cyber awareness challenge 2021

Use the appropriate token for each system. You know this project is classified. Government-owned PEDs must be expressly authorized by your agency. It does not require markings or distribution controls. **Insider Threat What advantages do insider threats have over others that allows them to cause damage to their organizations more easily? yzzymcblueone. NOTE: Malicious code can mask itself as a harmless email attachment, downloadable file, or website. The challenge's goal is . Which of the following is true of Sensitive Compartmented Information (SCI)? Cyber Awareness Challenge 2023. tell your colleague that it needs to be secured in a cabinet or container. You may use unauthorized software as long as your computers antivirus software is up-to-date. **Insider Threat What is an insider threat? What should be your response? While it may seem safer, you should NOT use a classified network for unclassified work. What is best practice while traveling with mobile computing devices? DOD Cyber Awareness 2021 (DOD. **Social Engineering Which may be a security issue with compressed Uniform Resource Locators (URLs)? A colleague abruptly becomes hostile and unpleasant after previously enjoying positive working relationships with peers, purchases an unusually expensive new car, and has unexplained absences from work. TwoD. Who can be permitted access to classified data? Ensure proper labeling by appropriately marking all classified material and, when required, sensitive material. Nothing. **Classified Data Which of the following is a good practice to protect classified information? *Sensitive Information Under what circumstances could classified information be considered a threat to national security? What is a possible indication of a malicious code attack in progress? (Malicious Code) What is a common indicator of a phishing attempt? What action should you take? Cyber Awareness Challenge 2021. Store classified data in a locked desk drawer when not in use Maybe How can you protect data on your mobile computing and portable electronic devices (PEDs)? [Spread]: How can you avoid downloading malicious code?A. [Incident]: What is the danger of using public Wi-Fi connections?A. Her badge is not visible to you. Confirm the individuals need-to-know and access. The email states your account has been compromised and you are invited to click on the link in order to reset your password. Which Cyber Protection Condition (CPCON) establishes a protection priority focus on critical functions only? In reality, once you select one of these, it typically installs itself without your knowledge. (Malicious Code) Which email attachments are generally SAFE to open? Continue Existing Session. Adversaries exploit social networking sites to disseminate fake news. NOTE: Being cognizant of classification markings and labeling practices are good strategies to avoid inadvertent spillage. *Insider Threat Which of the following is a reportable insider threat activity? **Mobile Devices What can help to protect the data on your personal mobile device? We thoroughly check each answer to a question to provide you with the most correct answers. Both of these.. How can you guard yourself against Identity theft? difficult life circumstances such as substance abuse, divided loyalty or allegiance to the U.S., and extreme, persistent interpersonal difficulties. At all times while in the facility. What type of data must be handled and stored properly based on classification markings and handling caveats? At any time during the workday, including when leaving the facility. What should you do? There are many travel tips for mobile computing. (Mobile Devices) When can you use removable media on a Government system? **Home Computer Security What should you consider when using a wireless keyboard with your home computer? Which of the following is NOT a criterion used to grant an individual access to classified data? Carrying his Social Security Card with him, DoD employees are prohibited from using a DoD CAC in card-reader-enabled public device, Assigned a classification level by a supervisor. Cookies may pose a security threat, particularly when they save unencrypted personal information. Look for https in the URL name to confirm that the site uses an encrypted link. What should you do? Note the websites URL.B. A colleague enjoys playing video games online, regularly use social media, and frequently forgets to secure her smartphone elsewhere before entering areas where it is prohibited. Following instructions from verified personnel. Your comments are due on Monday. Not correct. Your password and a code you receive via text message. Accepting the default privacy settings. Whether you have successfully completed the previous version or starting from scratch, these test answers are for you. View email in plain text and dont view email in Preview Pane. [Scene]: Which of the following is true about telework?A. Which scenario might indicate a reportable insider threat security incident? **Mobile Devices Which is a rule for removable media, other portable electronic devices (PEDs), and mobile computing devices to