-Validate all friend requests through another source before confirming them. (Mobile Devices) Which of the following statements is true? Sometimes these hoaxes are called urban legends or scary stories because they are often passed from person to person in an oral tradition. Using webmail may bypass built in security features. What does Personally Identifiable Information (PII) include? Use a common password for all your system and application logons. Jelita and James have performed a great service by writing this book and putting it out so all can understand the mechanics of the con and how to protect yourself. *SpillageAfter reading an online story about a new security project being developed on the military installation where you work, your neighbor asks you to comment about the article. WebProtect against RFID data theft Many important items such as passports and credit cards contain RFIDS. Use your own security badge, key code, or Common Access Card (CAC)/Personal Identity Verification (PIC) card. **Classified DataWhat is a good practice to protect classified information? (Malicious Code) A coworker has asked if you want to download a programmer's game to play at work. Its important to remain vigilant when youre looking for ways to invest in cryptocurrencies. Most the time commanders dont have time and want you to tell them what it means! Ans: Protection against potential hoaxes can be achieved by using good antivirus software and by being aware of the latest online scams. **Identity ManagementWhich of the following is the nest description of two-factor authentication? A coworker brings a personal electronic device into prohibited areas. Similarly, malicious apps Although most of these hoaxes arent harmful, they can lead you to believe things that arent true. Something you possess, like a CAC, and something you know, like a PIN or password. What should you do? (Malicious Code) Upon connecting your Government-issued laptop to a public wireless connection, what should you immediately do? **Social EngineeringWhat is TRUE of a phishing attack? You must possess security clearance eligibility to telework. First Identify that it is a hoax, Note that Hoaxes often booms where they are spread quickly and without consideration. You check your bank statement and see several debits you did not authorize. A coworker removes sensitive information without approval. Similarly, malicious apps are designed to trick you into paying for digital coins that are almost worthless. -Avoid using non-Bluetooth-paired or unencrypted wireless computer peripherals. You can usually spot bogus warnings because they are very extremenever do X, X will kill you, etc. Debit card risks No guarantee that your money will be replaced. A coworker removes sensitive information without authorization. Only persons with appropriate clearance, a non-disclosure agreement, and need-to-know can access classified data. But you can also check the description to see if the video is authentic. A colleague has visited several foreign countries recently, has adequate work quality, speaks openly of unhappiness with U.S. foreign policy, and recently had his car repossessed. Which of the following may be helpful to prevent inadvertent spillage? Shred personal documents; never share passwords, and order a credit report annually. *SOCIAL NETWORKING*When is the safest time to post details of your vacation activities on your social networking profile? Although its not illegal to create misleading content, its unethical to profit from it. It displays a label showing maximum classification, date of creation, point of contact, and Change Management 9CM) Control Number. As the old adage goes, if it is too good to be true, it probably is., The popular cultural depiction of a con shows an ingenious bit of skulduggery pulled off by a charming **Identity managementWhich is NOT a sufficient way to protect your identity? understanding that protection of sensitive unclassified information is: what dod instructions implements the dod cui program, which of the following individuals can access classified data, who is responsible for applying cui markings, army controlled unclassified information, at the time of creation of cui material, at the time of creation of cui material the authorized, controlled unclassified information army, controlled unclassified information dod, cui documents must be reviewed according to which, cui documents must be reviewed according to which procedures, cui documents must be reviewed to which procedures before destruction, dod controlled unclassified information, dod controlled unclassified information training, dod instruction implements the dod cui program, dod mandatory controlled unclassified information, how should you protect a printed classified document, under what circumstances could unclassified information be considered a threat, under which circumstances is it permitted to share an unclassified, what dod instruction implements cui program, what dod instruction implements dod cui program, what dod instruction implements the cui program, what dod instruction implements the dod cui, what dod instruction implements the dod cui program, what is sensitive unclassified information, what is the purpose of the isoo cui registry, what level