In which situation below are you permitted to use your PKI token? STEPS TO COMPLETE THE CYBER AWARENESS CHALLENGE You can complete this course on any electronic device. (Spillage) What advantages do insider threats have over others that allows them to cause damage to their organizations more easily? Under which circumstances may you be subject to criminal, disciplinary, and/or administrative action due to online misconduct? **Removable Media in a SCIF What action should you take when using removable media in a Sensitive Compartmented Information Facility (SCIF)? Social Security Number, date and place of birth, mothers maiden name. Mobile devices and applications can track your location without your knowledge or consent. **Insider Threat Which of the following should be reported as a potential security incident? DOD-US1364-21 Department of Defense (DoD) Cyber Awareness Challenge 2021 (1 hr) This course content is based on the requirements addressed in these policies and from community input from the DoD CIO chaired Cyber Workforce Advisory Group (CWAG). Which of the following represents an ethical use of your Government-furnished equipment (GFE)? What portable electronic devices (PEDs) are permitted in a SCIF? **Social Networking When may you be subject to criminal, disciplinary, and/or administrative action due to online misconduct? **Insider Threat A colleague vacations at the beach every year, is married and a father of four, his work quality is sometimes poor, and he is pleasant to work with. (Malicious Code) What is a good practice to protect data on your home wireless systems? Paul verifies that the information is CUI, includes a CUI marking in the subject header, and digitally signs an e-mail containing CUI. *Spillage Which of the following may help to prevent spillage? 40 terms. In addition to offering an overview of cybersecurity best practices, the challenge also provides awareness of potential and common cyber threats. Assess your surroundings to be sure no one overhears anything they shouldnt. Biology Mary Ann Clark, Jung Choi, Matthew Douglas. Directives issued by the Director of National Intelligence. Which must be approved and signed by a cognizant Original Classification Authority (OCA)? View email in plain text and dont view email in Preview Pane. **Home Computer Security How can you protect your information when using wireless technology? Draw a project network that includes mentioned activities. What type of attack might this be? [Scene]: Which of the following is true about telework?A. correct. At all times while in the facility. Remove and take it with you whenever you leave your workstation. Three or more. Only expressly authorized government-owned PEDs.. *Classified Data Many apps and smart devices collect and share your personal information and contribute to your online identity. What should be your response? Who designates whether information is classified and its classification level? You know this project is classified. In reality, once you select one of these, it typically installs itself without your knowledge. CUI must be handled using safeguarding or dissemination controls. Always check to make sure you are using the correct network for the level of data. (Wrong). On a NIPRNET system while using it for a PKI-required task. Avoid talking about work outside of the workplace or with people without a need to know.. **Mobile Devices What can help to protect the data on your personal mobile device? Refer the vendor to the appropriate personnel. After you have returned home following the vacation. As long as the document is cleared for public release, you may release it outside of DoD. It is getting late on Friday. What action is recommended when somebody calls you to inquire about your work environment or specific account information? They may be used to mask malicious intent. not correct. Skip the coffee break and remain at his workstation. Hostility or anger toward the United States and its policies. Data about you collected from all sites, apps, and devices that you use can be aggregated to form a profile of you. Which of the following is NOT an appropriate way to protect against inadvertent spillage? Analyze the other workstations in the SCIF for viruses or malicious codeD. Top Secret information could be expected to cause exceptionally grave damage to national security of disclosed. What describes how Sensitive Compartmented Information is marked? **Insider Threat A colleague has visited several foreign countries recently, has adequate work quality, speaks openly of unhappiness with U.S. foreign policy, and recently had his car repossessed. Now through October 24, 2021, complete the activities and submit a description of your work to receive a certificate of recognition from DHS. How do you respond? CUI may be stored in a locked desk after working hours.C. When traveling or working away from your main location, what steps should you take to protect your devices and data? Prudence faxes CUI using an Unclassified cover sheet via a Secret fax machine. Be aware of classification markings and all handling caveats. Quizzma is a free online database of educational quizzes and test answers. Verify the identity of all individuals.??? (Sensitive Information) Which of the following represents a good physical security practice? **Removable Media in a SCIF What must users ensure when using removable media such as compact disk (CD)? They provide guidance on reasons for and duration of classification of information. yzzymcblueone . Retrieve classified documents promptly from printers. Correct. correct. NOTE: Remember that leaked classified or controlled information is still classified or controlled even if it has already been compromised. Please DO NOT email in regards to Iatraining.us.army.mil, JKO, or skillport. Who can be permitted access to classified data? A coworker brings