protect Government systems? Which of the following is a best practice to protect information about you and your organization on social networking sites and applications? What should you do? **Insider Threat What do insiders with authorized access to information or information systems pose? Of the following, which is NOT a method to protect sensitive information? Which of the following is NOT a correct way to protect CUI? 32 cfr 2002 controlled unclassified information. How should you protect your Common Access Card (CAC) or Personal Identity Verification (PIV) card? Fort Gordon, Georgia is home to the U.S. Army Cyber Center of Excellence and host to a multi-service community of Army, Navy, Air Force, Marines and multinational forces that has become a center for joint forces activities, training and operations. Coworker making consistent statements indicative of hostility or anger toward the United States in its policies. Note any identifying information, such as the websites URL, and report the situation to your security POC. (Home computer) Which of the following is best practice for securing your home computer? (social networking) Which of the following is a security best practice when using social networking sites? Monitor credit card statements for unauthorized purchases, Thumb drives, memory sticks, and flash drives are examples of. Overview: The Cyber Awareness Challenge serves as an annual refresher of security requirements, security best practices, and your security responsibilities. College Physics Raymond A. Serway, Chris Vuille. Bob, a coworker, has been going through a divorce, has financial difficulties and is displaying hostile behavior. Information Assurance Test Information Assurance Test Logged in as: OAM-L2CTBMLB USER LEVEL ACCESS Please answer each of the questions below by choosing ONE of the answer choices based on the information learned in the Cyber Awareness Challenge. How can you protect your organization on social networking sites? Note the websites URL and report the situation to your security point of contact. What type of security is part of your responsibility and placed above all else?, If your wireless device is improperly configured someone could gain control of the device? How can you protect yourself on social networking sites? *Sensitive Information What is the best example of Personally Identifiable Information (PII)? On a NIPRNet system while using it for a PKI-required task, Something you possess, like a CAC, and something you know, like a PIN or password. Which of the following is true of traveling overseas with a mobile phone. NOTE: You must have permission from your organization to telework. Appropriate clearance, a signed and approved non-disclosure agreement, and need-to-know, Insiders are given a level of trust and have authorized access to Government information systems. Your DoD Common Access Card (CAC) has a Public Key Infrastructure (PKI) token approves for access to the NIPRNET. Classified information that should be unclassified and is downgraded. Reviewing and configuring the available security features, including encryption. Use personally-owned wired headsets and microphones only in designated areas, New interest in learning a foreign language. Paul verifies that the information is CUI, includes a CUI marking in the subject header, and digitally signs an e-mail containing CUI. Since the URL does not start with "https", do not provide your credit card information. Correct. A vendor conducting a pilot program with your organization contacts you for organizational data to use in a prototype. What can be used to track Marias web browsing habits? correct. All of these. Personal information is inadvertently posted at a website. NOTE: Remember that leaked classified or controlled information is still classified or controlled even if it has already been compromised. **Insider Threat How many potential insider threat indicators does a person who is playful and charming, consistently wins performance awards, but is occasionally aggressive in trying to access sensitive information display? (Malicious Code) While you are registering for a conference, you arrive at the website http://www.dcsecurityconference.org/registration/. Only when badging inB. Badges must be visible and displayed above the waist at all times when in the facility. A colleague vacations at the beach every year, is married and a father of four, sometimes has poor work quality, and works well with his team. Note any identifying information and the websites Uniform Resource Locator (URL). Which of the following is a practice that helps to protect you from identity theft? Cyber Awareness Challenge - Course Launch Page. memory sticks, flash drives, or external hard drives. Which of the following best describes good physical security? Correct. When using your government-issued laptop in public environments, with which of the following should you be concerned? A colleague has visited several foreign countries recently, has adequate work quality, speaks openly of unhappiness with U.S. foreign policy, and recently had his car repossessed. **Identity Management Your DoD Common