Podcast
Questions and Answers
How can you protect your home computer?
How can you protect your home computer?
Turn on the password feature
What should Carl do after receiving an e-mail about a potential health risk?
What should Carl do after receiving an e-mail about a potential health risk?
Forward it
Which of the following is an appropriate use of government e-mail?
Which of the following is an appropriate use of government e-mail?
Using a digital signature when sending attachments
Does Sylvia risk being overheard when commuting via public transportation?
Does Sylvia risk being overheard when commuting via public transportation?
Signup and view all the answers
What is true of transmitting or transporting Sensitive Compartmented Information (SCI)?
What is true of transmitting or transporting Sensitive Compartmented Information (SCI)?
Signup and view all the answers
What conditions are necessary to be granted access to SCI?
What conditions are necessary to be granted access to SCI?
Signup and view all the answers
What does Terry's post about smoke from the Pentagon likely represent?
What does Terry's post about smoke from the Pentagon likely represent?
Signup and view all the answers
Which statement regarding Protected Health Information (PHI) is false?
Which statement regarding Protected Health Information (PHI) is false?
Signup and view all the answers
Which of the following is NOT a best practice for protecting your home wireless network for telework?
Which of the following is NOT a best practice for protecting your home wireless network for telework?
Signup and view all the answers
Does tapping a phone at a payment terminal pose a security risk?
Does tapping a phone at a payment terminal pose a security risk?
Signup and view all the answers
How can you prevent viruses and malicious code?
How can you prevent viruses and malicious code?
Signup and view all the answers
Which behavior should you report?
Which behavior should you report?
Signup and view all the answers
What should you do about a text message from a package shipper requesting updated delivery instructions?
What should you do about a text message from a package shipper requesting updated delivery instructions?
Signup and view all the answers
Which use of a DoD PKI token is appropriate?
Which use of a DoD PKI token is appropriate?
Signup and view all the answers
What is a best practice when browsing the internet?
What is a best practice when browsing the internet?
Signup and view all the answers
Where can you use classified data?
Where can you use classified data?
Signup and view all the answers
Which of the following contributes to your online identity?
Which of the following contributes to your online identity?
Signup and view all the answers
How can you protect your home computer?
How can you protect your home computer?
Signup and view all the answers
Which statements are true of DoD Unclassified data?
Which statements are true of DoD Unclassified data?
Signup and view all the answers
Which of the following is NOT a way that malicious code can spread?
Which of the following is NOT a way that malicious code can spread?
Signup and view all the answers
What is the goal of an Insider Threat Program?
What is the goal of an Insider Threat Program?
Signup and view all the answers
Which use of removable media is allowed?
Which use of removable media is allowed?
Signup and view all the answers
What can you do with an unclassified laptop within a collateral classified space?
What can you do with an unclassified laptop within a collateral classified space?
Signup and view all the answers
When is the safest time to post about your vacation plans on social media?
When is the safest time to post about your vacation plans on social media?
Signup and view all the answers
What is NOT an appropriate use of your Common Access Card (CAC)?
What is NOT an appropriate use of your Common Access Card (CAC)?
Signup and view all the answers
Is it correct to say, 'Do not travel with a mobile device if you can avoid it'?
Is it correct to say, 'Do not travel with a mobile device if you can avoid it'?
Signup and view all the answers
Which statement about spillage is true?
Which statement about spillage is true?
Signup and view all the answers
What is permitted within a Sensitive Compartmented Information Facility (SCIF)?
What is permitted within a Sensitive Compartmented Information Facility (SCIF)?
Signup and view all the answers
What should you do if you receive a call offering a $50 gift card for a survey?
What should you do if you receive a call offering a $50 gift card for a survey?
Signup and view all the answers
How should government owned removable media be stored?
How should government owned removable media be stored?
Signup and view all the answers
What is a best practice for using government e-mail?
What is a best practice for using government e-mail?
Signup and view all the answers
What is a best practice for physical security?
What is a best practice for physical security?
Signup and view all the answers
Which of the following is least likely to pose a risk to share on a social networking site?
Which of the following is least likely to pose a risk to share on a social networking site?
Signup and view all the answers
How can you protect your home computer?
How can you protect your home computer?
