DOD Cyber Awareness 2023 Flashcards
48 Questions
100 Views

DOD Cyber Awareness 2023 Flashcards

Created by
@GrandDwarf5939

Questions and Answers

What should you do if a vendor contacts you for organizational data to use in a prototype?

Refer the vendor to the appropriate personnel.

How can you protect classified data when it is not in use?

Store classified data appropriately in a GSA-approved vault/container.

What is the basis for handling and storage of classified data?

Classification markings and handling caveats.

What must you do before using an unclassified laptop in a classified environment?

<p>Ensure that any cameras, microphones, and Wi-Fi embedded in the laptop are physically disabled.</p> Signup and view all the answers

What level of damage to national security can you expect from the disclosure of Top Secret information?

<p>Exceptionally grave damage.</p> Signup and view all the answers

What is required for telework?

<p>You must have your organization's permission to telework.</p> Signup and view all the answers

What is true about protecting classified data?

<p>Classified material must be appropriately marked.</p> Signup and view all the answers

What constitutes a reportable insider threat activity?

<p>Attempting to access sensitive information without need-to-know.</p> Signup and view all the answers

What scenario might indicate a reportable insider threat?

<p>A colleague removes sensitive information without seeking authorization.</p> Signup and view all the answers

What is a potential insider threat indicator?

<p>Unusual interest in classified information.</p> Signup and view all the answers

What piece of information is safest to include on your social media profile?

<p>Your favorite movie.</p> Signup and view all the answers

What is true about many apps and smart devices?

<p>They collect and share your personal information.</p> Signup and view all the answers

How can you protect your organization on social networking sites?

<p>Ensure there are no identifiable landmarks in photos.</p> Signup and view all the answers

What is a best practice for protecting Controlled Unclassified Information (CUI)?

<p>Store it in a locked desk drawer after working hours.</p> Signup and view all the answers

What best describes a way to safely transmit Controlled Unclassified Information (CUI)?

<p>Verify that the information is CUI, include a CUI marking in the subject header, and digitally sign the email.</p> Signup and view all the answers

Which designation includes Personally Identifiable Information (PII) and Protected Health Information (PHI)?

<p>Controlled Unclassified Information (CUI).</p> Signup and view all the answers

Which of the following is NOT an example of CUI?

<p>Press release data.</p> Signup and view all the answers

Which of the following is NOT a correct way to protect CUI?

<p>CUI may be stored on any password-protected system.</p> Signup and view all the answers

What best describes good physical security?

<p>Stopping an individual in a secure area who is not wearing a badge.</p> Signup and view all the answers

What is an example of two-factor authentication?

<p>A Common Access Card and Personal Identification Number.</p> Signup and view all the answers

What is the best way to protect your Common Access Card (CAC)?

<p>Store it in a shielded sleeve.</p> Signup and view all the answers

What must authorized personnel do before permitting entry to a Sensitive Compartmented Information Facility (SCIF)?

<p>Confirm the individual's need-to-know and access.</p> Signup and view all the answers

What is true of Sensitive Compartmented Information (SCI)?

<p>Access requires Top Secret clearance and indoctrination.</p> Signup and view all the answers

Which of the following is NOT a potential consequence of using removable media unsafely in a SCIF?

<p>Damage to the removable media.</p> Signup and view all the answers

What portable electronic devices (PEDs) are permitted in a SCIF?

<p>Only expressly authorized government-owned PEDs.</p> Signup and view all the answers

What is the response to an incident such as opening an uncontrolled DVD on a computer in a SCIF?

<p>All of these.</p> Signup and view all the answers

Which of the following is NOT a type of malicious code?

<p>Executables.</p> Signup and view all the answers

Which of the following actions can help to protect your identity?

<p>Shred personal documents.</p> Signup and view all the answers

What is an appropriate use of government email?

<p>Use a digital signature when sending attachments or hyperlinks.</p> Signup and view all the answers

What type of social engineering targets particular groups of people?

<p>Spear phishing.</p> Signup and view all the answers

How can you protect yourself from social engineering?

<p>Verify the identity of all individuals.</p> Signup and view all the answers

What is true of traveling overseas with a mobile phone?

<p>A personally owned device must be unenrolled while out of the country.</p> Signup and view all the answers

What should you do when using publicly available Internet, such as hotel Wi-Fi?

<p>Only connect with Government VPN.</p> Signup and view all the answers

What is the danger of using public Wi-Fi connections?

<p>Both of these.</p> Signup and view all the answers

Which personally-owned computer peripheral is permitted for use with Government-furnished equipment?

<p>A headset with a microphone through a USB port.</p> Signup and view all the answers

How can you protect data on your mobile computing and portable electronic devices (PEDs)?

<p>Enable automatic screen locking after a period of inactivity.</p> Signup and view all the answers

What is an example of removable media?

<p>External hard drive.</p> Signup and view all the answers

What is true of Internet of Things (IoT) devices?

<p>They can become an attack vector to other devices.</p> Signup and view all the answers

When is it appropriate to have your security badge visible?

<p>At all times when in the facility.</p> Signup and view all the answers

What should the owner of printed SCI do differently?

<p>Retrieve classified documents promptly from printers.</p> Signup and view all the answers

What should participants in a conversation involving SCI do differently?

<p>Physically assess that everyone within listening distance is cleared.</p> Signup and view all the answers

Which demonstrates proper protection of mobile devices?

<p>Linda encrypts all of the sensitive data.</p> Signup and view all the answers

Which does NOT constitute spillage?

<p>Classified information downgraded to unclassified.</p> Signup and view all the answers

Which is NOT an appropriate way to protect against inadvertent spillage?