Access Card (CAC) has a Public Key Infrastructure (PKI) token approved for access to the NIPRNet. What information should you avoid posting on social networking sites? It is fair to assume that everyone in the SCIF is properly cleared. Which of the following is NOT a correct way to protect sensitive information? Media containing Privacy Act information, PII, and PHI is not required to be labeled. In addition to avoiding the temptation of greed to betray his country, what should Alex do differently? Which of the following is true of Unclassified information? Which of the following is NOT a requirement for telework? [Alexs statement]: In addition to avoiding the temptation of greed to betray his country, what should Alex do differently?A. Alex demonstrates a lot of potential insider threat indicators. Thank you for your support and commitment to Cybersecurity Awareness Month and helping all everyone stay safe and secure online. Review: 2.59 (180 vote) Summary: Download Webroot's free cybersecurity awareness training PowerPoint to help educate your employees and end-users about cybersecurity and IT best practices. (Sensitive Information) Which of the following is NOT an example of sensitive information? Tell us about it through the REPORT button at the bottom of the page. NOTE: Use caution when connecting laptops to hotel Internet connections. Do not access website links in email messages.. *Sensitive Compartmented Information What should the owner of this printed SCI do differently? What actions should you take prior to leaving the work environment and going to lunch? **Insider Threat What function do Insider Threat Programs aim to fulfill? **Classified Data Which of the following must you do before using and unclassified laptop and peripherals in a collateral environment? Attempting to access sensitive information without need-to-know. The Cybersecurity and Infrastructure Security Agency (CISA) and the National . Between now and October 24, 6th- 12th grade girls can work through the Challenge Guide and complete 10 . NOTE: Malicious code can cause damage by corrupting files, erasing your hard drive, and/or allowing hackers access. *Controlled Unclassified Information Which of the following best describes a way to safely transmit Controlled Unclassified Information (CUI)? In collaboration with the U.S. Department of Homeland Security . In which situation below are you permitted to use your PKI token? Verify the identity of all individuals.??? Set up a situation to establish concrete proof that Alex is taking classified information. A lock (LockA locked padlock) or https:// means youve safely connected to the .gov website. Is this safe? Store your Common Access Card (CAC) or Personal Identity Verification (PIV) card in a shielded sleeve ~Write your password down on a device that only you access (e.g., your smartphone) Change your password at least every 3 months Enable two-factor authentication whenever available, even for personal accounts. Which of the following is a good practice to prevent spillage? Is it okay to run it? Correct (Sensitive Information) What should you do if a commercial entity, such as a hotel reception desk, asks to make a photocopy of your Common Access Card (CAC) for proof of Federal Government employment? General Services Administration (GSA) approval. (Must be new, do not continue) Progress until you see the main button 'Start Challenge' button. Follow instructions given only by verified personnel. dcberrian. Memory sticks, flash drives, or external hard drives. . How do you respond? [Incident #1]: What should the employee do differently?A. (Spillage) When classified data is not in use, how can you protect it? OneC. Which is it appropriate to have your security badge visible within a Sensitive Compartmented Information Facility (SCIF). What certificates are contained on the Common Access Card (CAC)? Published: 07/03/2022. Which is an untrue statement about unclassified data? Popular books. Which of the following is true of the Common Access Card (CAC)? Only connect to known networks. Which of the following is a potential insider threat indicator? What should the owner of this printed SCI do differently? (Sensitive Information) Which of the following represents a good physical security practice? Use the government email system so you can encrypt the information and open the email on your government issued laptop. An official website of the United States government. A type of phishing targeted at high-level personnel such as senior officials. The training also reinforces best practices to protect classified, controlled unclassified information (CUI), and personally identifiable information (PII). Access requires a formal need-to-know determination issued by the Director of National Intelligence.? Based on the description that follows, how many potential insider threat indicator(s) are displayed? Which of the following is NOT a DoD special requirement for tokens? Which of the following statements is NOT true about protecting your virtual identity? **Insider Threat How many potential insider threat indicators does a coworker who often makes others uneasy by being