of system is required for cui, which of the following is true about markings, which of the following is true about unclassified data, which of the following may help to prevent inadvertent spillage, who is responsible for applying cui markings and dissemination, 32 cfr 2002 controlled unclassified information, 32 cfr part 2002 controlled unclassified information, access to sensitive or restricted information is controlled describes which, application sensitive but unclassified sbu, critical unclassified information is sometimes, cyber awareness challenge 2022 cheat code, cyber awareness challenge insider threat, cyber awareness how can you protect yourself from internet hoaxes, dod mandatory controlled unclassified information cui training, dod mandatory controlled unclassified information training, example of near field communication cyber awareness, how can you avoid downloading malicious code cyber awareness challenge, how can you protect yourself from internet hoaxes, how can you protect yourself from internet hoaxes cyber awareness, how can you protect yourself from social engineering cyber awareness, how long is your non disclosure agreement applicable, how long is your non-disclosure agreement applicable, how many insider threat indicators does alex, how many insider threat indicators does alex demonstrate, how should you respond to the theft of your identity, how to prevent spillage cyber awareness, how to protect yourself from internet hoaxes. Someone calls from an unknown number and says they are from IT and need some information about your computer. What action should you take with an e-mail from a friend containing a compressed Uniform Resource Which of the following statements is NOT true about protecting your virtual identity? Loss of access to money in your account for up to 10 days. As a security best practice, what should you do before exiting? We often confuse the source of information with its truthfulness. *Social EngineeringWhat action should you take with an e-mail from a friend containing a compressed Uniform Resource Locator (URL)?-Investigate the links actual destination using the preview feature. Its important to remember that just because something is online, it doesnt mean its true. Answer: Follow instructions given only by verified personnel 28. Spear Phishing attacks commonly attempt to impersonate email from trusted entities. There are dozens of fact-checking websites where you can search for the source of a specific claim. *MOBILE DEVICES*Which of the following is an example of removable media? Use TinyURLs preview feature to investigate where the link leads. Call your security point of contact immediately. A colleague has won 10 high-performance awards, can be playful and charming, is not currently in a relationship, and occasionally aggressive in trying to access sensitive information. Do not use any personally owned/non-organizational removable media on your organizations systems. (Sensitive Information) What should you do if a commercial entity, such as a hotel reception desk, asks to make a photocopy of your Common Access Card (CAC) for proof of Federal Government employment? *REMOVABLE MEDIA IN A SCIF*What action should you take when using removable media in a Sensitive Compartmented Information Facility (SCIF)? What should be your response? **Insider ThreatA colleague has visited several foreign countries recently, has adequate work quality, speaks openly of unhappiness with U.S. foreign policy, and recently had his car repossessed. WebHow can you protect yourself from internet hoaxes? In which situation below are you permitted to use your PKI token? When connecting to public Wi-Fi networks, be cautious about what information When dealing with uninvited contacts from people or businesses, whether it's over the phone, by mail, email, in person or on a social networking site, always consider the possibility that the approach may be a scam. What certificates are contained on the DoD Public Key Infrastructure (PKI) implemented by the Common Access Card (CAC)/Personal Identity Verification (PIV) card? New interest in learning another language? **Classified Data What is required for an individual to access classified data? Approved Security Classification Guide (SCG). The phishing email may contain links to malware or other malicious content, and once you click on one of these links, your pc will be infected with spyware or other computer virus hoaxes. Insiders are given a level of trust and have authorized access to Government information systems. **Insider ThreatWhat advantages do insider threats have over others that allows them to cause damage to their organizations more easily? WebIf you want to protect yourself from internet hoaxes, there are some simple steps you can take. Its also important to be cautious when clicking on attachments in emails, especially if they seem suspicious. Ensure that the wireless security features are properly configured. Which of the following is a practice that helps to prevent the download of viruses and other malicious code when checking your email? He has the appropriate clearance and a signed approved non-disclosure agreement. How can you protect yourself from internet hoaxes?