Podcast
Questions and Answers
Which of the following is permitted when using an unclassified laptop within a collateral classified space?
Which of the following is permitted when using an unclassified laptop within a collateral classified space?
- An unapproved mobile device
- A government issued tablet
- A government issued wired headset with microphone (correct)
- A personal laptop
Which of the following is a best practice for using government email?
Which of the following is a best practice for using government email?
- Share your email password with trusted colleagues
- Send mass e-mails to all contacts
- Use a personal email for official communications
- Do not send mass e-mails (correct)
Which of the following personally owned peripherals can you use with government-furnished equipment (GFE)?
Which of the following personally owned peripherals can you use with government-furnished equipment (GFE)?
- A personal printer
- A tablet
- A smartphone
- A USB hub (correct)
Which of the following is NOT a best practice for protecting data on a mobile device?
Which of the following is NOT a best practice for protecting data on a mobile device?
You receive a phone call offering you a $50 gift card if you participate in a survey. What course of action should you take?
You receive a phone call offering you a $50 gift card if you participate in a survey. What course of action should you take?
Which of the following is NOT a way that malicious code can spread?
Which of the following is NOT a way that malicious code can spread?
Which of the following is NOT a best practice for protecting your home wireless network for telework?
Which of the following is NOT a best practice for protecting your home wireless network for telework?
What is an example of a strong password?
What is an example of a strong password?
Which of the following is least likely to pose a risk to share on a social networking site?
Which of the following is least likely to pose a risk to share on a social networking site?
Carl receives an e-mail about a potential health risk caused by a common ingredient in processed food. Which of the following actions should Carl NOT take with the e-mail?
Carl receives an e-mail about a potential health risk caused by a common ingredient in processed food. Which of the following actions should Carl NOT take with the e-mail?
Where are you permitted to use classified data?
Where are you permitted to use classified data?
Which of the following is an appropriate use of DoD Public Key Infrastructure (PKI) token?
Which of the following is an appropriate use of DoD Public Key Infrastructure (PKI) token?
How can you protect your home computer?
How can you protect your home computer?
Which of the following is true of transmitting or transporting Sensitive Compartmented Information (SCI)?
Which of the following is true of transmitting or transporting Sensitive Compartmented Information (SCI)?
Which of the following is permitted within a Sensitive Compartmented Information SCIF?
Which of the following is permitted within a Sensitive Compartmented Information SCIF?
Does Sylvia pose a security concern while commuting?
Does Sylvia pose a security concern while commuting?
How can you prevent viruses and malicious code?
How can you prevent viruses and malicious code?
What concern does the email from Carl's boss pose?
What concern does the email from Carl's boss pose?
What conditions are necessary to be granted access to Sensitive Compartmented Information (SCI)?
What conditions are necessary to be granted access to Sensitive Compartmented Information (SCI)?
When linked to a specific individual, which of the following is NOT an example of Personally Identifiable Information (PII)?
When linked to a specific individual, which of the following is NOT an example of Personally Identifiable Information (PII)?
Which of the following is best practice to protect your identity?
Which of the following is best practice to protect your identity?
Which of the following is true of spillage?
Which of the following is true of spillage?
Which of the following is a risk associated with removable media?
Which of the following is a risk associated with removable media?
Based on the description provided, how many insider threat indicators are present for Elyse?
Based on the description provided, how many insider threat indicators are present for Elyse?
How can you protect your home computer?
How can you protect your home computer?
Flashcards
Classified Laptop Headset
Classified Laptop Headset
Use a government-issued wired headset with microphone for unclassified laptops in classified spaces.
Mass Emails from Govt.
Mass Emails from Govt.
Avoid sending large emails from government accounts to protect against overload and breaches.
USB Hub for GFE
USB Hub for GFE
A USB hub is acceptable personal device for Government Furnished Equipment (GFE).
Automatic Screen Lock
Automatic Screen Lock
Signup and view all the flashcards
Unsolicited Phone Calls
Unsolicited Phone Calls
Signup and view all the flashcards
External File Scanning
External File Scanning
Signup and view all the flashcards
Printed SCI Retrieval
Printed SCI Retrieval
Signup and view all the flashcards
SCI Access Requirements
SCI Access Requirements
Signup and view all the flashcards
Unverified Health Emails
Unverified Health Emails
Signup and view all the flashcards
Strong Password Example
Strong Password Example
Signup and view all the flashcards
Annual Credit Report
Annual Credit Report
Signup and view all the flashcards
Router SSID/Password
Router SSID/Password
Signup and view all the flashcards
Spear Phishing Emails
Spear Phishing Emails
Signup and view all the flashcards
Removable Media Risks
Removable Media Risks
Signup and view all the flashcards
Insider Threat Assessment
Insider Threat Assessment
Signup and view all the flashcards
Social Engineering Caution
Social Engineering Caution
Signup and view all the flashcards
Study Notes
Cybersecurity Best Practices
- Use a government-issued wired headset with microphone for unclassified laptops in classified spaces to maintain security protocols.
- Avoid sending mass emails from government accounts to prevent information overload and potential security breaches.
- A USB hub is an acceptable personally owned peripheral for use with Government Furnished Equipment (GFE).
Mobile Device Security
- Do not disable automatic screen locking on mobile devices; this feature is essential for data protection.
- Be cautious with unsolicited phone calls offering gifts; they may be attempts at social engineering. Always decline such offers.
Data Protection Strategies
- Regularly scan external files before uploading to your computer to prevent viruses and malicious code.
- Printed Sensitive Compartmented Information (SCI) must be promptly retrieved from printers to maintain document confidentiality.
Handling Sensitive Information
- Access to SCI requires Top Secret clearance and indoctrination into the SCI program, ensuring only authorized personnel handle sensitive data.
- It is inappropriate to forward unverified emails regarding health risks, as they may spread misinformation.
Password Security
- A strong example of a password is "d+Uf_4RimUz," showcasing the importance of complexity in password creation.
- To safeguard online identity, ordering a credit report annually is highly recommended.
Wireless Network Safety
- Avoid using pre-set router SSIDs and passwords for home wireless networks to enhance security against unauthorized access.
Recognizing Phishing Attempts
- Emails from unknown personal addresses requesting urgent information may represent spear phishing attempts; verify with known contact methods.
Removable Media Risks
- Using removable media can introduce malicious code and compromise system integrity, confidentiality, and availability.
Insider Threat Indicators
- Assessing insider threats requires careful observation; in the provided example, Elyse shows no indicators of risk.
Social Engineering Awareness
- Sharing innocuous personal information, like a pet’s name, is typically low-risk, but caution is still advised on social networking sites.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.
Description
Test your knowledge with these flashcards focused on the DoD Cyber Awareness Challenge 2024. Each card highlights important best practices and guidelines for using government equipment and email. Perfect for anyone preparing for cybersecurity awareness in a military context.