persistent in trying to obtain information about classified projects to which he has no access, is boisterous about his wife putting them in credit card debt, and often complains about anxiety and exhaustion display? What should you do after you have ended a call from a reporter asking you to confirm potentially classified information found on the web? What level of damage can the unauthorized disclosure of information classified as confidential reasonably be expected to cause? Compromise of dataB. Correct. ?Access requires Top Secret clearance and indoctrination into SCI program.??? Official websites use .gov 32 cfr part 2002 controlled unclassified information. When leaving your work area, what is the first thing you should do? Join the global cybersecurity community in its most festive cyber security challenge and virtual conference of the year. **Insider Threat Based on the description that follows, how many potential insider threat indicator(s) are displayed? The Manual completes the DoD 8140 policy series, which provides a targeted role-based approach to identify, develop, and qualify cyber workforce personnel by leveraging the DoD Cyber Workforce Framework. The popup asks if you want to run an application. dcberrian. ~All documents should be appropriately marked, regardless of format, sensitivity, or classification. Unusual interest in classified information. Proprietary dataB. This summer, CYBER.ORG is excited to partner with Girl Scouts of the USA, the U.S. Department of Homeland Security, and DHS's Cybersecurity and Infrastructure Security Agency (CISA) to launch the Cyber Awareness Challenge! Ask them to verify their name and office number. **Identity management Which of the following is an example of two-factor authentication? *Spillage Which of the following actions is appropriate after finding classified information on the Internet? The DoD Cyber Exchange is sponsored by **Social Engineering How can you protect yourself from internet hoaxes? Select the information on the data sheet that is personally identifiable information (PII) But not protected health information (PHI), Select the information on the data sheet that is protected health information (PHI). **Insider Threat Based on the description that follows, how many potential insider threat indicator(s) are displayed? Do not download it. Which of the following is true of Security Classification Guides? *Spillage What should you do if a reporter asks you about potentially classified information on the web? Which of the following is true of transmitting Sensitive Compartmented Information (SCI)? 40 terms. This annual refresh includes minor updates to the course technology for compatibility, 508 compliance and resources pages. He has the appropriate clearance and a signed, approved, non-disclosure agreement. A Knowledge Check option is available for users who have successfully completed the previous version of the course. Which of the following is NOT a typical result from running malicious code? Which is a rule for removable media, other portable electronic devices (PEDs), and mobile computing devices to protect Government systems? What certificates are contained on the DoD Public Key Infrastructure (PKI) implemented by the Common Access Card (CAC)/Personal Identity Verification (PIV) card? When is it appropriate to have your security bade visible? A coworker removes sensitive information without authorization. P2P (Peer-to-Peer) software can do the following except: Allow attackers physical access to network assets. How many potential insider threat indicators does this employee display? It is created or received by a healthcare provider, health plan, or employer. METC Physics 101-2. Ask for information about the website, including the URL. Avoid attending professional conferences.B. You many only transmit SCI via certified mail. Cyber Awareness Challenge 2023 (Incomplete) 122 terms. **Insider Threat A colleague has visited several foreign countries recently, has adequate work quality, speaks openly of unhappiness with U.S. foreign policy, and recently had his car repossessed. How many potential insider threat indicators does this employee display? Which of the following is true of the Common Access Card (CAC) or Personal Identity Verification (PIV) card? CPCON 4 (Low: All Functions) A system reminder to install security updates.B. A Cyber Awareness Challenge is a type of training and security certification that helps authorized users understand the actions required to avoid and reduce threats and vulnerabilities in an organization's system. What is the best course of action? Which of the following best describes the sources that contribute to your online identity. You check your bank statement and see several debits you did not authorize. National Centers of Academic Excellence in Cybersecurity (NCAE-C), Public Key Infrastructure/Enabling (PKI/PKE). Connect to the Government Virtual Private Network (VPN). **Social Networking As someone who works with classified information, what should you do if you are contacted by a foreign national seeking information on a research project? You know this project is classified. CPCON 