Podcast
Questions and Answers
What conditions are necessary to be granted access to Sensitive Compartmented Information (SCI)?
What conditions are necessary to be granted access to Sensitive Compartmented Information (SCI)?
Top Secret clearance and indoctrination into the SCI program
Which of the following is permitted when using an unclassified laptop within a collateral classified space?
Which of the following is permitted when using an unclassified laptop within a collateral classified space?
Which of the following is an authoritative source for derivative classification?
Which of the following is an authoritative source for derivative classification?
Security Classification Guide
Which of the following actions should Carl NOT take with the e-mail regarding a potential health risk?
Which of the following actions should Carl NOT take with the e-mail regarding a potential health risk?
Signup and view all the answers
How can an adversary use information available in public records to target you?
How can an adversary use information available in public records to target you?
Signup and view all the answers
Which of the following is an appropriate use of government e-mail?
Which of the following is an appropriate use of government e-mail?
Signup and view all the answers
Which of the following is NOT a best practice for protecting data on a mobile device?
Which of the following is NOT a best practice for protecting data on a mobile device?
Signup and view all the answers
What action should Annabeth take if she realizes a conversation involving Sensitive Compartmented Information (SCI) may have been overheard?
What action should Annabeth take if she realizes a conversation involving Sensitive Compartmented Information (SCI) may have been overheard?
Signup and view all the answers
On your home computer, how can you best establish passwords when creating separate user accounts?
On your home computer, how can you best establish passwords when creating separate user accounts?
Signup and view all the answers
Which of the following is an allowed use of government-furnished equipment (GFE)?
Which of the following is an allowed use of government-furnished equipment (GFE)?
Signup and view all the answers
How can you prevent viruses and malicious code?
How can you prevent viruses and malicious code?
Signup and view all the answers
Which best describes an insider threat? Someone who uses __________ access, ___________, to harm national security through unauthorized disclosure, data modification, espionage, terrorism, or kinetic actions.
Which best describes an insider threat? Someone who uses __________ access, ___________, to harm national security through unauthorized disclosure, data modification, espionage, terrorism, or kinetic actions.
Signup and view all the answers
Which of the following is an example of behavior that you should report?
Which of the following is an example of behavior that you should report?
Signup and view all the answers
Which of the following is true of telework?
Which of the following is true of telework?
Signup and view all the answers
After a classified document is leaked online, it makes national headlines. You should still treat it as classified even though it has been compromised.
After a classified document is leaked online, it makes national headlines. You should still treat it as classified even though it has been compromised.
Signup and view all the answers
How should government-owned removable media be stored?
How should government-owned removable media be stored?
Signup and view all the answers
When linked to a specific individual, which of the following is NOT an example of Personally Identifiable Information (PII)?
When linked to a specific individual, which of the following is NOT an example of Personally Identifiable Information (PII)?
Signup and view all the answers
What does the Common Access Card (CAC) contain?
What does the Common Access Card (CAC) contain?
Signup and view all the answers
Does Sylvia's use of her government approved mobile device for work calls during her commute pose a security concern?
Does Sylvia's use of her government approved mobile device for work calls during her commute pose a security concern?
Signup and view all the answers
Does Beth's action of tapping her phone at a payment terminal to pay for a purchase pose a security risk?
Does Beth's action of tapping her phone at a payment terminal to pay for a purchase pose a security risk?
Signup and view all the answers
Which of the following is NOT an appropriate use of your Common Access Card (CAC)?
Which of the following is NOT an appropriate use of your Common Access Card (CAC)?
Signup and view all the answers
When is the safest time to post on social media about your vacation plans?
When is the safest time to post on social media about your vacation plans?
Signup and view all the answers
What is the best course of action if you receive a text message from a package shipper notifying you about a delay, but you're not expecting a package?
What is the best course of action if you receive a text message from a package shipper notifying you about a delay, but you're not expecting a package?
Signup and view all the answers
Study Notes
Access to Sensitive Information
- Top Secret clearance is required for access to Sensitive Compartmented Information (SCI).
- Indoctrination into the SCI program is necessary for access.
Use of Technology in Classified Spaces
- Government-issued wired headsets with microphones are allowed on unclassified laptops in classified spaces.
- Personal use of government equipment includes checking personal emails when permitted by the organization.
Classification and Reporting
- Security Classification Guides are authoritative sources for derivative classification.
- Emails containing potential health risks should not be forwarded without verification.
- An incident of overhearing SCI should be reported to the security point of contact.
Information Security Practices
- Each user should create strong, individual passwords on home computers for separate accounts.
- All external files should be scanned for viruses before uploading to computers.
- Sensitive information should never be taken home for telework without authorization.
Insider Threats and PII
- Insider threats are individuals with authorized access that can harm national security through various actions.
- Not all information linked to individuals qualifies as Personally Identifiable Information (PII); for instance, automobile make and model does not qualify.
Use of Common Access Card (CAC)
- The Common Access Card (CAC) contains certificates for identification, encryption, and digital signatures.
- Using CAC as photo identification with commercial entities is inappropriate.
Telework and Social Media Safety
- Telework requires permission from the organization.
- Information about vacation plans should be posted on social media only after returning from the trip.
Eavesdropping Risks
- Communicating via government-approved mobile devices in public transport poses security risks due to the possibility of eavesdropping.
- Contactless payment methods, like tapping a phone, carry risks of signal interception.
Handling Suspicious Messages
- Unknown messages regarding package deliveries should be treated with caution, with the best action being to delete such messages if unexpected.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.
Description
Test your knowledge on the DOD Cyber Awareness Challenge 2024 with these flashcards. Covering key terms and concepts, this quiz is essential for understanding Cybersecurity protocols and regulations. Perfect for those preparing for the challenge or wanting a refresher.