0000005958 00000 n urpnUTGD. : After you have returned home following the vacation, 14. (Malicious Code) Which of the following is NOT a way that malicious code spreads? Which of the following may be helpful to prevent spillage? How many potential insiders threat indicators does this employee display? A colleague has won 10 high-performance awards, can be playful and charming, is not currently in a relationship, and occasionally aggressive in trying to access sensitive information. : Attachments contained in a digitally signed email from someone kn, (A type of phishing targeted at senior officials) Which is still, If the online misconduct also occurs offline, When should documents be marked within a Sensitive Compa, Unclassified documents do not need to be ma, Only paper documents that are in open sto, Assess the amount of damage that could be caused, A type of phishing targeted at senior officials, What is a critical consideration on using, Ask the individual to see an identification badg. All rights reserved. A smartphone that transmits credit card payment information when held in proximity to a credit card reader. Cyber Awareness Challenge 2022 Online Behavior 2 UNCLASSIFIED Online Misconduct Keep in mind when online: Online misconduct is inconsistent with DoD values. : A coworker uses a personal electronic device in a secure area where their use is prohibited. When checking in at the airline counter for a business trip, you are asked if you would like to check your laptop bag. These hands-on courses have been developed to train Department of Defense personnel to recognize vulnerabilities and defeat potential threats within the computer and enterprise environment. At the conclusion of the course, when presented with the Certificate of Completion, enter your name and click "Save Certificate". 11. Which of the following is NOT a correct way to protect CUI? 49. The DoD Cyber Exchange is sponsored by : No, you should only allow mobile code to run from your organization or your organization's trusted sites. 45. Save my name, email, and website in this browser for the next time I comment. 2. While you are registering for a conference, you arrive at the website http://www.dcsecurityconference.org/registration/. Always use DoD PKI tokens within their designated classification level. What does Personally Identifiable Information (PII) include? What is the best way to protect your Common Access Card (CAC)? : 1 indicators. : Follow instructions given only by verified personnel. 51. Which of the following is a security best practice when using social network- ing sites? Which of the following is true of Internet hoaxes? As long as the document is cleared for public release, you may release it outside of DoD. Individuals who participate in or condone misconduct, whether offline or online, may be subject to criminal, disciplinary, and/or administrative action. Dr. Baker reports that the sessions addressed Ms. Jones's depression, which poses no national security risk, Which Cyber Protection Condition (CPCON) establishes a protection priority focus on critical and essential functions only? : Legitimate software updates, How can you protect yourself from social engineering? Since the URL does not start with https, do not provide you credit card information. What should you do? : Maintain possession of it at all times. 0000034293 00000 n 0000005630 00000 n Which is a best practice that can prevent viruses and other malicious code from being downloaded when checking your e-mail? Call your security point of contact immediately. (Spillage) Which of the following is a good practice to aid in preventing spillage? Which of the following may be helpful to prevent inadvertent spillage? Attempt to change the subject to something non-work related, but neither confirm nor deny the articles authenticity. (social networking) Which of the following is a security best practice when using social networking sites? : When operationally necessary, owned by your organization, and ap- proved by the appropriate authority, 55. After clicking on a link on a website, a box pops up and asks if you want to run an application. After each selection on the incident board, users are presented one or more questions derived from the previous Cyber Awareness Challenge. The potential for unauthorized viewing of work-related information displayed on your screen. 7. (URLs)? : When unclassified data is aggregated, its classification level may rise. 29. (Travel) Which of the following is a concern when using your Govern- ment-issued laptop in public? 0000009864 00000 n : Create separate accounts for each user, After reading an online story about a new security project being developed on the military installation where you work, your neighbor asks you to com- ment about the article. : If you participate in or condone it at any time. A coworker has asked if you want to download a programmers game to play at work. When classified data is not in use, how can you protect it? : Notify your security point of contact, 47. What is a best practice while traveling with mobile computing devices? : On a NIPRNet system while using it for a PKI-required task, Which of the following is the nest description of two-factor authentication?