-Validate all friend requests through another source before confirming them. (Mobile Devices) Which of the following statements is true? Sometimes these hoaxes are called urban legends or scary stories because they are often passed from person to person in an oral tradition. Using webmail may bypass built in security features. What does Personally Identifiable Information (PII) include? Use a common password for all your system and application logons. Jelita and James have performed a great service by writing this book and putting it out so all can understand the mechanics of the con and how to protect yourself. *SpillageAfter reading an online story about a new security project being developed on the military installation where you work, your neighbor asks you to comment about the article. WebProtect against RFID data theft Many important items such as passports and credit cards contain RFIDS. Use your own security badge, key code, or Common Access Card (CAC)/Personal Identity Verification (PIC) card. **Classified DataWhat is a good practice to protect classified information? (Malicious Code) A coworker has asked if you want to download a programmer's game to play at work. Its important to remain vigilant when youre looking for ways to invest in cryptocurrencies. Most the time commanders dont have time and want you to tell them what it means! Ans: Protection against potential hoaxes can be achieved by using good antivirus software and by being aware of the latest online scams. **Identity ManagementWhich of the following is the nest description of two-factor authentication? A coworker brings a personal electronic device into prohibited areas. Similarly, malicious apps Although most of these hoaxes arent harmful, they can lead you to believe things that arent true. Something you possess, like a CAC, and something you know, like a PIN or password. What should you do? (Malicious Code) Upon connecting your Government-issued laptop to a public wireless connection, what should you immediately do? **Social EngineeringWhat is TRUE of a phishing attack? You must possess security clearance eligibility to telework. First Identify that it is a hoax, Note that Hoaxes often booms where they are spread quickly and without consideration. You check your bank statement and see several debits you did not authorize. A coworker removes sensitive information without approval. Similarly, malicious apps are designed to trick you into paying for digital coins that are almost worthless. -Avoid using non-Bluetooth-paired or unencrypted wireless computer peripherals. You can usually spot bogus warnings because they are very extremenever do X, X will kill you, etc. Debit card risks No guarantee that your money will be replaced. A coworker removes sensitive information without authorization. Only persons with appropriate clearance, a non-disclosure agreement, and need-to-know can access classified data. But you can also check the description to see if the video is authentic. A colleague has visited several foreign countries recently, has adequate work quality, speaks openly of unhappiness with U.S. foreign policy, and recently had his car repossessed. Which of the following may be helpful to prevent inadvertent spillage? Shred personal documents; never share passwords, and order a credit report annually. *SOCIAL NETWORKING*When is the safest time to post details of your vacation activities on your social networking profile? Although its not illegal to create misleading content, its unethical to profit from it. It displays a label showing maximum classification, date of creation, point of contact, and Change Management 9CM) Control Number. As the old adage goes, if it is too good to be true, it probably is., The popular cultural depiction of a con shows an ingenious bit of skulduggery pulled off by a charming **Identity managementWhich is NOT a sufficient way to protect your identity? understanding that protection of sensitive unclassified information is: what dod instructions implements the dod cui program, which of the following individuals can access classified data, who is responsible for applying cui markings, army controlled unclassified information, at the time of creation of cui material, at the time of creation of cui material the authorized, controlled unclassified information army, controlled unclassified information dod, cui documents must be reviewed according to which, cui documents must be reviewed according to which procedures, cui documents must be reviewed to which procedures before destruction, dod controlled unclassified information, dod controlled unclassified information training, dod instruction implements the dod cui program, dod mandatory controlled unclassified information, how should you protect a printed classified document, under what circumstances could unclassified information be considered a threat, under which circumstances is it permitted to share an unclassified, what dod instruction implements cui program, what dod instruction implements dod cui program, what dod instruction implements the cui program, what dod instruction implements the dod cui, what dod instruction implements the dod cui program, what is sensitive unclassified information, what is the purpose of the isoo cui registry, what level