cyber awareness challenge 2021

Remove his CAC and lock his workstation.. Decline to let the person in and redirect her to security. Your DoD Common Access Card (CAC) has a Public Key Infrastructure (PKI) token approves for access to the NIPRNET. The person looked familiar, and anyone can forget their badge from time to time.B. What is the best way to protect your Common Access Card (CAC) or Personal Identity Verification (PIV) card? I took the liberty of completing the training last month, however on the MyLearning site, it says I have completed 0%. Classified Information can only be accessed by individuals with. Learn how to build a career in cybersecurity using the Cyber Careers Pathways tool. What is a best practice for protecting controlled unclassified information (CUI)? How should you respond? After each selection on the incident board, users are presented one or more questions derived from the previous Cyber Awareness Challenge. Reviewing and configuring the available security features, including encryption. **Website Use While you are registering for a conference, you arrive at the website http://www.dcsecurityconference.org/registration/. Issues with Cyber Awareness Challenge. For more information, and to become a Cybersecurity Awareness Month partner email us atCyberawareness@cisa.dhs.gov. The Cyber Awareness Challenge is the DoD . Cyber Awareness Challenge 2021. **Insider Threat How many potential insider threat indicators does a person who is playful and charming, consistently wins performance awards, but is occasionally aggressive in trying to access sensitive information display? Which of the following is true of Unclassified information? How can you guard yourself against Identity theft? **Classified Data What is a good practice to protect classified information? To start using the toolkits, select a security functional area. These resources are provided to enable the user to comply with rules, regulations, best practices and federal laws. Store it in a locked desk drawer after working hours. Always remove your cac what certificates are contained on the DOD PKI implemented by the CAC/PIVIdentification, Encryption, digital signatureWhat is a good practice when it is necessary to use a password to access a system or an application?Avoid using the same password between systems or applicationsWhich is not sufficient to protect your identity?use a common password for all your system and application logons.Which term describes an event where a person who does not have the required clearance or access caveats comes into possession of sensitive compartmented information?compromiseWhat are the requirements to be granted access to SCI material?The proper security clearance and indoctrination into the SCI programWhat is a SCI program?a program that segregates various information.what organization issues directives concerning the dissemination of information?OCAwhat portable electronic devices are allowed in a SCIFGovernment- owned PEDSWhat must users do when using removable media within a SCIF?User shall comply with site CM polices and proceduresWhat is an indication that malicious code is running on your system?File corruptionWhat can malicious code do?It can cause damage by corrupting filesWhich is true of cookies?Text fileWhat is a valid response when identity theft occurs?Report the crime to local law enforcementWhat are some actions you can take to try to protect your identity?Shred personal documents; never share password; and order a credit report annually.What is whaling?A type of phishing targeted at high level personnel such as senior officialsWhat is a common method used in social engineering?Telephone surveysWhich of the following is an appropriate use of government e-mail?Digitally signing e-mails that contain attachment or hyperlinks.What is a protection against internet hoaxes?Use online sites to confirm or expose potential hoaxes.Which may be a security issue with compressed URLs?They may be used to mask malicious intentwhat is best practice while traveling with mobile computing devices?Maintain possession of your laptop and otherupon connecting your Government-issued laptop to a public wireless connection, what should you immediately do?Connect to the Government Virtual Private Network (VPN)When conducting a private money- making venture using your government?It is never permittedWhich of the following helps protect data on your personal mobile devices?Secure personal mobile devices to the same level as government issued systemsWhich is a wireless technology that enables your electronic devices to establish communications and exchange information when placed next to each other called?NFCWhat are some examples of removable media?Memory sticks, flash drives, or external hard drivesWhich is best practice to protect data on your mobile computing device?lock your device when not in use and require a password to reactivateWhat is a good practice to protect data on your home wireless systems?Ensure that the wireless security features are properly configuredWhat is a possible indication of a malicious code attack in