas display proper badges.
IDENTITY MANAGEMENT
- Always remove your Common Access Card (CAC) or Personal Identity Verification (PIV) card when leaving your workstation.
- A DoD Public Key Infrastructure (PKI) token should only be in use during active PKI-required tasks.
SENSITIVE COMPARTMENTED INFORMATION (SCI)
- Transporting sensitive compartmented information requires prior courier briefing for SCI.
- Access to SCI demands Top Secret clearance and indoctrination into the SCI program.
REMOVABLE MEDIA IN A SCIF
- Only government-approved portable electronic devices (PEDs) are permitted in Sensitive Compartmented Information Facilities (SCIFs).
MALICIOUS CODE
- Executables are not classified as malicious code.
WEBSITE USE
- Shredding personal documents is an effective method to protect your identity online.
SOCIAL ENGINEERING
- With compressed URLs, always investigate by using the preview feature to ensure the link is safe.
- To defend against social engineering, verify the identity of all individuals before sharing any information.
- A common phishing tactic involves prompting victims to update or validate their information.
TRAVEL
- Using public Wi-Fi can expose transmitted information to potential theft, as it may not allow VPN usage.
USE OF GOVERNMENT-FURNISHED EQUIPMENT (GFE)
- Connecting a personally-owned monitor to Government-Furnished Equipment (GFE) via USB is prohibited.
MOBILE DEVICES
- Location tracking by mobile devices and applications may occur without users’ knowledge or consent.
- To secure data on mobile devices, enable automatic screen locking after a period of inactivity.
HOME COMPUTER SECURITY
- For secure teleworking, implement Wi-Fi Protected Access 2 (WPA2) Personal encryption on your home wireless network.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.
Description
Test your knowledge on cyber awareness with this quiz based on the 2023 challenge. Explore key practices for handling spillage and classified data, as well as guidelines for telework. Perfect for anyone looking to enhance their understanding of cybersecurity protocols.