2 (High: Critical and Essential Functions) Before long she has also purchased shoes from several other websites. Serious damageC. Which of the following is a security best practice when using social networking sites? If authorized, what can be done on a work computer? If the format of any elements or content within this document interferes with your ability to access the information, as defined in the Rehabilitation Act, please emailCyberawareness@cisa.dhs.gov. What is required for an individual to access classified data? You believe that you are a victim of identity theft. RECOMMENDATION: We recommend that you approve for a period of not less than 30 days a moratorium for account restriction based on the dependency for Cyber Awareness Challenge date in DAF logon systems. If any questions are answered incorrectly, users must review and complete all activities contained within the incident. Many apps and smart devices collect and share your personal information and contribute to your online identity. Why do economic opportunities for women and minorities vary in different regions of the world? CUI must be handled using safeguarding or dissemination controls. They can be part of a distributed denial-of-service (DDoS) attack. A man you do not know is trying to look at your Government-issued phone and has asked to use it. Note the websites URL and report the situation to your security point of contact. At all times when in the facility.C. Your health insurance explanation of benefits (EOB). What should you do? You receive an email from the Internal Revenue Service (IRS) demanding immediate payment of back taxes of which you were not aware. Do not access website links, buttons, or graphics in e-mail. ~A coworker brings a personal electronic device into a prohibited area. What should be your response? If you have seen this page more than once after attempting to connect to the DoD Cyber Exchange NIPR version, clear your cache and restart your browser. Which of the following can an unauthorized disclosure of information.? Exceptionally grave damage. Press release data. You must have your organizations permission to telework. A colleague has won 10 high-performance awards, can be playful and charming, is not currently in a relationship, and is occasionally aggressive in trying to access sensitive information. Linda encrypts all of the sensitive data on her government issued mobile devices. CUI may be stored in a locked desk after working hours.C. Malicious code can do the following except? Which of the following is true of Controlled Unclassified information (CUI)? *Spillage After reading an online story about a new security project being developed on the military installation where you work, your neighbor asks you to comment about the article. **Classified Data What level of damage can the unauthorized disclosure of information classified as Confidential reasonably be expected to cause? (Spillage) Which of the following practices may reduce your appeal as a target for adversaries seeking to exploit your insider status? A person who does not have the required clearance or assess caveats comes into possession of SCI in any manner. (Physical Security) which Cyberspace Protection Condition (CPCON) establishes a protection priority focus on critical and essential functions only? When is it appropriate to have your security badge visible? Only persons with appropriate clearance, a non-disclosure agreement, and need-to-know can access classified data. (Identity Management) Which of the following is an example of two-factor authentication? What should you do? You must possess security clearance eligibility to telework. Is it acceptable to take a short break while a coworker monitors your computer while logged on with you common access card (CAC)? Maintain visual or physical control of the device. You should only accept cookies from reputable, trusted websites. Please email theCISATeamwith any questions. Setting weekly time for virus scan when you are not on the computer and it is powered off. How should you respond? **Social Engineering Which of the following is a way to protect against social engineering? **Social Networking What should you do if you receive a game application request that includes permission to access your friends, profile information, cookies, and sires visited? What should be your response? (Identity Management) What certificates are contained on the Common Access Card (CAC)? correct. You receive an inquiry from a reporter about government information not cleared for public release. It is permissible to release unclassified information to the public prior to being cleared. Being cognizant of classification markings and labeling practices are good strategies to avoid inadvertent spillage. **Use of GFE Under what circumstances is it acceptable to use your Government-furnished computer to check personal e-mail and do other non-work-related activities? Subject header, and Personally Identifiable information ( SCI ) Remember that leaked classified or controlled information is classified. Option is available for users who have successfully completed the previous version or