cyber awareness challenge 2021

*Sensitive Compartmented Information When faxing Sensitive Compartmented Information (SCI), what actions should you take? Which of the following is true of Security Classification Guides? How can you protect yourself from social engineering? Please DO NOT email in regards to Iatraining.us.army.mil, JKO, or skillport. Please email theCISATeamwith any questions. Assess your surroundings to be sure no one overhears anything they shouldnt. How many potential insider threat indicators does this employee display? **Identity management What is the best way to protect your Common Access Card (CAC)? Only persons with appropriate clearance, a non-disclosure agreement, and need-to-know can access classified data. The website requires a credit card for registration. Which of the following is a good practice to prevent spillage? Classified DVD distribution should be controlled just like any other classified media. . What is considered a mobile computing device and therefore shouldnt be plugged in to your Government computer? Is it acceptable to take a short break while a coworker monitors your computer while logged on with you common access card (CAC)? The purpose of the Cyber Awareness Challenge is to influence behavior, focusing on actions that authorized users can engage to mitigate threats and vulnerabilities to DoD Information Systems. Compromise of dataB. *Sensitive Compartmented Information When should documents be marked within a Sensitive Compartmented Information Facility (SCIF). How many potential insiders threat indicators does this employee display? Cyber Awareness Challenge - Course Launch Page. classified material must be appropriately marked. (Sensitive Information) What certificates are contained on the Common Access Card (CAC)? You receive an unexpected email from a friend: I think youll like this: https://tinyurl.com/2fcbvy. What action should you take? While it may seem safer, you should NOT use a classified network for unclassified work. access to classified information. In which situation below are you permitted to use your PKI token? It may be compromised as soon as you exit the plane. How should you protect a printed classified document when it is not in use? The website requires a credit card for registration. Your health insurance explanation of benefits (EOB). Who can be permitted access to classified data? To complete the . **Classified Data How should you protect a printed classified document when it is not in use? ?Access requires Top Secret clearance and indoctrination into SCI program.??? Store it in a GSA approved vault or container. Which may be a security issue with compressed urls? Which of the following is true of downloading apps? Directing you to a website that looks real. Ctrl+F (Cmd+F) will help you a lot when searching through such a large set of questions. **Removable Media in a SCIF What action should you take when using removable media in a Sensitive Compartmented Information Facility (SCIF)? Call your security point of contact immediately. Malicious code can do damage by corrupting files, erasing your hard drive, and/or allowing hackers access. Unclassified documents do not need to be marked as a SCIF. History 7 Semester 1 Final 2. damage to national security. Additionally, you can use Search Box above or, Visit this page of all answer (literally 500+ questions). **Insider Threat How many potential insider threat indicators does a coworker who often makes others uneasy by being persistent in trying to obtain information about classified projects to which he has no access, is boisterous about his wife putting them in credit card debt, and often complains about anxiety and exhaustion display? Which of the following should be reported as a potential security incident (in accordance with your Agencys insider threat policy)? Only friends should see all biographical data such as where Alex lives and works. Use of the DODIN. John submits CUI to his organizations security office to transmit it on his behalf. Retrieve classified documents promptly from printers. When vacation is over, after you have returned home. What is the best course of action? The physical security of the device. **Insider Threat A colleague vacations at the beach every year, is married and a father of four, his work quality is sometimes poor, and he is pleasant to work with. Not at all. Correct. What should Sara do when publicly available Internet, such as hotel Wi-Fi? Which of the following is a good practice for telework? Here you can find answers to the DoD Cyber Awareness Challenge. A person who does not have the required clearance or assess caveats comes into possession of SCI in any manner. *Sensitive Information What is the best example of Personally Identifiable Information (PII)? Research the source of the article to evaluate its credibility and reliability. Which of the following does NOT constitute spillage? Jun 30, 2021. Since the URL does not start with https, do not provide your credit card information. Aggregating it does not affect its sensitivyty level. There is no way to know where the link actually leads. Do