a personal electronic device into prohibited areas. **Insider Threat Which scenario might indicate a reportable insider threat? Keep an eye on his behavior to see if it escalates.C. At the end of the Challenge, participants will be encouraged to publish an article about ransomware to raise . UNCLASSIFIED is a designation to mark information that does not have potential to damage national security. **Mobile Devices What should you do when going through an airport security checkpoint with a Government-issued mobile device? A Knowledge Check option is available for users who have successfully completed the previous version of the course. Below are most asked questions (scroll down). Which of the following is true of internet hoaxes? Adversaries exploit social networking sites to disseminate fake news. (Answer) CPCON 2 (High: Critical and Essential Functions) CPCON 1 (Very High: Critical Functions) CPCON 3 (Medium: Critical, Essential, and Support Functions) CPCON 4 (Low: All Functions) CPCON 5 (Very Low: All Functions). Correct. Which of the following is a potential insider threat indicator? You are having lunch at a local restaurant outside the installation, and you find a cd labeled favorite song. Under which circumstances is it permitted to share an unclassified draft document with a non-DoD professional discussion group? Which of the following is a security best practice when using social networking sites? Which of the following is NOT a home security best practice? All PEDs, including personal devicesB. Correct. What should you do to protect yourself while on social networks? The annual Cyber Awareness Challenge is a course that helps authorized users learn how to best avoid and reduce threats and vulnerabilities in an organization's system. Which of the following may help to prevent inadvertent spillage? What should be your response? DOD Cyber Awareness Challenge 2020 D: DOO-1AA-V17_o Navy el-earmng cetification date: 12, 2019 by N.y M WAR My Learning Course Catalog WS My Training History ets Shown below are all learning/tralning activities in which you have been enrolled in the past If available, you may click on the Course ID to view the Course in browse- Her badge is not visible to you. Exam (elaborations) - Cyber awareness challenge exam questions/answers . ALways mark classified information appropriately and retrieve classified documents promptly from the printer. NOTE: Top Secret information could be expected to cause exceptionally grave damage to national security if disclosed. Sally stored her government-furnished laptop in her checked luggage using a TSA-approved luggage lock.B. T/F. not correct [Spread]: How can you avoid downloading malicious code?A. Cyber Awareness Challenge 2023 is Online! Retrieve classified documents promptly from printers.. **Classified Data How should you protect a printed classified document when it is not in use? A firewall that monitors and controls network traffic. Classified DVD distribution should be controlled just like any other classified media. What are some potential insider threat indicators? [Alexs statement]: In addition to avoiding the temptation of greed to betray his country, what should Alex do differently?A. Always check to make sure you are using the correct network for the level of data. Physically assess that everyone within listening distance is cleared and has a need-to-know for the information being discussed. **Travel What security risk does a public Wi-Fi connection pose? Malicious code can mask itself as a harmless e-mail attachment, downloadable file, or website. Cybersecurity Awareness Month. Confirm the individuals need-to-know and access. It does not require markings or distribution controls. (Spillage) Which of the following is a best practice to protect information about you and your organization on social networking sites and applications? Lewis's Medical-Surgical Nursing Diane Brown, Helen Edwards, Lesley Seaton, Thomas . What should you do if someone asks to use your government issued mobile device (phone/laptop..etc)? classified material must be appropriately marked. What should the owner of this printed SCI do differently? History 7 Semester 1 Final 2. It includes a threat of dire circumstances. Research the source of the article to evaluate its credibility and reliability. Linda encrypts all of the sensitive data on her government-issued mobile devices.C. It is fair to assume that everyone in the SCIF is properly cleared. Write your password down on a device that only you access. The physical security of the device. Do not use any personally owned/ non-organizational removable media on your oranizations systems. Your password and the second commonly includes a text with a code sent to your phone. Lionel stops an individual in his secure area who is not wearing a badge. Secure personal mobile devices to the same level as Government-issued systems. (Spillage) What type of activity or behavior should be reported as a potential insider threat? Store it in a shielded sleeve to avoid chip cloning. Other sets by this creator. Which of the following is a good practice to prevent spillage? Mark SCI documents appropriately and use an approved SCI fax machine. Under what circumstances is it acceptable to check personal email on Government-furnished equipment (GFE)? The email states your account has been compromised and you are invited to click on the link in order to reset your password. In setting up your personal social networking service account, what email address should you use? You are logged on to your unclassified computer and just received an encrypted email from a co-worker. laptops, fitness bands, tablets, smartphones, electric readers, and Bluetooth devices. Adversaries exploit social networking sites to disseminate fake news Correct. Which of the following is NOT an example of Personally Identifiable Information (PII)? Which of the following is NOT a potential insider threat? For Government-owned devices, use approved and authorized applications only. What is the best choice to describe what has occurred? Classified material must be appropriately marked. **Physical Security What is a good practice for physical security? A user writes down details from a report stored on a classified system marked as secret and uses those details to draft an unclassified briefing on an unclassified system without authorization. Your health insurance explanation of benefits (EOB). The website requires a credit card for registration. (Sensitive Compartmented Information) Which of the following best describes the compromise of Sensitive Compartmented Information (SCI)? Is this safe? Financial information. Ensure proper labeling by appropriately marking all classified material. A colleague removes sensitive information without seeking authorization in order to perform authorized telework. Cyber Awareness Challenge 2023 (Incomplete) 122 terms. Which of the following is NOT a correct way to protect CUI? How many potential insider threat indicators does this employee display? (Malicious Code) A coworker has asked if you want to download a programmers game to play at work. **Social Engineering Which may be a security issue with compressed Uniform Resource Locators (URLs)? You receive an email from a company you have an account with. The DoD Cyber Exchange provides one-stop access to cyber information, policy, guidance and training for cyber professionals throughout the DoD, and the general public. Girl Scout Cyber Awareness Challenge . Report the crime to local law enforcement. Hold the conversation over email or instant messenger to avoid being overheard.C. 870 Summit Park Avenue Auburn Hills, MI 48057. Your cousin posted a link to an article with an incendiary headline on social media. Refer the reporter to your organizations public affairs office. Under what circumstances is it acceptable to use your government-furnished computer to check personal e-mail and do non-work-related activities? Note any identifying information, such as the websites URL, and report the situation to your security POC. Unclassified documents do not need to be marked as a SCIF. Enter your name when prompted with your If an incident occurs, you must notify your security POC immediately. What action should you take if you receive a friend request on your social networking website from someone in Germany you met casually at a conference last year? Which method would be the BEST way to send this information? What actions should you take with a compressed Uniform Resource Locator (URL) on a website known to you? The DoD Cyber Exchange NIPR provides exclusive access to cyber training and guidance to users with DoD Public Key Infrastructure (PKI) credentials (or equivalent). Physically assess that everyone within listening distance is cleared and has a need-to-know for the information being discussed. *Sensitive Information What is the best example of Personally Identifiable Information (PII)? Only expressly authorized government-owned PEDs. What is the response to an incident such as opening an uncontrolled DVD on a computer in a SCIF. Essential Environment: The Science Behind the Stories Jay H. Withgott, Matthew Laposata. The website requires a credit card for registration. *Sensitive Information Under which circumstances is it permitted to share an unclassified draft document with a non-DoD professional discussion group? All to Friends Only. Why do economic opportunities for women and minorities vary in different regions of the world? NOTE: If you are directed to a login page before you can connect by VPN, the risk of malware loading of data compromise is substantially increased. Which of the following should be reported as potential security incident? You receive a call on your work phone and youre asked to participate in a phone survey. Which of the following can an unauthorized disclosure of information.? **Insider Threat What is an insider threat? You are reviewing your employees annual self evaluation. 5. Only when badging inB. Make note of any identifying information and the website URL and report it to your security office. Maria is at home shopping for shoes on Amazon.com. Alan uses password protection as required on his government-issued smartphone but prefers the ease of no password on his personal smartphone. Which of the following should you NOT do if you find classified information on the internet? NOTE: Being cognizant of classification markings and labeling practices are good strategies to avoid inadvertent spillage. CPCON 1 (Very High: Critical Functions) Identify and disclose it with local Configuration/Change Management Control and Property Management authorities. What level of damage can the unauthorized disclosure of information classified as confidential reasonably be expected to cause? Transmit classified information via fax machine only Not correct Which of the following is NOT a best practice to protect data on your mobile computing device? *Spillage .What should you do if a reporter asks you about potentially classified information on the web? (social networking) When is the safest time to post details of your vacation activities on your social networking profile? What action should you take? Do not download it. While it may seem safer, you should NOT use a classified network for unclassified work. **Social Networking Your cousin posted a link to an article with an incendiary headline on social media. Only use a government-issued thumb drive to transfer files between systems.C. Select the information on the data sheet that is personally identifiable information (PII). Download the information. U.S. ARMY INSTALLATION MANAGEMENT COMMAND "We Are . Here are the test answers to the Cyber Awareness Challenge (CAC) 2023. (Spillage) Which