DOD Cyber Awareness Challenge 2024
18 Questions
100 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What does it mean if your meeting notes are unclassified?

They do not have the potential to damage national security.

What type of information does the personnel roster represent?

Controlled unclassified information (CUI)

When emailing the personnel roster, which actions should you take? (Select all that apply)

  • Use a digital signature (correct)
  • Do not use any protection
  • Encrypt the email (correct)
  • Use a secure method (correct)

What action should be taken in response to compromised sensitive compartmented information (SCI)?

<p>Call your security point of contact (POC)</p> Signup and view all the answers

Which items should you consider for potential clues? (Select all that apply)

<p>Laptop (D)</p> Signup and view all the answers

Who demonstrated behavior that could lead to the compromise of SCI?

<p>Col. Cockatiel</p> Signup and view all the answers

Which option poses a physical security risk? (Select all that apply)

<p>Sensitive compartmented information facility (A), Collateral classified space (B), Open office area (C), Posting an access roster in public view (D)</p> Signup and view all the answers

Is sending government email to sell cookies an appropriate use of government-furnished equipment (GFE)?

<p>False (B)</p> Signup and view all the answers

Select the individual who securely authenticates their identity.

<p>Alex</p> Signup and view all the answers

How can malicious code spread? (Select all that apply)

<p>Via unsecured downloads (B), From infected websites (C), Through email attachments (D)</p> Signup and view all the answers

How can you prevent the download of malicious code?

<p>Scan external files before uploading to your device and research apps and their vulnerabilities before downloading.</p> Signup and view all the answers

Which of the following may indicate a malicious code attack? (Select all that apply)

<p>The device slows down (A), A new tab appears in the web browser (B), A new app suddenly appears on the device (C)</p> Signup and view all the answers

How many phishing indicators are present in the two emails regarding DOD IT and DOD software?

<p>3 in DOD IT, 3 in DOD software (D)</p> Signup and view all the answers

What should you bring for mobile devices?

<p>Cash, approved hotspot, leave</p> Signup and view all the answers

Which actions should you take on social networking? (Select all that apply)

<p>Deny friend requests from unknown users (A), Delete suspicious messages (C)</p> Signup and view all the answers

What should you do if you notice an insider threat?

<p>Yes, report Roberto</p> Signup and view all the answers

What should you secure while teleworking? (Select all that apply)

<p>The area of your workspace (B), HDMI monitor and USB keyboard (D)</p> Signup and view all the answers

What are some essential practices for home computer security? (Select all that apply)

<p>Enable firewall (A), Create user profiles (B), Install antivirus software (C)</p> Signup and view all the answers

Study Notes

Meeting Notes

  • Unclassified meeting notes do not pose a threat to national security.

Personnel Rosters

  • Personnel rosters represent Controlled Unclassified Information (CUI).

E-mail Protocol

  • When sending personnel rosters via email, it is essential to encrypt and use digital signatures.

Response to Compromise

  • In case of compromised Sensitive Compartmented Information (SCI), contact your security point of contact.

Security Clue Identification

  • For security reasons, a laptop is acceptable to have, while a water jug and printer pose no security risk.

Compromise Behavior

  • Col. Cockatiel displayed behavior that could compromise Sensitive Compartmented Information (SCI).

Physical Security Risks

  • Open office area security risks include posting access rosters publicly and the presence of collateral classified space.
  • All mentioned situations involve disabling cameras, microphones, Wi-Fi, and utilizing government-wired peripherals.

Appropriate Use of Government Equipment

  • Sending government emails for personal sales (e.g., cookies) is inappropriate.

Secure Authentication

  • Alex securely authenticates her identity, exemplifying proper security measures.

Malicious Code Spread

  • Malicious code can spread through various methods, excluding virus scans.

Prevention of Malicious Code Downloads

  • To prevent the download of malicious code, scan external files before uploading and research app vulnerabilities.

Indicators of Malicious Code Attacks

  • Signs of a malicious code attack may include unexpected apps on devices, devices slowing down, or new tabs appearing in web browsers.

Phishing Indicators in Emails

  • The first DOD IT email contains 4 phishing indicators, while the second DOD software email also shows 3+ indicators.

Mobile Device Protocol

  • Safe practices for mobile devices include carrying cash, using approved hotspots, and being prepared to leave if necessary.

Social Networking Practices

  • Best practices for social networking include deleting unnecessary information, denying friend requests from unknown contacts, and continuing to scroll through feeds cautiously.

Website Use

  • Always research claims made on websites for verification.

Insider Threat Reporting

  • If suspecting an insider threat, report individuals such as Roberto immediately.

Telework Security

  • For telework, secure your area, and utilize appropriate equipment like HDMI monitors and USB keyboards.

Home Computer Security

  • Ensure home computers are equipped with antivirus software, have user profiles created, and enable security features.

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

Description

Test your knowledge with our flashcards on the DOD Cyber Awareness Challenge for 2024. Learn about unclassified information, controlled unclassified information, and best practices for handling sensitive data. Perfect for anyone preparing for cybersecurity responsibilities.

More Like This

Use Quizgecko on...
Browser
Browser