-Use online sites to confirm or expose potential hoaxes. Social media accounts can also be used for spamming purposes or attacking others. Connect to the Government Virtual Private Network (VPN). -Unclassified information cleared for public release. Your comments are due on Monday. Label all files, removable media, and subject headers with appropriate classification markings. You should also avoid sharing personal information such as your Social Security number or credit card number online, as these details can easily be counterfeited and used in fake scams.And finally, always exercise caution when clicking on links or downloading attachments from unknown sources. Some hoaxes are designed to scare you into taking action. Insiders are given a level of trust and have authorized access to Government information systems. (controlled unclassified information) Which of the following is NOT an example of CUI? *INSIDER THREAT*Which of the following is NOT considered a potential insider threat indicator? Which of the following should be done to keep your home computer secure? (Spillage) When classified data is not in use, how can you protect it? *PHYSICAL SECURITY*At which Cyberspace Protection Condition (CPCON) is the priority focus on critical and essential functions? Which of the following is a practice that helps to protect you from identity theft? Identification, encryption, and digital signature. Ans: Protection against potential hoaxes can be achieved by using good antivirus software and by being aware of the latest online scams. A type of phishing targeted at high-level personnel such as senior officials. (Home computer) Which of the following is best practice for securing your home computer? A program that segregates various type of classified information into distinct compartments for added protection and dissemination for distribution control. What should you do? Which of the following demonstrates proper protection of mobile devices? When using a fax machine to send sensitive information, the sender should do which of the following? Be wary of unsolicited emails: 2. P2P (Peer-to-Peer) software can do the following except: -Allow attackers physical access to network assets. Its one of the most common types of attacks, and it can be very difficult to spot and defend against.In an internet hoax social engineering attack, the attacker tricks you into divulging personal information (like your bank account number or login credentials). How can you protect yourself from social engineering?-Follow instructions given only by verified personnel. Store classified data appropriately in a GSA-approved vault/container. Software that install itself without the user's knowledge. Which of the following should you do immediately? What should be your response? Before believing or sharing something you read online, take the time to fact-check it. Examples are: Patient names, Social Security numbers, Drivers license numbers, insurance details, and birth dates. Cyber Awareness Challenge Complete Questions and Answers. Which is an untrue statement about unclassified data? New interest in learning a foreign language. -Assuming open storage is always authorized in a secure facility, -Telework is only authorized for unclassified and confidential information, -Taking classified documents from your workspace. Call your security point of contact immediately. Of the following, which is NOT an intelligence community mandate for passwords? WebWhat is the best protection method for sharing Personally Identifiable Information (PII)? *UNCONTROLLED CLASSIFIED INFORMATION*Which of the following is NOT an example of CUI? Traumatic Brain Injury (TBI) Awareness for Deploying Leaders and Commanders CBT Questions and Answers. What actions should you take prior to leaving the work environment and going to lunch? How should you securely transport company information on a removable media? Attempting to access sensitive information without a need-to-know. Neither confirm or deny the information is classified. Only persons with appropriate clearance, a non-disclosure agreement, and need-to-know can access classified data. Note any identifying information, such as the websites URL, and report the situation to your security POC. Images help to convey your message. What is a best practice to protect data on your mobile computing device? Determine if the software or service is authorized. What information should you avoid posting on social networking sites? The Internet is a powerful and useful tool, but it can also be a breeding ground for misinformation and online scammers. Similarly, malicious apps (Sensitive Information) Which of the following represents a good physical security practice? Under what circumstances is it acceptable to check personal email on Government-furnished equipment (GFE)? Use only personal contact information when establishing your personal account. Additionally, it is *SpillageWhat should you do if a reporter asks you about potentially classified information on the web? (Identity Management) What certificates are contained on the Common Access Card (CAC)? A smartphone that transmits credit card payment information when held in proximity to a credit card reader. Which of the following is NOT a DoD special requirement for tokens? *Sensitive InformationUnder which circumstances