Signup and view all the answers
Sensitive Compartmented Information (SCI) is a program that ______________ various types of classified information for ______________ protection and dissemination or distribution control.
Sensitive Compartmented Information (SCI) is a program that ______________ various types of classified information for ______________ protection and dissemination or distribution control.
Signup and view all the answers
Do you need permission from your organization to telework?
Do you need permission from your organization to telework?
Signup and view all the answers
Is open storage allowed in Sensitive Compartmented Information Facilities (SCIFs)?
Is open storage allowed in Sensitive Compartmented Information Facilities (SCIFs)?
Signup and view all the answers
Which is NOT a best practice for teleworking in an environment with IoT devices?
Which is NOT a best practice for teleworking in an environment with IoT devices?
Signup and view all the answers
Based on the description provided, how many insider threat indicators are present?
Based on the description provided, how many insider threat indicators are present?
Signup and view all the answers
What is Tom prohibited from doing with a report containing employees' names, addresses, and salary?
What is Tom prohibited from doing with a report containing employees' names, addresses, and salary?
Signup and view all the answers
Which of these is NOT a potential indicator that your device may be under a malicious code attack?
Which of these is NOT a potential indicator that your device may be under a malicious code attack?
Signup and view all the answers
What is a best practice to protect your identity?
What is a best practice to protect your identity?
Signup and view all the answers
Study Notes
Home Computer Protection
- Activate password feature on devices to enhance security.
- Regularly back up files to prevent data loss.
Handling Suspicious Emails
- Forward emails about potential health risks to appropriate personnel for verification.
Appropriate Use of Government Email
- Employ digital signatures when sending attachments to ensure authenticity.
Public Transportation Safety
- Be aware of eavesdropping and shoulder surfing when using mobile devices in public.
Handling Sensitive Compartmented Information (SCI)
- Promptly retrieve printed SCI from printers.
- Access to SCI requires Top Secret clearance and indoctrination into the program.
Social Media Caution
- Be skeptical of sensational posts, as they may lead to phishing attempts.
Protected Health Information (PHI)
- PHI is created by healthcare providers and requires strict confidentiality.
Wireless Network Security
- Avoid using default SSID and password for home wireless networks to enhance security.
Payment Security Risks
- Contactless payments pose risks of signal interception by malicious actors.
Virus Protection
- Scan all external files before uploading to computers to mitigate virus threats.
Reporting Improper Behavior
- Report unauthorized removal of sensitive information for telework purposes.
Text Message Caution
- Delete unsolicited messages from package shippers that request personal information.
Proper Use of DoD PKI Tokens
- Ensure tokens are used within their designated classifications.
Internet Browsing Best Practices
- Accept cookies only from trusted websites to protect personal data.
Classifying Classified Data
- Utilize classified data only in secure areas that match the classification level.
Online Identity Management
- Awareness that various factors contribute to your online presence.
Insider Threat Program Goals
- Aim to deter, detect, and mitigate insider threats within organizations.
Removable Media Use
- Only authorized government-owned removable media for operational needs is allowed.
Using Laptops in Secure Areas
- Unclassified laptops can be used with government-issued wired headsets in classified facilities.
Social Media Posting Timing
- Delay posting about vacations until after returning to avoid increased risk of security breaches.
CAC Usage Guidelines
- Avoid using CAC as identification for commercial entities.
Travel Best Practices for Mobile Devices
- It is advised to travel with mobile devices, rather than avoid taking them.
Spillage Definition
- Spillage involves classified information becoming publicly accessible.
Sensitive Compartmented Information Facilities (SCIF)
- SCIFs allow open storage due to robust physical security measures.
Internet of Things (IoT) Security
- Avoid using default security settings on IoT devices to minimize vulnerabilities.
Insider Threat Indicators
- Diligent work history and personal attributes do not automatically indicate insider threats; evaluate carefully.
Handling Sensitive Reports
- Prohibition on emailing sensitive reports containing personal information to unauthorized personnel.
Device Security Warnings
- System update notifications are typically not indicators of malicious attacks.
Identity Protection Tips
- Request annual credit reports to monitor for identity theft.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.
Description
Test your knowledge with these flashcards on cyber awareness concepts for 2024. Each card covers essential practices for protecting your computer and dealing with cybersecurity threats. Perfect for anyone looking to improve their cyber safety skills!