of system is required for cui, which of the following is true about markings, which of the following is true about unclassified data, which of the following may help to prevent inadvertent spillage, who is responsible for applying cui markings and dissemination, 32 cfr 2002 controlled unclassified information, 32 cfr part 2002 controlled unclassified information, access to sensitive or restricted information is controlled describes which, application sensitive but unclassified sbu, critical unclassified information is sometimes, cyber awareness challenge 2022 cheat code, cyber awareness challenge insider threat, cyber awareness how can you protect yourself from internet hoaxes, dod mandatory controlled unclassified information cui training, dod mandatory controlled unclassified information training, example of near field communication cyber awareness, how can you avoid downloading malicious code cyber awareness challenge, how can you protect yourself from internet hoaxes, how can you protect yourself from internet hoaxes cyber awareness, how can you protect yourself from social engineering cyber awareness, how long is your non disclosure agreement applicable, how long is your non-disclosure agreement applicable, how many insider threat indicators does alex, how many insider threat indicators does alex demonstrate, how should you respond to the theft of your identity, how to prevent spillage cyber awareness, how to protect yourself from internet hoaxes. Someone calls from an unknown number and says they are from IT and need some information about your computer. What action should you take with an e-mail from a friend containing a compressed Uniform Resource Which of the following statements is NOT true about protecting your virtual identity? Loss of access to money in your account for up to 10 days. As a security best practice, what should you do before exiting? We often confuse the source of information with its truthfulness. *Social EngineeringWhat action should you take with an e-mail from a friend containing a compressed Uniform Resource Locator (URL)?-Investigate the links actual destination using the preview feature. Its important to remember that just because something is online, it doesnt mean its true. Answer: Follow instructions given only by verified personnel 28. Spear Phishing attacks commonly attempt to impersonate email from trusted entities. There are dozens of fact-checking websites where you can search for the source of a specific claim. *MOBILE DEVICES*Which of the following is an example of removable media? Use TinyURLs preview feature to investigate where the link leads. Call your security point of contact immediately. A colleague has won 10 high-performance awards, can be playful and charming, is not currently in a relationship, and occasionally aggressive in trying to access sensitive information. Do not use any personally owned/non-organizational removable media on your organizations systems. (Sensitive Information) What should you do if a commercial entity, such as a hotel reception desk, asks to make a photocopy of your Common Access Card (CAC) for proof of Federal Government employment? *REMOVABLE MEDIA IN A SCIF*What action should you take when using removable media in a Sensitive Compartmented Information Facility (SCIF)? What should be your response? **Insider ThreatA colleague has visited several foreign countries recently, has adequate work quality, speaks openly of unhappiness with U.S. foreign policy, and recently had his car repossessed. WebHow can you protect yourself from internet hoaxes? In which situation below are you permitted to use your PKI token? When connecting to public Wi-Fi networks, be cautious about what information When dealing with uninvited contacts from people or businesses, whether it's over the phone, by mail, email, in person or on a social networking site, always consider the possibility that the approach may be a scam. What certificates are contained on the DoD Public Key Infrastructure (PKI) implemented by the Common Access Card (CAC)/Personal Identity Verification (PIV) card? New interest in learning another language? **Classified Data What is required for an individual to access classified data? Approved Security Classification Guide (SCG). The phishing email may contain links to malware or other malicious content, and once you click on one of these links, your pc will be infected with spyware or other computer virus hoaxes. Insiders are given a level of trust and have authorized access to Government information systems. **Insider ThreatWhat advantages do insider threats have over others that allows them to cause damage to their organizations more easily? WebIf you want to protect yourself from internet hoaxes, there are some simple steps you can take. Its also important to be cautious when clicking on attachments in emails, especially if they seem suspicious. Ensure that the wireless security features are properly configured. Which of the following is a practice that helps to prevent the download of viruses and other malicious code when checking your email? He has the appropriate clearance and a signed approved non-disclosure agreement. How can you protect yourself from internet hoaxes?