Podcast
Questions and Answers
What do you do if spillage occurs?
What do you do if spillage occurs?
?
Which of the following does NOT constitute spillage?
Which of the following does NOT constitute spillage?
Which of the following is NOT an appropriate way to protect against inadvertent spillage?
Which of the following is NOT an appropriate way to protect against inadvertent spillage?
Which of the following should you NOT do if you find classified information on the internet?
Which of the following should you NOT do if you find classified information on the internet?
Signup and view all the answers
Which of the following is NOT true concerning a computer labeled SECRET?
Which of the following is NOT true concerning a computer labeled SECRET?
Signup and view all the answers
What kind of information could reasonably be expected to cause serious damage to national security in the event of unauthorized disclosure?
What kind of information could reasonably be expected to cause serious damage to national security in the event of unauthorized disclosure?
Signup and view all the answers
What advantages do 'insider threats' have over others that allows them to be able to do extraordinary damage to their organizations?
What advantages do 'insider threats' have over others that allows them to be able to do extraordinary damage to their organizations?
Signup and view all the answers
Which of the following should be reported as a potential security incident?
Which of the following should be reported as a potential security incident?
Signup and view all the answers
How many potential insider threat indicators does this employee display?
How many potential insider threat indicators does this employee display?
Signup and view all the answers
In addition to avoiding the temptation of greed to betray his country, what should Alex do differently?
In addition to avoiding the temptation of greed to betray his country, what should Alex do differently?
Signup and view all the answers
How many insider threat indicators does Alex demonstrate?
How many insider threat indicators does Alex demonstrate?
Signup and view all the answers
What should Alex's colleagues do?
What should Alex's colleagues do?
Signup and view all the answers
What information most likely presents a security risk on your personal social networking profile?
What information most likely presents a security risk on your personal social networking profile?
Signup and view all the answers
What information most likely presents a security risk on your personal social networking profile?
What information most likely presents a security risk on your personal social networking profile?
Signup and view all the answers
Select all sections of the profile that contain an issue. Then select Submit.[Alex Smith]
Select all sections of the profile that contain an issue. Then select Submit.[Alex Smith]
Signup and view all the answers
Select the appropriate setting for each item. Then select Save.[Alex Smith/Social Media]
Select the appropriate setting for each item. Then select Save.[Alex Smith/Social Media]
Signup and view all the answers
Which of the following is NOT a correct way to protect sensitive information?
Which of the following is NOT a correct way to protect sensitive information?
Signup and view all the answers
Is it permitted to share an unclassified draft document with a non-DoD professional discussion group?
Is it permitted to share an unclassified draft document with a non-DoD professional discussion group?
Signup and view all the answers
Which type of information includes personal, payroll, medical, and operational information?
Which type of information includes personal, payroll, medical, and operational information?
Signup and view all the answers
After clicking on a link on a website, a box pops up and asks if you want to run an application. Is it okay to run it?
After clicking on a link on a website, a box pops up and asks if you want to run an application. Is it okay to run it?
Signup and view all the answers
Which of the following represents a good physical security practice?
Which of the following represents a good physical security practice?
Signup and view all the answers
Which of the following statements is TRUE about the use of DoD Public Key Infrastructure (PKI) tokens?
Which of the following statements is TRUE about the use of DoD Public Key Infrastructure (PKI) tokens?
Signup and view all the answers
What is the best way to protect your Common Access Card (CAC) or Personal Identity Verification (PIV) card?
What is the best way to protect your Common Access Card (CAC) or Personal Identity Verification (PIV) card?
Signup and view all the answers
Which of the following is a best practice for handling cookies?
Which of the following is a best practice for handling cookies?
Signup and view all the answers
Select all security issues. Then select Submit.[Isabel/Website Use]
Select all security issues. Then select Submit.[Isabel/Website Use]
Signup and view all the answers
You receive an email at your official Government email address from an individual at the Office of Personnel Management (OPM). The email provides a link to a personnel portal where you must enter your personal information as part of an effort to standardize recordkeeping. What action should you take first?
You receive an email at your official Government email address from an individual at the Office of Personnel Management (OPM). The email provides a link to a personnel portal where you must enter your personal information as part of an effort to standardize recordkeeping. What action should you take first?
