DoD Cyber Awareness Challenge 2024 Flashcards

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

Mabel is a government employee who needs to share a document containing contractor proprietary information with his supervisor. What is the most appropriate way for Mabel to do this?

  • Print it and hand it to her
  • Email the document
  • Share it on social media
  • Use an approved secure sharing method (correct)

What is an authoritative source for a derivative classification?

Security classification guide

What is an example of behavior that should be reported?

Taking sensitive information home for telework without authorization

What might Terri have seen on her social media feed related to a smoke billowing from the Pentagon?

<p>A phishing attempt (B)</p> Signup and view all the answers

Which of the following is not an appropriate use for your Common Access Card?

<p>Using it as photo identification with a commercial entity (B)</p> Signup and view all the answers

Spillage refers to the unauthorized disclosure of classified information.

<p>True (A)</p> Signup and view all the answers

Which of the following is not a best practice for protecting data on a mobile device?

<p>Disable automatic screen locking (D)</p> Signup and view all the answers

What is the best course of action if you receive a suspicious text message about a delayed package delivery?

<p>Delete the message</p> Signup and view all the answers

How can you protect your home computer?

<p>Turn on the password feature</p> Signup and view all the answers

Printed Sensitive Compartmented Information (SCI) must be retrieved properly from the printer.

<p>True (A)</p> Signup and view all the answers

What is the best practice for physical security?

<p>Use your own security badge or key code for facility access</p> Signup and view all the answers

Which of the following is a step you should not take to protect against spillage?

<p>Purge any device's memory before connecting to a classified network (D)</p> Signup and view all the answers

Unclassified DoD data may require access and distribution controls.

<p>True (A)</p> Signup and view all the answers

Which of the following is not a best practice for protecting your home wireless network?

<p>Use your router's preset SSID and password (B)</p> Signup and view all the answers

Where are you permitted to use classified data?

<p>Only in a SCIF</p> Signup and view all the answers

What action should Annabeth take if she believes a sensitive compartmented information conversation was overheard?

<p>Contact her security POC with detailed information about the incident</p> Signup and view all the answers

Which of these is not a potential indicator that your device may be under a malicious code attack?

<p>A notification for a system update that has been publicized (A)</p> Signup and view all the answers

How should government-owned removable media be stored?

<p>In a GSA approved container, according to the appropriate security classification</p> Signup and view all the answers

What is the best practice for using a government email?

<p>Do not send mass e-mails</p> Signup and view all the answers

Which of the following uses of removable media is appropriate?

<p>Encrypting data stored on removable media (A)</p> Signup and view all the answers

Which of the following is a risk associated with removable media?

<p>All of these (D)</p> Signup and view all the answers

Protected Health Information (PHI) is a type of controlled unclassified information.

<p>False (B)</p> Signup and view all the answers

Which of the following contributes to your online identity?

<p>All of these (C)</p> Signup and view all the answers

What is the best practice when browsing the Internet?

<p>Only accept cookies from reputable, trusted websites (B)</p> Signup and view all the answers

Flashcards

Secure Document Sharing

Sharing documents containing sensitive information with only those who have appropriate clearance ensures confidentiality.

Derivative Classification

Derivative classification refers to assigning security classifications to documents based on the information they contain, using the principles of original classification.

Reporting Sensitive Behavior

Unauthorized handling or transfer of sensitive information, such as taking it home, should be reported immediately to maintain security.

Social Media Caution

Social media posts, especially those with alarming content, can be phishing attempts to steal personal information.

Signup and view all the flashcards

CAC Usage

The Common Access Card (CAC) is solely for government identification and access; it is not a general photo ID for commercial purposes.

Signup and view all the flashcards

Mobile Device Security

Automatic screen locking on mobile devices protects sensitive data from unauthorized access.

Signup and view all the flashcards

Suspicious Communications

If you receive unexpected or suspicious messages about package deliveries, especially with links, it's safest to delete them to avoid phishing attempts.

Signup and view all the flashcards

Home Computer Security

Enabling password protection on home computers prevents unauthorized access to sensitive data.

Signup and view all the flashcards

Handling Sensitive Information

Retrieval of Sensitive Compartmented Information (SCI) from printers must be done securely to prevent unauthorized access.

Signup and view all the flashcards

Physical Security Measures

Using personal security badges or access codes provides a physical layer of security when entering facilities.

Signup and view all the flashcards

Preventing Data Spillage

Purging device memory before connecting to a classified network can lead to data spillage and unauthorized access.

Signup and view all the flashcards

Unclassified Data Controls

Even unclassified data belonging to the DoD may have specific access and distribution controls in place to maintain security.

