Podcast
Questions and Answers
Which of the following is permitted when using an unclassified laptop within a collateral classified space?
Which of the following is permitted when using an unclassified laptop within a collateral classified space?
Which of the following is a best practice for using government email?
Which of the following is a best practice for using government email?
Which of the following personally owned peripherals can you use with government-furnished equipment (GFE)?
Which of the following personally owned peripherals can you use with government-furnished equipment (GFE)?
Which of the following is NOT a best practice for protecting data on a mobile device?
Which of the following is NOT a best practice for protecting data on a mobile device?
Signup and view all the answers
You receive a phone call offering you a $50 gift card if you participate in a survey. What course of action should you take?
You receive a phone call offering you a $50 gift card if you participate in a survey. What course of action should you take?
Signup and view all the answers
Which of the following is NOT a way that malicious code can spread?
Which of the following is NOT a way that malicious code can spread?
Signup and view all the answers
Which of the following is NOT a best practice for protecting your home wireless network for telework?
Which of the following is NOT a best practice for protecting your home wireless network for telework?
Signup and view all the answers
What is an example of a strong password?
What is an example of a strong password?
Signup and view all the answers
Which of the following is least likely to pose a risk to share on a social networking site?
Which of the following is least likely to pose a risk to share on a social networking site?
Signup and view all the answers
Carl receives an e-mail about a potential health risk caused by a common ingredient in processed food. Which of the following actions should Carl NOT take with the e-mail?
Carl receives an e-mail about a potential health risk caused by a common ingredient in processed food. Which of the following actions should Carl NOT take with the e-mail?
Signup and view all the answers
Where are you permitted to use classified data?
Where are you permitted to use classified data?
Signup and view all the answers
Which of the following is an appropriate use of DoD Public Key Infrastructure (PKI) token?
Which of the following is an appropriate use of DoD Public Key Infrastructure (PKI) token?
Signup and view all the answers
How can you protect your home computer?
How can you protect your home computer?
Signup and view all the answers
Which of the following is true of transmitting or transporting Sensitive Compartmented Information (SCI)?
Which of the following is true of transmitting or transporting Sensitive Compartmented Information (SCI)?
Signup and view all the answers
Which of the following is permitted within a Sensitive Compartmented Information SCIF?
Which of the following is permitted within a Sensitive Compartmented Information SCIF?
Signup and view all the answers
Does Sylvia pose a security concern while commuting?
Does Sylvia pose a security concern while commuting?
Signup and view all the answers
How can you prevent viruses and malicious code?
How can you prevent viruses and malicious code?
Signup and view all the answers
What concern does the email from Carl's boss pose?
What concern does the email from Carl's boss pose?
Signup and view all the answers
What conditions are necessary to be granted access to Sensitive Compartmented Information (SCI)?
What conditions are necessary to be granted access to Sensitive Compartmented Information (SCI)?
Signup and view all the answers
When linked to a specific individual, which of the following is NOT an example of Personally Identifiable Information (PII)?
When linked to a specific individual, which of the following is NOT an example of Personally Identifiable Information (PII)?
Signup and view all the answers
Which of the following is best practice to protect your identity?
Which of the following is best practice to protect your identity?
Signup and view all the answers
Which of the following is true of spillage?
Which of the following is true of spillage?
Signup and view all the answers
Which of the following is a risk associated with removable media?
Which of the following is a risk associated with removable media?
Signup and view all the answers
Based on the description provided, how many insider threat indicators are present for Elyse?
Based on the description provided, how many insider threat indicators are present for Elyse?
Signup and view all the answers
How can you protect your home computer?
How can you protect your home computer?
Signup and view all the answers
Study Notes
Cybersecurity Best Practices
- Use a government-issued wired headset with microphone for unclassified laptops in classified spaces to maintain security protocols.
- Avoid sending mass emails from government accounts to prevent information overload and potential security breaches.
- A USB hub is an acceptable personally owned peripheral for use with Government Furnished Equipment (GFE).
Mobile Device Security
- Do not disable automatic screen locking on mobile devices; this feature is essential for data protection.
- Be cautious with unsolicited phone calls offering gifts; they may be attempts at social engineering. Always decline such offers.
Data Protection Strategies
- Regularly scan external files before uploading to your computer to prevent viruses and malicious code.
- Printed Sensitive Compartmented Information (SCI) must be promptly retrieved from printers to maintain document confidentiality.
Handling Sensitive Information
- Access to SCI requires Top Secret clearance and indoctrination into the SCI program, ensuring only authorized personnel handle sensitive data.
- It is inappropriate to forward unverified emails regarding health risks, as they may spread misinformation.
Password Security
- A strong example of a password is "d+Uf_4RimUz," showcasing the importance of complexity in password creation.
- To safeguard online identity, ordering a credit report annually is highly recommended.
Wireless Network Safety
- Avoid using pre-set router SSIDs and passwords for home wireless networks to enhance security against unauthorized access.
Recognizing Phishing Attempts
- Emails from unknown personal addresses requesting urgent information may represent spear phishing attempts; verify with known contact methods.
Removable Media Risks
- Using removable media can introduce malicious code and compromise system integrity, confidentiality, and availability.
Insider Threat Indicators
- Assessing insider threats requires careful observation; in the provided example, Elyse shows no indicators of risk.
Social Engineering Awareness
- Sharing innocuous personal information, like a pet’s name, is typically low-risk, but caution is still advised on social networking sites.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.
Description
Test your knowledge with these flashcards focused on the DoD Cyber Awareness Challenge 2024. Each card highlights important best practices and guidelines for using government equipment and email. Perfect for anyone preparing for cybersecurity awareness in a military context.