Podcast
Questions and Answers
What does it mean if your meeting notes are unclassified?
What does it mean if your meeting notes are unclassified?
They do not have the potential to damage national security.
What type of information does the personnel roster represent?
What type of information does the personnel roster represent?
Controlled unclassified information (CUI)
When emailing the personnel roster, which actions should you take? (Select all that apply)
When emailing the personnel roster, which actions should you take? (Select all that apply)
What action should be taken in response to compromised sensitive compartmented information (SCI)?
What action should be taken in response to compromised sensitive compartmented information (SCI)?
Signup and view all the answers
Which items should you consider for potential clues? (Select all that apply)
Which items should you consider for potential clues? (Select all that apply)
Signup and view all the answers
Who demonstrated behavior that could lead to the compromise of SCI?
Who demonstrated behavior that could lead to the compromise of SCI?
Signup and view all the answers
Which option poses a physical security risk? (Select all that apply)
Which option poses a physical security risk? (Select all that apply)
Signup and view all the answers
Is sending government email to sell cookies an appropriate use of government-furnished equipment (GFE)?
Is sending government email to sell cookies an appropriate use of government-furnished equipment (GFE)?
Signup and view all the answers
Select the individual who securely authenticates their identity.
Select the individual who securely authenticates their identity.
Signup and view all the answers
How can malicious code spread? (Select all that apply)
How can malicious code spread? (Select all that apply)
Signup and view all the answers
How can you prevent the download of malicious code?
How can you prevent the download of malicious code?
Signup and view all the answers
Which of the following may indicate a malicious code attack? (Select all that apply)
Which of the following may indicate a malicious code attack? (Select all that apply)
Signup and view all the answers
How many phishing indicators are present in the two emails regarding DOD IT and DOD software?
How many phishing indicators are present in the two emails regarding DOD IT and DOD software?
Signup and view all the answers
What should you bring for mobile devices?
What should you bring for mobile devices?
Signup and view all the answers
Which actions should you take on social networking? (Select all that apply)
Which actions should you take on social networking? (Select all that apply)
Signup and view all the answers
What should you do if you notice an insider threat?
What should you do if you notice an insider threat?
Signup and view all the answers
What should you secure while teleworking? (Select all that apply)
What should you secure while teleworking? (Select all that apply)
Signup and view all the answers
What are some essential practices for home computer security? (Select all that apply)
What are some essential practices for home computer security? (Select all that apply)
Signup and view all the answers
Study Notes
Meeting Notes
- Unclassified meeting notes do not pose a threat to national security.
Personnel Rosters
- Personnel rosters represent Controlled Unclassified Information (CUI).
E-mail Protocol
- When sending personnel rosters via email, it is essential to encrypt and use digital signatures.
Response to Compromise
- In case of compromised Sensitive Compartmented Information (SCI), contact your security point of contact.
Security Clue Identification
- For security reasons, a laptop is acceptable to have, while a water jug and printer pose no security risk.
Compromise Behavior
- Col. Cockatiel displayed behavior that could compromise Sensitive Compartmented Information (SCI).
Physical Security Risks
- Open office area security risks include posting access rosters publicly and the presence of collateral classified space.
- All mentioned situations involve disabling cameras, microphones, Wi-Fi, and utilizing government-wired peripherals.
Appropriate Use of Government Equipment
- Sending government emails for personal sales (e.g., cookies) is inappropriate.
Secure Authentication
- Alex securely authenticates her identity, exemplifying proper security measures.
Malicious Code Spread
- Malicious code can spread through various methods, excluding virus scans.
Prevention of Malicious Code Downloads
- To prevent the download of malicious code, scan external files before uploading and research app vulnerabilities.
Indicators of Malicious Code Attacks
- Signs of a malicious code attack may include unexpected apps on devices, devices slowing down, or new tabs appearing in web browsers.
Phishing Indicators in Emails
- The first DOD IT email contains 4 phishing indicators, while the second DOD software email also shows 3+ indicators.
Mobile Device Protocol
- Safe practices for mobile devices include carrying cash, using approved hotspots, and being prepared to leave if necessary.
Social Networking Practices
- Best practices for social networking include deleting unnecessary information, denying friend requests from unknown contacts, and continuing to scroll through feeds cautiously.
Website Use
- Always research claims made on websites for verification.
Insider Threat Reporting
- If suspecting an insider threat, report individuals such as Roberto immediately.
Telework Security
- For telework, secure your area, and utilize appropriate equipment like HDMI monitors and USB keyboards.
Home Computer Security
- Ensure home computers are equipped with antivirus software, have user profiles created, and enable security features.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.
Description
Test your knowledge with our flashcards on the DOD Cyber Awareness Challenge for 2024. Learn about unclassified information, controlled unclassified information, and best practices for handling sensitive data. Perfect for anyone preparing for cybersecurity responsibilities.