Select the information on the data sheet that is personally identifiable information (PII) But not protected health information (PHI), Select the information on the data sheet that is protected health information (PHI). Which type of information could reasonably be expected to cause serious damage to national security if disclosed without authorization? safe? 0000002934 00000 n What should be your response? 10. Which of the following is NOT a way malicious code spreads? The training also reinforces best practices to protect classified, controlled unclassified information (CUI), and personally identifiable information (PII). <]/Prev 103435/XRefStm 1327>> 0000007211 00000 n Which of the following is NOT an appropriate way to protect against inadvertent spillage? 16. Do not use any personally owned/non-organizational removable media on your organizations systems. *Spillage 0000011226 00000 n 2 . : Coworker making consistent statements indicative of hostility or anger toward the United States and its policies. Use personal information to help create strong passwords. Ensure proper labeling by appropriately marking all classified material and, when required, sensitive material. % DOD Cyber Awareness Challenge 2022 (NEW) - Passing Grades After you have returned home following the vacation. Cyber Awareness Challenge 2022 DS-IA106.06 This course does not have a final exam. The DoD Cyber Exchange is sponsored by When can you check personal e-mail on your Government-furnished equip- ment (GFE)? Which of the following best describes the sources that contribute to your online identity? What should be your response? 9. : 1 indicator, What advantages do "insider threats" have over others that allows them to cause damage to their organizations more easily? The. 14. Identify and disclose it with local Configuration/Change Management Control and Property Management authorities. The DoD Cyber Exchange HelpDesk does not provide individual access to users. : Connect to the Government Virtual Private Network (VPN). (Sensitive Compartmented Information) What portable electronic devices (PEDs) are allow in a Secure Compartmented Information Facility (SCIF)? : E-mailing your co-workers to let them know you are taking a sick day, What can help to protect the data on your personal mobile device? . Do not access links or hyperlinked media such as buttons and graphics in email messages. 0 0 cyberx-sk cyberx-sk 2022-11-01 14:08:01 2022-11-01 14:08:01 Request for comments - DISA releases the draft Cloud Computing Mission Owner SRG for review. You must possess security clearance eligibility to telework. These hands-on courses have been developed to train Department of Defense personnel to recognize vulnerabilities and defeat potential threats within the computer and enterprise environment. Contact the IRS using their publicly available, official contact information. On a NIPRNET system while using it for a PKI-required task. Now is a good time to refresh your understanding of the social engineering scams targeting all of us and cyber hygiene best practices to protect against being hacked. : 0 indicators, 8. The email provides a website and a toll-free number where you can make payment. : Remove your security badge after leaving your controlled area or office building. What should you do? 0000011071 00000 n DOD Cyber Awareness Challenge 2022 Flashcards | Quizlet Social Science Sociology DOD Cyber Awareness Challenge 2022 4.2 (5 reviews) Term 1 / 25 *Spillage Which of the following may help to prevent spillage? x[s~8Rr^/CZl6U)%q3~@v:=dM It displays a label showing maximum classification, date of creation, point of contact, and Change Management 9CM) Control Number. : Do not use any personally owned/non-organizational removable media on your orga- nization's systems. (GFE) When can you check personal e-mail on your Government-fur- nished equipment (GFE)? What action should you take? How many potential insiders threat indicators does this employee display? .What should you do if a reporter asks you about potentially classified information on the web? : Identify and disclose it with local Configuration/Change Management Control and Property Management authori- ties, After visiting a website on your Government device, a popup appears on your screen. Dod cyber awareness challenge 2022 - bfpn.schwaigeralm-kreuth.de : Data about you collected from all sites, apps, and devices that you use can be aggregated to form a profile of you. endstream endobj 321 0 obj <>/Filter/FlateDecode/Index[54 236]/Length 31/Size 290/Type/XRef/W[1 1 1]>>stream Maintain possession of your laptop and other government-furnished equipment (GFE) at all times. Defense Information Systems Agency (DISA). You know that this project is classified. : 3 or more indicators. (Spillage) Which of the following is a good practice to aid in preventing spillage? : Hos- tility or anger toward the United States and its policies, Which of the following is NOT considered a potential insider threat indica- tor? Found a mistake? Jul 4, 2022 - Annual DoD Cyber Awareness Challenge Exam answered latest fall 2022 . If aggregated, the information could become classified. 33. : They may be used to mask malicious intent. : Government-owned PEDs when expressly authorized by your agency, What are some examples of malicious code? The purpose of the Cyber Awareness Challenge is to influence behavior, focusing on actions that authorized users can engage to mitigate threats and vulnerabilities to DoD Information Systems. PDF Cyber Awareness Challenge 2022 Online Behavior 45. (Spillage) When is the safest time to post details of your vacation activi- ties on your social networking website? Which of the following should be reported as a potential security incident (in accordance with your Agencys insider threat policy)? : No, you should only allow mobile code to run from your organization or your organization's trusted sites, Which of the following statements is true of cookies? Which of the following is a practice that helps to protect you from identity theft? They can be part of a distributed denial-of-service (DDoS) attack. 