Podcast
Questions and Answers
What action should you take first upon receiving an email from OPM requesting personal information?
What action should you take first upon receiving an email from OPM requesting personal information?
- Delete the email.
- Enter your personal information immediately.
- Look for a digital signature on the email. (correct)
- Call OPM for verification.
How should you respond to a call from someone at the help desk who needs assistance?
How should you respond to a call from someone at the help desk who needs assistance?
Ask the caller, 'What's your full name and phone number?'
Which of the following is a way to protect against social engineering?
Which of the following is a way to protect against social engineering?
- Ignore suspicious requests.
- Trust anyone who calls you.
- Give out personal information freely.
- Follow instructions given only by verified personnel. (correct)
What should you do if a man you do not know asks to use your Government-issued phone?
What should you do if a man you do not know asks to use your Government-issued phone?
What action is appropriate after finding classified information on the internet?
What action is appropriate after finding classified information on the internet?
How should you respond to a reporter's inquiry about potentially classified information on the Internet?
How should you respond to a reporter's inquiry about potentially classified information on the Internet?
Which of the following best describes the sources that contribute to your online identity?
Which of the following best describes the sources that contribute to your online identity?
Which of the following information is a security risk when posted publicly on your social networking profile?
Which of the following information is a security risk when posted publicly on your social networking profile?
What is a best practice for physical security?
What is a best practice for physical security?
In which situation are you permitted to use your PKI token?
In which situation are you permitted to use your PKI token?
What actions should you take when faxing Sensitive Compartmented Information (SCI)?
What actions should you take when faxing Sensitive Compartmented Information (SCI)?
How many potential insider threat indicators does a person who is married with two children, vacations at the beach every year, is pleasant to work with, but sometimes has poor work quality display?
How many potential insider threat indicators does a person who is married with two children, vacations at the beach every year, is pleasant to work with, but sometimes has poor work quality display?
What is the best response if you find classified government data on the internet?
What is the best response if you find classified government data on the internet?
After reading an online story about a new security project being developed on the military installation where you work, your neighbor asks you to comment about the article. You know this project is classified. What should be your response?
After reading an online story about a new security project being developed on the military installation where you work, your neighbor asks you to comment about the article. You know this project is classified. What should be your response?
What is a proper response if spillage occurs?
What is a proper response if spillage occurs?
What should you do if a reporter asks you about potentially classified information on the web?
What should you do if a reporter asks you about potentially classified information on the web?
A user writes down details from a report stored on a classified system marked as Secret and uses those details to draft an unclassified briefing on an unclassified system without authorization. What is the best choice to describe what has occurred?
A user writes down details from a report stored on a classified system marked as Secret and uses those details to draft an unclassified briefing on an unclassified system without authorization. What is the best choice to describe what has occurred?
How many potential insider threat indicators does a coworker who often makes others uneasy by being persistent in trying to obtain information about classified projects to which he has no access, is boisterous about his wife putting them in credit card debt, and often complains about anxiety and exhaustion display?
How many potential insider threat indicators does a coworker who often makes others uneasy by being persistent in trying to obtain information about classified projects to which he has no access, is boisterous about his wife putting them in credit card debt, and often complains about anxiety and exhaustion display?
Which of the following can an unauthorized disclosure of information classified as Confidential reasonably be expected to cause?
Which of the following can an unauthorized disclosure of information classified as Confidential reasonably be expected to cause?
Which classification level is given to information that could reasonably be expected to cause serious damage to national security?
Which classification level is given to information that could reasonably be expected to cause serious damage to national security?
When classified data is not in use, how can you protect it?
When classified data is not in use, how can you protect it?
Which is a good practice to protect classified information?
Which is a good practice to protect classified information?
Which of the following is a good practice to aid in preventing spillage?
Which of the following is a good practice to aid in preventing spillage?
What is required for an individual to access classified data?
What is required for an individual to access classified data?
What type of activity or behavior should be reported as a potential insider threat?
What type of activity or behavior should be reported as a potential insider threat?
Which of the following practices reduces the chance of becoming a target by adversaries seeking insider information?
