cyber awareness challenge 2021

For instance, Cyber4Dev collaborated with eBotho, a Botswana NGO to launch CyberSmartBW and the CyberSmart challenge to raise awareness of Cyber hygiene and Cybersecurity through TV, webinar, and radio (Cyber4Dev, 2021) during the month of October which is recognized as cybersecurity month in many countries (The Midweek Sun, 2020). Upon connecting your Government-issued laptop to a public wireless connection, what should you immediately do? What is the best example of Protected Health Information (PHI)? (social networking) Which of the following is a security best practice when using social networking sites? A colleague is playful and charming, consistently wins performance awards, and is occasionally aggressive in trying to access classified information. Which of the following is NOT a typical means for spreading malicious code? The DoD Cyber Exchange SIPR provides access to cyber training and guidance to users with a SIPRNet token. P2P (Peer-to-Peer) software can do the following except: Allow attackers physical access to network assets. Ensure proper labeling by appropriately marking all classified material and, when required, sensitive material. Which scenario might indicate a reportable insider threat security incident? *Sensitive Compartmented Information When is it appropriate to have your security badge visible? (controlled unclassified information) Which of the following is NOT an example of CUI? Only expressly authorized government-owned PEDs. Your password and a code you receive via text message. This training is current, designed to be engaging, and relevant to the user. Paul verifies that the information is CUI, includes a CUI marking in the subject header and digitally signs an e-mail containing CUI. It is getting late on Friday. Three or more, NOTE: Alex demonstrates a lot of potential insider threat indicators, including difficult life circumstances, unexplained affluence, and unusual interest in classified information. A Common Access Card and Personal Identification Number. Issues with Cyber Awareness Challenge. What is the best course of action? They may be used to mask malicious intent. **Identity Management Which of the following is the nest description of two-factor authentication? What should you do if a reporter asks you about potentially classified information on the web? Be aware of classification markings and all handling caveats. Linda encrypts all of the sensitive data on her government-issued mobile devices.C. A person who does not have the required clearance or assess caveats comes into possession of SCI in any manner. Three or more. Senior government personnel, military or civilian. **Use of GFE What is a critical consideration on using cloud-based file sharing and storage applications on your Government-furnished equipment (GFE)? Start a new Cyber Security Awareness Challenge session. (Sensitive Compartmented Information) Which of the following best describes the compromise of Sensitive Compartmented Information (SCI)? Always take your Common Access Card (CAC) when you leave your workstation. correct. Your favorite movie. Defense Information Systems Agency (DISA), The Defense Information Systems Agency recently approved the Arista Multi-Layer Switch (MLS) Extensible Operating System, The Defense Information Systems Agency recently approved the Riverbed NetProfiler Security Technical Implementation Guide, The Defense Information Systems Agency recently released the Microsoft Windows Server 2022 Security Technical Implementation, National Centers of Academic Excellence in Cybersecurity (NCAE-C), Public Key Infrastructure/Enabling (PKI/PKE), DISA releases the Arista Multi-Layer Switch (MLS) Extensible Operating System (EOS) 4.2x Technical Implementation Guide, DISA releases the Riverbed NetProfiler Security Technical Implementation Guide, DISA releases Microsoft Windows Server 2022 STIG with Ansible. (Spillage) When is the safest time to post details of your vacation activities on your social networking website? Her badge is not visible to you. what should you do? **Insider Threat How many potential insider threat indicators does a person who is playful and charming, consistently wins performance awards, but is occasionally aggressive in trying to access sensitive information display? When traveling or working away from your main location, what steps should you take to protect your devices and data? Spillage occurs when information is spilled from a higher classification or protection level to a lower classification or protection level. Retrieve classified documents promptly from printers.. The answers here are current and are contained within three (3) incidents: spillage, Controlled Unclassified Information (CUI), and malicious codes. Which is a way to protect against phishing attacks? Adversaries exploit social networking sites to disseminate fake news Correct. Attempt to change the subject to something non-work related, but neither confirm nor deny the articles authenticity. Which of the following is NOT one? **Social Networking Which of the following best describes the sources that contribute to your online identity? The purpose of the Cyber Awareness Challenge is to influence behavior, focusing on actions that authorized users can engage to mitigate threats and vulnerabilities to DoD Information Systems. dcberrian. Call your security point of contact immediately. Use of the DODIN. **Identity management Which of the following is NOT a best practice to preserve the authenticity of your identity? laptops, fitness bands, tablets, smartphones, electric readers, and Bluetooth devices. classified material must be appropriately marked. What should you do? Always use DoD PKI tokens within their designated classification level. At the end of the Challenge, participants will be encouraged to publish an article about ransomware to raise . What information relates to the physical or mental health of an individual? Insiders are given a level of trust and have authorized access to Government information systems. *Social Networking Assess your surroundings to be sure no one overhears anything they shouldnt. Press F12 on your keyboard to open developer tools. Nothing. It also says I cannot print out the certificate. CUI may be stored on any password-protected system.B. What certificates are contained on the Common Access Card (CAC)? *Malicious Code Which of the following is NOT a way that malicious code spreads? 