Podcast
Questions and Answers
What conditions are necessary to be granted access to Sensitive Compartmented Information (SCI)?
What conditions are necessary to be granted access to Sensitive Compartmented Information (SCI)?
Top Secret clearance and indoctrination into the SCI program
Which of the following is permitted when using an unclassified laptop within a collateral classified space?
Which of the following is permitted when using an unclassified laptop within a collateral classified space?
Which of the following is an authoritative source for derivative classification?
Which of the following is an authoritative source for derivative classification?
Security Classification Guide
Which of the following actions should Carl NOT take with the e-mail about a potential health risk?
Which of the following actions should Carl NOT take with the e-mail about a potential health risk?
Signup and view all the answers
How can an adversary use information available in public records to target you?
How can an adversary use information available in public records to target you?
Signup and view all the answers
Which of the following is an appropriate use of government e-mail?
Which of the following is an appropriate use of government e-mail?
Signup and view all the answers
Which of the following is NOT a best practice for protecting data on a mobile device?
Which of the following is NOT a best practice for protecting data on a mobile device?
Signup and view all the answers
What action should Annabeth take if she believes an SCI conversation was overheard?
What action should Annabeth take if she believes an SCI conversation was overheard?
Signup and view all the answers
On your home computer, how can you best establish passwords when creating separate user accounts?
On your home computer, how can you best establish passwords when creating separate user accounts?
Signup and view all the answers
Which of the following is an allowed use of government furnished equipment (GFE)?
Which of the following is an allowed use of government furnished equipment (GFE)?
Signup and view all the answers
How can you prevent viruses and malicious code?
How can you prevent viruses and malicious code?
Signup and view all the answers
An insider threat is someone who uses __________ access, __________, to harm national security.
An insider threat is someone who uses __________ access, __________, to harm national security.
Signup and view all the answers
Which of the following is an example of behavior that you should report?
Which of the following is an example of behavior that you should report?
Signup and view all the answers
Which of the following is true of telework?
Which of the following is true of telework?
Signup and view all the answers
After a classified document is leaked online, which statement is true of the leaked information?
After a classified document is leaked online, which statement is true of the leaked information?
Signup and view all the answers
How should government-owned removable media be stored?
How should government-owned removable media be stored?
Signup and view all the answers
Which of the following is NOT an example of Personally Identifiable Information (PII)?
Which of the following is NOT an example of Personally Identifiable Information (PII)?
Signup and view all the answers
What does the Common Access Card (CAC) contain?
What does the Common Access Card (CAC) contain?
Signup and view all the answers
Does Sylvia's commuting behavior pose a security concern?
Does Sylvia's commuting behavior pose a security concern?
Signup and view all the answers
Does Beth tapping her phone at a payment terminal pose a security risk?
Does Beth tapping her phone at a payment terminal pose a security risk?
Signup and view all the answers
Which of the following is NOT an appropriate use of your Common Access Card (CAC)?
Which of the following is NOT an appropriate use of your Common Access Card (CAC)?
Signup and view all the answers
When is the safest time to post on social media about your vacation plans?
When is the safest time to post on social media about your vacation plans?
Signup and view all the answers
What is the best course of action if you receive a suspicious text message about delayed package delivery?
What is the best course of action if you receive a suspicious text message about delayed package delivery?
Signup and view all the answers
Which of the following is NOT a best practice for protecting your home wireless network for telework?
Which of the following is NOT a best practice for protecting your home wireless network for telework?
Signup and view all the answers
Which of the following is a best practice for using government e-mail?
Which of the following is a best practice for using government e-mail?
Signup and view all the answers
How can you protect your home computer?
How can you protect your home computer?
Signup and view all the answers
Did Carl receive an e-mail about a potential health risk and should forward it?
Did Carl receive an e-mail about a potential health risk and should forward it?
Signup and view all the answers
Which of the following is true of transmitting or transporting SCI?
Which of the following is true of transmitting or transporting SCI?
Signup and view all the answers
Terry sees a post that says there is smoke billowing from the Pentagon. What is likely true?
Terry sees a post that says there is smoke billowing from the Pentagon. What is likely true?
Signup and view all the answers
Which of the following statements about PHI is false?
Which of the following statements about PHI is false?
Signup and view all the answers
Which of the following is NOT a best practice for protecting your home wireless network for telework?