Signup and view all the flashcards

Home Wireless Network Security

Using preset router service set identifiers (SSIDs) and passwords weakens security; creating unique ones improves it.

Signup and view all the flashcards

Use of Classified Data

Classified data is only permitted for use within a Secure Compartmented Information Facility (SCIF).

Signup and view all the flashcards

Security Breaches

If you suspect sensitive information might have been overheard, immediately contact a security Point of Contact (POC) with details.

Signup and view all the flashcards

Indicators of Malicious Code

Standard notifications for system updates are not indicators of a malicious code attack.

Signup and view all the flashcards

Insider Threat Indicators

Prolonged good performance does not guarantee the absence of insider threats; monitoring unusual behaviors is crucial.

Signup and view all the flashcards

Storing Government Media

Removable media, like flash drives, should be stored in GSA-approved containers based on their security classification for protection.

Signup and view all the flashcards

Best Practice for Government Emails

Mass emails should be avoided to protect sensitive information and maintain communication integrity.

Signup and view all the flashcards

Appropriate Use of Removable Media

Encrypting data when using removable media protects it from unauthorized access.

Signup and view all the flashcards

Risks of Removable Media

Removable media usage carries risks like potential data breaches if not handled securely.

Signup and view all the flashcards

PHI Protection

Protected Health Information (PHI) is subject to health privacy laws, not classified as controlled unclassified information.

Signup and view all the flashcards

Online Identity Formation

Online identity is formed through interactions like social media use, browsing habits, and personal disclosures.

Signup and view all the flashcards

Internet Browsing Safety

Accepting cookies only from reputable websites minimizes security risks while browsing online.

Signup and view all the flashcards

Study Notes

Document Sharing Procedures

  • Government employees must securely share documents containing sensitive information with appropriate clearance only.
  • Best practices involve approved methods as per security guidelines.

Derivative Classification

  • Security classification guides serve as authoritative sources for derivative classification.

Reporting Sensitive Behavior

  • Unauthorized handling or transfer of sensitive information, such as taking it home for telework, should be reported immediately.

Social Media Caution

  • Posts featuring alarming content (e.g., smoke at the Pentagon) may be phishing attempts designed to steal personal information.

Common Access Card (CAC) Usage

  • CAC is not appropriate for photo identification in commercial settings; it is exclusive to government purposes.

Data Protection Practices

  • Automatic screen locking on mobile devices is essential for protecting sensitive data.

Suspicious Communications

  • If you receive unexpected messages about package deliveries, especially with links, it is safest to delete the message to avoid phishing attempts.

Home Computer Security

  • Enabling password protection on home computers is critical for security against unauthorized access.

Handling Sensitive Information

  • Sensitive Compartmented Information (SCI) must be retrieved properly from printers to prevent unauthorized access.

Physical Security Protocols

  • Best physical security practice includes using personal security badges or access codes to enter facilities.

Preventing Data Spillage

  • Never purge device memory before connecting to a classified network; this can lead to data spillage and unauthorized access.

Unclassified Data Controls

  • DoD unclassified data may still require specific access and distribution controls to maintain security.

Home Wireless Network Security

  • Avoid using preset router service set identifiers (SSIDs) and passwords; create unique ones for enhanced security.

Use of Classified Data

  • Classified data is permitted only in a Secure Compartmented Information Facility (SCIF).

Response to Potential Security Breaches

  • If sensitive information is potentially overheard, contact a security Point of Contact (POC) immediately with details.

Indicators of Malicious Code

  • Standard notifications for system updates are not indicators of a malicious code attack.

Insider Threat Indicators

  • Prolonged good performance does not necessarily indicate insider threat but requires vigilance in monitoring unusual behaviors.

Storing Government Media

  • Removable media should be stored in GSA-approved containers based on their security classification for protection.

Best Practice for Government Emails

  • Mass emails should be avoided to protect sensitive information and maintain communication integrity.

Appropriate Use of Removable Media

  • Encrypting data when using removable media is a best practice to prevent unauthorized access.

Risks of Removable Media

  • Many risks are associated with removable media usage, including potential data breaches if not handled securely.

Protected Health Information (PHI)

  • PHI is not classified as controlled unclassified information but is instead protected under health privacy laws.

Online Identity Formation

  • Online identity is shaped by various factors, including social media use, browsing habits, and personal disclosures.

Internet Browsing Safety

  • Accept cookies only from reputable and trusted websites to minimize security risks while browsing online.

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

More Like This

Confidential Document
8 questions

Confidential Document

EnergySavingDystopia4071 avatar
EnergySavingDystopia4071
Document Collaboration and Security Quiz
5 questions
Document Warning and Editing Risks
10 questions
Use Quizgecko on...
Browser
Browser