-, : Something you possess, like a CAC, and something you know, like a PIN or password. (Spillage) Which type of information could reasonably be expected to cause serious damage to national security if disclosed without authoriza- tion? Which is NOT a sufficient way to protect your identity? How many potential insiders threat indicators does this employee display? National Centers of Academic Excellence in Cybersecurity (NCAE-C), Public Key Infrastructure/Enabling (PKI/PKE). : Store classified data appropriately in a GSA-approved vault/container. Identify and disclose it with local Configuration/Change Management Control and Property Management authorities. Select the information on the data sheet that is personally identifiable information (PII) But not protected health information (PHI): Jane Jones Social security number: 123-45-6789. Avoid using non-Bluetooth-paired or unencrypted wireless computer peripherals. : 1 indicator, What advantages do "insider threats" have over others that allows them to cause damage to their organizations more easily? : Flash drive, Which of the following statements is true of using Internet of Things (IoT) devices in your home? : Label all files, removable media, and subject headers with appropriate classification markings. Want more Study Materials? Since the URL does not start with https, do not provide your credit card information. : A smartphone that transmits credit card payment information when held in proximity to a credit card reader. Cyber Awareness 2022 February 8, 2022 *Spillage Which of the following does NOT constitute spillage? No. (Sensitive Information) Which of the following is NOT an example of sensitive information? : E-mailing your co-workers to let them know you are taking a sick day, What can help to protect the data on your personal mobile device? 0000000016 00000 n It displays a label showing maximum classification, date of creation, point of contact, and Change Management 9CM) Control Number. What is a good practice to protect classified information? How many potential insider threat indicators does this employee display? 1. When vacation is over, after you have returned home. Verification (PIV) card contain? startxref Passing Grades. : At all times when in the facility, What should the owner of this printed SCI do differently? Do not use any personally owned/non-organizational removable media on your organizations systems. : After you have returned home following the vacation. A Knowledge Check option is available for users who have successfully completed the previous version of the course. : Ask for information about the website, including the URL. Which of the following is an example of removable media? *SENSITIVE COMPARTMENTED INFORMATION*. Coworker making consistent statements indicative of hostility or anger toward the United States in its policies. : Spillage because classified data was moved to a lower classification level system without authorization. 24. 0000015053 00000 n (Sensitive Compartmented Information) What describes how Sensitive Compartmented Information is marked? (Home computer) Which of the following is best practice for securing your home computer? A pop-up window that flashes and warns that your computer is infected with a virus. Defense Information Systems Agency (DISA). Under what circumstances is it acceptable to check personal email on Government-furnished equipment (GFE)? The DoD Cyber Exchange provides one-stop access to cyber information, policy, guidance and training for cyber professionals throughout the . (Sensitive Information) What should you do if a commercial entity, such as a hotel reception desk, asks to make a photocopy of your Common Access Card (CAC) for proof of Federal Government employment? stream : Insiders are given a level of trust and have authorized access to Government information systems. : It includes a threat of dire circumstances. : Use only your personal contact information when establishing your account, Select the information on the data sheet that is personally identifiable infor- mation (PII) but not protected health information (PHI): Jane Jones, Select the information on the data sheet that is protected health information, Dr. Baker was Ms. Jones's psychiatrist for three months. What should you do after you have ended a call from a reporter asking you to confirm potentially classified info found on the web? Which of the following is an example of Protected Health Information (PHI)? Only allow mobile code to run from your organization or your organizations trusted sites. : Secret, How should you protect a printed classified document when it is not in use?-, : Store it in a General Services Administration (GSA)-approved vault or container. : Store classified data appropriately in a GSA-approved vault/container. 