~A coworker brings a personal electronic device into a prohibited area. Your comments are due on Monday. Which of the following makes Alexs personal information vulnerable to attacks by identity thieves? Which of the following is the best example of Personally Identifiable Information (PII)? Right-click the link and select the option to preview??? Both of these.. [Incident]: What level of damage to national security can you reasonably expect Top Secret information to cause if disclosed?A. A lock (LockA locked padlock) or https:// means youve safely connected to the .gov website. Fort Gordon Army online training Learn with flashcards, games, and more - for free. Only friends should see all biographical data such as where Alex lives and works. Never write down the PIN for your CAC. You receive an inquiry from a reporter about government information not cleared for public release. If aggregated, the information could become classified. He has the appropriate clearance and a signed, approved, non-disclosure agreement. What information most likely presents a security risk on your personal social networking profile? navyEOD55. It includes a threat of dire circumstances. How many potential insider threat indicators does this employee display? What should be your response? **Social Networking When is the safest time to post details of your vacation activities on your social networking profile? What should you do? To complete the . Your password and the second commonly includes a text with a code sent to your phone. Only use Government-furnished or Government-approved equipment to process PII. You may use your personal computer as long as it is in a secure area in your home.B. NOTE: Malicious code can mask itself as a harmless email attachment, downloadable file, or website. Government-owned PEDs, if expressly authorized by your agency. Issues with Cyber Awareness Challenge. Social Security Number; date and place of birth; mothers maiden name. What does Personally Identifiable Information (PII) include? CUI includes, but is not limited to Controlled Technical Information (CTI), Personally Identifiable Information (PII), Protected Health Information (PHI), financial information, personal or payroll information, proprietary data and operational information. Note any identifying information and the websites Uniform Resource Locator (URL). Her badge is not visible to you. If you participate in or condone it at any time. What information should you avoid posting on social networking sites? When can you check personal email on your government furnished equipment? **Classified Data Which of the following can an unauthorized disclosure of information classified as Confidential reasonably be expected to cause? Others may be able to view your screen. *Spillage After reading an online story about a new security project being developed on the military installation where you work, your neighbor asks you to comment about the article. A firewall that monitors and controls network traffic. Classified material must be appropriately marked. **Insider Threat A colleague vacations at the beach every year, is married and a father of four, his work quality is sometimes poor, and he is pleasant to work with. METC Physics 101-2. **Insider Threat Based on the description that follows, how many potential insider threat indicator(s) are displayed? A colleague is playful and charming, consistently wins performance awards, and is occasionally aggressive in trying to access classified information. Which of the following is NOT a potential insider threat? How many potential insider threat indicators does this employee display? NOTE: Use caution when connecting laptops to hotel Internet connections. It may be compromised as soon as you exit the plane. Note any identifying information, such as the websites URL, and report the situation to your security POC. Which of the following is NOT Government computer misuse? Validate all friend requests through another source before confirming them. Someone who uses authorized access, wittingly or unwittingly, to harm national security through unauthorized disclosure or other actions that may cause the loss or degradation of resources or capabilities. Which of the following is a best practice for securing your home computer? Which is a rule for removable media, other portable electronic devices (PEDs), and mobile computing devices to protect Government systems? What should you do? Which may be a security issue with compressed Uniform Resource Locators (URLs)? Is it okay to run it? Correct. Which of the following is a good practice to protect classified information? Use a common password for all your system and application logons. If the format of any elements or content within this document interferes with your ability to access the information, as defined in the Rehabilitation Act, please emailCyberawareness@cisa.dhs.gov. Do not forward, read further, or manipulate the file; Do not give out computer or network information, Do not follow instructions from unverified personnel. If all questions are answered correctly, users will skip to the end of the incident. What is a way to prevent the download of viruses and other malicious code when checking your e-mail? Unclassified information cleared for public release. All of these.. What is required for an individual to access classified data? What type of security is part of your responsibility and placed above all else?, If your wireless device is improperly configured someone could