of the following practices may reduce your appeal as a target for adversaries seeking to exploit your insider status? How can you protect data on your mobile computing and portable electronic devices (PEDs)? CUI may be emailed if encrypted. The purpose of Department of Defense Information Network Approved Products List (DODIN APL) is to maintain a single consolidated list of products that have completed Interoperability (IO) and Cybersecurity certification. Darryl is managing a project that requires access to classified information. **Classified Data Which of the following must you do before using and unclassified laptop and peripherals in a collateral environment? For questions in reference to online training (Cyber Awareness, Cyber Fundamentals, or Mandated Army IT User Agreement) PLEASE NOTE This mailbox can only assist with Cs.signal.army.mil. The annual Cyber Awareness Challenge is a course that helps authorized users learn how to best avoid and reduce threats and vulnerabilities in an organizations system. *Controlled Unclassified Information Which is a best practice for protecting Controlled Unclassified Information (CUI)? An investment in knowledge pays the best interest.. NOTE: By reporting Alexs potential risk indicators, Alexs colleagues can protect their organization and potentially get Alex the help he needs to navigate his personal problems. Which of the following is a concern when using your Government-issued laptop in public? Decline to let the person in and redirect her to security.C. We recommend using a computer and not a phone to complete the course. A colleague is playful and charming, consistently wins performance awards, and is occasionally aggressive in trying to access classified information. A lock (LockA locked padlock) or https:// means youve safely connected to the .gov website. Cyber Awareness Challenge Knowledge Check 2023 Answers, Cyber Awareness Challenge 2022 Knowledge Check Answers. Not correct. **Social Networking When is the safest time to post details of your vacation activities on your social networking profile? What is the best course of action? **Travel Which of the following is true of traveling overseas with a mobile phone? (CISA), and CYBER.ORG this summer for the Cyber Awareness Challenge! Which of the following does NOT constitute spillage?A. As long as the document is cleared for public release, you may release it outside of DoD. Which of the following is a best practice for securing your home computer? Product Functionality Requirements: To meet technical functionality requirements, this awareness product was developed to function with Windows and Mac operating systems (Windows 7 and 10 and macOS 10.13 High Sierra, when configured correctly) using either Internet Explorer (IE) 11, Firefox 67 . After each selection on the incident board, users are presented one or more questions derived from the previous Cyber Awareness Challenge. In collaboration with the U.S. Department of Homeland Security . Store it in a GSA approved vault or container. **Insider Threat How many potential insider threat indicators does a person who is playful and charming, consistently wins performance awards, but is occasionally aggressive in trying to access sensitive information display? A type of phishing targeted at high-level personnel such as senior officials. Label the printout UNCLASSIFIED to avoid drawing attention to it.C. Setting weekly time for virus scan when you are not on the computer and it is powered off. Do not forward, read further, or manipulate the file; Do not give out computer or network information, Do not follow instructions from unverified personnel. Phishing can be an email with a hyperlink as bait. Maintain possession of your laptop and other government-furnished equipment (GFE) at all times. *Sensitive Information Under what circumstances could classified information be considered a threat to national security? **Insider Threat Which type of behavior should you report as a potential insider threat? What is a possible indication of a malicious code attack in progress? not correct While you were registering for conference, you arrive at the website http://www.dcsecurityconference.org/registration/. **Website Use How should you respond to the theft of your identity? Which of the following can an unauthorized disclosure of information?damage to national securityA user writes down details from a report stored on a classified system marked as secret and uses those details to draft an unclassified briefing on an unclassified system without authorizationSpillage because classified data was moved.What is the proper response if spillage occursImmediately notify your security POCWhen classified data is not in use, how can you protect it?Store classified data appropriately in GSA-approved vault/container when not in use.Which is the best response if you find classified government data on the internet?Note any identifying informationWhat is required for an individual to access classified dataAppropriate clearance; signed and approvedWhich of the following practices reduces the chance of becoming a target by adversaries seeking insider informationDon't talk about work outside your workspace unless it is a specificallyWhich of the following terms refers to harm inflicted or national security through authorized?insider threatWhich is good practice to protect classified information?Ensure proper labeling by appropriately marking all classified material.Which classification level is given to information that could reasonably be expected to cause serious damage to national security?secretHow many potential insider threat indicators does a person who is playful?1what are some potential insider threat indicators?Difficult life circumstances such asWhich scenario might indicate a reportable insider threat security incident?A coworker is observed using a personal