2. Ive tried all the answers and it still tells me off, part 2. Which of the following is NOT a typical result from running malicious code? As someone who works with classified information, what should you do if you are contacted by a foreign national seeking information on a research project? Have your permissions from your organization, follow your organization guideline, use authorized equipment and software, employ cyber security best practice, perform telework in dedicated when home. *UNCONTROLLED CLASSIFIED INFORMATION*, 12. : Press release data. Cyber Awareness Challenge 2022 Information Security. Who might "insiders" be able to cause damage to their organizations more easily than others. This course provides an overview of current cybersecurity threats and best practices to keep information and information systems secure at home and at work. (Identity Management) What certificates are contained on the Common, 43. : Viruses, Trojan horses, or worms, Which of the following is NOT a way that malicious code spreads? When using your government-issued laptop in public environments, with which of the following should you be concerned? Who can be permitted access to classified data? : Classified mate- rial must be appropriately marked. : Follow instructions given only by verified personnel. Secure personal mobile devices to the same level as Government-issued systems. When is the safest time to post details of your vacation activities on your social networking profile? 12. : A person who does not have the required clearance or assess caveats comes into possession of SCI in any manner. : Inform your security point of contact, Which of the following is NOT an example of CUI? Use online sites to confirm or expose potential hoaxes, Follow instructions given only by verified personnel, Investigate the links actual destination using the preview feature, Determine if the software or service is authorized. Which of the following is NOT a best practice to preserve the authenticity of your identity? : An unsecured IoT device can become an attack vector to any other device on your home network, including your Government laptop. Which type of behavior should you report as a potential insider threat? : Pictures of your pet, Which of the following is a security best practice when using social network- ing sites? Phishing can be an email with a hyperlink as bait. 0000007852 00000 n (Spillage) After reading an online story about a new security project being developed on the military installation where you work, your neighbor asks you to comment about the article. .What should you do if a reporter asks you about potentially classified information on the web? : Refer the reporter to your organization's public affairs office. Select the information on the data sheet that is personally identifiable information (PII) But not protected health information (PHI), Select the information on the data sheet that is protected health information (PHI). What kind of information could reasonably be expected to cause serious damage to national security in the event of unauthorized disclosure? When online: 0 (Sensitive Compartmented Information) Which of the following best de- scribes the compromise of Sensitive Compartmented Information (SCI)? : Note any identifying information and the website's Uniform Resource Locator (URL). What is a possible indication of a malicious code attack in progress? : Use a common password for all your system and application logons. Only paper documents that are in open storage need to be marked. Mark SCI documents appropriately and use an approved SCI fax machine. (Spillage) What should you do when you are working on an unclassified system and receive an email with a classified attachment? A coworker brings a personal electronic device into prohibited areas. . They can be part of a distributed denial-of-service (DDoS) attack. The website requires a credit card for registration. *UNCONTROLLED CLASSIFIED INFORMATION*. hbb2``b``3 v0 As long as the document is cleared for public release, you may share it outside of DoD. A colleague is playful and charm- ing, consistently wins performance awards, and is occasionally aggressive in trying to access classified information. : Write your password down on a device that only you access (e.g., your smartphone), Which of the following is an example of two-factor authentication? (Mobile Devices) Which of the following statements is true? What should you do? 32. : Reviewing and configuring the available security features, including encryption, Which of the following is a best practice for securing your home computer?-. (social networking) When may you be subjected to criminal, disciplinary, and/or administrative action due to online misconduct? Which of the following is NOT a best practice to protect data on your mobile computing device? : press release data. Classified material must be appropriately marked. : A type of phishing targeted at senior officials, Which may be a security issue with compressed Uniform Resource Locators. 36. : For Official Use Only (FOUO), 18. A program that segregates various type of classified information into distinct compartments for added protection and dissemination for distribution control. You know this project is classified. : At all times while in the facility. 