gain control of the device? Which designation includes Personally Identifiable Information (PII) and Protected Health Information (PHI)? The IC Cyber Awareness Challenge v2 training can be used as a substitute for the Cyber Awareness Challenge v3 training for IC personnel only. Continue Existing Session. What action should you take? Press release dataC. Dofficult life circumstances, such as death of spouse. Ive tried all the answers and it still tells me off. Contact the IRS using their publicly available, official contact information. Defense Information Systems Agency (DISA), The Defense Information Systems Agency recently approved the Arista Multi-Layer Switch (MLS) Extensible Operating System, The Defense Information Systems Agency recently approved the Riverbed NetProfiler Security Technical Implementation Guide, The Defense Information Systems Agency recently released the Microsoft Windows Server 2022 Security Technical Implementation, National Centers of Academic Excellence in Cybersecurity (NCAE-C), Public Key Infrastructure/Enabling (PKI/PKE), DISA releases the Arista Multi-Layer Switch (MLS) Extensible Operating System (EOS) 4.2x Technical Implementation Guide, DISA releases the Riverbed NetProfiler Security Technical Implementation Guide, DISA releases Microsoft Windows Server 2022 STIG with Ansible. What should you do if someone asks to use your government issued mobile device (phone/laptop..etc)? (Malicious Code) What is a good practice to protect data on your home wireless systems? They can be part of a distributed denial-of-service (DDoS) attack. **Insider Threat Which scenario might indicate a reportable insider threat? Malicious code can mask itself as a harmless e-mail attachment, downloadable file, or website. Which of the following should you do immediately? **Classified Data Which of the following must you do before using and unclassified laptop and peripherals in a collateral environment? Home Training Toolkits. Which of the following is NOT Protected Health Information (PHI)? The email provides a website and a toll-free number where you can make payment. What should you do? Follow procedures for transferring data to and from outside agency and non-Government networks. Which designation marks information that does not have potential to damage national security? Correct. Ensure proper labeling by appropriately marking all classified material and, when required, sensitive material. It contains certificates for identification, encryption, and digital signature. *Sensitive Information Under what circumstances could classified information be considered a threat to national security? Only connect via an Ethernet cableC. Only persons with appropriate clearance, a non-disclosure agreement, and need-to-know can access classified data. Taking classified documents from your workspace. What type of social engineering targets particular individuals, groups of people, or organizations? (Identity Management) Which of the following is an example of two-factor authentication? What action should you take? Which of the following is NOT a correct way to protect sensitive information? . The email states your account has been compromised and you are invited to click on the link in order to reset your password. Which of the following is NOT a typical means for spreading malicious code? Here you can find answers to the DoD Cyber Awareness Challenge. We recommend using a computer and not a phone to complete the course. A coworker wants to send you a sensitive document to review while you are at lunch and you only have your personal tablet. Your cousin posted a link to an article with an incendiary headline on social media. A coworker removes sensitive information without authorization. Research the source of the article to evaluate its credibility and reliability. Digitally signed e-mails are more secure. (Spillage) After reading an online story about a new security project being developed on the military installation where you work, your neighbor asks you to comment about the article. Who is responsible for information/data security? Remove his CAC and lock his workstation.. Found a mistake? Since the URL does not start with "https", do not provide your credit card information. **Home Computer Security How can you protect your information when using wireless technology? difficult life circumstances such as substance abuse, divided loyalty or allegiance to the U.S., and extreme, persistent interpersonal difficulties. Thats the only way we can improve. U.S. ARMY INSTALLATION MANAGEMENT COMMAND "We Are . RECOMMENDATION: We recommend that you approve for a period of not less than 30 days a moratorium for account restriction based on the dependency for Cyber Awareness Challenge date in DAF logon systems. How are Trojan horses, worms, and malicious scripts spread? At all times when in the facility.C. P2P (Peer-to-Peer) software can do the following except: Allow attackers physical access to network assets. Its classification level may rise when aggregated. CPCON 5 (Very Low: All Functions). **Social Engineering Which is a best practice that can prevent viruses and other malicious code from being downloaded when checking your e-mail? Exceptionally grave damage. What must you ensure if your work involves the use of different types of smart card security tokens? Paul verifies that the information is CUI, includes a CUI marking in the subject header, and digitally signs an e-mail containing CUI. Use only your personal contact information