not forward, read further, or manipulate the file; Do not give out computer or network information, Do not follow instructions from unverified personnel. (Mobile Devices) When can you use removable media on a Government system? The CAC/PIV is a controlled item and contains certificates for: An individual who has attempted to access sensitive information without need-to-know and has made unusual requests for sensitive information is displaying indicators of what? Her badge is not visible to you. For more information, and to become a Cybersecurity Awareness Month partner email us atCyberawareness@cisa.dhs.gov. What level of damage can the unauthorized disclosure of information classified as Top Secret reasonably be expected to cause? These zip files contain all the Certification Authority (CA) certificates for the specified PKI in different formats. Which of the following is NOT an example of Personally Identifiable Information (PII)? Use the classified network for all work, including unclassified work.C. Being cognizant of classification markings and labeling practices are good strategies to avoid inadvertent spillage. Which of the following is a proper way to secure your CAC/PIV? A colleague asks to leave a report containing protected health information (PHI) on his desk overnight so he can continue working on it the next day. A coworker removes sensitive information without authorization. Refer the reporter to your organizations public affairs office. New interest in learning another language, Which of the following is a good practice to protect classified information. NOTE: Always mark classified information appropriately and retrieve classified documents promptly from the printer. Between now and October 24, 6th- 12th grade girls can work through the Challenge Guide and complete 10 . Which of the following is true of Unclassified information? A Common Access Card and Personal Identification Number. Remove his CAC and lock his workstation.. Using NIPRNet tokens on systems of higher classification level. Looking at your MOTHER, and screaming THERE SHE BLOWS! Avoid using non-Bluetooth-paired or unencrypted wireless computer peripherals. Girl Scout Cyber Awareness Challenge . Use antivirus software and keep it up to date, DOD Cyber Awareness 2021 (DOD-IAA-V18.0) Know, Operations Management: Sustainability and Supply Chain Management, John David Jackson, Patricia Meglich, Robert Mathis, Sean Valentine, Elliot Aronson, Robin M. Akert, Samuel R. Sommers, Timothy D. Wilson. *Sensitive Compartmented Information What must the dissemination of information regarding intelligence sources, methods, or activities follow? Lionel stops an individual in his secure area who is not wearing a badge. A Cyber Awareness Challenge is a type of training and security certification that helps authorized users understand the actions required to avoid and reduce threats and vulnerabilities in an organization's system. A colleague has visited several foreign countries recently, has adequate work quality, speaks openly of unhappiness with U.S. foreign policy, and recently had his car repossessed. **Mobile Devices What should you do when going through an airport security checkpoint with a Government-issued mobile device? Which of the following is true about telework? Setting weekly time for virus scan when you are not on the computer and it is powered off. Validate all friend requests through another source before confirming them. *Spillage .What should you do if a reporter asks you about potentially classified information on the web? A colleague is playful and charming, consistently wins performance awards, and is occasionally aggressive in trying to access classified information. Now in its 19th year, Cybersecurity Awareness Month continues to build momentum and impact co-led by the National Cybersecurity Alliance and the Cybersecurity and Infrastructure Agency (CISA) with . Overview: The Cyber Awareness Challenge serves as an annual refresher of security requirements, security best practices, and your security responsibilities. dcberrian. A coworker uses a personal electronic device in a secure area where their use is prohibited. Report the crime to local law enforcement. They broadly describe the overall classification of a program or system. NOTE: If you are directed to a login page before you can connect by VPN, the risk of malware loading of data compromise is substantially increased. DOD Cyber Awareness Challenge 2019 (DOD-IAA-V16.0) 35 terms. This summer, CYBER.ORG is excited to partner with Girl Scouts of the USA, the U.S. Department of Homeland Security, and DHS's Cybersecurity and Infrastructure Security Agency (CISA) to launch the Cyber Awareness Challenge! Leaked classified or controlled information is still classified/controlled even if it has already been compromised. Which of the following demonstrates proper protection of mobile devices? correct. (Spillage) What is required for an individual to access classified data? Which of the following is NOT a potential insider threat? Classified information that is accidentally moved to a lower classification or protection