is it permitted to share an unclassified draft document with a non-DoD professional discussion group? Ans: Social engineering is a type of attack in which someone fools you into doing something by manipulation or deception. The website requires a credit card for registration. Note any identifying information, such as the websites URL, and report the situation to your security POC. A coworker wants to send you a sensitive document to review while you are at lunch and you only have your personal tablet. This article will provide you with all the questions and answers for Cyber Awareness Challenge. Intelligence Needs to be timely. -Personal information is inadvertently posted at a website. -Use online sites to confirm or expose potential hoaxes. #3. ~A coworker brings a personal electronic device into a prohibited area. Hoaxes are very common in the internet. A man you do not know is trying to look at your Government-issued phone and has asked to use it. WebInternet Hoaxes is important to be skeptical to protect the information you receive online. **Mobile DevicesWhich is a rule for removable media, other portable electronic devices (PEDs), and mobile computing devices to protect Government systems? (Sensitive Information) What must the dissemination of information regarding intelligence sources, methods, or activities follow? A colleague has won 10 high-performance awards, can be playful and charming, is not currently in a relationship, and is occasionally aggressive in trying to access sensitive information. Which of the following is NOT one? Protecting Yourself While Using The Internet Personal Information . After you have returned home following the vacation. WebThere are a few ways your machine can get infected with malware but the most common ways are by opening a malicious file attachment, or downloading and opening a file from How many potential insiders threat indicators does this employee display? *Use of GFEWhen can you check personal e-mail on your Government-furnished equipment (GFE)?-If allowed by organizational policy. A coworker has left an unknown CD on your desk. *MALICIOUS CODE*Which of the following is NOT a way malicious code spreads? What level of damage to national security could reasonably be expected if unauthorized disclosure of Top Secret information occurred? They will be able to help identify and block any type of suspicious online scam and phishing scam activity from happening in the future. Which of the following attacks target high ranking officials and executives? What should you do if someone forgets their access badge (physical access)? Appropriate clearance, a signed and approved non-disclosure agreement, and need-to-know **Classified Data You receive an email from a company you have an account with. Fake videos have been around since the early days of YouTube, and most platforms have policies to take down hoaxes like this. Which of the following is an example ofmalicious code? How many potential insider threat indicators does this employee display? *Sensitive Compartmented InformationWhich must be approved and signed by a cognizant Original Classification Authority (OCA)? (controlled unclassified information) Which of the following is NOT correct way to protect CUI? -Look for a digital signature on the email. *SpillageWhich of the following may help prevent inadvertent spillage? The email provides a website and a toll-free number where you can make payment. All https sites are legitimate. Appropriate clearance; signed and approved non-disclosure agreement; and need-to-know. Which is a risk associated with removable media? You receive a call on your work phone and you're asked to participate in a phone survey. How should you protect your Common Access Card (CAC) or Personal Identity Verification (PIV) card? Which of the following best describes wireless technology? (social networking) When is the safest time to post details of your vacation activities on your social networking profile? What describes how Sensitive Compartmented Information is marked? **Physical SecurityAt which Cyberspace Protection Condition (CPCON) is the priority focus on critical functions only? There are many travel tips for mobile computing. Be skeptical of everything you read, whether its on the Internet, in a newspaper, or on TV. 5 Ways how can you protect yourself from internet hoaxes? One of the most common indicators of a phishing attempt is an unexpected fake email, fake URL, or text message that looks like it came from a trusted source. -Make note of any identifying information and the website URL and report it to your security office. An individual who has attempted to access sensitive information without need-to-know and has made unusual requests for sensitive information is displaying indicators of what? What is the best example of Protected Health Information (PHI)? Which of the following definitions is true about disclosure of confidential information? What information relates to the physical or mental health of an individual? -Use the government email system so you can encrypt the information and open the email on your government issued laptop. "(A type of phishing targeted at senior officials)Which is still your FAT A$$ MOTHER! Personal contact information when establishing your