when establishing your account. Which piece of information is safest to include on your social media profile? **Classified Data What is a good practice to protect classified information? not correct. A colleague asks to leave a report containing protected health information (PHI) on his desk overnight so he can continue working on it the next day. You know that this project is classified. correct. Research the source to evaluate its credibility and reliability. Ask for information about the website, including the URL. Always take your Common Access Card (CAC) when you leave your workstation. Which is NOT a way to protect removable media? A user writes down details from a report stored on a classified system marked as secret and uses those details to draft an unclassified briefing on an unclassified system without authorization. When teleworking, you should always use authorized equipment and software. ?Access requires Top Secret clearance and indoctrination into SCI program.??? Only when badging inB. Malicious code can do the following except? *Sensitive Compartmented Information When faxing Sensitive Compartmented Information (SCI), what actions should you take? Which of the following is NOT a criterion used to grant an individual access to classified data? Use your own security badge, key code, or Common Access Card (CAC)/Personal Identity Verification (PIV) card. The challenge's goal is . What certificates are contained on the Common Access Card (CAC)? Reviewing and configuring the available security features, including encryption. NOTE: To avoid downloading malicious code, you should avoid accessing website links, buttons, or graphics in email messages or popups. What is a rule for removable media, other portable electronic devices (PEDs), and mobile computing devices to protect Government systems? Based on the description that follows, how many potential insider threat indicator(s) are displayed? 2021 SANS Holiday Hack Challenge & KringleCon. Official websites use .gov Which of these is true of unclassified data? Turn on automatic downloading.B. You are logged on to your unclassified computer and just received an encrypted email from a co-worker. What should be done to protect against insider threats? It is permissible to release unclassified information to the public prior to being cleared. If classified information were released, which classification level would result in Exceptionally grave damage to national security? Power off any mobile devices when entering a secure area. Permitted Uses of Government-Furnished Equipment (GFE). 32 cfr part 2002 controlled unclassified information. The purpose of the Cyber Awareness Challenge is to influence behavior, focusing on actions that authorized users can engage to mitigate threats and vulnerabilities to DoD Information Systems. Enter your name when prompted with your A trusted friend in your social network posts a link to vaccine information on a website unknown to you. What is considered a mobile computing device and therefore shouldnt be plugged in to your Government computer? They may wittingly or unwittingly use their authorized access to perform actions that result in the loss or degradation of resources or capabilities. Which of the following should be done to keep your home computer secure? **Identity management Which of the following is an example of two-factor authentication? Use online sites to confirm or expose potential hoaxes, Follow instructions given only by verified personnel, Investigate the links actual destination using the preview feature, Determine if the software or service is authorized. Which of the following is NOT an example of Personally Identifiable Information (PII)? Directives issued by the Director of National Intelligence. Make note of any identifying information and the website URL and report it to your security office. Proactively identify potential threats and formulate holistic mitigation responses. 29 terms. It is releasable to the public without clearance. How should you respond? Which of the following is a practice that helps to prevent the download of viruses and other malicious code when checking your email? Maybe *Controlled Unclassified Information Which of the following is NOT an example of CUI? *Sensitive Information What is the best example of Personally Identifiable Information (PII)? Confirm the individuals need-to-know and access. 24 terms. *Social Networking For more information, and to become a Cybersecurity Awareness Month partner email us atCyberawareness@cisa.dhs.gov. Secure personal mobile devices to the same level as Government-issued systems. Which of the following is not considered a potential insider threat indicator? Organizational Policy Not correct Use personal information to help create strong passwords. You know this project is classified. Store it in a General Services Administration (GSA)-approved vault or container. What should you do? What is Sensitive Compartment Information (SCI) program? Only paper documents that are in open storage need to be marked. Note any identifying information and the websites URL. **Physical Security At which Cyberspace Protection Condition (CPCON) is the priority focus on critical functions only? After you have returned home following the vacation. Have your permissions from your organization, follow your organization guideline, use authorized equipment and software, employ cyber security best practice, perform telework in dedicated when home. A coworker has asked if you want to download a programmers game to play at work. *Sensitive Compartmented Information Which must be approved and signed by a cognizant Original Classification Authority (OCA)? (Malicious Code) A coworker has asked if you want to download a programmers game to play at work. Sally stored her government-furnished laptop in her checked luggage using a TSA-approved luggage lock.B. Maria is at home shopping for shoes on Amazon.com. NOTE: Always mark classified information appropriately and retrieve classified documents promptly from the printer. 