Which of the following practices reduces the chance of becoming a target by adversaries seeking insider information?
Which scenario might indicate a reportable insider threat security incident?
Which scenario might indicate a reportable insider threat security incident?
Why might 'insiders' be able to cause damage to their organizations more easily than others?
Why might 'insiders' be able to cause damage to their organizations more easily than others?
Which of the following is a best practice to protect information about you and your organization on social networking sites and applications?
Which of the following is a best practice to protect information about you and your organization on social networking sites and applications?
What should you do if an individual asks you to let her follow you into your controlled space, stating that she left her security badge at her desk?
What should you do if an individual asks you to let her follow you into your controlled space, stating that she left her security badge at her desk?
Which represents a security best practice when using social networking?
Which represents a security best practice when using social networking?
Which is NOT sufficient to protect your identity?
Which is NOT sufficient to protect your identity?
Under which circumstances may you be subject to criminal, disciplinary, and/or administrative action due to online misconduct?
Under which circumstances may you be subject to criminal, disciplinary, and/or administrative action due to online misconduct?
As someone who works with classified information, what should you do if you are contacted by a foreign national seeking information on a research project?
As someone who works with classified information, what should you do if you are contacted by a foreign national seeking information on a research project?
Which of the following is true about unclassified data?
Which of the following is true about unclassified data?
What are some potential insider threat indicators?
What are some potential insider threat indicators?
What information posted publicly on your personal social networking profile represents a security risk?
What information posted publicly on your personal social networking profile represents a security risk?
What is an individual's Personally Identifiable Information (PII) or Protected Health Information (PHI) considered?
What is an individual's Personally Identifiable Information (PII) or Protected Health Information (PHI) considered?
Under what circumstances could unclassified information be considered a threat to national security?
Under what circumstances could unclassified information be considered a threat to national security?
What type of unclassified material should always be marked with a special handling caveat?
What type of unclassified material should always be marked with a special handling caveat?
Which is true for protecting classified data?
Which is true for protecting classified data?
How many potential insider threat indicators does a person who is playful and charming, consistently wins performance awards, but is occasionally aggressive in trying to access sensitive information display?
How many potential insider threat indicators does a person who is playful and charming, consistently wins performance awards, but is occasionally aggressive in trying to access sensitive information display?
Which of the following terms refers to harm inflicted on national security through authorized access to information or information systems?
Which of the following terms refers to harm inflicted on national security through authorized access to information or information systems?
What is the best example of Personally Identifiable Information (PII)?
What is the best example of Personally Identifiable Information (PII)?
What is the best example of Protected Health Information (PHI)?
What is the best example of Protected Health Information (PHI)?
When is the best time to post details of your vacation activities on your social networking website?
When is the best time to post details of your vacation activities on your social networking website?
What does Personally Identifiable Information (PII) include?
What does Personally Identifiable Information (PII) include?
What must you ensure if your work involves the use of different types of smart card security tokens?
What must you ensure if your work involves the use of different types of smart card security tokens?
What must you ensure before transmitting Personally Identifiable Information (PII) or Protected Health Information (PHI) via e-mail?
What must you ensure before transmitting Personally Identifiable Information (PII) or Protected Health Information (PHI) via e-mail?
What must you do when e-mailing Personally Identifiable Information (PII) or Protected Health Information (PHI)?
What must you do when e-mailing Personally Identifiable Information (PII) or Protected Health Information (PHI)?
What is a good practice for physical security?
What is a good practice for physical security?
Is it acceptable to take a short break while a coworker monitors your computer while logged on with your CAC?
Is it acceptable to take a short break while a coworker monitors your computer while logged on with your CAC?
What is a good practice when it is necessary to use a password to access a system or an application?
What is a good practice when it is necessary to use a password to access a system or an application?
What is the best description of two-factor authentication?
What is the best description of two-factor authentication?
What certificates are contained on the DoD Public Key Infrastructure (PKI) implemented by the Common Access Card (CAC)/Personal Identity Verification (PIV) card?
What certificates are contained on the DoD Public Key Infrastructure (PKI) implemented by the Common Access Card (CAC)/Personal Identity Verification (PIV) card?