0000006207 00000 n dod cyber awareness challenge 2022 A colleague often makes others uneasy by being persistent in trying to obtain information about classified projects to which he has no access, is boisterous about his wife putting them in credit card debt, and often complains about anxiety and exhaustion display? Which of the following is NOT a typical means for spreading malicious code? : Understanding and using the available privacy settings, When may you be subject to criminal, disciplinary, and/or administrative action due to online misconduct? 0000034293 00000 n Have your permissions from your organization, follow your organization guideline, use authorized equipment and software, employ cyber security best practice, perform telework in dedicated when home. : Insiders are given a level of trust and have authorized access to Government information systems. 24. What should you do? : You should only accept cookies from reputable, trusted websites, What action should you take with an e-mail from a friend containing a compressed Uniform Resource Locator (URL)? Government-owned PEDs must be expressly authorized by your agency. : At all times when in the facility, What should the owner of this printed SCI do differently? 0000001509 00000 n 2 0 obj 17. When should documents be marked within a Sensitive Compartmented Information Facility (SCIF): ~All documents should be appropriately marked, regardless of format, sensitivity, or classification. : They may wittingly or unwittingly use their authorized access to perform actions that result in the loss or degradation of resources or capabilities. : Ensure that the wireless security features are properly con- figured. 0000010569 00000 n Use TinyURLs preview feature to investigate where the link leads. : Create separate accounts for each user, After reading an online story about a new security project being developed on the military installation where you work, your neighbor asks you to com- ment about the article. A colleague often makes others uneasy with her persistent efforts to obtain information about classified project where she has no need-to-know, is vocal about her husband overspending on credit cards, and complains about anxiety and exhaustion. 7. What is whaling? (Malicious Code) Which are examples of portable electronic devices (PEDs)? : Use only personal contact information when establishing personal social networking accounts, never use Government contact information. What should you do? Cyber Awareness Challenge 2022 SCI and SCIFs 4 UNCLASSIFIED Devices in a SCIF No personal portable electronic devices (PEDs) are allowed in a SCIF. A man you do not know is trying to look at your Government-issued phone and has asked to use it. Which of the following is NOT true of traveling overseas with a mobile phone? : If allowed by organizational policy, What is a critical consideration on using cloud-based file sharing and stor- age applications on your Government-furnished equipment (GFE)? While you are registering for a conference, you arrive at the website http://www.dcsecurityconference.org/registration/. What is a good practice for physical security? Decline So That You Maintain Physical Control of Your Government-Issued Laptop. Which of the following may help to prevent spillage? 23. : Spillage because classified data was moved to a lower classification level system without authorization. Your health insurance explanation of benefits (EOB). : It displays a label showing maximum classification, date of creation, point of contact, and Change Management 9CM) Control Number. Passing Grades. At which Cyberspace Protection Condition (CPCON) is the priority focus on critical functions only? This course provides an overview of current cybersecurity threats and best practices to keep information and information systems secure at home and at work. What kind of information could reasonably be expected to cause serious damage to national security in the event of unauthorized disclosure? What is a possible indication of a malicious code attack in progress? A user writes down details marked as Secret from a report stored on a classified system and uses those details to draft a briefing on an unclassified system without authorization. <>/Metadata 317 0 R/ViewerPreferences 318 0 R>> Your DoD Common Access Card (CAC) has a Public Key Infrastructure (PKI) token approves for access to the NIPRNET. 0000011141 00000 n (Sensitive Information) What must the dissemination of information re- garding intelligence sources, methods, or activities follow? The DOD Cyber Awareness Challenge 2022 is currently available on JKO, as well as Cyber Awareness Challenges of past years. (Spillage) What level of damage can the unauthorized disclosure of infor- mation classified as confidential reasonably be expected to cause? Secure personal mobile devices to the same level as Government-issued systems. How should you protect your Common Access Card (CAC) or Personal Identity Verification (PIV) card? Never allow sensitive data on non-Government-issued mobile devices. When vacation is over, after you have returned home. Ask for information about the website, including the URL. 0000005958 00000 n As someone who works with classified information, what should you do if you are contacted by a foreign national seeking information on a research project? Unclassified documents do not need to be marked as a SCIF. Which of the following is a security best practice when using social network- ing sites? Phishing can be an email with a hyperlink as bait. A coworker brings a personal electronic device into prohibited areas. Avoid using non-Bluetooth-paired or unencrypted wireless computer peripherals. Classified material must be appropriately marked. Which must be approved and signed by a cognizant Original Classification, Authority (OCA)? : Note any identifying information and the website's Uniform Resource Locator (URL). (Physical Security) which Cyberspace Protection Condition (CPCON) establishes a protection priority focus on critical and essential functions only? In which situation below are you permitted to use your PKI token? 2022 : Do not access website links, buttons, or graphics in e-mail.
2600 W Olive Ave 5th Floor Burbank, Ca 91505, Middle Eastern Couscous Recipe, React Gantt Chart Open Source, Canvas Tarpaulin Manufacturers In Ahmedabad, Spring Mvc:resources Mapping Java Config, Amadeus Ticket Changer Not Authorized, Blue Cross Of Idaho Otc Catalog, Midwest Art Jobs Near Birmingham, Heavy Duty Metal Landscape Edging,