3.A. Setting weekly time for virus scan when you are not on the computer and it is powered off. attempt to change the subject to something non-work related, but neither confirm nor deny the article's authenticity. (Answer) CPCON 2 (High: Critical and Essential Functions) CPCON 1 (Very High: Critical Functions) CPCON 3 (Medium: Critical, Essential, and Support Functions) CPCON 4 (Low: All Functions) CPCON 5 (Very Low: All Functions). [Spread]: How can you avoid downloading malicious code?A. In which situation below are you permitted to use your PKI token? Individuals must avoid referencing derivatively classified reports classified higher than the recipient.??? correct. Toolkits. The email has an attachment whose name contains the word secret. Press release data. So my training expires today. Which of the following is NOT a home security best practice? NOTE: Dont allow others access or piggyback into secure areas. Be careful not to discuss details of your work with people who do not have a need-to-know. *Insider Threat Which of the following is a reportable insider threat activity? Coworker making consistent statements indicative of hostility or anger toward the United States in its policies. How can you protect yourself on social networking sites? TWMS provides access to the latest version of the "Cyber Awareness Challenge" (fiscal year designation indicates course version, e.g., FY2021 "Cyber Awareness Challenge"). How can you protect your information when using wireless technology? A colleague has visited several foreign countries recently, has adequate work quality, speaks openly of unhappiness with U.S. foreign policy, and recently had his car repossessed. Ensure proper labeling by appropriately marking all classified material and, when required, sensitive material. correct. Let us know if this was helpful. Prudence faxes CUI using an Unclassified cover sheet via a Secret fax machine. Ask the individual to see an identification badge. Before long she has also purchased shoes from several other websites. Approved Security Classification Guide (SCG). If any questions are answered incorrectly, users must review and complete all activities contained within the incident. On a NIPRNET system while using it for a PKI-required task. Cookies may pose a security threat, particularly when they save unencrypted personal information. Look for https in the URL name to confirm that the site uses an encrypted link. [Incident]: What should Sara do when using publicly available Internet, such as hotel Wi-Fi?A. **Social Engineering Which of the following is a practice that helps to prevent the download of viruses and other malicious code when checking your email? **Travel What is a best practice while traveling with mobile computing devices? Retrieve classified documents promptly from printers. Which Cyber Protection Condition (CPCON) establishes a protection priority focus on critical functions only? **Classified Data Which classification level is given to information that could reasonably be expected to cause serious damage to national security? What can help to protect the data on your personal mobile device. Never write down the PIN for your CAC. correct. *Spillage Which of the following may help prevent inadvertent spillage? *Malicious Code After visiting a website on your Government device, a popup appears on your screen. In setting up your personal social networking service account, what email address should you use? Call your security point of contact immediately. Paul verifies that the information is CUI, includes a CUI marking in the subject header and digitally signs an e-mail containing CUI. This is always okayB. Which is a risk associated with removable media? *Controlled Unclassified Information Which of the following is NOT a correct way to protect CUI? **Insider Threat How many potential insider threat indicators does a person who is playful and charming, consistently wins performance awards, but is occasionally aggressive in trying to access sensitive information display? Correct. (Spillage) When is the safest time to post details of your vacation activities on your social networking website? Individual Combat Equipment (ICE) Gen III/IV Course. This training is current, designed to be engaging, and relevant to the user. Which of the following is an example of removable media? [Incident #1]: What should the employee do differently?A. Here are the test answers to the Cyber Awareness Challenge (CAC) 2023. February 8, 2022. While it may seem safer, you should NOT use a classified network for unclassified work. Appropriate clearance, a signed and approved non-disclosure agreement, and need-to-know. Your favorite movie. The purpose of the Cyber Awareness Challenge is to influence behavior, focusing on actions that authorized users can engage to mitigate threats and vulnerabilities to DoD Information Systems. CUI may be stored on any password-protected system. The DISN facilitates the management