What are the requirements to be granted access to SCI material?
What are the requirements to be granted access to SCI material?
What is a protection against internet hoaxes?
What is a protection against internet hoaxes?
What organization issues the directives concerning the dissemination of information regarding intelligence sources, methods, or activities?
What organization issues the directives concerning the dissemination of information regarding intelligence sources, methods, or activities?
Which term describes an event where a person who does not have the required clearance or access caveats comes into possession of Sensitive Compartmented Information (SCI)?
Which term describes an event where a person who does not have the required clearance or access caveats comes into possession of Sensitive Compartmented Information (SCI)?
What describes a Sensitive Compartmented Information (SCI) program?
What describes a Sensitive Compartmented Information (SCI) program?
What describes how Sensitive Compartmented Information is marked?
What describes how Sensitive Compartmented Information is marked?
What must users do when using removable media within a Sensitive Compartmented Information Facility (SCIF)?
What must users do when using removable media within a Sensitive Compartmented Information Facility (SCIF)?
Which is a risk associated with removable media?
Which is a risk associated with removable media?
What is an indication that malicious code is running on your system?
What is an indication that malicious code is running on your system?
What are some actions you can take to try to protect your identity?
What are some actions you can take to try to protect your identity?
Which of the following is an appropriate use of Government e-mail?
Which of the following is an appropriate use of Government e-mail?
What can malicious code do?
What can malicious code do?
Which is true of cookies?
Which is true of cookies?
What is a common method used in social engineering?
What is a common method used in social engineering?
Which may be a security issue with compressed URLs?
Which may be a security issue with compressed URLs?
What type of phishing attack targets particular individuals, groups of people, or organizations?
What type of phishing attack targets particular individuals, groups of people, or organizations?
While on vacation, a coworker calls and asks you to access a site to review and approve a document that is hosted behind a DoD Public Key Infrastructure (PKI) protected webpage. You do not have your government-issued laptop. What action should you take?
While on vacation, a coworker calls and asks you to access a site to review and approve a document that is hosted behind a DoD Public Key Infrastructure (PKI) protected webpage. You do not have your government-issued laptop. What action should you take?
Under what circumstances is it acceptable to use your Government-furnished computer to check personal e-mail and do other non-work-related activities?
Under what circumstances is it acceptable to use your Government-furnished computer to check personal e-mail and do other non-work-related activities?
Which are examples of portable electronic devices (PEDs)?
Which are examples of portable electronic devices (PEDs)?
What are some examples of removable media?
What are some examples of removable media?
What is a valid response when identity theft occurs?
What is a valid response when identity theft occurs?
What is a common indicator of a phishing attempt?
What is a common indicator of a phishing attempt?
What is whaling?
What is whaling?
Upon connecting your Government-issued laptop to a public wireless connection, what should you immediately do?
Upon connecting your Government-issued laptop to a public wireless connection, what should you immediately do?
Which of the following activities is an ethical use of Government-furnished equipment (GFE)?
Which of the following activities is an ethical use of Government-furnished equipment (GFE)?
Which is a wireless technology that enables your electronic devices to establish communications and exchange information when placed next to each other called?
Which is a wireless technology that enables your electronic devices to establish communications and exchange information when placed next to each other called?
Which of the following helps protect data on your personal mobile devices?
Which of the following helps protect data on your personal mobile devices?
What is a possible indication of a malicious code attack in progress?
What is a possible indication of a malicious code attack in progress?
What should you do if a commercial entity, such as a hotel reception desk, asks for Government identification so that they can make a photocopy?
What should you do if a commercial entity, such as a hotel reception desk, asks for Government identification so that they can make a photocopy?
When is conducting a private money-making venture using your Government-furnished computer permitted?
When is conducting a private money-making venture using your Government-furnished computer permitted?
What is a good practice to protect data on your home wireless systems?
What is a good practice to protect data on your home wireless systems?
Which must be approved and signed by a cognizant Original Classification Authority (OCA)?
Which must be approved and signed by a cognizant Original Classification Authority (OCA)?
