DOD Cyber Awareness 2023 Flashcards

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What should you do if a vendor contacts you for organizational data to use in a prototype?

Refer the vendor to the appropriate personnel.

How can you protect classified data when it is not in use?

Store classified data appropriately in a GSA-approved vault/container.

What is the basis for handling and storage of classified data?

Classification markings and handling caveats.

What must you do before using an unclassified laptop in a classified environment?

<p>Ensure that any cameras, microphones, and Wi-Fi embedded in the laptop are physically disabled.</p> Signup and view all the answers

What level of damage to national security can you expect from the disclosure of Top Secret information?

<p>Exceptionally grave damage.</p> Signup and view all the answers

What is required for telework?

<p>You must have your organization's permission to telework.</p> Signup and view all the answers

What is true about protecting classified data?

<p>Classified material must be appropriately marked.</p> Signup and view all the answers

What constitutes a reportable insider threat activity?

<p>Attempting to access sensitive information without need-to-know.</p> Signup and view all the answers

What scenario might indicate a reportable insider threat?

<p>A colleague removes sensitive information without seeking authorization.</p> Signup and view all the answers

What is a potential insider threat indicator?

<p>Unusual interest in classified information. (A)</p> Signup and view all the answers

What piece of information is safest to include on your social media profile?

<p>Your favorite movie.</p> Signup and view all the answers

What is true about many apps and smart devices?

<p>They collect and share your personal information.</p> Signup and view all the answers

How can you protect your organization on social networking sites?

<p>Ensure there are no identifiable landmarks in photos.</p> Signup and view all the answers

What is a best practice for protecting Controlled Unclassified Information (CUI)?

<p>Store it in a locked desk drawer after working hours.</p> Signup and view all the answers

What best describes a way to safely transmit Controlled Unclassified Information (CUI)?

<p>Verify that the information is CUI, include a CUI marking in the subject header, and digitally sign the email.</p> Signup and view all the answers

Which designation includes Personally Identifiable Information (PII) and Protected Health Information (PHI)?

<p>Controlled Unclassified Information (CUI).</p> Signup and view all the answers

Which of the following is NOT an example of CUI?

<p>Press release data. (B)</p> Signup and view all the answers

Which of the following is NOT a correct way to protect CUI?

<p>CUI may be stored on any password-protected system. (B)</p> Signup and view all the answers

What best describes good physical security?

<p>Stopping an individual in a secure area who is not wearing a badge.</p> Signup and view all the answers

What is an example of two-factor authentication?

<p>A Common Access Card and Personal Identification Number.</p> Signup and view all the answers

What is the best way to protect your Common Access Card (CAC)?

<p>Store it in a shielded sleeve.</p> Signup and view all the answers

What must authorized personnel do before permitting entry to a Sensitive Compartmented Information Facility (SCIF)?

<p>Confirm the individual's need-to-know and access.</p> Signup and view all the answers

What is true of Sensitive Compartmented Information (SCI)?

<p>Access requires Top Secret clearance and indoctrination.</p> Signup and view all the answers

Which of the following is NOT a potential consequence of using removable media unsafely in a SCIF?

<p>Damage to the removable media. (A)</p> Signup and view all the answers

What portable electronic devices (PEDs) are permitted in a SCIF?

<p>Only expressly authorized government-owned PEDs.</p> Signup and view all the answers

What is the response to an incident such as opening an uncontrolled DVD on a computer in a SCIF?

<p>All of these.</p> Signup and view all the answers

Which of the following is NOT a type of malicious code?

<p>Executables. (C)</p> Signup and view all the answers

Which of the following actions can help to protect your identity?

<p>Shred personal documents.</p> Signup and view all the answers

What is an appropriate use of government email?

<p>Use a digital signature when sending attachments or hyperlinks.</p> Signup and view all the answers

What type of social engineering targets particular groups of people?

<p>Spear phishing.</p> Signup and view all the answers

How can you protect yourself from social engineering?

<p>Verify the identity of all individuals.</p> Signup and view all the answers

What is true of traveling overseas with a mobile phone?

<p>A personally owned device must be unenrolled while out of the country.</p> Signup and view all the answers

What should you do when using publicly available Internet, such as hotel Wi-Fi?

<p>Only connect with Government VPN.</p> Signup and view all the answers

What is the danger of using public Wi-Fi connections?

<p>Both of these. (A)</p> Signup and view all the answers

Which personally-owned computer peripheral is permitted for use with Government-furnished equipment?

<p>A headset with a microphone through a USB port.</p> Signup and view all the answers

How can you protect data on your mobile computing and portable electronic devices (PEDs)?

<p>Enable automatic screen locking after a period of inactivity.</p> Signup and view all the answers

What is an example of removable media?

<p>External hard drive.</p> Signup and view all the answers

What is true of Internet of Things (IoT) devices?

<p>They can become an attack vector to other devices.</p> Signup and view all the answers

When is it appropriate to have your security badge visible?

<p>At all times when in the facility.</p> Signup and view all the answers

What should the owner of printed SCI do differently?

<p>Retrieve classified documents promptly from printers.</p> Signup and view all the answers

What should participants in a conversation involving SCI do differently?

<p>Physically assess that everyone within listening distance is cleared.</p> Signup and view all the answers

Which demonstrates proper protection of mobile devices?