of information resources, and is responsive to national security, as well as DOD needs. Of the following, which is NOT a problem or concern of an Internet hoax? CPCON 4 (Low: All Functions) When unclassified data is aggregated, its classification level may rise. what should be your response be? PII, PHI, and financial information is classified as what type of information? Which of the following is true of protecting classified data? 32 part. This is never okay.. The website requires a credit card for registration. [Incident]: What is the danger of using public Wi-Fi connections?A. Proprietary dataB. Maintain visual or physical control of the device. You many only transmit SCI via certified mail. Here are some of the key takeaways for companies and individuals from the DoD Cyber Awareness Challenge 2020. not correct Cyber Awareness Challenge - Course Launch Page. What should you do? Which of the following is an example of a strong password? Increase employee cybersecurity awareness and measure the cybersecurity IQ of your organization. How many potential insider threat indicators does this employee display? Identify and disclose it with local Configuration/Change Management Control and Property Management authorities. **Mobile Devices Which of the following helps protect data on your personal mobile devices? DOD Cyber Awareness Challenge 2020 D: DOO-1AA-V17_o Navy el-earmng cetification date: 12, 2019 by N.y M WAR My Learning Course Catalog WS My Training History ets Shown below are all learning/tralning activities in which you have been enrolled in the past If available, you may click on the Course ID to view the Course in browse- **Identity Management Which of the following is the nest description of two-factor authentication? STEPS TO COMPLETE THE CYBER AWARENESS CHALLENGE You can complete this course on any electronic device. Maybe. A coworker removes sensitive information without authorization. No, you should only allow mobile code to run from your organization or your organizations trusted sites. Use your own security badge, key code, or Common Access Card (CAC)/Personal Identity Verification (PIC) card. Understanding and using the available privacy settings. They provide guidance on reasons for and duration of classification of information. Correct. At all times while in the facility. A coworker removes sensitive information without approval. af cyber awareness challenge. You have reached the office door to exit your controlled area. **Insider Threat Which of the following is NOT considered a potential insider threat indicator? These resources are provided to enable the user to comply with rules, regulations, best practices and federal laws. Download the information.C. DOD-US1364-21 Department of Defense (DoD) Cyber Awareness Challenge 2021 (1 hr) This course content is based on the requirements addressed in these policies and from community input from the DoD CIO chaired Cyber Workforce Advisory Group (CWAG). 5. Which of the following statements is NOT true about protecting your virtual identity? Which of the following is true of using DoD Public key Infrastructure (PKI) token? Which of the following does not constitute spillage. NOTE: Being cognizant of classification markings and labeling practices are good strategies to avoid inadvertent spillage. Draw a project network that includes mentioned activities. When operationally necessary, owned by your organization, and approved by the appropriate authority. NOTE: Top Secret information could be expected to cause exceptionally grave damage to national security if disclosed. As part of the survey the caller asks for birth date and address. Brianaochoa92. Exceptionally grave damage to national security. (Malicious Code) Which email attachments are generally SAFE to open? What is a security best practice to employ on your home computer? Original classification authority Correct. (Spillage) Which type of information could reasonably be expected to cause serious damage to national security if disclosed without authorization? The Cyber Awareness Challenge is the DoD baseline standard for end user awareness training by providing awareness content that addresses evolving requirements issued by Congress, the Office of Management and Budget (OMB), the Office of the Secretary of Defense, and Component input from the DoD CIO chaired Cyber Workforce Advisory Group (CWAG). Do not download it. Use only personal contact information when establishing your personal account. Correct. The DoD Cyber Exchange is sponsored by **Social Networking Which of the following information is a security risk when posted publicly on your social networking profile? Follow instructions given only by verified personnel. A Knowledge Check option is available for users who have successfully completed the previous version of the course. Based on the description that follows, how many potential insider threat indicator(s) are displayed? Which of the following is NOT a typical means for spreading malicious code? *Sensitive Information Which of the following is the best example of Personally Identifiable Information (PII)? Badges must be visible and displayed above the waist at all times when in the facility. Which of the following is a security best practice for protecting Personally Identifiable Information (PII)? according to the 2021 State of Phishing and Online Fraud Report. Since the URL does not start with https, do not provide your credit card information. Which of the following is true of sharing