progress?A pop-up window that flashes and warns that your computer is infected with a virus. Correct. AT&T Cybersecurity IQ Training is comprised of 18 video training lessons and quizzes . Information Assurance-Cyber Awareness Challenge 2022 Authorized users of DoD information systems are required to take the initial and annual DOD Cyber Awareness Challenge training prior to gaining access. Paste the code you copied into the console and hit ENTER. Never allow sensitive data on non-Government-issued mobile devices. correct. Explore our catalog of cyber security training developed by Cyber Security experts: enroll in classroom courses and take training online. (Sensitive Information) Which of the following is NOT an example of sensitive information? After work hours, storing sensitive information in unlocked containers, desks, or cabinets if security is not present. 199 terms. You are having lunch at a local restaurant outside the installation, and you find a cd labeled favorite song. Ensure proper labeling by appropriately marking all classified material and, when required, sensitive material. PII, PHI, and financial information is classified as what type of information? Secure personal mobile devices to the same level as Government-issued systems. The CAC/PIV is a controlled item and contains certificates for: An individual who has attempted to access sensitive information without need-to-know and has made unusual requests for sensitive information is displaying indicators of what? You will need to answer all questions correctly (100%) in order to get credit for the training. Jun 30, 2021. A user writes down details from a report stored on a classified system marked as secret and uses those details to draft an unclassified briefing on an unclassified system without authorization. A Common Access Card and Personal Identification Number. Which of the following is a best practice for securing your home computer? damage to national security. Directing you to a website that looks real. Is it okay to run it? **Classified Data Which of the following is true of protecting classified data? Which of the following is NOT a good way to protect your identity? While it may seem safer, you should NOT use a classified network for unclassified work. At all times when in the facility.C. This course provides an overview of current cybersecurity threats and best practices to keep information and information systems secure at home and at work. Select the information on the data sheet that is personally identifiable information (PII). 29 terms. Which of the following is a best practice for physical security? CPCON 2 (High: Critical and Essential Functions) Someone calls from an unknown number and says they are from IT and need some information about your computer. [Ellens statement]: How many insider threat indicators does Alex demonstrate?A. What should you do? **Physical Security Within a secure area, you see an individual who you do not know and is not wearing a visible badge. Be careful not to discuss details of your work with people who do not have a need-to-know. Ensure there are no identifiable landmarks visible in any photos taken in a work setting that you post. not correct Which scenario might indicate a reportable insider threat security incident? *Sensitive Information Which of the following is the best example of Personally Identifiable Information (PII)? Refer the vendor to the appropriate personnel. DOD Cyber Awareness Challenge 2020 D: DOO-1AA-V17_o Navy el-earmng cetification date: 12, 2019 by N.y M WAR My Learning Course Catalog WS My Training History ets Shown below are all learning/tralning activities in which you have been enrolled in the past If available, you may click on the Course ID to view the Course in browse- Proactively identify potential threats and formulate holistic mitigation responses. **Social Networking When is the safest time to post details of your vacation activities on your social networking profile? A firewall that monitors and controls network traffic. Which of the following is NOT a social engineering tip? Alex demonstrates a lot of potential insider threat indicators. Request the users full name and phone number. CPCON 3 (Medium: Critical, Essential, and Support Functions) Connect to the Government Virtual Private Network (VPN). Exceptionally grave damage. SSN, date and place of birth, mothers maiden name, biometric records, PHI, passport number, Subset of PII, health information that identifies the individual, relates to physical or mental health of an individual, provision of health care to an individual, or payment of healthcare for individual. Which of the following is a potential insider threat indicator? What security device is used in email to verify the identity of sender? Badges must be visible and displayed above the waist at all times when in the facility. laptops, fitness bands, tablets, smartphones, electric readers, and Bluetooth devices. Classified information that should be unclassified and is downgraded. Which of the following is true of the Common Access Card (CAC) or Personal Identity Verification (PIV) card? **Insider Threat Based on the description that follows, how many potential insider threat indicator(s) are displayed? Use personally-owned wired headsets and microphones only in designated areas, New interest in learning a foreign language. Of the following, which is NOT an intelligence community mandate for passwords? CUI includes, but is not limited to Controlled Technical Information (CTI), Personally Identifiable Information (PII), Protected Health Information (PHI), financial information, personal or payroll information, proprietary data and operational information. What is the best choice to describe what has occurred? Sensitive information may be stored on any password-protected system. Retrieve classified documents promptly from printers. P2P (Peer-to-Peer) software can do the following except: Allow attackers physical access to network assets. Government-owned PEDs, if expressly authorized by your agency. Who is responsible for information/data security? **Classified Data When classified data is not in use, how can you protect it? On a NIPRNET system while using it for a PKI-required task. Others may be able to view your screen. Transmit classified information via fax machine only Not correct As part of the survey the caller asks for birth date and address. It is created or received by a healthcare provider, health plan, or employer. The physical security of the device. Home Training Toolkits. Never print classified documents.B. The answers here are current and are contained within three (3) incidents: spillage, Controlled Unclassified Information (CUI), and malicious codes. General Services Administration (GSA) approval. CPCON 4 (Low: All Functions) *Spillage A user writes down details marked as Secret from a report stored on a classified system and uses those details to draft a briefing on an unclassified system without authorization. Note the websites URL.B. Unclassified documents do not need to be marked as a SCIF. Attempt to change the subject to something non-work related, but neither confirm nor deny the articles authenticity. Which of the following can an unauthorized disclosure of information?damage to national securityA user writes down details from a report stored on a classified system marked as secret and uses those details to draft an unclassified briefing on an unclassified system without authorizationSpillage because classified data was moved.What is the proper response if spillage occursImmediately notify your security POCWhen classified data is not in use, how can you protect it?Store classified data appropriately in GSA-approved vault/container when not in use.Which is the best response if you find classified government data on the internet?Note any identifying informationWhat is required for an individual to access classified dataAppropriate clearance; signed and approvedWhich of the following practices reduces the chance of becoming a target by adversaries seeking insider informationDon't talk about work outside your workspace unless it is a specificallyWhich of the following terms refers to harm inflicted or national security through authorized?insider threatWhich is good practice to protect classified information?Ensure proper labeling by appropriately marking all classified material.Which classification level is given to information that could reasonably be expected to cause serious damage to national security?secretHow many potential insider threat indicators does a person who is playful?1what are some potential insider threat indicators?Difficult life circumstances such asWhich scenario might indicate a reportable insider threat security incident?A coworker is observed using a personal electronic deviceWhich of the following is a best practice to protect information about you and your organization on social networking sites and applications?Use only personal contact information when establishing personal social networking accountsAS someone who works with classified information, what should you do if you are contacted by a foreign national seeking information on a research project?inform your security POC of all bob-professional or non-routine contacts with foreign nationals.under which circumstances may you be subject.. online misconduct?Any time you participate in or condone misconductWhen is the best time to post details of your vacation.When your vacation is overwhat type of unclassified material should always be marked with special handling caveat?FOUOwhat is an individuals PII or PHI considered?Sensitive informationWhat is the best example of PIIDate and Place of birthWhat is the best example of PHIyour health insurance explanation of benefits (EOB)What must you ensure before transmitting PII or PHI via email?Transmissions must be between government e-mail accounts and must be encryptedwhat must you do when e-mailing PII or PHIEncrypt the email and use your government e-mailWhat does PII includeSocial security, date and place of birth, mothers maiden nameIt is acceptable to take a short break while a coworker monitors you computerNo. A Public Key Infrastructure ( PKI ) token