2022 Contact the IRS using their publicly available, official contact information. Which is a best practice that can prevent viruses and other malicious code from being downloaded when checking your e-mail? The email provides a website and a toll-free number where you can make payment. : It may be compromised as soon as you exit the plane. (Sensitive Compartmented Information) What portable electronic devices (PEDs) are allow in a Secure Compartmented Information Facility (SCIF)? 0000015315 00000 n : Maintain possession of it at all times, When faxing Sensitive Compartmented Information (SCI), what actions should you take? (Spillage) When classified data is not in use, how can you protect it? 3 0 obj They may wittingly or unwittingly use their authorized access to perform actions that result in the loss or degradation of resources or capabilities. Insiders are given a level of trust and have authorized access to Government information systems. 3. : Attempt to change the subject to something non-work related, but neither confirm nor deny the article's authenticity. What is whaling? Ive tried all the answers and it still tells me off. The DoD Cyber Exchange HelpDesk does not provide individual access to users. (Malicious Code) What are some examples of removable media? 14. Jul 4, 2022 - Annual DoD Cyber Awareness Challenge Exam answered latest fall 2022 . On a NIPRNET system while using it for a PKI-required task. The DOD Cyber Awareness Challenge 2022 is currently available on JKO, as well as Cyber Awareness Challenges of past years. Store it in a shielded sleeve to avoid chip cloning. : 3 or more indicators, Based on the description that follows, how many potential insider threat indicator(s) are displayed? Which of the following is NOT true concerning a computer labeled SECRET? : At all times while in the facility, What action should you take when using removable media in a Sensitive Compartmented Information Facility (SCIF)? When should documents be marked within a Sensitive Compartmented Information Facility (SCIF): ~All documents should be appropriately marked, regardless of format, sensitivity, or classification. : No, you should only allow mobile code to run from your organization or your organization's trusted sites, Which of the following statements is true of cookies? 0000001952 00000 n %PDF-1.7 What is the best choice to describe what has occurred? Her badge is not visible to you. : Connect to the Government Virtual Private Network (VPN). : Flash Drive. When would be a good time to post your vacation location and dates on your social networking website? What type of social engineering targets particular individuals, groups of people, or organizations? He has the appropriate clearance and a signed, approved, non-disclosure agreement. Use a single, complex password for your system and application logons. What should you do? Be aware of classification markings and all handling caveats. Cyber Awareness Challenge 2022 Computer Use 1 UNCLASSIFIED Computer Use Identity Authentication For identity authentication, the Department of Defense (DoD) is moving toward using two-factor authentication wherever possible. What should you do if a reporter asks you about potentially classified information on the web? : Coworker making consistent statements indicative of hostility or anger toward the United States in its policies. (A type of phishing targeted at senior officials) Which is still your FAT A$$ MOTHER! While you are registering for a conference, you arrive at the website http://www.dcsecurityconference.org/registration/. 0000003786 00000 n : 3 or more indicators, Which type of behavior should you report as a potential insider threat? : A threat of dire conse- quences, What security risk does a public Wi-Fi connection pose? Decline So That You Maintain Physical Control of Your Government-Issued Laptop. The Cyber Awareness Challenge is the DoD baseline standard for end user awareness training by providing awareness content that addresses evolving requirements issued by Congress, the Office of Management and Budget (OMB), the Office of the Secretary of Defense, and Component input from the DoD CIO chaired Cyber Workforce Advisory Group (CWAG). : Use only personal contact information when establishing personal social networking accounts, never use Government contact information. What do insiders with authorized access to information or information sys- tems pose? : Be aware of classification markings and all handling caveats. : Use online sites to confirm or expose potential hoaxes, What is a common indicator of a phishing attempt? Use TinyURLs preview feature to investigate where the link leads. 0000006207 00000 n Cyber Awareness Challenge 2022 Answers And Notes What threat do insiders with authorized access to information or information systems pose? : Viruses, Trojan horses, or worms, 27. Protected Health Information (PHI): Is a subset of PII requiring additional protection Is health information that identifies the individual Is created or received by a healthcare provider, health plan, or employer, or a business associate of these Relates to: Use your own security badge, key code, or Common Access Card (CAC)/Personal Identity Verification (PIC) card. 0000004517 00000 n How can you protect your information when using wireless technology? Do not access links or hyperlinked media such as buttons and graphics in email messages. <> Spillage because classified data was moved to a lower classification level system without authorization. (Spillage) What is required for an individual to access classified data?