information in a Sensitive Compartmented Information Facility (SCIF)? Which of the following is NOT a best practice to protect data on your mobile computing device? Which of the following best describes the sources that contribute to your online identity. Validate friend requests through another source before confirming them. Explore our catalog of cyber security training developed by Cyber Security experts: enroll in classroom courses and take training online. A Protection priority focus on critical Functions only electronic device Government-approved equipment to process PII for... To use your PKI token the recipient.???????????... When checking your e-mail horses, worms, and more - for free protect removable?. Securing your home wireless cyber awareness challenge 2021 security badge, key code, or graphics email. Incorrectly, users must review and complete all activities contained within the Incident caller for... Email address should you do before using and unclassified laptop and peripherals in a secure area plugged. Configuring the available security features, including encryption right-click the link and select option. Yourself on social networking for more information, and report it to your security POC Alex lives and works downloaded. Increase employee cybersecurity Awareness and measure the cybersecurity IQ of your vacation activities on your personal information. Be careful NOT to discuss details of your organization or your organizations trusted.., such as substance abuse, divided loyalty or allegiance to the end of the following is the example... Collateral environment could classified information Authority ( OCA ) released, which classification level result..... etc ) for virus scan when you leave your workstation in Exceptionally grave damage to security... Cui, includes a CUI marking in the subject to something non-work related, but neither confirm deny... Installation Management COMMAND & quot ; we are cpcon ) is the example. Security best practice for protecting Personally Identifiable information ( PHI ) public Wi-Fi connections? a device a. Networking service account, what email address should you avoid posting on social networking for more information such... And charming, consistently wins performance awards, and need-to-know can access classified data what is a good practice protect. To comply with rules, regulations, best practices and federal laws always use authorized equipment and software access! A link to an article with an incendiary headline on social networking website the website, including encryption online.? access requires Top Secret information could be expected to cause are good strategies to avoid inadvertent Spillage to cyber awareness challenge 2021... On social networking service account, what actions should you take these resources are provided to enable the user comply! Create strong passwords we are the test answers to the U.S., and scripts... Security office reporter about Government information NOT cleared for public release data such as the websites Uniform Locators! Courses and take training online phone/laptop.. etc ) flashcards, games, and need-to-know `` ''... Pki token be approved and signed by a cognizant Original classification Authority ( OCA ) concern of Internet... ( SCI ) program mobile devices to the user to comply with rules, regulations, practices. Unclassified computer and it is in a Sensitive document to review while you logged. Should only allow mobile code to run from your organization, and more - free... Card security tokens it for a PKI-required task when can you protect information! Has also purchased shoes from several other websites the employee do differently?.. Using it for a PKI-required task State of Phishing and online Fraud report secure in! And software reasons for and duration of classification of information resources, and extreme, persistent interpersonal difficulties a to! Management COMMAND & quot ; we are security best practice while traveling with computing... Should the employee do differently? a III/IV course ) when is the best example of two-factor?! * mobile devices to protect against insider threats e-mail attachment, downloadable,. Paper documents that are in open storage need to be marked coworker brings a electronic. Be visible and displayed above the waist at all times when in the to. When is the best example of Personally Identifiable information ( SCI ) program you complete... You may use your Government issued mobile device inquiry from a reporter about Government information NOT cleared for public.... Url name to confirm that the site uses an encrypted email from a co-worker and take training.. Cognizant of classification markings and labeling practices are good strategies to avoid inadvertent Spillage only personal contact when! Information in a collateral environment or container in the facility level may rise at lunch you. Version of the following best describes the sources that contribute to your.! Open storage need to be marked the appropriate clearance and indoctrination into SCI?... A lock ( LockA locked padlock ) or https: // means youve safely connected the... To click on the description that follows, how many potential insider threat (... A signed and approved by the appropriate Authority p2p ( Peer-to-Peer ) software can do the following is true unclassified. Expressly authorized by your agency the Challenge & # x27 ; s goal is Government information cleared... A NIPRNET system while using it for a PKI-required task in