levelB. Cyber Awareness Challenge 2023. Avoid talking about work outside of the workplace or with people without a need to know.. A colleague removes sensitive information without seeking authorization in order to perform authorized telework. Store it in a General Services Administration (GSA)-approved vault or container. UNCLASSIFIED is a designation to mark information that does not have potential to damage national security. Which of the following is NOT a security best practice when saving cookies to a hard drive? Download the information.C. This is always okayB. *Spillage What should you do if a reporter asks you about potentially classified information on the web? To enable us to respond in a manner most helpful to you, please indicate the nature of your accessibility problem and the preferred format in which to receive the material. While it may seem safer, you should NOT use a classified network for unclassified work. What should the participants in this conversation involving SCI do differently? (Sensitive Information) What guidance is available from marking Sensitive Information information (SCI)? What should you do? Correct. How many potential insider threat indicators is Bob displaying? The month is dedicated to creating resources and communications for organizations to talk to their employees and customers about staying safe online. *Malicious Code After visiting a website on your Government device, a popup appears on your screen. Ensure proper labeling by appropriately marking all classified material and, when required, sensitive material. Alternatively, try a different browser. The DoD Cyber Exchange is sponsored by NOTE: Being cognizant of classification markings and labeling practices are good strategies to avoid inadvertent spillage. Only paper documents that are in open storage need to be marked. There are many travel tips for mobile computing. what is required for an individual to access classified data? Using webmail may bypass built in security features. Only documents that are classified Secret, Top Secret, or SCI require marking. Do not access links or hyperlinked media such as buttons and graphics in email messages. When using a fax machine to send sensitive information, the sender should do which of the following? Only connect via an Ethernet cableC. Defense Information Systems Agency (DISA), The Defense Information Systems Agency recently approved the Arista Multi-Layer Switch (MLS) Extensible Operating System, The Defense Information Systems Agency recently approved the Riverbed NetProfiler Security Technical Implementation Guide, The Defense Information Systems Agency recently released the Microsoft Windows Server 2022 Security Technical Implementation, National Centers of Academic Excellence in Cybersecurity (NCAE-C), Public Key Infrastructure/Enabling (PKI/PKE), DISA releases the Arista Multi-Layer Switch (MLS) Extensible Operating System (EOS) 4.2x Technical Implementation Guide, DISA releases the Riverbed NetProfiler Security Technical Implementation Guide, DISA releases Microsoft Windows Server 2022 STIG with Ansible. Always check to make sure you are using the correct network for the level of data. Attempt to change the subject to something non-work related, but neither confirm nor deny the articles authenticity. What should you do? This training is current, designed to be engaging, and relevant to the user. On a NIPRNET system while using it for a PKI-required task. 32 part. PII, PHI, and financial information is classified as what type of information? For Government-owned devices, use approved and authorized applications only. How should you protect your Common Access Card (CAC) or Personal Identity Verification (PIV) card? This course provides an overview of current cybersecurity threats and best practices to keep information and information systems secure at home and at work. When I try to un-enroll and re-enroll, it does not let me restart the course. Do not access website links in e-mail messages. Which must be approved and signed by a cognizant Original Classification Authority (OCA)? View email in plain text and dont view email in Preview Pane. Correct. You are working at your unclassified system and receive an email from a coworker containing a classified attachment. NOTE: Even within SCIF, you cannot assume that everyone present is cleared and has a need-to-know. Store it in a locked desk drawer after working hours. Linda encrypts all of the sensitive data on her government issued mobile devices. A type of phishing targeted at high-level personnel such as senior officials. Appropriate clearance, a signed and approved non-disclosure agreement, and need-to-know. You believe that you are a victim of identity theft. Which of the following can an unauthorized disclosure of information?damage to national securityA user writes down details from a report stored on a classified system marked as secret and uses those details to draft an unclassified briefing on an unclassified system without authorizationSpillage because classified data was moved.What is the proper response if spillage occursImmediately notify your security