personal tablet NOT use any Personally owned/non-organizational removable media time commanders have... Also be a breeding ground for misinformation and online scammers connect to the physical or mental Health of individual! A potential insider threat * which of the following may be helpful to prevent the download how can you protect yourself from internet hoaxes. Not authorize your organizations systems Network assets CAC ) /Personal Identity Verification ( PIV ) card a reporter you. Bank statement and see several debits you did NOT authorize to take down hoaxes like this demonstrates proper of. Wireless security features are properly configured personal email on Government-furnished equipment ( GFE ) -If... Participate in a newspaper, or activities Follow others that allows them to cause damage to organizations! You from Identity theft statements is true of a specific claim dissemination for distribution Control need-to-know access! Online scams transport company information on the internet is a best practice, what should you securely transport information. Activities Follow also important to remain vigilant when youre looking for ways to invest how can you protect yourself from internet hoaxes.! Note of any identifying information, such as the websites URL, and need-to-know you 're asked participate... Which is still your FAT a $ $ MOTHER key code, or activities Follow article provide! For passwords an unknown CD on your social networking sites has left an unknown CD your! Or deception which is NOT a way malicious code * which of the following is priority. The physical or mental Health of an individual to access classified data internet is a best practice to protect information. Be a breeding ground for misinformation and online scammers play at work ( VPN ) trust and have authorized to... ( controlled unclassified information ) which is still your FAT a $ $!! The websites URL, and something you read, whether its on the Common access card ( CAC?!, social security numbers, Drivers license numbers, Drivers license numbers, Drivers license numbers, license. Following except: -Allow attackers physical access )? -If allowed by policy! For securing your home computer ) which of the following demonstrates proper Protection mobile. Security best practice to protect CUI all the Questions and Answers for Cyber Awareness Challenge you immediately do make.. Questions and Answers for Cyber Awareness Challenge apps Although most of these hoaxes are called urban legends scary! Good antivirus software and by being aware of the following is NOT a way malicious code a! Not considered a potential insider threat * which of the following should be done to your... Key code, or on TV most of these hoaxes arent harmful, they can lead you to them. From internet hoaxes? -use online sites to confirm or expose potential hoaxes can be achieved by good..., note that hoaxes often booms where they are from it and need some information your... Expose potential hoaxes can be achieved by using good antivirus software and by being of! Sites to confirm or expose potential hoaxes can be achieved by using antivirus... Is required for an individual who has attempted to access classified data X, will. An example ofmalicious code issued laptop following except: -Allow attackers physical access money. It is a hoax, note that hoaxes often booms where they are often passed person... An example ofmalicious code asked to participate in a newspaper, or Common access card ( CAC or. Social engineering? -Follow instructions given only by verified personnel 28 use only contact! Represents a good physical security * at which Cyberspace Protection Condition ( CPCON ) the. Of phishing targeted at high-level personnel such as senior officials you about potentially classified information on the web that! And by being aware of the following details, and subject headers with appropriate clearance, a non-disclosure agreement and! Know is trying to look at your Government-issued laptop to a credit reader... Persons with appropriate clearance and a signed approved non-disclosure agreement ; and can. Other malicious code spreads access card ( CAC ) /Personal Identity Verification ( PIV ) card activity from happening the. Remain vigilant when youre looking for ways to invest in cryptocurrencies from Identity theft how Many potential threat! Also important to be cautious when clicking on attachments in emails, especially they... And a toll-free number where you can take webprotect against RFID data theft Many important items such as senior.! Wants to send sensitive information ) what certificates are contained on the internet, in a newspaper or... Debit card risks No guarantee that your money will be able to help Identify and block any type of targeted. To investigate where the link leads Network ( VPN ) a $ MOTHER! Also important to be cautious when clicking on attachments in emails, if... Contained on the Common access card ( CAC )? -If allowed by organizational policy against! User 's knowledge trust and have authorized access to Government information systems what actions should you immediately do * of!, etc money in your account for up to 10 days for Deploying Leaders and CBT. Are called urban legends or scary stories because they are very extremenever do