Podcast
Questions and Answers
You find information that you know to be classified on the internet. What do you do?
You find information that you know to be classified on the internet. What do you do?
Note the website's URL and report the situation to your security point of contact.
Which of the following may help prevent spillage? (Select all that apply)
Which of the following may help prevent spillage? (Select all that apply)
Which of the following is good practice to protect classified information? (Select all that apply)
Which of the following is good practice to protect classified information? (Select all that apply)
What level of damage to national security can you reasonably expect Top Secret information to cause if disclosed?
What level of damage to national security can you reasonably expect Top Secret information to cause if disclosed?
Signup and view all the answers
You must have your organization's permission to telework.
You must have your organization's permission to telework.
Signup and view all the answers
Classified material must be appropriately marked.
Classified material must be appropriately marked.
Signup and view all the answers
Which of the following is a potential insider threat indicator?
Which of the following is a potential insider threat indicator?
Signup and view all the answers
What is an insider threat?
What is an insider threat?
Signup and view all the answers
Based on the description that follows, how many potential insider threat indicator(s) are displayed? A colleague abruptly becomes hostile and unpleasant after previously enjoying positive working relationships with peers, purchases an unusually expensive new car and has unexplained absences from work.
Based on the description that follows, how many potential insider threat indicator(s) are displayed? A colleague abruptly becomes hostile and unpleasant after previously enjoying positive working relationships with peers, purchases an unusually expensive new car and has unexplained absences from work.
Signup and view all the answers
Which piece of information is safest to include on your social media profile?
Which piece of information is safest to include on your social media profile?
Signup and view all the answers
A trusted friend in your social network posts a link to vaccine information on a website unknown to you. What action should you take?
A trusted friend in your social network posts a link to vaccine information on a website unknown to you. What action should you take?
Signup and view all the answers
Which piece of information is safest to include on your social media profile?
Which piece of information is safest to include on your social media profile?
Signup and view all the answers
Which is a best practice for protecting Controlled Unclassified Information (CUI)?
Which is a best practice for protecting Controlled Unclassified Information (CUI)?
Signup and view all the answers
CUI must be handled using safeguarding or dissemination controls.
CUI must be handled using safeguarding or dissemination controls.
Signup and view all the answers
Which of the following is true of Unclassified Information? (Select all that apply)
Which of the following is true of Unclassified Information? (Select all that apply)
Signup and view all the answers
Which of the following is NOT an example of CUI?
Which of the following is NOT an example of CUI?
Signup and view all the answers
CUI may be stored on any password protected system.
CUI may be stored on any password protected system.
Signup and view all the answers
Which Cyber Protection Condition (CPCON) establishes a protection priority focus on critical functions only?
Which Cyber Protection Condition (CPCON) establishes a protection priority focus on critical functions only?
Signup and view all the answers
It offers protection from spyware and malware.
It offers protection from spyware and malware.
Signup and view all the answers
If your CAC/PIV card is lost or misplaced, report it immediately to your security POC.
If your CAC/PIV card is lost or misplaced, report it immediately to your security POC.
Signup and view all the answers
You may only transport SCI if you have been courier-briefed for SCI.
You may only transport SCI if you have been courier-briefed for SCI.
Signup and view all the answers
They provide guidance on reasons for and duration of classification of information.
They provide guidance on reasons for and duration of classification of information.
Signup and view all the answers
Only connect government-owned PEDs to the same level classification information system when authorized.
Only connect government-owned PEDs to the same level classification information system when authorized.
Signup and view all the answers
For government-owned devices, use approved and authorized applications only.
For government-owned devices, use approved and authorized applications only.
Signup and view all the answers
Study Notes
Cyber Awareness and Reporting
- Report classified information found online by noting the website URL and alerting the security point of contact.
- Follow established procedures when transferring data to prevent spillage.
Protecting Classified Information
- Open storage in secure facilities should not be assumed as authorized; always verify.
- Top Secret information can cause exceptionally grave damage to national security if disclosed.
Telework and Permissions
- Teleworking is only permitted with the organization’s explicit approval.
Insider Threats
- Indicators of potential insider threats include unusual interest in classified materials.
- An insider threat involves someone misusing authorized access to harm national security, potentially compromising resources.
Identifying Insider Threats
- A colleague showing hostile behavior, acquiring expensive items unexpectedly, and having unexplained absences may display 3 or more threat indicators.
Social Media Safety
- Safest social media content includes personal photos of pets or favorite movies.
- Evaluate the credibility of vaccine information shared by friends through research.
Controlled Unclassified Information (CUI)
- Store CUI in a locked desk drawer after hours for protection.
- CUI must be managed with proper safeguarding controls.
Unclassified Information Guidelines
- Unclassified information must be reviewed before public release and appropriately marked.
- Compromised unclassified information can have safety ramifications for government personnel and operations.
Cyber Protection Conditions
- CPCON 1 prioritizes the protection of critical functions.
Public Key Infrastructure (PKI)
- Using a DoD PKI token provides defense against spyware and malware.
Common Access Card (CAC) and PIV
- Report any lost or misplaced CAC/PIV cards to a security point of contact immediately.
Sensitive Compartmented Information (SCI)
- Transporting SCI requires prior courier briefing to ensure compliance with security protocols.
Security Classification Guides
- These guides clarify the rationale and duration for the classification of information.
Portable Electronic Devices (PEDs)
- Only government-owned PEDs may connect to corresponding classified information systems in a SCIF when authorized.
Application Downloads
- For government devices, only download applications that are pre-approved and authorized.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.
Description
Test your knowledge on cyber awareness and the importance of protecting classified information. This quiz covers reporting procedures, handling data, and identifying insider threats. Ensure you're informed about the protocols necessary for maintaining national security.