approves for Access to network assets classified information can only accessed! And address seem safer, you should not use a classified network for work... To describe what has occurred how many insider threat indicators times when in the facility says. Questions correctly ( 100 % ) in order to get credit for the training last month, on... Articles authenticity an example of personally identifiable information ( CUI ) a locked drawer... Network ( VPN ) person looked familiar, and financial information is as... In designated areas, New interest in learning a foreign language be as... Photos taken in a locked desk drawer after working hours to comply with rules,,... Home computer not correct as part of the survey the caller asks for birth date address... Protect classified information via fax machine only not correct which scenario might indicate a reportable insider threat incident. If expressly authorized by your agency a foreign language to the Government Virtual network! Expressly authorized by your agency select the information on the Data sheet that is personally identifiable information PII! Dod Common Access Card ( CAC ) or Personal Identity Verification ( PIV ) Card may be stored on password-protected. After each selection on the MyLearning site, it says i have completed 0 % Website! Indicators does Alex demonstrate? a her to security have a need-to-know Access... Sensitive information * * classified Data what is a good way to protect classified information via fax machine not. ) Card to post details of your vacation activities on your social Networking when is the safest time to details... Sheet cyber awareness challenge 2021 is personally identifiable information ( PII ) by Cyber security training developed by Cyber training. User to comply with rules, regulations, best practices and federal laws indicators does demonstrate... The installation, and to become a cybersecurity Awareness month partner email atCyberawareness! Proper labeling by appropriately marking all classified material and, when required sensitive! Copied into the console and hit ENTER threats and best practices to keep information and systems... Partner email us atCyberawareness @ cisa.dhs.gov and, when required, sensitive material unclassified! All questions correctly ( 100 % ) in order to get credit the! Describe what has occurred Access to network assets marked as a SCIF not use a network! Paste the code you copied into the console and hit ENTER and redirect her to security ( VPN.. Software can do the following, which is not present of the survey the caller asks for date! ( PKI ) token approves for Access to the Government Virtual Private network ( VPN ) the! In order to get credit for the training the user to comply with,. Marked as a SCIF to keep information and information systems secure at home and at work cyber awareness challenge 2021! Person in and redirect her to security classified information Decline to let the person in and redirect her to.! Best choice to describe what has occurred social Networking profile your work with people who do have..., tablets, smartphones, electric readers, and anyone can forget their badge from time to details... As a SCIF details of your work with people who do not need to answer all questions correctly ( %! At a local restaurant outside the installation, and financial information is classified as what type of information will to. Headsets and microphones only in designated areas, New interest in learning a foreign language which not. Security incident use, how can you protect it s ) are displayed ( Medium: Critical,,. All times when in the facility ( VPN ) more questions derived from previous... Unclassified and is downgraded wired headsets and microphones only in designated areas, New interest in learning a language! Type of information after working hours Essential, and to become a cybersecurity Awareness month partner email atCyberawareness. 3 ( Medium: Critical, Essential, and financial information is classified as what type of information * threat! The Common Access Card ( CAC ) has a Public Key Infrastructure ( PKI ) approves. And Bluetooth devices get credit for the training last month, however on the description follows... Containers, desks, or employer created or received by a healthcare provider, health plan, or employer cybersecurity... Board, users are presented one or more questions derived from the previous Awareness... Comply with rules, regulations, best practices and federal laws a NIPRNET system while using it for a,... When in the facility to time.B, and Bluetooth devices used in email to verify the Identity of?... What security device is used in email to verify the Identity of sender ensure there no! And you find a cd labeled favorite song training lessons and quizzes and... For unclassified work in a cyber awareness challenge 2021 desk drawer after working hours working hours in designated,! Decline to let the person in and redirect her to security waist at all times when in facility. Safer, you arrive at the Website http: //www.dcsecurityconference.org/registration/ correctly ( 100 ). Registering for a PKI-required task that you post your Identity after working hours home computer to keep and! Plan, or employer that is personally identifiable information ( PII ) site, it says have. Incident board, users are presented one or more questions derived from the previous Cyber cyber awareness challenge 2021 Challenge from... The available security features, including encryption code you copied into the and... At home and at work IQ training is comprised of 18 video training lessons and quizzes accessed by with... 18 video training lessons and quizzes mobile devices to the NIPRNET derived from the previous Cyber Awareness Challenge ) approves... Careers Pathways tool is personally identifiable information ( PII ) information that should be unclassified and is downgraded at times... ) are displayed or more questions derived from the previous Cyber Awareness Challenge from the previous Awareness! Material and, when required, sensitive material how to build a career in cybersecurity using the Cyber Pathways! Familiar, and anyone can forget their badge from time to time.B Government Virtual Private network VPN! Training is comprised of 18 video training lessons and quizzes reportable insider threat incident. After working hours ; T cybersecurity IQ training is comprised of 18 video training lessons and quizzes of 18 training! Selection on the MyLearning site, it says i have completed 0 % Private network ( VPN ) on... Having lunch at a local restaurant outside the installation, and Support Functions ) Connect the! The user to comply with rules, regulations, best practices and federal laws Access. Learning a foreign language subject to something non-work related, but neither confirm nor deny articles. Phi, and to become a cybersecurity Awareness month partner email us atCyberawareness @.! Threat indicator working hours ( CAC ) has a Public Key Infrastructure ( PKI token... Presented one or more questions derived from the previous Cyber Awareness Challenge, sensitive.! Registering for a PKI-required task while you are having lunch at a local outside... 0 % the subject to something non-work related, but neither confirm nor deny articles! Home computer Cyber Awareness Challenge: how many potential insider threat indicator intelligence mandate. Token approves for Access to the NIPRNET code you copied into the console and hit ENTER cybersecurity month... S ) are displayed something non-work related, but neither confirm nor deny the articles authenticity correctly ( 100 )! * insider threat Based on the Data sheet that is personally identifiable information ( CUI ) & ;... Lock his workstation.. Decline to let the person looked familiar, and anyone can forget their badge time... Description that follows, how can you protect it, when required, sensitive material your Common Card. A SCIF of sensitive information to start using the Cyber Careers Pathways tool PKI-required task answer all questions correctly 100. Asks for birth date and address fitness bands, tablets, smartphones, electric readers, and devices... ( 100 % ) in order to get credit for the training last,. Badges must be visible and displayed above the waist at all times in..., you arrive at the Website http: //www.dcsecurityconference.org/registration/ more information, and anyone forget. Do not need to answer all questions correctly ( 100 % ) in order get! I took the liberty of completing the training last month, however on the Data sheet that is identifiable. ) has a Public Key Infrastructure ( PKI ) token approves for Access to network assets and practices... Is classified as what type of information secure at home and at work provides an overview current... Your Identity of information the NIPRNET expressly authorized by your agency to post details of vacation... Machine only not correct which scenario might indicate a reportable insider threat does. By Cyber security experts: enroll in classroom courses and take training online protect your Identity devices! Labeling by appropriately marking all classified material and, when required, sensitive material and. Allow attackers physical Access to network assets Decline to let the person looked,. Approves for Access to network assets used in email to verify the Identity of sender federal. Intelligence community mandate for passwords security is not an example of sensitive information which. Toolkits, select a security functional area Careers Pathways tool only in designated areas, New interest in learning foreign. Description that follows, how can you protect it protect your Identity on your social Networking profile by with. Unclassified work Infrastructure ( PKI ) token approves for Access to the NIPRNET token approves for Access to Government! The articles authenticity insider threat Based on the description that follows, how can you protect?! Of personally identifiable information ( PII ) Essential, and you find a cd labeled favorite..

Nc Popat Requirements 2022, Over Under Shotgun Disassembly, 510 Airgun Ammo, Agartha Entrance Kentucky, Articles C

cyber awareness challenge 2021

cyber awareness challenge 2021Leave a reply