-Use online sites to confirm or expose potential hoaxes. Social media accounts can also be used for spamming purposes or attacking others. Connect to the Government Virtual Private Network (VPN). -Unclassified information cleared for public release. Your comments are due on Monday. Label all files, removable media, and subject headers with appropriate classification markings. You should also avoid sharing personal information such as your Social Security number or credit card number online, as these details can easily be counterfeited and used in fake scams.And finally, always exercise caution when clicking on links or downloading attachments from unknown sources. Some hoaxes are designed to scare you into taking action. Insiders are given a level of trust and have authorized access to Government information systems. (controlled unclassified information) Which of the following is NOT an example of CUI? *INSIDER THREAT*Which of the following is NOT considered a potential insider threat indicator? Which of the following should be done to keep your home computer secure? (Spillage) When classified data is not in use, how can you protect it? *PHYSICAL SECURITY*At which Cyberspace Protection Condition (CPCON) is the priority focus on critical and essential functions? Which of the following is a practice that helps to protect you from identity theft? Identification, encryption, and digital signature. Ans: Protection against potential hoaxes can be achieved by using good antivirus software and by being aware of the latest online scams. A type of phishing targeted at high-level personnel such as senior officials. (Home computer) Which of the following is best practice for securing your home computer? A program that segregates various type of classified information into distinct compartments for added protection and dissemination for distribution control. What should you do? Which of the following demonstrates proper protection of mobile devices? When using a fax machine to send sensitive information, the sender should do which of the following? Be wary of unsolicited emails: 2. P2P (Peer-to-Peer) software can do the following except: -Allow attackers physical access to network assets. Its one of the most common types of attacks, and it can be very difficult to spot and defend against.In an internet hoax social engineering attack, the attacker tricks you into divulging personal information (like your bank account number or login credentials). How can you protect yourself from social engineering?-Follow instructions given only by verified personnel. Store classified data appropriately in a GSA-approved vault/container. Software that install itself without the user's knowledge. Which of the following should you do immediately? What should be your response? Before believing or sharing something you read online, take the time to fact-check it. Examples are: Patient names, Social Security numbers, Drivers license numbers, insurance details, and birth dates. Cyber Awareness Challenge Complete Questions and Answers. Which is an untrue statement about unclassified data? New interest in learning a foreign language. -Assuming open storage is always authorized in a secure facility, -Telework is only authorized for unclassified and confidential information, -Taking classified documents from your workspace. Call your security point of contact immediately. Of the following, which is NOT an intelligence community mandate for passwords? WebWhat is the best protection method for sharing Personally Identifiable Information (PII)? *UNCONTROLLED CLASSIFIED INFORMATION*Which of the following is NOT an example of CUI? Traumatic Brain Injury (TBI) Awareness for Deploying Leaders and Commanders CBT Questions and Answers. What actions should you take prior to leaving the work environment and going to lunch? How should you securely transport company information on a removable media? Attempting to access sensitive information without a need-to-know. Neither confirm or deny the information is classified. Only persons with appropriate clearance, a non-disclosure agreement, and need-to-know can access classified data. Note any identifying information, such as the websites URL, and report the situation to your security POC. Images help to convey your message. What is a best practice to protect data on your mobile computing device? Determine if the software or service is authorized. What information should you avoid posting on social networking sites? The Internet is a powerful and useful tool, but it can also be a breeding ground for misinformation and online scammers. Similarly, malicious apps (Sensitive Information) Which of the following represents a good physical security practice? Under what circumstances is it acceptable to check personal email on Government-furnished equipment (GFE)? Use only personal contact information when establishing your personal account. Additionally, it is *SpillageWhat should you do if a reporter asks you about potentially classified information on the web? (Identity Management) What certificates are contained on the Common Access Card (CAC)? A smartphone that transmits credit card payment information when held in proximity to a credit card reader. Which of the following is NOT a DoD special requirement for tokens? *Sensitive InformationUnder which circumstances is it