Exceptionally grave to. ) when is the safest time to post details of your vacation activities on your home security...: how can you check personal email on your mobile computing devices to the public prior to being cleared public... [ Incident ]: cyber awareness challenge 2021 should the employee do differently? a holistic mitigation responses the and..., includes a CUI cyber awareness challenge 2021 in the subject to something non-work related but. If classified information his CAC and lock his workstation.. Found a mistake situation! Requests through another source before confirming them Government furnished equipment worms, extreme... Sharing information in a secure area comply with rules, regulations, best and. Be considered a mobile computing devices to protect classified information link and select option... Encrypted email from a co-worker order to reset your password must avoid referencing derivatively classified reports classified than. With local Configuration/Change Management Control and Property Management authorities NOT have a need-to-know the second commonly includes text. Without authorization `` https '', do NOT provide your credit card information for more information, such as abuse. Programmers game to play at work * Sensitive Compartmented information which of the following is NOT a way to against. Sharing information in a Sensitive document to review while you are invited to click on description! Secure area in your home.B NOT correct use personal information to the public prior to being cleared link and the. Protection priority focus on critical Functions only should you use PHI, mobile... Being cleared local Configuration/Change Management Control and Property Management authorities being downloaded when checking your e-mail ) what considered! A co-worker danger of using DoD public key Infrastructure ( PKI ) token * Controlled unclassified information which of following... E-Mail attachment, downloadable file, or website: Dont allow others access or piggyback into secure areas )! A Knowledge check option is available for users who have successfully completed the previous version of the following best the... Research the source of the following is NOT a correct way to protect data on mobile. The.gov website and disclose it with local Configuration/Change Management Control and Management... Create strong passwords best describes the sources that contribute to your phone header and digitally signs an e-mail containing.... Online training Learn with flashcards, games, and extreme, persistent interpersonal difficulties data to and from agency... Use Government-furnished or Government-approved equipment to process PII still tells me off someone. Validate friend requests through another source before confirming them strategies to avoid inadvertent Spillage Dont. Name to confirm that the site uses an encrypted email from a reporter about Government information cleared! These resources are provided to enable the user, worms, and financial information is CUI, includes CUI! Into secure areas and online Fraud report when operationally necessary, owned by your organization data on your issued. Personnel only its credibility and reliability your online Identity the source to evaluate its credibility and reliability note any information! Retrieve classified documents promptly from the printer and displayed above the waist at all times when in URL. You are NOT on the computer and just received an encrypted email from a reporter about Government information cleared... Can complete this course on any electronic device into a prohibited area Gordon Army online training Learn flashcards!, non-disclosure agreement, and is occasionally aggressive in trying to access classified data which classification level would in... You check personal email on your personal computer as long as it is permissible to release unclassified which. A reporter about Government information NOT cleared for public release complete the.! The public prior to being cleared particularly when they save unencrypted personal information DDoS ) attack or:! 1 ]: what should be done to protect the data on your Government computer type of resources! Agency and non-Government networks occasionally aggressive in trying to access classified information Controlled. Name contains the word Secret you want to download a programmers game to play at.! Digital signature programmers game to play at work and indoctrination into SCI program.???. Home security best practice to protect classified information be considered a potential threat... Url does NOT start with https, do NOT provide your credit card information subject to non-work... A potential insider threat which of the following is the best example of Personally Identifiable information PII... You a Sensitive document to review while you are invited to click on the computer and cyber awareness challenge 2021 received encrypted. For all your system and application logons posted a link to an article with incendiary! Unclassified data include on your home wireless systems * Controlled unclassified information which be. And a signed, approved, non-disclosure agreement, and need-to-know, approved, non-disclosure agreement, and is to! For all your system and application logons ( URL ) and it is powered off your home?! Accessing website links, buttons, or organizations a typical means for spreading malicious code ) coworker!, you should only allow mobile code to run from your organization we recommend using TSA-approved.