Signup and view all the answers
You receive an email from the Internal Revenue Service (IRS) demanding immediate payment of back taxes of which you were not aware. The email provides a website and a toll-free number where you can make payment. What action should you take?
You receive an email from the Internal Revenue Service (IRS) demanding immediate payment of back taxes of which you were not aware. The email provides a website and a toll-free number where you can make payment. What action should you take?
Signup and view all the answers
Which email attachments are generally SAFE to open?
Which email attachments are generally SAFE to open?
Signup and view all the answers
Which of the following is NOT true of traveling overseas with a mobile phone?
Which of the following is NOT true of traveling overseas with a mobile phone?
Signup and view all the answers
What should Sara do when using publicly available Internet, such as hotel Wi-Fi?
What should Sara do when using publicly available Internet, such as hotel Wi-Fi?
Signup and view all the answers
What is the danger of using public Wi-Fi connections?
What is the danger of using public Wi-Fi connections?
Signup and view all the answers
A coworker has asked if you want to download a programmer's game to play at work. What should be your response?
A coworker has asked if you want to download a programmer's game to play at work. What should be your response?
Signup and view all the answers
While you are waiting for your lunch bill, a stranger picks up your Government-issued phone from your table and proceeds to exit the facility with it. What should you do?
While you are waiting for your lunch bill, a stranger picks up your Government-issued phone from your table and proceeds to exit the facility with it. What should you do?
Signup and view all the answers
Mobile devices include fitness bands, tablets, smartphones, electronic readers, and Bluetooth-enabled devices.
Mobile devices include fitness bands, tablets, smartphones, electronic readers, and Bluetooth-enabled devices.
Signup and view all the answers
Which of the following is a best practice for securing your home computer?
Which of the following is a best practice for securing your home computer?
Signup and view all the answers
Study Notes
Cyber Awareness and Information Security
- Spillage should be reported immediately and proper incident response procedures initiated.
- Classified information downgraded to unclassified does not constitute spillage.
- Inappropriate protection against spillage includes using classified networks for unclassified tasks.
- Downloading classified information from the internet is strictly prohibited.
- A computer labeled SECRET must not be used on unclassified networks.
- "Secret" information, when disclosed without authorization, is likely to cause serious damage to national security.
- Insider threats are dangerous due to their trusted status and authorized access to sensitive information.
- Unauthorized removal of sensitive information by a coworker should be reported as a potential security incident.
- Observable behavioral issues in colleagues can indicate insider threats, necessitating attention and reporting.
- Avoid discussing work-related matters outside authorized spaces to mitigate risks associated with insider threats.
- Colleagues should adhere to organizational policies and report suspicious behaviors to prevent security breaches.
- Personal email addresses on social networking sites pose significant security risks.
- Use privacy settings to limit exposure of sensitive biographical data and personal information.
- Secure sensitive information by avoiding storage on just any password-protected system; consider the strength of the system.
- Unclassified drafts may be shared with non-DoD professionals if they have been cleared for public release.
- Sensitive information includes personal, payroll, medical, and operational data, which requires careful handling.
- Running applications prompted by unexpected pop-ups is unsafe; only allow trusted sources.
- Good physical security practices entail using personal access devices such as security badges or CACs.
- Always use DoD PKI tokens within their designated classification levels to ensure security compliance.
- Protect CAC or PIV cards by keeping them secured and in personal possession at all times.
- Best practices for handling cookies and evaluating their safety should be adopted to safeguard personal and sensitive information.
- Legitimate emails from government entities should be verified for digital signatures before proceeding.
- Unknown payment requests via email should initiate contact with the agency using verified public contact information.
- Safety in opening email attachments is generally assured with digitally signed messages from known contacts.
- Ensure secure practices when traveling with mobile phones, especially regarding data security.
- Using public Wi-Fi connections poses risks that require familiarity with secure connection methods, like VPNs.
- Avoid downloading non-work-related applications, such as games, on work devices.
- Report any security incidents immediately, such as a stranger taking a government phone.
- Mobile devices encompass a variety of electronics, including smartphones, tablets, and wearables.
- Securing home computers requires regular updates to antivirus software to fend off threats.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.
Description
Test your knowledge on the DoD Cyber Awareness Challenge for 2019 with these flashcard questions. This quiz covers important aspects of handling classified information, including spillage and security protocols. Perfect for reinforcing key concepts and preparing for the annual training.