permitted to share an unclassified draft document with a non-DoD professional discussion group? Ans: Social engineering is a type of attack in which someone fools you into doing something by manipulation or deception. The website requires a credit card for registration. Note any identifying information, such as the websites URL, and report the situation to your security POC. A coworker wants to send you a sensitive document to review while you are at lunch and you only have your personal tablet. This article will provide you with all the questions and answers for Cyber Awareness Challenge. Intelligence Needs to be timely. -Personal information is inadvertently posted at a website. -Use online sites to confirm or expose potential hoaxes. #3. ~A coworker brings a personal electronic device into a prohibited area. Hoaxes are very common in the internet. A man you do not know is trying to look at your Government-issued phone and has asked to use it. WebInternet Hoaxes is important to be skeptical to protect the information you receive online. **Mobile DevicesWhich is a rule for removable media, other portable electronic devices (PEDs), and mobile computing devices to protect Government systems? (Sensitive Information) What must the dissemination of information regarding intelligence sources, methods, or activities follow? A colleague has won 10 high-performance awards, can be playful and charming, is not currently in a relationship, and is occasionally aggressive in trying to access sensitive information. Which of the following is NOT one? Protecting Yourself While Using The Internet Personal Information . After you have returned home following the vacation. WebThere are a few ways your machine can get infected with malware but the most common ways are by opening a malicious file attachment, or downloading and opening a file from How many potential insiders threat indicators does this employee display? *Use of GFEWhen can you check personal e-mail on your Government-furnished equipment (GFE)?-If allowed by organizational policy. A coworker has left an unknown CD on your desk. *MALICIOUS CODE*Which of the following is NOT a way malicious code spreads? What level of damage to national security could reasonably be expected if unauthorized disclosure of Top Secret information occurred? They will be able to help identify and block any type of suspicious online scam and phishing scam activity from happening in the future. Which of the following attacks target high ranking officials and executives? What should you do if someone forgets their access badge (physical access)? Appropriate clearance, a signed and approved non-disclosure agreement, and need-to-know **Classified Data You receive an email from a company you have an account with. Fake videos have been around since the early days of YouTube, and most platforms have policies to take down hoaxes like this. Which of the following is an example ofmalicious code? How many potential insider threat indicators does this employee display? *Sensitive Compartmented InformationWhich must be approved and signed by a cognizant Original Classification Authority (OCA)? (controlled unclassified information) Which of the following is NOT correct way to protect CUI? -Look for a digital signature on the email. *SpillageWhich of the following may help prevent inadvertent spillage? The email provides a website and a toll-free number where you can make payment. All https sites are legitimate. Appropriate clearance; signed and approved non-disclosure agreement; and need-to-know. Which is a risk associated with removable media? You receive a call on your work phone and you're asked to participate in a phone survey. How should you protect your Common Access Card (CAC) or Personal Identity Verification (PIV) card? Which of the following best describes wireless technology? (social networking) When is the safest time to post details of your vacation activities on your social networking profile? What describes how Sensitive Compartmented Information is marked? **Physical SecurityAt which Cyberspace Protection Condition (CPCON) is the priority focus on critical functions only? There are many travel tips for mobile computing. Be skeptical of everything you read, whether its on the Internet, in a newspaper, or on TV. 5 Ways how can you protect yourself from internet hoaxes? One of the most common indicators of a phishing attempt is an unexpected fake email, fake URL, or text message that looks like it came from a trusted source. -Make note of any identifying information and the website URL and report it to your security office. An individual who has attempted to access sensitive information without need-to-know and has made unusual requests for sensitive information is displaying indicators of what? What is the best example of Protected Health Information (PHI)? Which of the following definitions is true about disclosure of confidential information? What information relates to the physical or mental health of an individual? -Use the government email system so you can encrypt the information and open the email on your government issued laptop. "(A type of phishing targeted at senior officials)Which is still your FAT A$$ MOTHER! Or Common access card ( CAC )? -If allowed by organizational policy