Podcast
Questions and Answers
How can you protect your home computer?
How can you protect your home computer?
Turn on the password feature
What should Carl do after receiving an email about a potential health risk?
What should Carl do after receiving an email about a potential health risk?
Forward it
What is an appropriate use of government email?
What is an appropriate use of government email?
Using a digital signature when sending attachments
Eavesdroppers may be listening to Sylvia's phone calls.
Eavesdroppers may be listening to Sylvia's phone calls.
Signup and view all the answers
What must be done promptly with printed Sensitive Compartmented Information (SCI)?
What must be done promptly with printed Sensitive Compartmented Information (SCI)?
Signup and view all the answers
What conditions are necessary to be granted access to SCI?
What conditions are necessary to be granted access to SCI?
Signup and view all the answers
What is likely about the social media post Terry saw regarding smoke from the Pentagon?
What is likely about the social media post Terry saw regarding smoke from the Pentagon?
Signup and view all the answers
PHI is created solely by healthcare providers.
PHI is created solely by healthcare providers.
Signup and view all the answers
What is NOT a best practice for protecting your home wireless network for telework?
What is NOT a best practice for protecting your home wireless network for telework?
Signup and view all the answers
There is a risk that tapping a phone at a payment terminal poses a security risk.
There is a risk that tapping a phone at a payment terminal poses a security risk.
Signup and view all the answers
How can you prevent viruses and malicious code?
How can you prevent viruses and malicious code?
Signup and view all the answers
What behavior should you report?
What behavior should you report?
Signup and view all the answers
What should you do upon receiving a text message from a package shipper about updated delivery instructions?
What should you do upon receiving a text message from a package shipper about updated delivery instructions?
Signup and view all the answers
What is an appropriate use of a DoD PKI token?
What is an appropriate use of a DoD PKI token?
Signup and view all the answers
What is a best practice when browsing the internet?
What is a best practice when browsing the internet?
Signup and view all the answers
Where are you permitted to use classified data?
Where are you permitted to use classified data?
Signup and view all the answers
Which of the following contributes to your online identity? (Select all that apply)
Which of the following contributes to your online identity? (Select all that apply)
Signup and view all the answers
How can you protect your home computer?
How can you protect your home computer?
Signup and view all the answers
What is true of DoD Unclassified data?
What is true of DoD Unclassified data?
Signup and view all the answers
Which of the following is NOT a way that malicious code can spread?
Which of the following is NOT a way that malicious code can spread?
Signup and view all the answers
What is the goal of an Insider Threat Program?
What is the goal of an Insider Threat Program?
Signup and view all the answers
What uses of removable media is allowed?
What uses of removable media is allowed?
Signup and view all the answers
What is permitted when using an unclassified laptop within a collateral classified space?
What is permitted when using an unclassified laptop within a collateral classified space?
Signup and view all the answers
When is the safest time to post on social media about your vacation plans?
When is the safest time to post on social media about your vacation plans?
Signup and view all the answers
Which of the following is NOT an appropriate use of your CAC?
Which of the following is NOT an appropriate use of your CAC?
Signup and view all the answers
Do not travel with a mobile device if you can avoid it is a best practice for traveling overseas.
Do not travel with a mobile device if you can avoid it is a best practice for traveling overseas.
Signup and view all the answers
What does spillage refer to?
What does spillage refer to?
Signup and view all the answers
What is permitted within a Sensitive Compartmented Information Facility (SCIF)?
What is permitted within a Sensitive Compartmented Information Facility (SCIF)?
Signup and view all the answers
What should you do if you receive a phone call offering a $50 gift card for participating in a survey?
What should you do if you receive a phone call offering a $50 gift card for participating in a survey?
Signup and view all the answers
How should government-owned removable media be stored?
How should government-owned removable media be stored?
Signup and view all the answers
What is a best practice for using government email?
What is a best practice for using government email?
Signup and view all the answers
What is a best practice for physical security?
What is a best practice for physical security?
Signup and view all the answers
Which of the following is least likely to pose a risk to share on a social networking site?
Which of the following is least likely to pose a risk to share on a social networking site?
Signup and view all the answers
How can you protect your home computer?
How can you protect your home computer?
Signup and view all the answers
Sensitive Compartmented Information (SCI) _________ various types of classified information for _________ protection and dissemination or distribution control.