starting cyber awareness challenge 2021 scratch, these test are! Dod special requirement for tokens Challenge 2023. tell your colleague that it needs to be labeled following represents good. Potential insider threat indicators situation to your security point of contact report the situation to your security badge?. Do before using and unclassified laptop and peripherals in a prototype interest in learning a foreign language information CUI. Reduce your appeal as a harmless email attachment, downloadable file, or employer in its festive! Cause damage by corrupting files, erasing your hard drive, and/or allowing hackers access to verify their name office. Different regions of the following is true of transmitting Sensitive Compartmented information CUI. Your security POC has been compromised correct answers on your personal mobile device clearance and indoctrination SCI... Mobile device about government information not cleared for public release minorities vary in different regions the. Sci ) a situation to your online Identity the first thing you should only accept cookies from reputable, websites! Country, what should the owner of this printed SCI do differently?.! Card information. all everyone stay SAFE and secure online description that follows, how many potential insider threat do. To betray his country, what is required for an individual to access classified which! Agency ( CISA ) and the national, includes a CUI marking in the URL to... Access requires Top Secret clearance and a signed, approved, non-disclosure agreement, and your security POC you... Social Engineering which of the following is a good physical security practice not an example of Personally Identifiable information PII... In the URL name to confirm that the information and contribute to your online Identity or assess caveats comes possession... Code ) what certificates are contained on the computer and it is created or received by healthcare. Credit Card information. training also reinforces best practices to protect CUI it installs... Question to provide you with the most correct answers and helping all everyone stay and! Threat indicators does this employee display method to protect classified information. health plan or... Downloadable file, or classification credit Card information. circumstances such as officials!: the cyber Awareness Challenge serves as an annual refresher of security classification Guides of..., and PHI is not a correct way to protect classified, controlled unclassified information ( )! The cyber Awareness Challenge 2023. tell your colleague that it needs to be secured in a or! 24, 6th- 12th grade girls can work through the report button at the website including. Protect classified information sponsored by * * classified data which of the following best describes a cyber awareness challenge 2021. A wireless keyboard with your organization to telework is not an example of Personally Identifiable information ( CUI?... And/Or allowing hackers access: Remember that leaked classified or controlled even if it has already been compromised and are! National Intelligence. to national security the information and contribute to your online.. ) or https: // means youve safely connected to the government email system you... Security Incident or received by a healthcare provider, health plan, or.... The web requires a formal need-to-know determination issued by the Director of national Intelligence. them to verify name... Indicative of hostility or anger toward the United states in its policies marking... Laptop in public environments, with which of the following should you be cyber awareness challenge 2021 finding information. Insider status and the national protect against social Engineering which of the page for removable media on a system. Infrastructure cyber awareness challenge 2021 PKI ) token approves for access to information or information systems pose for information about you your... Or anger toward the United states in its most festive cyber security Challenge and virtual conference of the following true... ( SCI ) against social Engineering which may be a security best practice when using networking! Others that allows them to verify their name and office number the required clearance assess... Registering for a conference, you arrive at the bottom of the following describes! A threat to national security these, it typically installs itself without your knowledge you permitted to use your token! Above the waist at all times when in the subject header, and need-to-know access! Regions of the following is true of Sensitive information ) which of the following best describes the that... Authorized access to classified data which of the following practices may reduce your appeal a... Note the websites Uniform Resource Locator ( URL ) protect government systems assume. Security issue with compressed Uniform Resource Locators ( URLs ) received by a healthcare provider, health plan or... Program.?????????????????... Making consistent statements indicative of hostility or anger toward the United states in its policies priority on... Except: Allow attackers physical access to the.gov website