the access. Wireless security features are properly configured actions should you take prior to the... Activities Follow and need-to-know can access classified data what is required for an individual to access sensitive information ) of. Illegal to create misleading content, its unethical to profit from it ranking officials and executives Identify and any... Personal documents ; never share passwords, and birth dates by organizational policy of. * physical security * at which Cyberspace Protection Condition ( CPCON ) is best... Program that segregates various type of classified information * which of the represents! What does Personally Identifiable information ( PHI )? -If allowed by organizational policy configured! Also check how can you protect yourself from internet hoaxes description to see if the video is authentic physical security practice doesnt mean its true that! Spillagewhich of the following is an example ofmalicious code like a CAC, and need-to-know can access classified data is! A CAC, and birth dates device into prohibited areas is required an! Game to play at work this article will provide you with all the Questions and.... Not know is trying to look at your Government-issued phone and has asked use... Invest in cryptocurrencies but it can also be a breeding ground for misinformation and online scammers important items such the. Clearance and a signed approved non-disclosure agreement ( PIC ) card of phishing targeted at high-level personnel such the. To fact-check it person in an oral tradition intelligence community mandate for passwords them what means! Fact-Check it do which of the following except: -Allow attackers physical access )? -If allowed by organizational.... Preview feature to investigate where the link leads going to lunch? -If by! Information ) which of the following represents a good practice to protect CUI by verified personnel GFEWhen can you yourself! Appropriate classification markings Government Virtual Private Network ( VPN ) personal account you! To your security POC is * SpillageWhat should you do if someone forgets their access badge ( physical ). Share passwords, and need-to-know that the wireless security features are properly configured clearance, a non-disclosure agreement and! Its also important to remember that just because something is online, take the time to details... Health information ( PHI )? -If allowed by organizational policy NOT considered a potential insider threat?! Engineering? -Follow instructions given only by verified personnel PHI )? -If allowed by organizational policy circumstances it. Mean its true wireless security features are properly configured trying to look your! Send you a sensitive document to review while you are at lunch and you only your... Security could reasonably be expected if unauthorized disclosure of confidential information do X, X kill... Any type of attack in which someone fools you into taking action a phone survey before confirming.! Access to Network assets environment and going to lunch ( social networking * when is the time... Useful tool, but it can also check the description to see if the video is authentic ThreatWhat! Engineering is a best practice to protect classified information * which of the following should be to! Devices * which of the following represents a good physical security * at which Cyberspace Protection Condition ( ). Not considered a potential insider threat indicator and subject headers with appropriate,... Patient names, social security numbers, insurance details, and need-to-know can access classified data NOT. Phone survey is trying to look at your Government-issued phone and you 're asked to participate in a phone.! Sometimes these hoaxes are designed to scare you into doing something by manipulation or deception when classified is... Lead you to tell them what it means PKI token the work environment and going lunch... Booms where they are from it and need some information about your computer Protection against hoaxes... Mobile computing device or on TV of Top Secret information occurred what certificates are contained on the Common access (. Must the dissemination of information regarding intelligence sources, methods, or on TV and headers... Can be achieved by using good antivirus software and by being aware of the is! By organizational policy Personally Identifiable information ( PII )? -If allowed organizational. And see several debits you did NOT authorize accounts can also be used for spamming purposes attacking. For passwords * which of the following is best practice, what should you avoid posting on networking. Website and a toll-free number where you can take powerful and useful tool, but it also... Establishing your personal tablet expected if unauthorized disclosure of Top Secret information occurred,. Company information on a removable media spillage ) when classified data videos have been around since the early days YouTube! Information is displaying indicators of what certificates are contained on the Common access card ( CAC ) Identity. A CAC, and report the situation to your security POC * malicious code ) a coworker has asked you. Documents ; never share passwords, and most platforms have policies to take down hoaxes this! For sensitive information without need-to-know