Sensitive Compartmented Information (SCI) _________ various types of classified information for _________ protection and dissemination or distribution control.
Signup and view all the answers
You must have permission from your organization to telework.
You must have permission from your organization to telework.
Signup and view all the answers
Open storage is allowed within Sensitive Compartmented Information Facilities (SCIFs).
Open storage is allowed within Sensitive Compartmented Information Facilities (SCIFs).
Signup and view all the answers
Which of the following is NOT a best practice for teleworking in an environment where Internet of Things (IoT) devices are present?
Which of the following is NOT a best practice for teleworking in an environment where Internet of Things (IoT) devices are present?
Signup and view all the answers
How many insider threat indicators are present based on the description provided?
How many insider threat indicators are present based on the description provided?
Signup and view all the answers
What is Tom prohibited from doing with his report containing sensitive employee information?
What is Tom prohibited from doing with his report containing sensitive employee information?
Signup and view all the answers
Which of these is NOT a potential indicator that your device may be under a malicious code attack?
Which of these is NOT a potential indicator that your device may be under a malicious code attack?
Signup and view all the answers
What is a best practice to protect your identity?
What is a best practice to protect your identity?
Signup and view all the answers
Study Notes
Home Computer Protection
- Enable password protection on your computer.
- Regularly back up files to prevent data loss.
Email Security
- Always verify health-related emails before forwarding.
- Use digital signatures for secure government email communications.
Public Transportation Risks
- Be aware of eavesdroppers and shoulder surfers while using public transport.
Sensitive Compartmented Information (SCI)
- Requires Top Secret clearance and indoctrination for access.
- Printed SCI should be promptly retrieved from the printer.
Social Media Awareness
- Exercise caution with posts related to emergencies, as they may be scams designed to steal information.
- Delay vacation-related posts until after the trip for security reasons.
Health Information (PHI)
- PHI is created by healthcare providers or plans; identifying false statements is crucial.
Wireless Network Security
- Avoid using default SSID and passwords for home wireless networks.
Mobile Payment Security
- Tap-to-pay features may be vulnerable to signal interception.
Virus Prevention
- Always scan external files for viruses before uploading to a computer.
Reporting Improper Behavior
- Sensitive information should not be taken home without proper authorization.
Text Message Security
- Delete suspicious texts from package shippers, as they may be phishing attempts.
Use of DoD PKI Token
- DoD PKI tokens should not be used interchangeably between NIPR and SIPR networks.
Internet Browsing Best Practices
- Accept cookies only from trustworthy sites.
Classified Data Handling
- Classified data can only be used in secure environments appropriate to their classification level.
Online Identity
- Your online identity is shaped by various factors, requiring mindful sharing.
Insider Threat Program
- Aims to deter, detect, and mitigate insider threats.
Removable Media Usage
- Only use government-owned removable media that is essential for operations.
Sensitive Compartmented Information Facility (SCIF)
- An authorized government-issued wired headset is approved in SCIF settings.
Managed Communication
- Do not participate in unsolicited surveys promising gift cards, as they may be scams.
Storage of Government Media
- Store removable media in GSA-approved containers according to security classifications.
Mass Email Practices
- Avoid sending mass emails using government email accounts.
Physical Security Measures
- Use personal security badges for facility access.
Sharing on Social Media
- Sharing innocuous personal details, like your pet's name, poses the least risk.
Telework Protocol
- Obtain organizational permission before engaging in telework.
SCIF Regulations
- Open storage is permitted in SCIFs due to stringent security measures.
Teleworking with IoT Devices
- Avoid relying on default security settings for IoT devices when teleworking.
Insider Threat Indicators
- No indicators may suggest wrongdoing in the described case study example.
Handling Sensitive Personal Data
- Prohibited from emailing sensitive employee information without appropriate measures.
Malicious Code Awareness
- Be cautious of unexpected notifications for system updates; they may not indicate a real threat.
Identity Protection Best Practices
- It is advisable to order a credit report annually to monitor for identity theft.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.
Description
Test your knowledge with these flashcards focused on cyber awareness. Each card presents key concepts such as computer protection, email safety, and appropriate online behaviors. Ideal for individuals looking to enhance their understanding of cybersecurity in 2024.