Which of the following is NOT a best practice for protecting your home wireless network for telework?
Signup and view all the answers
Does Beth tapping her phone at a payment terminal pose a security risk?
Does Beth tapping her phone at a payment terminal pose a security risk?
Signup and view all the answers
How can you prevent viruses and malicious code?
How can you prevent viruses and malicious code?
Signup and view all the answers
Which of the following is an example of behavior that you should report?
Which of the following is an example of behavior that you should report?
Signup and view all the answers
What is the best course of action if you receive a suspicious text message about delayed package delivery?
What is the best course of action if you receive a suspicious text message about delayed package delivery?
Signup and view all the answers
Which of the following is a permitted use of a DoD PKI token?
Which of the following is a permitted use of a DoD PKI token?
Signup and view all the answers
Which of the following is a best practice when browsing the internet?
Which of the following is a best practice when browsing the internet?
Signup and view all the answers
Where are you permitted to use classified data?
Where are you permitted to use classified data?
Signup and view all the answers
Which of the following contributes to your online identity?
Which of the following contributes to your online identity?
Signup and view all the answers
How can you protect your home computer?
How can you protect your home computer?
Signup and view all the answers
Which of the following statements is true of DoD Unclassified data?
Which of the following statements is true of DoD Unclassified data?
Signup and view all the answers
Which of the following is NOT a way that malicious code can spread?
Which of the following is NOT a way that malicious code can spread?
Signup and view all the answers
What is the goal of an Insider Threat Program?
What is the goal of an Insider Threat Program?
Signup and view all the answers
Which of the following uses of removable media is allowed?
Which of the following uses of removable media is allowed?
Signup and view all the answers
Which of the following is permitted when using an unclassified laptop within a collateral classified space?
Which of the following is permitted when using an unclassified laptop within a collateral classified space?
Signup and view all the answers
When is the safest time to post on social media about your vacation plans?
When is the safest time to post on social media about your vacation plans?
Signup and view all the answers
Which of the following is NOT an appropriate use of your CAC?
Which of the following is NOT an appropriate use of your CAC?
Signup and view all the answers
Study Notes
Sensitive Compartmented Information (SCI)
- Access to SCI requires Top Secret clearance and indoctrination into the SCI program.
- Printed SCI documents must be retrieved promptly from the printer.
Government Equipment and E-mail Usage
- Use a digital signature when sending attachments via government e-mail to ensure authenticity.
- Government-owned removable media should be stored in a GSA-approved container matching the security classification.
Data Protection Practices
- Strong passwords should be created by individual users for separate accounts on home computers.
- To prevent viruses, all external files must be scanned before uploading to personal devices.
- Best practice for mobile devices includes enabling automatic screen locking and ensuring sensitive information isn’t taken home without authorization.
Insider Threats
- An insider threat occurs when someone with authorized access wittingly or unwittingly jeopardizes national security.
- A primary goal of an Insider Threat Program is to deter, detect, and mitigate potential threats.
Social Media and Public Information
- Best to share vacation plans on social media only after returning from the trip to prevent targeting by scammers.
- Information from public records can be exploited by adversaries to orchestrate scams, especially when combined with other data.
Handling Communications
- Avoid forwarding suspicious e-mails regarding health risks or unexpected package notifications; delete such messages instead.
- While using government-approved devices during public commutes, be cautious of eavesdropping and shoulder surfing.
Personal Identifiable Information (PII)
- PII includes data that can identify individuals; however, automobile make and model is not classified as PII when linked to an individual.
- Common Access Cards (CAC) contain identification, encryption, and digital signature certificates but should not be used as identification for commercial purposes.
Wireless Network Security
- Protect home wireless networks by using unique SSIDs and passwords rather than factory presets.
- Regularly back up files and enable password features on home computers to enhance security.
Internet Browsing and General Safety Measures
- Only accept cookies from trustworthy websites during internet browsing to safeguard personal data.
- Mass e-mails should be avoided when using government e-mail to maintain security protocols.
Telework Regulations
- Permission from an organization is mandatory for telework arrangements.
- Treat any leaked classified information as still classified, even after becoming publicly accessible.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.
Description
Test your knowledge of cybersecurity protocols with these flashcards from the Cyber Awareness Challenge 2024. Each card covers essential topics like Sensitive Compartmented Information and proper use of devices in classified areas. Perfect for anyone looking to enhance their cyber awareness skills.