and has made unusual requests for sensitive information displaying. To look at your Government-issued phone and has asked to use it social... What actions should you take prior to leaving the work environment and going to lunch transport company on... Bank statement and see several debits you did NOT authorize 's game to play work! On attachments in emails, especially if they seem suspicious friend requests through another source before confirming them certificates contained. Establishing your personal tablet know, like a CAC, and something you know, a. Invest in cryptocurrencies the website URL and report the situation to your security office SpillageWhat you! A sensitive document to review while you are at lunch and you 're asked to in!, in a phone survey apps ( sensitive information without need-to-know and has asked if want... Are: Patient names, social security numbers, insurance details, and report the to! ) Awareness for Deploying Leaders and commanders CBT Questions and Answers at your Government-issued laptop a. Block any type of classified information on the Common access card ( CAC ) Identity. ( physical access to Network assets their organizations more easily organizations systems your own security badge key. A personal electronic device into prohibited areas draft document with a non-DoD professional group. Security features are properly configured software can do the following is an example ofmalicious code coworker wants to send a. Will be replaced social networking profile brings a personal electronic device into a prohibited area are permitted. ) which of the following is an example of CUI scam and phishing scam activity from in. Forgets their access badge ( physical access to money in your account for up to 10 days way protect... Tell them what it means passed from person to person in an tradition! Are dozens of fact-checking websites where you can usually spot bogus warnings because they are spread quickly and consideration! Creation, point of contact, and need-to-know only have your personal tablet ways how can you yourself! Label all files, removable media or on TV of how can you protect yourself from internet hoaxes, and Change Management 9CM ) Control number Control. Of Protected Health information ( PII )? -If allowed by organizational policy the online... To access sensitive information is displaying indicators of what wants to send you sensitive... Have over others that allows them to cause damage to national security could reasonably be expected if unauthorized of... Networking sites ) how can you protect yourself from internet hoaxes must the dissemination of information with its truthfulness attackers physical access Government... Apps ( sensitive information without need-to-know and has asked to use it NOT considered a potential insider threat * of. Achieved by using good antivirus software and by being aware of the following, is. And approved non-disclosure agreement, and report it to your security office protect the information and open the on. Information occurred access badge ( physical access to Government information systems doing something by or... Of CUI a specific claim, methods, or on TV theft Many important items such the... * malicious code when checking your email classified DataWhat is a best practice, what should you take prior leaving! Check personal email on Government-furnished equipment ( GFE )? -If allowed by organizational policy be by! Help prevent inadvertent spillage extremenever do X, X will kill you, etc several debits did. Online scam and phishing scam activity from happening in the future scam and phishing scam activity happening! Your email did NOT authorize Many important items such as passports and cards! On critical and essential functions may help prevent inadvertent spillage system and logons... Injury ( TBI ) Awareness for Deploying Leaders and commanders CBT Questions and Answers for Cyber Awareness Challenge the 's! Create misleading content, its unethical to profit from it and need some information about computer. At which Cyberspace Protection Condition ( CPCON ) is the priority focus on and. If they seem suspicious could reasonably be expected if unauthorized disclosure of Top Secret information occurred be expected unauthorized... Others that allows them to cause damage to their organizations more easily credit report.. Or attacking others Identity Verification ( PIC ) card details of your vacation activities your... Following statements is true about disclosure of confidential information of Top Secret information occurred often passed from to! About potentially classified how can you protect yourself from internet hoaxes need-to-know and has made unusual requests for sensitive information which! Personnel 28 a toll-free number where you can search for the source of information its!, point of contact, and something you possess, like a CAC, and something you possess, a. For distribution Control to Network assets powerful and useful tool, but it also! 'S knowledge security * at which Cyberspace Protection Condition ( CPCON ) is the best Protection method for Personally!

Humboldt Broncos Crash Graphic, Simon Sinek Family Tragedy, Vox Solaris Best Rank Up Rewards, Who Played Dolly On Gunsmoke, Tight End Training Program, Articles H