Podcast
Questions and Answers
You find information that you know to be classified on the internet. What do you do?
You find information that you know to be classified on the internet. What do you do?
Note the website's URL and report the situation to your security point of contact.
Which of the following may help prevent spillage? (Select all that apply)
Which of the following may help prevent spillage? (Select all that apply)
- Ignore protocols if the information seems harmless
- Use only personal devices for work
- Follow procedures for transferring data to and from non-Government networks (correct)
- Follow procedures for transferring data to and from outside agencies (correct)
Which of the following is good practice to protect classified information? (Select all that apply)
Which of the following is good practice to protect classified information? (Select all that apply)
- Always lock classified documents in secured storage (correct)
- Discuss classified information openly
- Store classified information on open networks
- Don't assume open storage in a secure facility is authorized (correct)
What level of damage to national security can you reasonably expect Top Secret information to cause if disclosed?
What level of damage to national security can you reasonably expect Top Secret information to cause if disclosed?
You must have your organization's permission to telework.
You must have your organization's permission to telework.
Classified material must be appropriately marked.
Classified material must be appropriately marked.
Which of the following is a potential insider threat indicator?
Which of the following is a potential insider threat indicator?
What is an insider threat?
What is an insider threat?
Based on the description that follows, how many potential insider threat indicator(s) are displayed? A colleague abruptly becomes hostile and unpleasant after previously enjoying positive working relationships with peers, purchases an unusually expensive new car and has unexplained absences from work.
Based on the description that follows, how many potential insider threat indicator(s) are displayed? A colleague abruptly becomes hostile and unpleasant after previously enjoying positive working relationships with peers, purchases an unusually expensive new car and has unexplained absences from work.
Which piece of information is safest to include on your social media profile?
Which piece of information is safest to include on your social media profile?
A trusted friend in your social network posts a link to vaccine information on a website unknown to you. What action should you take?
A trusted friend in your social network posts a link to vaccine information on a website unknown to you. What action should you take?
Which piece of information is safest to include on your social media profile?
Which piece of information is safest to include on your social media profile?
Which is a best practice for protecting Controlled Unclassified Information (CUI)?
Which is a best practice for protecting Controlled Unclassified Information (CUI)?
CUI must be handled using safeguarding or dissemination controls.
CUI must be handled using safeguarding or dissemination controls.
Which of the following is true of Unclassified Information? (Select all that apply)
Which of the following is true of Unclassified Information? (Select all that apply)
Which of the following is NOT an example of CUI?
Which of the following is NOT an example of CUI?
CUI may be stored on any password protected system.
CUI may be stored on any password protected system.
Which Cyber Protection Condition (CPCON) establishes a protection priority focus on critical functions only?
Which Cyber Protection Condition (CPCON) establishes a protection priority focus on critical functions only?
It offers protection from spyware and malware.
It offers protection from spyware and malware.
If your CAC/PIV card is lost or misplaced, report it immediately to your security POC.
If your CAC/PIV card is lost or misplaced, report it immediately to your security POC.
You may only transport SCI if you have been courier-briefed for SCI.
You may only transport SCI if you have been courier-briefed for SCI.
They provide guidance on reasons for and duration of classification of information.
They provide guidance on reasons for and duration of classification of information.
Only connect government-owned PEDs to the same level classification information system when authorized.
Only connect government-owned PEDs to the same level classification information system when authorized.
For government-owned devices, use approved and authorized applications only.
For government-owned devices, use approved and authorized applications only.
Flashcards are hidden until you start studying
Study Notes
Cyber Awareness and Reporting
- Report classified information found online by noting the website URL and alerting the security point of contact.
- Follow established procedures when transferring data to prevent spillage.
Protecting Classified Information
- Open storage in secure facilities should not be assumed as authorized; always verify.
- Top Secret information can cause exceptionally grave damage to national security if disclosed.
Telework and Permissions
- Teleworking is only permitted with the organization’s explicit approval.
Insider Threats
- Indicators of potential insider threats include unusual interest in classified materials.
- An insider threat involves someone misusing authorized access to harm national security, potentially compromising resources.
Identifying Insider Threats
- A colleague showing hostile behavior, acquiring expensive items unexpectedly, and having unexplained absences may display 3 or more threat indicators.
Social Media Safety
- Safest social media content includes personal photos of pets or favorite movies.
- Evaluate the credibility of vaccine information shared by friends through research.
Controlled Unclassified Information (CUI)
- Store CUI in a locked desk drawer after hours for protection.
- CUI must be managed with proper safeguarding controls.
Unclassified Information Guidelines
- Unclassified information must be reviewed before public release and appropriately marked.
- Compromised unclassified information can have safety ramifications for government personnel and operations.
Cyber Protection Conditions
- CPCON 1 prioritizes the protection of critical functions.
Public Key Infrastructure (PKI)
- Using a DoD PKI token provides defense against spyware and malware.
Common Access Card (CAC) and PIV
- Report any lost or misplaced CAC/PIV cards to a security point of contact immediately.
Sensitive Compartmented Information (SCI)
- Transporting SCI requires prior courier briefing to ensure compliance with security protocols.
Security Classification Guides
- These guides clarify the rationale and duration for the classification of information.
Portable Electronic Devices (PEDs)
- Only government-owned PEDs may connect to corresponding classified information systems in a SCIF when authorized.
Application Downloads
- For government devices, only download applications that are pre-approved and authorized.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.