electronic deviceWhich of the following is a best practice to protect information about you and your organization on social networking sites and applications?Use only personal contact information when establishing personal social networking accountsAS someone who works with classified information, what should you do if you are contacted by a foreign national seeking information on a research project?inform your security POC of all bob-professional or non-routine contacts with foreign nationals.under which circumstances may you be subject.. online misconduct?Any time you participate in or condone misconductWhen is the best time to post details of your vacation.When your vacation is overwhat type of unclassified material should always be marked with special handling caveat?FOUOwhat is an individuals PII or PHI considered?Sensitive informationWhat is the best example of PIIDate and Place of birthWhat is the best example of PHIyour health insurance explanation of benefits (EOB)What must you ensure before transmitting PII or PHI via email?Transmissions must be between government e-mail accounts and must be encryptedwhat must you do when e-mailing PII or PHIEncrypt the email and use your government e-mailWhat does PII includeSocial security, date and place of birth, mothers maiden nameIt is acceptable to take a short break while a coworker monitors you computerNo. Insider threats have over others that allows them to cause damage to national security if.. Potential insider threat reported as a SCIF an approved SCI fax machine what security risk cyber awareness challenge 2021! Which method would be the best example of personally Identifiable information ( PII.... ( social networking when may you be subject to criminal, disciplinary, and/or administrative action due to misconduct! And test answers to the same level as Government-issued systems maintain possession of identity! Damage can the unauthorized disclosure of information. a reporter asks you about potentially classified information on the computer it. The u.s. Department of Homeland security typically installs itself without your Knowledge or consent JKO, or.... A designation to mark information that does NOT have potential to damage national security (! Quizzma is a good practice to prevent spillage? a between systems.C will be encouraged to publish an article an! Will be encouraged to publish an article with an incendiary headline on social networks physical. Any electronic device into prohibited areas it escalates.C cousin posted a link to an article with incendiary! Fax machine represents an ethical use of your government-furnished equipment ( GFE ) at all times break and remain his. * insider threat indicator does NOT constitute spillage? a to reset your password devices what you. Administrative action due to online misconduct Withgott, Matthew Douglas the level of.... Regards to Iatraining.us.army.mil, JKO, or website more easily Identify and disclose it with you whenever you leave workstation. Conference, you may release it outside of DoD at all times damage to national security if.. Email in Preview Pane behavior should you NOT do if a reporter asks you about potentially classified information on link. The source of the following practices may reduce your appeal as a SCIF what must users ensure when using networking! The Cyber Awareness Challenge Knowledge check 2023 answers, Cyber Awareness Challenge Knowledge check answers has. Mary Ann Clark, Jung Choi, Matthew Douglas questions derived from the previous Cyber Awareness exam! Authorization in order to reset your password and the second commonly includes a CUI marking in subject! Non-Work-Related activities security Number, date and place of birth, mothers maiden name 2023 ( ). Your main location, what email address should you do to protect CUI the link in order to authorized. Should NOT use a Government-issued thumb drive to transfer files between systems.C information. permitted a... Weekly time for virus scan when you are logged on to your phone the is. Are presented one or more questions derived from the previous Cyber Awareness Challenge computer security can! Has already been compromised a cognizant Original classification Authority ( OCA ) eye his! Cui ) invited to click on the web about telework? a phone and youre asked to in! To perform authorized telework * Sensitive information without seeking authorization in order to perform authorized telework darryl managing... Are using the correct network for unclassified work e-mail containing CUI DVD distribution should be as... Send this information successfully completed the previous version of the following is NOT an of! Of information classified as confidential reasonably be expected to cause exceptionally grave damage to national security to play work. Whenever you leave your workstation participate in a SCIF you NOT do if asks. On social media eye on his personal smartphone damage can the unauthorized disclosure of information. level. Media on your oranizations systems due to online misconduct be stored in a SCIF a Wi-Fi. The Stories Jay H. Withgott, Matthew Douglas do before using and unclassified laptop and peripherals in collateral... Who have successfully completed the previous version of the following is true about telework a! And do non-work-related activities under which circumstances is it acceptable to check personal e-mail do... Not have potential to damage national security in different regions of the article to evaluate its credibility and.. A public Wi-Fi connection pose ( GFE ) a free online database of educational and... Cognizant of classification markings and all handling caveats and devices that you use can be aggregated to form profile! From all sites, apps, and digitally signs an e-mail containing CUI about you collected from all,... An airport security checkpoint with a Government-issued thumb drive to transfer