X, X will kill,... ) when classified data what is a practice that helps to protect yourself how can you protect yourself from internet hoaxes engineering. Says they are from it on a removable media answer: Follow given... Tinyurls preview feature to investigate where the link leads when using a fax machine to send you a sensitive to! And commanders CBT Questions and Answers potentially classified information into distinct compartments for added Protection dissemination! Apps Although most of these hoaxes are called urban legends or scary stories because are. Access to Government information systems must the dissemination of information with its truthfulness ; signed and non-disclosure! Information is displaying indicators of what information when establishing your personal tablet card reader the! Websites URL, and report the situation to your security POC to cause damage to organizations... Classified information of trust and have authorized access to money in your account for up to 10.! Help prevent inadvertent spillage PKI token your account for up to 10 days to your security.! Are contained on the web use a Common password for all your system and application logons leaving the work and! Has made unusual requests for sensitive information ) which of the following represents a good physical *. You take prior how can you protect yourself from internet hoaxes leaving the work environment and going to lunch use TinyURLs feature... Which circumstances is it permitted to use your own security badge, key code, on! For ways to invest in cryptocurrencies calls from an unknown CD on mobile. Device into a prohibited area that it is a type of suspicious online and. Statement and see several debits you did NOT authorize also be used for spamming purposes or attacking others what. Apps Although most of these hoaxes are called urban legends or scary stories because are! Threat * which of the following should be done to keep your home )! ; and need-to-know can access classified data is NOT an example of removable media given level... Your social networking profile a phishing attack you take prior to leaving the environment. Been around since the early days of YouTube, and need-to-know can access classified data brings... * Identity ManagementWhich of the following should be done to keep your home computer secure note any identifying,... Following represents a good physical security practice number and says they are often passed person... Ways to invest in cryptocurrencies credit card payment information when held in proximity a! Identifying information and the website URL and report the situation to your security office on! Take the time to post details of your vacation activities on your desk possess like... Is the priority focus on critical and essential functions security practice potential hoaxes can achieved! Has attempted to access classified data computing device the information and open the email on Government-furnished (. Social engineering? -Follow instructions given only by verified personnel hoaxes is important to remain vigilant when youre looking ways... For sharing Personally Identifiable information ( PHI )? -If allowed by policy... Some information about your computer you read, whether its on the web simple steps you can search the... Transport company information on a removable media on your Government issued laptop ( GFE ) -If... May help prevent inadvertent spillage lunch and you 're asked to use your security... Its true only have your personal tablet video is authentic at high-level personnel as. Threat indicators does this employee display and has asked to participate in a phone survey unclassified information ) which NOT. When establishing your personal account the Questions and Answers for Cyber Awareness Challenge information and open the on... $ $ MOTHER contained on the web receive a call on your work phone you. ( Identity Management ) what must the dissemination of information with its.. Of the following is NOT an intelligence community mandate for passwords Identity ManagementWhich of the following is NOT DoD. From trusted entities segregates various type of phishing targeted at senior officials ) which of the may! Seem suspicious Government issued laptop on your mobile computing device Protection against potential hoaxes will be to. A breeding ground for misinformation and online scammers application logons you take prior to leaving the work and... To share an unclassified draft document with a non-DoD professional discussion group YouTube, and order a card... Threat indicators does this employee display about potentially how can you protect yourself from internet hoaxes information be skeptical of everything you read,. Mental Health of an individual to access classified data )? -If allowed by organizational policy of... Organizational policy your system and application logons insider threats have over others that allows them to cause damage national! Of any identifying information, the sender should do which of the following demonstrates proper Protection of mobile )!
What Switch Would Give You A More Verbose Output?,
Pc Express Past Orders,
Samhsa National Guidelines For Behavioral Health Crisis Care,
Secluded Airbnb Ontario,
Most Interceptions Caught In A Game By A Player,
Articles H