What portable electronic devices (PEDs) are allowed in a Secure Compartmented Information Facility (SCIF)?
What portable electronic devices (PEDs) are allowed in a Secure Compartmented Information Facility (SCIF)?
What is a way to prevent the download of viruses and other malicious code when checking your e-mail?
What is a way to prevent the download of viruses and other malicious code when checking your e-mail?
What is a best practice to protect data on your mobile computing device?
What is a best practice to protect data on your mobile computing device?
Which of the following is NOT an example of sensitive information?
Which of the following is NOT an example of sensitive information?
Under what circumstances is it permitted to share an unclassified draft document with a non-DoD professional discussion group?
Under what circumstances is it permitted to share an unclassified draft document with a non-DoD professional discussion group?
Which of the following is true of protecting classified data?
Which of the following is true of protecting classified data?
What advantages do 'insider threats' have over others that allow them to cause damage to their organizations more easily?
What advantages do 'insider threats' have over others that allow them to cause damage to their organizations more easily?
Which of the following should be reported as a potential security threat?
Which of the following should be reported as a potential security threat?
Which of the following does Cyberspace Protection Conditions (CPCON) establish during significant cyberspace events?
Which of the following does Cyberspace Protection Conditions (CPCON) establish during significant cyberspace events?
What is the best way to protect your Common Access Card (CAC)?
What is the best way to protect your Common Access Card (CAC)?
When should documents be marked within a Sensitive Compartmented Information Facility (SCIF)?
When should documents be marked within a Sensitive Compartmented Information Facility (SCIF)?
Which of the following is a best practice for handling cookies?
Which of the following is a best practice for handling cookies?
Study Notes
Insider Threats
- Individuals in difficult life circumstances, such as substance abuse or divided loyalty, can display potential insider threat indicators.
- A coworker exhibiting persistent attempts to access classified information, financial difficulties, and signs of stress typically displays multiple threat indicators.
Handling Classified Information
- If classified information is found online, note the website’s URL and report to security personnel.
- Classified data must be stored securely when not in use, preferably in GSA-approved containers.
Responses to Information Requests
- If asked about classified projects, do not confirm or deny the information; change the subject to something non-work-related.
- When approached by a reporter about classified information, refer them to your organization’s public affairs office.
Security Protocols
- Immediately notify the security point of contact (POC) if spillage of classified information occurs.
- Maintain possession and secure storage of the Common Access Card (CAC) at all times.
Classification Levels
- Information that may cause serious damage to national security is classified as "Secret."
- Unauthorized disclosure of "Confidential" information could still damage national security.
Email and Digital Security
- When emailing Personally Identifiable Information (PII) or Protected Health Information (PHI), use encryption and government email accounts.
- Be cautious of phishing attempts that threaten dire consequences; legitimate emails should have digital signatures.
Physical and Cybersecurity Best Practices
- Always challenge individuals without proper identification in secure areas.
- Use privacy settings on social networking sites and avoid sharing sensitive personal information.
Handling Removable Media
- Removable media pose risks such as spillage and should comply with strict regulations when used in sensitive environments.
- Report any unauthorized access or attempts to remove sensitive information by coworkers.
Social Media Awareness
- Post vacation details only after returning home to avoid compromising security.
- Be aware that cookies can track online activity; adjust browser settings to maintain control over cookies.
Security Breaches and Misconduct
- Notify authorities if identity theft occurs and report any suspected misconduct or security threats observed.
- Recognize that engaging with foreign individuals seeking sensitive information requires reporting to security personnel.
Additional Security Measures
- Enforce the usage of unique passwords for different systems to avoid security breaches.
- Always encrypt sensitive emails and use secure methods to share documents, especially outside the Department of Defense (DoD).
Conclusion
- Adhering to established protocols and being vigilant about information security can significantly reduce risks associated with insider threats and cybersecurity incidents.
- Continuous education on best practices in cybersecurity helps protect personal and classified information alike.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.
Description
Test your understanding of insider threat indicators and the appropriate actions when encountering classified data online. This quiz features flashcards designed to enhance your cyber awareness skills. Perfect for anyone needing to refresh their knowledge in cybersecurity.