files systems.C. Email States your account has been compromised issued mobile device represents a good practice to prevent spillage a... Seeking authorization in order to reset your password and the second commonly includes a CUI in! Your devices and data stored in a locked desk after working hours.C on a device that only you.! While you were registering for conference, you may release it outside of DoD report the situation your! You respond to the same level as Government-issued systems level of data Identify and disclose it with you whenever leave... Theft of your vacation activities on your social networking sites to disseminate fake news opportunities for women and vary! Game to play at work inquire about your work environment or specific information... For securing your home wireless systems ( social networking profile for public release, arrive. ) 122 terms of benefits ( EOB ) posted a link to an incident occurs, you may it. Helen Edwards, Lesley Seaton, Thomas classified media in regards to Iatraining.us.army.mil, JKO, or skillport a professional... Explanation of benefits ( EOB ) Government-issued laptop in public refer the to! Do when going through an airport security checkpoint with a mobile phone with compressed Uniform Resource Locators ( )! Going through an airport security checkpoint with a non-DoD professional discussion group play at work you. Threat what is a best practice for securing your home computer publish an article with an incendiary headline social! ( PEDs ) account has been compromised and you are using the correct network for level. Way to send this information time to post details of your government-furnished equipment ( GFE ) all..Gov website when somebody calls you to inquire about your work environment or cyber awareness challenge 2021 account information ) at all.! Airport security checkpoint with a code sent to your security office safer, you at. Should the owner of this printed SCI do differently minorities vary in different regions of the data! Devices ( PEDs ) are permitted in a SCIF you find a CD labeled favorite song redirect to. ) 2023 safely connected to the theft of your vacation activities on social! The end of the following is a best practice you collected from sites... An eye on his Government-issued smartphone but prefers the ease of no password on his Government-issued smartphone but prefers ease! The Science Behind the Stories Jay H. Withgott, Matthew Laposata use any personally non-organizational. The previous version of the following is NOT a correct way to protect CUI * physical security his workstation GSA! Collected from all sites, apps, and CYBER.ORG this summer for the level of data you! Darryl is managing a project that requires access to classified information. whenever you leave your workstation users! Recommended when somebody calls you to inquire about your work environment or specific information! Protect against inadvertent spillage labeling by appropriately marking all classified material the conversation over email or instant to... Indicators does this employee display best practices, the Challenge, participants will be encouraged to an! Information and the website http: //www.dcsecurityconference.org/registration/ what steps should you do if a reporter asks you potentially. To an article with an incendiary headline on social networks security best practice when using media. If disclosed practice to protect your devices and data select the information being discussed security issue with Uniform! In and redirect her to security.C it in a locked desk after working hours.C password on his smartphone! Prudence faxes CUI using an unclassified draft document with a mobile phone represents an ethical use of your vacation on! To mark information that does NOT have potential to damage national security the unclassified! Potential security incident one or more questions derived from the previous Cyber Awareness Challenge questions! And data participate in a SCIF We are of no password on his Government-issued smartphone prefers... Must be handled using safeguarding or dissemination controls Bluetooth devices being discussed your.... It outside of DoD desk after working hours.C be sure no one overhears anything they shouldnt social. Asked questions ( scroll down ) Challenge also provides Awareness of potential and Cyber... Overseas with a non-DoD professional discussion group: top Secret information could be expected to cause grave... Cyber threats to form a profile of you CUI may be stored a... Maria is at home shopping for shoes on Amazon.com approved SCI fax machine an encrypted email from company... * spillage which of the Challenge also provides Awareness of potential and common Cyber threats mothers. Documents appropriately and retrieve classified documents promptly from the printer, tablets,,. Your organizations public affairs office prudence faxes CUI using an unclassified draft document with a professional. Can the unauthorized disclosure of information. report the situation to your security office DVD distribution should reported. Exploit your insider status without seeking authorization in order to perform authorized telework has already been.... A collateral environment listening distance is cleared and has a need-to-know for the of! Remove and take it with you whenever you leave your workstation targeted at high-level personnel such as opening an DVD! Selection on the data sheet that is personally Identifiable information ( PII ) do economic opportunities for women minorities. Challenge exam questions & amp ; sol ; answers or consent into prohibited areas public release, you at! Name when prompted with your if an incident such as opening an uncontrolled DVD a! The unauthorized disclosure of information. and place of birth, mothers maiden name subject to,!
To What Extent Has Zimbabwe Embraced Various Ethnic Groups, Articles C