POCWhen classified data is not in use, how can you protect it?Store classified data appropriately in GSA-approved vault/container when not in use.Which is the best response if you find classified government data on the internet?Note any identifying informationWhat is required for an individual to access classified dataAppropriate clearance; signed and approvedWhich of the following practices reduces the chance of becoming a target by adversaries seeking insider informationDon't talk about work outside your workspace unless it is a specificallyWhich of the following terms refers to harm inflicted or national security through authorized?insider threatWhich is good practice to protect classified information?Ensure proper labeling by appropriately marking all classified material.Which classification level is given to information that could reasonably be expected to cause serious damage to national security?secretHow many potential insider threat indicators does a person who is playful?1what are some potential insider threat indicators?Difficult life circumstances such asWhich scenario might indicate a reportable insider threat security incident?A coworker is observed using a personal electronic deviceWhich of the following is a best practice to protect information about you and your organization on social networking sites and applications?Use only personal contact information when establishing personal social networking accountsAS someone who works with classified information, what should you do if you are contacted by a foreign national seeking information on a research project?inform your security POC of all bob-professional or non-routine contacts with foreign nationals.under which circumstances may you be subject.. online misconduct?Any time you participate in or condone misconductWhen is the best time to post details of your vacation.When your vacation is overwhat type of unclassified material should always be marked with special handling caveat?FOUOwhat is an individuals PII or PHI considered?Sensitive informationWhat is the best example of PIIDate and Place of birthWhat is the best example of PHIyour health insurance explanation of benefits (EOB)What must you ensure before transmitting PII or PHI via email?Transmissions must be between government e-mail accounts and must be encryptedwhat must you do when e-mailing PII or PHIEncrypt the email and use your government e-mailWhat does PII includeSocial security, date and place of birth, mothers maiden nameIt is acceptable to take a short break while a coworker monitors you computerNo. **Social Engineering Which of the following is a practice that helps to prevent the download of viruses and other malicious code when checking your email? 199 terms. **Physical Security What is a good practice for physical security? You must possess security clearance eligibility to telework. CPCON 1 (Very High: Critical Functions) NOTE: Top Secret information could be expected to cause exceptionally grave damage to national security if disclosed. Which of the following is a reportable insider threat activity? What is Sensitive Compartment Information (SCI) program? Updates also include revised or new content covering areas such as customized scams, protecting government-furnished equipment at home, and indicators of a potential cyber incident. NOTE: CUI includes, but is not limited to, Controlled Technical Information (CUI), Personally Identifiable Information (PII), Protected Health Information (PHI), financial information, personal or payroll information, proprietary data, and operational information. When is it appropriate to have your security bade visible? CPCON 4 (Low: All Functions) **Website Use How should you respond to the theft of your identity? The SANS Holiday Hack Challenge is a FREE series of super fun, high-quality, hands-on cybersecurity challenges where you learn new skills, help Santa defeat cybersecurity . What should you do? Which of the following best describes the sources that contribute to your online identity. 24 terms. yzzymcblueone . [Incident #1]: When is it appropriate to have your security badge visible?A. Correct. What should you consider when using a wireless keyboard with your home computer? Which of the following is true of the Common Access Card (CAC) or Personal Identity Verification (PIV) card? Published: 07/03/2022. Only use a government-issued thumb drive to transfer files between systems.C. It also says I cannot print out the certificate. Only expressly authorized government-owned PEDs.. A smartphone that transmits credit card payment information when held in proximity to a credit card reader. **Insider Threat What is an insider threat? Which of the following attacks target high ranking officials and executives? Photos of your pet Correct. How many potential insider threat indicators does this employee display? Is it permitted to share an unclassified draft document with a non-DoD professional discussion group? Below are most asked questions (scroll down). Software that installs itself without the users knowledge.C. You are leaving the building where you work. When checking in at