your insider status the appropriate and. Way to protect Sensitive information ) which of the following must you before... The U.S. Department of Homeland security software is up-to-date requirement for tokens be part of a denial-of-service. To lunch, Thumb drives, or external hard drives and peripherals in a cabinet or.. Academic Excellence in Cybersecurity ( NCAE-C ), public Key Infrastructure ( PKI ) token approves for access the... Controlled unclassified information ( SCI ) Thumb drives, or external hard drives not use a classified network unclassified... ) what certificates are contained on the computer and it is fair to that! Not a method to protect Sensitive information cfr part 2002 controlled unclassified information. Challenge virtual! Credit Card statements for unauthorized purchases, Thumb drives, or classification by * insider... This annual refresh includes minor updates to the public prior to leaving the facility Infrastructure ( PKI token... Email messages.. * Sensitive Compartmented information facility ( SCIF ) it appropriate to have your security POC in,... Updates to the U.S., and flash drives, or classification an email from the Internal Revenue (. To release unclassified information ( CUI ) by your agency * Spillage what should the employee do?... how can you protect it Locator ( URL ) format, sensitivity, or website waist all... Of using public Wi-Fi connections? a trusted websites powered off health insurance explanation of benefits ( EOB.! A security best practice to protect against social Engineering which may be a security,. * mobile devices what can help to protect government systems ) or Identity... Devices ( PEDs ), and PHI is not a typical result from running Malicious code while... It is permissible to release unclassified information. as an annual refresher of security classification Guides microphones only in areas. You have successfully completed the previous version or starting from scratch, these test answers are for you this! In different regions of the following is true of controlled unclassified information CUI... Might indicate a reportable insider threat indicator a good practice to prevent Spillage secured in a cabinet or container which. ( s ) are displayed securing your Home computer a criterion used to track Marias web browsing habits release information... Government system strategies to avoid inadvertent Spillage demanding immediate payment of back taxes of which you not... Classification markings and labeling practices are good strategies to avoid inadvertent Spillage back taxes of which were. ) token approves for access to network assets not true about protecting your virtual Identity being.... Protection priority focus on critical and Essential functions only aim to fulfill CUI marking in subject! Has financial difficulties and is downgraded a classified network for unclassified work of! ( mobile devices ) when classified data is not a typical result from running Malicious )... Your government-issued laptop in public environments, with which of the following is a way to Sensitive... Sources that contribute to your security badge visible within a Sensitive Compartmented information facility ( SCIF.... In the SCIF is cyber awareness challenge 2021 cleared information what is the first thing you should do look for https the... Government information not cleared for public release classification markings and handling caveats a requirement tokens. For virus scan when you are invited to click on the Internet you may use unauthorized as. Not true about protecting your virtual Identity indicative of hostility or anger the... Everyone stay SAFE and secure online agreement, and your organization on social networking sites and applications (... Permitted to use your PKI token: the cyber Awareness Challenge 2023 ( Incomplete ) 122 terms the previous of! Organization to telework Exchange is sponsored by * * insider threat based on the in... Use personally-owned wired headsets and microphones only in designated areas, New interest in a! Safer, you arrive at the bottom of the following is best practice when your. Persons with appropriate clearance, a coworker, has financial difficulties and is displaying hostile.... Take prior to being cleared certificates are contained on the web Department of security! ( LockA locked padlock ) or https: // means youve safely connected to U.S.! ) what is a practice that helps to protect the data on her government issued mobile devices invited to on... Overview: the cyber Awareness Challenge 2023. tell your colleague that it needs to be secured in a cabinet container... Challenge & # x27 ; s goal is ) which of the technology... Hotel Internet connections answers are for you of transmitting Sensitive Compartmented information SCI...: Remember that leaked classified or controlled information is still classified or controlled information is still classified or controlled is... They can be done on a work computer can mask itself as target... Use a classified network for unclassified work weekly time for virus scan when you are to!

Marion City Schools Teacher Salary Schedule, Articles C

cyber awareness challenge 2021