<p>Linda encrypts all of the sensitive data.</p> Signup and view all the answers

Which does NOT constitute spillage?

<p>Classified information downgraded to unclassified. (B)</p> Signup and view all the answers

Which is NOT an appropriate way to protect against inadvertent spillage?

<p>Use the classified network for all work. (A)</p> Signup and view all the answers

What should you NOT do if you find classified information on the internet?

<p>Download the information.</p> Signup and view all the answers

Who designates whether information is classified and its classification level?

<p>The appropriate authority or designated personnel.</p> Signup and view all the answers

What is a good practice to protect classified information?

<p>Regularly conduct security training.</p> Signup and view all the answers

What may help to prevent spillage?

<p>Follow procedures for transferring data to and from outside agencies.</p> Signup and view all the answers

Flashcards are hidden until you start studying

Study Notes

Vendor Data Request

  • Refer vendors to appropriate personnel for organizational data requests.

Protecting Classified Data

  • Store classified data in GSA-approved vaults/containers when not in use.

Handling Classified Data

  • Classification markings and handling caveats dictate data handling and storage.

Unclassified Laptop Usage

  • Disable any embedded cameras, microphones, and Wi-Fi before using unclassified laptops in classified environments.

Impact of Top Secret Disclosure

  • Disclosure of Top Secret information can cause exceptionally grave damage to national security.

Telework Guidelines

  • Permission from the organization is required for teleworking.

Marking Classified Material

  • Proper marking is essential for protecting classified data.

Insider Threat Activities

  • Attempting to access sensitive information without the need-to-know is reportable as an insider threat.

Indicators of Insider Threat

  • Removing sensitive information without authorization for telework may indicate insider threat behavior.

Social Media Privacy

  • Safest information to share on social media includes non-identifiable details, like favorite movies.

Apps and Smart Devices

  • Many apps gather and share personal information, impacting online identity.

Social Networking Site Protection

  • Avoid posting identifiable work-related photos where landmarks can be recognized.

Protecting Controlled Unclassified Information (CUI)

  • Store CUI in locked desk drawers after business hours for security.

Transmitting CUI Safely

  • Verify CUI status, mark emails appropriately, and digitally sign them for secure transmission.

Designation of Information Types

  • CUI includes Personally Identifiable Information (PII) and Protected Health Information (PHI).

Examples of CUI

  • Press release data is not classified as CUI.

Storing CUI Safely

  • CUI storage should not be performed on any password-protected system indiscriminately.

Physical Security Best Practices

  • Stop unbadged individuals in secure areas to ensure safety and compliance.

Two-Factor Authentication

  • Examples include using a Common Access Card and a Personal Identification Number.

Protecting Security Cards

  • Store Common Access Cards (CAC) or Personal Identity Verification (PIV) cards in shielded sleeves.

SCIF Entry Protocol

  • Confirm the need-to-know and access before allowing individuals in Sensitive Compartmented Information Facilities (SCIF).

SCI Access Requirements

  • Access to Sensitive Compartmented Information (SCI) requires Top Secret clearance and specific indoctrination.

Removable Media Risks

  • Using removable media unsafely in SCIF does not typically damage the media itself, but poses other risks.

Authorization for Electronic Devices

  • Only government-owned, expressly authorized devices are permitted in SCIF.

Incident Response in SCIF

  • Responding to incidents, such as opening unauthorized DVDs, necessitates all outlined measures.

Malicious Code Types

  • Categories do not include executables.

Identity Protection Actions

  • Shredding personal documents is a crucial step in protecting identity.

Government Email Usage

  • Utilize digital signatures for attaching files or hyperlinks in government emails.

Types of Social Engineering Attacks

  • Spear phishing specifically targets particular groups or individuals.

Preventing Social Engineering

  • Always verify individual identities to combat social engineering threats.

Traveling with Mobile Phones

  • Personal devices under BYOAD policy must be unenrolled when traveling abroad.

Public Wi-Fi Safety

  • Connecting to public Wi-Fi, like hotel internet, poses significant risks.

Permissible Computer Peripherals

  • Headsets with microphones and USB connections can be used with government-furnished equipment.

Data Security on Mobile Devices

  • Enable automatic screen lock on mobile and portable devices to secure data.

Removable Media Examples

  • External hard drives qualify as examples of removable media.

IoT Security Risks

  • Internet of Things (IoT) devices can create vulnerabilities on home networks.

Security Badge Visibility

  • Security badges must be visible at all times within facilities.

Handling Printed SCI

  • Retrieve classified documents promptly from printers to maintain security.

Conversation Guidelines with SCI

  • Ensure everyone within earshot is cleared and has a need-to-know during sensitive conversations.

Mobile Device Security Measures

  • Encrypt sensitive data on government-issued mobile devices for enhanced protection.

Definition of Spillage

  • Spillage does not include classified information downgraded to unclassified status.

Inadvertent Spillage Prevention

  • Utilize the classified network solely for classified work; do not mix with unclassified tasks.

Classified Information on the Internet

  • Downloading classified information found online should be avoided.

Classification Designation Authority

  • The authority for designating information classification lies with the appropriate officials.

Good Practices for Protecting Classified Information

  • Systematic approaches and consistent adherence to policies are essential.

Preventing Information Spillage

  • Follow strict procedures for transferring data between outside agencies and non-government networks.

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

More Like This

Use Quizgecko on...
Browser
Browser