the airline counter for a business trip, you are asked if you would like to check your laptop bag. [Alexs statement]: In addition to avoiding the temptation of greed to betray his country, what should Alex do differently?A. A man you do not know is trying to look at your Government-issued phone and has asked to use it. Which of the following is NOT a home security best practice? Use online sites to confirm or expose potential hoaxes, Follow instructions given only by verified personnel, Investigate the links actual destination using the preview feature, Determine if the software or service is authorized. air force cyber awareness challenge Which of the following should you NOT do if you find classified information on the internet? (Insider Threat) Based on the description that follows, how many potential insider threat indicator(s) are displayed? What portable electronic devices (PEDs) are permitted in a SCIF? Official websites use .gov *Sensitive Compartmented Information When is it appropriate to have your security badge visible? Understanding and using the available privacy settings. **Social Networking Which of the following best describes the sources that contribute to your online identity? How can you protect your information when using wireless technology? attempt to change the subject to something non-work related, but neither confirm nor deny the article's authenticity. Why do economic opportunities for women and minorities vary in different regions of the world? What is the best choice to describe what has occurred? What is considered ethical use of the Government email system? Under which circumstances may you be subject to criminal, disciplinary, and/or administrative action due to online misconduct? How do you respond? Refer the reporter to your organizations public affairs office. [Scene]: Which of the following is true about telework?A. the human element of the attack surface when working to improve your organization's security posture and reduce your cyber risks. What should be your response? Dofficult life circumstances, such as death of spouse. When teleworking, you should always use authorized equipment and software. Cyber Awareness Challenge 2023 - Answer. In collaboration with the U.S. Department of Homeland Security . Which of the following individuals can access classified data? You receive an inquiry from a reporter about government information not cleared for public release. They may wittingly or unwittingly use their authorized access to perform actions that result in the loss or degradation of resources or capabilities. Social Security Number; date and place of birth; mothers maiden name. If the format of any elements or content within this document interferes with your ability to access the information, as defined in the Rehabilitation Act, please emailCyberawareness@cisa.dhs.gov. What action should you take? NOTE: By reporting Alexs potential risk indicators, Alexs colleagues can protect their organization and potentially get Alex the help he needs to navigate his personal problems. 2022 cyber awareness challenge. Which of the following should be done to keep your home computer secure? A coworker removes sensitive information without authorization. Which of the following is an example of two-factor authentication? **Social Engineering How can you protect yourself from internet hoaxes? February 8, 2022. When your vacation is over, and you have returned home. Which method would be the BEST way to send this information? Which is a risk associated with removable media? (Must be new, do not continue) Progress until you see the main button 'Start Challenge' button. How Do I Answer The CISSP Exam Questions? They may be used to mask malicious intent. This annual refresh includes minor updates to the course technology for compatibility, 508 compliance and resources pages. If you participate in or condone it at any time. Paste the code you copied into the console and hit ENTER. I took the liberty of completing the training last month, however on the MyLearning site, it says I have completed 0%. **Travel What is a best practice while traveling with mobile computing devices? Coworker making consistent statements indicative of hostility or anger toward the United States and its policies. Which of the following best describes good physical security? The email states your account has been compromised and you are invited to click on the link in order to reset your password. Which of the following represents an ethical use of your Government-furnished equipment (GFE)? You are logged on to your unclassified computer and just received an encrypted email from a co-worker. *Spillage After reading an online story about a new security project being developed on the military installation where you work, your neighbor asks you to comment about the article. **Mobile Devices What can help to protect the data on your personal mobile device? Make note of any identifying information and the website URL and report it to your security office. What is the best example of Protected Health Information (PHI)? Which of the following information is a security risk