DoD Cyber Awareness Challenge 2024 Flashcards
25 Questions
169 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

Which of the following is permitted when using an unclassified laptop within a collateral classified space?

  • An unapproved mobile device
  • A government issued tablet
  • A government issued wired headset with microphone (correct)
  • A personal laptop

Which of the following is a best practice for using government email?

  • Share your email password with trusted colleagues
  • Send mass e-mails to all contacts
  • Use a personal email for official communications
  • Do not send mass e-mails (correct)

Which of the following personally owned peripherals can you use with government-furnished equipment (GFE)?

  • A personal printer
  • A tablet
  • A smartphone
  • A USB hub (correct)

Which of the following is NOT a best practice for protecting data on a mobile device?

<p>Disable automatic screen locking after a period of inactivity (D)</p> Signup and view all the answers

You receive a phone call offering you a $50 gift card if you participate in a survey. What course of action should you take?

<p>Decline to participate in the survey.</p> Signup and view all the answers

Which of the following is NOT a way that malicious code can spread?

<p>Running a virus scan (B)</p> Signup and view all the answers

Which of the following is NOT a best practice for protecting your home wireless network for telework?

<p>Use your router's pre-set Service Set Identifier (SSID) and password (D)</p> Signup and view all the answers

What is an example of a strong password?

<p>d+Uf_4RimUz</p> Signup and view all the answers

Which of the following is least likely to pose a risk to share on a social networking site?

<p>Your pet's name (B)</p> Signup and view all the answers

Carl receives an e-mail about a potential health risk caused by a common ingredient in processed food. Which of the following actions should Carl NOT take with the e-mail?

<p>Forward it (D)</p> Signup and view all the answers

Where are you permitted to use classified data?

<p>Only in SCIF.</p> Signup and view all the answers

Which of the following is an appropriate use of DoD Public Key Infrastructure (PKI) token?

<p>Use a token approved for SIPRNet on SIPRNet (C)</p> Signup and view all the answers

How can you protect your home computer?

<p>Regularly back up your files.</p> Signup and view all the answers

Which of the following is true of transmitting or transporting Sensitive Compartmented Information (SCI)?

<p>Printed SCI must be retrieved promptly from the printer (B)</p> Signup and view all the answers

Which of the following is permitted within a Sensitive Compartmented Information SCIF?

<p>An authorized Government-owned Portable Electronic Device (PED) (A)</p> Signup and view all the answers

Does Sylvia pose a security concern while commuting?

<p>Yes.</p> Signup and view all the answers

How can you prevent viruses and malicious code?

<p>Scan all external files before uploading to your computer.</p> Signup and view all the answers

What concern does the email from Carl's boss pose?

<p>This may be a spear phishing attempt.</p> Signup and view all the answers

What conditions are necessary to be granted access to Sensitive Compartmented Information (SCI)?

<p>Top Secret clearance and indoctrination into the SCI program.</p> Signup and view all the answers

When linked to a specific individual, which of the following is NOT an example of Personally Identifiable Information (PII)?

<p>Automobile make and model (D)</p> Signup and view all the answers

Which of the following is best practice to protect your identity?

<p>Order a credit report annually (A)</p> Signup and view all the answers

Which of the following is true of spillage?

<p>It can be either inadvertent or intentional (B)</p> Signup and view all the answers

Which of the following is a risk associated with removable media?

<p>ALL OF THESE (D)</p> Signup and view all the answers

Based on the description provided, how many insider threat indicators are present for Elyse?

<p>0 (Zero).</p> Signup and view all the answers

How can you protect your home computer?

<p>Turn on the password feature.</p> Signup and view all the answers

Flashcards

Classified Laptop Headset

Use a government-issued wired headset with microphone for unclassified laptops in classified spaces.

Mass Emails from Govt.

Avoid sending large emails from government accounts to protect against overload and breaches.

USB Hub for GFE

A USB hub is acceptable personal device for Government Furnished Equipment (GFE).

Automatic Screen Lock

Keep automatic screen locking enabled on mobile devices for data protection.

Signup and view all the flashcards

Unsolicited Phone Calls

Decline unsolicited offers of gifts from unknown callers; this is social engineering.

Signup and view all the flashcards

External File Scanning

Scan external files before uploading to prevent viruses.

Signup and view all the flashcards

Printed SCI Retrieval

Immediately retrieve printed Sensitive Compartmented Information (SCI) from printers.

Signup and view all the flashcards

SCI Access Requirements

Top Secret clearance and SCI program indoctrination is needed to access Sensitive Compartmented Information (SCI).

Signup and view all the flashcards

Unverified Health Emails

Do not forward unverified emails about health risks; misinformation can spread.

Signup and view all the flashcards

Strong Password Example

A complex password, like 'd+Uf_4RimUz', is crucial for online security.

Signup and view all the flashcards

Annual Credit Report

Order a credit report annually to maintain online safety.

Signup and view all the flashcards

Router SSID/Password

Do not use predefined router settings to avoid unauthorized access.

Signup and view all the flashcards

Spear Phishing Emails

Emails from unknown senders requesting urgent information may be spear phishing attempts.

Signup and view all the flashcards

Removable Media Risks

Removable media can introduce malicious code, compromising security.

Signup and view all the flashcards

Insider Threat Assessment

Carefully evaluate potential insider threats; in the example, Elyse was deemed low-risk

Signup and view all the flashcards

Social Engineering Caution

Avoid sharing personal information, like pet names, on social media, although low-risk in most cases.

Signup and view all the flashcards

Study Notes

Cybersecurity Best Practices

  • Use a government-issued wired headset with microphone for unclassified laptops in classified spaces to maintain security protocols.
  • Avoid sending mass emails from government accounts to prevent information overload and potential security breaches.
  • A USB hub is an acceptable personally owned peripheral for use with Government Furnished Equipment (GFE).

Mobile Device Security

  • Do not disable automatic screen locking on mobile devices; this feature is essential for data protection.
  • Be cautious with unsolicited phone calls offering gifts; they may be attempts at social engineering. Always decline such offers.

Data Protection Strategies

  • Regularly scan external files before uploading to your computer to prevent viruses and malicious code.
  • Printed Sensitive Compartmented Information (SCI) must be promptly retrieved from printers to maintain document confidentiality.

Handling Sensitive Information

  • Access to SCI requires Top Secret clearance and indoctrination into the SCI program, ensuring only authorized personnel handle sensitive data.
  • It is inappropriate to forward unverified emails regarding health risks, as they may spread misinformation.

Password Security

  • A strong example of a password is "d+Uf_4RimUz," showcasing the importance of complexity in password creation.
  • To safeguard online identity, ordering a credit report annually is highly recommended.

Wireless Network Safety

  • Avoid using pre-set router SSIDs and passwords for home wireless networks to enhance security against unauthorized access.

Recognizing Phishing Attempts

  • Emails from unknown personal addresses requesting urgent information may represent spear phishing attempts; verify with known contact methods.

Removable Media Risks

  • Using removable media can introduce malicious code and compromise system integrity, confidentiality, and availability.

Insider Threat Indicators

  • Assessing insider threats requires careful observation; in the provided example, Elyse shows no indicators of risk.

Social Engineering Awareness

  • Sharing innocuous personal information, like a pet’s name, is typically low-risk, but caution is still advised on social networking sites.

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

Description

Test your knowledge with these flashcards focused on the DoD Cyber Awareness Challenge 2024. Each card highlights important best practices and guidelines for using government equipment and email. Perfect for anyone preparing for cybersecurity awareness in a military context.

More Like This

Use Quizgecko on...
Browser
Browser