DOD Cyber Awareness Challenge 2024
18 Questions
100 Views

DOD Cyber Awareness Challenge 2024

Created by
@LionheartedBrazilNutTree

Questions and Answers

What does it mean if your meeting notes are unclassified?

They do not have the potential to damage national security.

What type of information does the personnel roster represent?

Controlled unclassified information (CUI)

When emailing the personnel roster, which actions should you take? (Select all that apply)

  • Use a digital signature (correct)
  • Do not use any protection
  • Encrypt the email (correct)
  • Use a secure method (correct)
  • What action should be taken in response to compromised sensitive compartmented information (SCI)?

    <p>Call your security point of contact (POC)</p> Signup and view all the answers

    Which items should you consider for potential clues? (Select all that apply)

    <p>Laptop</p> Signup and view all the answers

    Who demonstrated behavior that could lead to the compromise of SCI?

    <p>Col. Cockatiel</p> Signup and view all the answers

    Which option poses a physical security risk? (Select all that apply)

    <p>Sensitive compartmented information facility</p> Signup and view all the answers

    Is sending government email to sell cookies an appropriate use of government-furnished equipment (GFE)?

    <p>False</p> Signup and view all the answers

    Select the individual who securely authenticates their identity.

    <p>Alex</p> Signup and view all the answers

    How can malicious code spread? (Select all that apply)

    <p>Via unsecured downloads</p> Signup and view all the answers

    How can you prevent the download of malicious code?

    <p>Scan external files before uploading to your device and research apps and their vulnerabilities before downloading.</p> Signup and view all the answers

    Which of the following may indicate a malicious code attack? (Select all that apply)

    <p>The device slows down</p> Signup and view all the answers

    How many phishing indicators are present in the two emails regarding DOD IT and DOD software?

    <p>3 in DOD IT, 3 in DOD software</p> Signup and view all the answers

    What should you bring for mobile devices?

    <p>Cash, approved hotspot, leave</p> Signup and view all the answers

    Which actions should you take on social networking? (Select all that apply)

    <p>Deny friend requests from unknown users</p> Signup and view all the answers

    What should you do if you notice an insider threat?

    <p>Yes, report Roberto</p> Signup and view all the answers

    What should you secure while teleworking? (Select all that apply)

    <p>The area of your workspace</p> Signup and view all the answers

    What are some essential practices for home computer security? (Select all that apply)

    <p>Enable firewall</p> Signup and view all the answers

    Study Notes

    Meeting Notes

    • Unclassified meeting notes do not pose a threat to national security.

    Personnel Rosters

    • Personnel rosters represent Controlled Unclassified Information (CUI).

    E-mail Protocol

    • When sending personnel rosters via email, it is essential to encrypt and use digital signatures.

    Response to Compromise

    • In case of compromised Sensitive Compartmented Information (SCI), contact your security point of contact.

    Security Clue Identification

    • For security reasons, a laptop is acceptable to have, while a water jug and printer pose no security risk.

    Compromise Behavior

    • Col. Cockatiel displayed behavior that could compromise Sensitive Compartmented Information (SCI).

    Physical Security Risks

    • Open office area security risks include posting access rosters publicly and the presence of collateral classified space.
    • All mentioned situations involve disabling cameras, microphones, Wi-Fi, and utilizing government-wired peripherals.

    Appropriate Use of Government Equipment

    • Sending government emails for personal sales (e.g., cookies) is inappropriate.

    Secure Authentication

    • Alex securely authenticates her identity, exemplifying proper security measures.

    Malicious Code Spread

    • Malicious code can spread through various methods, excluding virus scans.

    Prevention of Malicious Code Downloads

    • To prevent the download of malicious code, scan external files before uploading and research app vulnerabilities.

    Indicators of Malicious Code Attacks

    • Signs of a malicious code attack may include unexpected apps on devices, devices slowing down, or new tabs appearing in web browsers.

    Phishing Indicators in Emails

    • The first DOD IT email contains 4 phishing indicators, while the second DOD software email also shows 3+ indicators.

    Mobile Device Protocol

    • Safe practices for mobile devices include carrying cash, using approved hotspots, and being prepared to leave if necessary.

    Social Networking Practices

    • Best practices for social networking include deleting unnecessary information, denying friend requests from unknown contacts, and continuing to scroll through feeds cautiously.

    Website Use

    • Always research claims made on websites for verification.

    Insider Threat Reporting

    • If suspecting an insider threat, report individuals such as Roberto immediately.

    Telework Security

    • For telework, secure your area, and utilize appropriate equipment like HDMI monitors and USB keyboards.

    Home Computer Security

    • Ensure home computers are equipped with antivirus software, have user profiles created, and enable security features.

    Studying That Suits You

    Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

    Quiz Team

    Description

    Test your knowledge with our flashcards on the DOD Cyber Awareness Challenge for 2024. Learn about unclassified information, controlled unclassified information, and best practices for handling sensitive data. Perfect for anyone preparing for cybersecurity responsibilities.

    Use Quizgecko on...
    Browser
    Browser