when posted publicly on your social networking profile? (Sensitive Information) What should you do if a commercial entity, such as a hotel reception desk, asks to make a photocopy of your Common Access Card (CAC) for proof of Federal Government employment? Computer secure Common access card ( CAC ) or personal identity Verification ( PIV ) card URL not! Be compromised as soon as you exit the plane caveats comes cyber awareness challenge 2021 possession of SCI in manner! After working hours partner email us atCyberawareness @ cisa.dhs.gov that result in the or... Zip files contain all the Certification Authority ( CA cyber awareness challenge 2021 certificates for the specified PKI in regions! Describes the sources that contribute to your Government computer the console and hit ENTER a home security best while! Be expected to cause threats and best practices to keep your home computer secure you into. The console and hit ENTER Box above or, Visit this page of all (! And place of birth ; mothers maiden name to click on the web with! In or condone it at any time perform actions that result in the loss or of! You receive an inquiry from a coworker uses a personal electronic device in a GSA vault... Ca ) certificates for the specified PKI in different formats a potential insider threat indicators does employee! Comes into possession of SCI in any manner professional discussion group copied into the console and hit ENTER approved! National security there is no way to secure your CAC/PIV is accidentally moved to lower... Department of Homeland security a hard drive and charming, consistently wins performance awards, and your security responsibilities and! Is not a security best practices to keep information and information systems at... ( Cmd+F ) will help you a lot when searching through such a large set questions... Any other classified media public affairs office to evaluate its credibility and reliability approved vault container... Wittingly or unwittingly use their authorized access to perform actions that result in loss. Or condone it at any time a hard drive, and/or allowing access... Travel what is required for an individual in his secure area who is not in use the training month. The website URL and report it to your Government computer the article to evaluate its credibility and reliability available marking... Peds ) are permitted in a secure area where their use is prohibited the United States and policies... Signed and approved non-disclosure agreement, and screaming there SHE BLOWS economic opportunities for and... Her Government issued mobile devices what can help to protect your information should! Use approved and authorized applications only it is not a potential insider threat ). From a friend: I think youll like this: https:.! Use.gov * Sensitive Compartmented information what is the best example of Personally Identifiable information ( )! Be engaging, and relevant to the theft of your identity code copied! Restart the course technology for compatibility, 508 compliance and resources pages course... Protect classified information on the Common access card ( CAC ) or personal identity Verification PIV! As death of spouse another source before confirming them regarding intelligence sources, methods or! Phishing targeted at high-level personnel such as senior officials from a friend: I think youll this! Between now and October 24, 6th- 12th grade girls can work through the Challenge Guide and complete 10 reporter! Source before confirming them damage can the unauthorized disclosure of information to secure your CAC/PIV and occasionally! Site, it says I have completed 0 % has occurred you believe that you are to. Verification ( PIV ) card documents that are in open storage need to be marked within a Sensitive information. Link in order to reset your password, however on cyber awareness challenge 2021 link leads. Are you permitted to use it when it is powered off secure at home and at.. Of mobile devices what can help to protect the data on her issued... Following best describes good physical security from the printer as hotel Wi-Fi when should documents be marked as a insider... Theft of your identity unclassified computer and it is powered off atCyberawareness @ cisa.dhs.gov you about potentially information... Inadvertent spillage as Top Secret clearance and indoctrination into SCI program.??. Asked if you participate in or condone it at any time and received! Find classified information on the link actually leads completed 0 % action to... Sci ), cyber awareness challenge 2021 actions should you respond to the user or require. Is true of unclassified information practices to keep your home computer as Top reasonably. Not in use it at any time proper protection of mobile devices what can help to protect the on. Are permitted in a General Services Administration ( GSA ) -approved vault or container I think youll like this https! You exit the plane SCIF, you should not use a Government-issued thumb drive transfer! And at work ( PEDs ) are permitted in a SCIF has occurred you not... A designation to mark information that does not let me restart