<p>Use the classified network for all work.</p> Signup and view all the answers

What should you NOT do if you find classified information on the internet?

<p>Download the information.</p> Signup and view all the answers

Who designates whether information is classified and its classification level?

<p>The appropriate authority or designated personnel.</p> Signup and view all the answers

What is a good practice to protect classified information?

<p>Regularly conduct security training.</p> Signup and view all the answers

What may help to prevent spillage?

<p>Follow procedures for transferring data to and from outside agencies.</p> Signup and view all the answers

Study Notes

Vendor Data Request

  • Refer vendors to appropriate personnel for organizational data requests.

Protecting Classified Data

  • Store classified data in GSA-approved vaults/containers when not in use.

Handling Classified Data

  • Classification markings and handling caveats dictate data handling and storage.

Unclassified Laptop Usage

  • Disable any embedded cameras, microphones, and Wi-Fi before using unclassified laptops in classified environments.

Impact of Top Secret Disclosure

  • Disclosure of Top Secret information can cause exceptionally grave damage to national security.

Telework Guidelines

  • Permission from the organization is required for teleworking.

Marking Classified Material

  • Proper marking is essential for protecting classified data.

Insider Threat Activities

  • Attempting to access sensitive information without the need-to-know is reportable as an insider threat.

Indicators of Insider Threat

  • Removing sensitive information without authorization for telework may indicate insider threat behavior.

Social Media Privacy

  • Safest information to share on social media includes non-identifiable details, like favorite movies.

Apps and Smart Devices

  • Many apps gather and share personal information, impacting online identity.

Social Networking Site Protection

  • Avoid posting identifiable work-related photos where landmarks can be recognized.

Protecting Controlled Unclassified Information (CUI)

  • Store CUI in locked desk drawers after business hours for security.

Transmitting CUI Safely

  • Verify CUI status, mark emails appropriately, and digitally sign them for secure transmission.

Designation of Information Types

  • CUI includes Personally Identifiable Information (PII) and Protected Health Information (PHI).

Examples of CUI

  • Press release data is not classified as CUI.

Storing CUI Safely

  • CUI storage should not be performed on any password-protected system indiscriminately.

Physical Security Best Practices

  • Stop unbadged individuals in secure areas to ensure safety and compliance.

Two-Factor Authentication

  • Examples include using a Common Access Card and a Personal Identification Number.

Protecting Security Cards

  • Store Common Access Cards (CAC) or Personal Identity Verification (PIV) cards in shielded sleeves.

SCIF Entry Protocol

  • Confirm the need-to-know and access before allowing individuals in Sensitive Compartmented Information Facilities (SCIF).

SCI Access Requirements

  • Access to Sensitive Compartmented Information (SCI) requires Top Secret clearance and specific indoctrination.

Removable Media Risks

  • Using removable media unsafely in SCIF does not typically damage the media itself, but poses other risks.

Authorization for Electronic Devices

  • Only government-owned, expressly authorized devices are permitted in SCIF.

Incident Response in SCIF

  • Responding to incidents, such as opening unauthorized DVDs, necessitates all outlined measures.

Malicious Code Types

  • Categories do not include executables.

Identity Protection Actions

  • Shredding personal documents is a crucial step in protecting identity.

Government Email Usage

  • Utilize digital signatures for attaching files or hyperlinks in government emails.

Types of Social Engineering Attacks

  • Spear phishing specifically targets particular groups or individuals.

Preventing Social Engineering

  • Always verify individual identities to combat social engineering threats.

Traveling with Mobile Phones

  • Personal devices under BYOAD policy must be unenrolled when traveling abroad.

Public Wi-Fi Safety

  • Connecting to public Wi-Fi, like hotel internet, poses significant risks.

Permissible Computer Peripherals

  • Headsets with microphones and USB connections can be used with government-furnished equipment.

Data Security on Mobile Devices

  • Enable automatic screen lock on mobile and portable devices to secure data.

Removable Media Examples

  • External hard drives qualify as examples of removable media.

IoT Security Risks

  • Internet of Things (IoT) devices can create vulnerabilities on home networks.

Security Badge Visibility

  • Security badges must be visible at all times within facilities.

Handling Printed SCI

  • Retrieve classified documents promptly from printers to maintain security.

Conversation Guidelines with SCI

  • Ensure everyone within earshot is cleared and has a need-to-know during sensitive conversations.

Mobile Device Security Measures

  • Encrypt sensitive data on government-issued mobile devices for enhanced protection.

Definition of Spillage

  • Spillage does not include classified information downgraded to unclassified status.

Inadvertent Spillage Prevention

  • Utilize the classified network solely for classified work; do not mix with unclassified tasks.

Classified Information on the Internet

  • Downloading classified information found online should be avoided.

Classification Designation Authority

  • The authority for designating information classification lies with the appropriate officials.

Good Practices for Protecting Classified Information

  • Systematic approaches and consistent adherence to policies are essential.

Preventing Information Spillage

  • Follow strict procedures for transferring data between outside agencies and non-government networks.

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

Description

Test your knowledge with these flashcards designed for the DOD Cyber Awareness 2023 training. Each card presents key concepts and best practices essential for maintaining data security and privacy in your organization. Perfect for reinforcing your understanding of information handling and related protocols.

More Quizzes Like This

DoD Cyber Awareness Challenge 2019
35 questions

DoD Cyber Awareness Challenge 2019

SustainableAntigorite1088 avatar
SustainableAntigorite1088
DOD Cyber Awareness 2023 Flashcards
26 questions

DOD Cyber Awareness 2023 Flashcards

BeneficialThermodynamics avatar
BeneficialThermodynamics
Use Quizgecko on...
Browser
Browser