870 Summit Park Avenue Auburn Hills, MI 48057. Download the information. Note the websites URL and report the situation to your security point of contact. **Travel Which of the following is true of traveling overseas with a mobile phone? *Insider Threat Which of the following is a potential insider threat indicator? (Sensitive Compartmented Information) What portable electronic devices (PEDs) are allow in a Secure Compartmented Information Facility (SCIF)? What level of damage can the unauthorized disclosure of information classified as confidential reasonably be expected to cause? The DoD Cyber Exchange NIPR provides exclusive access to cyber training and guidance to users with DoD Public Key Infrastructure (PKI) credentials (or equivalent). The website requires a credit card for registration. Financial information. For more information, and to become a Cybersecurity Awareness Month partner email us atCyberawareness@cisa.dhs.gov. What can be used to track Marias web browsing habits? Found a mistake? An official website of the United States government. Have your permissions from your organization, follow your organization guideline, use authorized equipment and software, employ cyber security best practice, perform telework in dedicated when home. Your health insurance explanation of benefits (EOB). Unclassified documents do not need to be marked as a SCIF. Report it to security. On a NIPRNET system while using it for a PKI-required task. ~All documents should be appropriately marked, regardless of format, sensitivity, or classification. The CAC/PIV is a controlled item and contains certificates for: An individual who has attempted to access sensitive information without need-to-know and has made unusual requests for sensitive information is displaying indicators of what? A type of phishing targeted at high-level personnel such as senior officials. **Mobile Devices Which is a rule for removable media, other portable electronic devices (PEDs), and mobile computing devices to protect Government systems? It is created or received by a healthcare provider, health plan, or employer. Store classified data in a locked desk drawer when not in use Maybe Now through October 24, 2021, complete the activities and submit a description of your work to receive a certificate of recognition from DHS. You have reached the office door to exit your controlled area. Acquisition. It contains certificates for identification, encryption, and digital signature. Make note of any identifying information and the website URL and report it to your security office. Cyber Awareness Challenge 2023 is Online! Data about you collected from all sites, apps, and devices that you use can be aggregated to form a profile of you. Linda encrypts all of the sensitive data on her government issued mobile devices. Which of the following is NOT true of traveling overseas with a mobile phone? You are logged on to your unclassified computer and just received an encrypted email from a co-worker. Which of the following represents an ethical use of your Government-furnished equipment (GFE)? correct. 14 Cybersecurity Awareness Training PPT for Employees - Webroot. NOTE: Even within SCIF, you cannot assume that everyone present is cleared and has a need-to-know. NOTE: You must have permission from your organization to telework. What is a possible indication of a malicious code attack in progress? tell your colleague that it needs to be secured in a cabinet or container. What level of damage to national security could reasonably be expected if unauthorized disclosure of Top Secret information occurred? If authorized, what can be done on a work computer? The Cybersecurity and Infrastructure Security Agency (CISA) and the National Cybersecurity Alliance (NCA) lead a collaborative effort between government and industry to raise cybersecurity awareness nationally and internationally. Only connect to known networks. Maybe **Insider Threat Which scenario might indicate a reportable insider threat? Government-owned PEDs, if expressly authorized by your agency. Only paper documents that are in open storage need to be marked. (Spillage) When classified data is not in use, how can you protect it? What should the participants in this conversation involving SCI do differently? Only use a government-issued thumb drive to transfer files between systems.C. *Sensitive Information Which of the following is an example of Protected Health Information (PHI)? 5. Position your monitor so that it is not facing others or easily observed by others when in use Correct. Which of the following is NOT an example of sensitive information? As long as the document is cleared for public release, you may release it outside of DoD. the human element of the attack surface when working to improve your organization's security posture and reduce your cyber risks. The purpose of the Cyber Awareness Challenge is to influence behavior, focusing on actions that authorized users can engage to mitigate threats and vulnerabilities to DoD Information Systems. **Website Use How should you respond to the theft of your identity? Your password and the second commonly includes a text with a code sent to your phone. Use only your personal contact information when establishing your account. Other - Dod cyber awareness test 2021/2022; answered 100% 4. **Social Engineering Which of the following is a practice that helps to prevent the download of viruses and other malicious code when checking your email? The website requires a credit card for registration. What is the danger of using public Wi-Fi connections? Ask probing questions of potential network contacts to ascertain their true identity.C. What portable electronic devices (PEDs) are permitted in a SCIF? Only documents that are classified Secret, Top Secret, or SCI require marking.

Philips 3200 Lattego Warning Lights, Spiritfarer How To Bounce, Samsung Refrigerator Lawsuit File A Claim, Meow The Cat Pet Hack, Berkshire Autographs And Memorabilia Website, Articles C