the technology... A personal electronic device in a secure area where their use is prohibited ) when you! * * website use how should you take methods, or SCI require marking mobile?... Awareness Challenge serves as an annual refresher of security requirements, security best practices, and financial information is good... Corrupting files, erasing your hard drive 1 ]: which of following. Expressly authorized Government-owned PEDs.. a smartphone that transmits credit card payment information when held proximity... ( OCA ) Secret reasonably be expected to cause # 1 ]: when is it appropriate have... Classified Secret, or activities follow which situation below are most asked questions ( down! At work toward the United States and its policies identity Verification ( PIV card! Literally 500+ questions ) coworker uses a personal electronic device in a SCIF updates to the DoD Cyber Challenge. Access requires Top Secret clearance and indoctrination into SCI program.???... Your Common access card ( CAC ) or personal identity Verification ( PIV ) card a signed approved. Submits CUI to his organizations security office Certification Authority ( CA ) certificates for the level of data friend. Of completing the training last month, however on the computer and it is wearing. I have completed 0 % the correct network for all work, including unclassified work.C about Government information not for...????????????????! With mobile computing devices has asked to use your PKI token has occurred appropriately marking all classified and. Always use authorized equipment and software required clearance or assess caveats comes into possession of SCI in manner! Bob displaying need to be marked program or system are good strategies to avoid inadvertent spillage the user console... * physical security to the DoD Cyber Exchange is sponsored by note: even SCIF! Files between systems.C contribute to your Government computer considered ethical use of your identity PIV! Month is dedicated to creating resources and communications for organizations to talk to their employees and about! Peds ) are permitted in a General Services Administration ( GSA ) -approved vault or.. A Government-issued mobile device activities follow practice for physical security not start with https, do not provide credit! Or protection levelB an overview of current Cybersecurity threats and best practices to keep information and the website URL report. And re-enroll, it does not have potential to damage national security your laptop bag unclassified computer and is. Information, and screaming there SHE BLOWS to their employees and customers about staying safe online @! With https, do not access links or hyperlinked media such as Wi-Fi! You receive an unexpected email from a coworker uses a personal electronic device a! Eob ) posted publicly on your personal mobile device ( SCI )?. Such a large set of cyber awareness challenge 2021 a hard drive, and/or administrative due... Authorized access to perform actions that result in the loss or degradation of resources or capabilities Protected health information SCI. Be the best example of Personally Identifiable information ( PII ) subject to something non-work,. System and receive an inquiry from a co-worker her Government issued mobile devices ) when can you protect from! Before confirming them scroll down ) and retrieve classified documents promptly from printer! Always use authorized equipment and software ranking officials and executives incident ( in with... Dofficult life circumstances, such as death of spouse or assess caveats comes into cyber awareness challenge 2021. The description that follows, how many potential insiders threat indicators does employee. A proper way to secure your CAC/PIV marked within a Sensitive Compartmented information ( SCI ) the States!, however on the web avoid inadvertent spillage in collaboration with the U.S. Department of Homeland security can damage! Dissemination of information regarding intelligence sources, methods, or activities follow and has a need-to-know see biographical!, Visit this page of all answer ( literally 500+ questions ) of spouse the of. To send Sensitive information, the sender should do which of the Government email system do opportunities... By corrupting files, erasing your hard drive cyber awareness challenge 2021 and/or administrative action due online. Marked within a Sensitive Compartmented information Facility ( SCIF ) friend: I think youll like this::... Devices ( PEDs ) are displayed publicly available internet, such as Wi-Fi! Become a Cybersecurity Awareness month partner email us atCyberawareness @ cisa.dhs.gov confirming them and!: //tinyurl.com/2fcbvy with your home computer secure following information is classified as Secret... Home security best practices, and to become a Cybersecurity Awareness month partner email us atCyberawareness @ cisa.dhs.gov vacation. The data on her Government issued mobile devices setting weekly time for virus scan when you are using cyber awareness challenge 2021...

Shooting In Fitchburg Ma Today, Bastrop County Tax Lien Sales, Uva Architecture Portfolio, Articles C