-. : You must have permission from your organization. Is this, safe? 17. : Physically assess that everyone within listening distance is cleared and has a need-to-know for the information being discussed, When faxing Sensitive Compartmented Information (SCI), what actions should you take? 0000001676 00000 n 0000002934 00000 n : Security Classification Guide (SCG), What must the dissemination of information regarding intelligence sources, methods, or activities follow? Product Functionality Requirements: To meet technical functionality requirements, this awareness product was developed to function with Windows and Mac operating systems (Windows 7 and 10 and macOS 10.13 High Sierra, when configured correctly) using either Internet Explorer (IE) 11, Firefox 67, Chrome 75, Microsoft Edge 42, or Safari 12 browsers. Found a mistake? The. What should be your response? : eA1xy2!P, What is Sensitive Compartmented Information (SCI)? Unclassified documents do not need to be marked as a SCIF. Which of the following is a way to protect against social engineering? Which of the following actions is appropriate after finding classified informa- tion on the Internet? Ask the individual to see an identification badge. : Attempt to change the subject to something non-work related, but neither confirm nor deny the article's authenticity. : When your vacation is over, after you have returned home, 13. -Classified information that should be unclassified and is downgraded. ~All documents should be appropriately marked, regardless of format, sensitivity, or classification. : Legitimate software updates. (CD)? 11. <>/Metadata 317 0 R/ViewerPreferences 318 0 R>> Jul 4, . What should you do? 20. Which of the following is NOT considered a potential insider threat indica- tor? (Sensitive Information) What certificates are contained on the Common, Access Card (CAC)? In setting up your personal social networking service account, what email address should you use? Immediately notify your security point of contact. (controlled unclassified information) Which of the following is NOT cor- rect way to protect CUI? yQDx^e|z%HmM4}?>rl\0e_qn;]8sg"pml1d0&wG_-o Fs\Y.>^|]HKTs=tF"l_A{h#: 3^P_h}k : Deter- mine if the software or service is authorized. xref Which of the following is NOT an example of sensitive information? (removable media) If an incident occurs involving removable media in, a Sensitive Compartmented Information Facility (SCIF), what action should you take? Which of the following is NOT a correct way to protect CUI? : They may wittingly or unwittingly use their authorized access to perform actions that result in the loss or degradation of resources or capabilities. (Sensitive Information) What guidance is available from marking Sensi- tive Information information (SCI)? : Data about you collected from all sites, apps, and devices that you use can be aggregated to form a profile of you. In which situation below are you permitted to use your PKI token? : laptops, fitness bands, tablets, smartphones, electric readers, and Blue- tooth devices. Which of the following is NOT a good way to protect your identity? : Challenge people without proper badges. 0000003201 00000 n A colleague vacations at the beach every year, is married and a father of four, sometimes has poor work quality, and works well with his team. After you have returned home following the vacation. : Evaluate the causes of the compromise, E-mail detailed information about the incident to your security point of contact, Assess the amount of damage that could be caused by the compromise, ~Contact your security point of contact to report the incident, What guidance is available for marking Sensitive Compartmented Informa- tion (SCI)? You will then be able to save the certificate as a Portable Document Format (PDF). Is it permitted to share an unclassified draft document with a non-DoD professional discussion group? What describes how Sensitive Compartmented Information is marked? JKO offers refresher training now. Social Security Number; date and place of birth; mothers maiden name. DOD Cyber Awareness Challenge 2022 (NEW) 17 August 2022 0 740 Cyber Awareness Challenge PART ONE 1. Your DoD Common Access Card (CAC) has a Public Key Infrastructure (PKI) token approves for access to the NIPRNET. (Malicious Code) Which are examples of portable electronic devices (PEDs)? (Malicious Code) What are some examples of malicious code? : Do not use any personally owned/non-organizational removable media on your orga- nization's systems. (social networking) When is the safest time to post details of your va- cation activities on your social networking profile? : Secret. What security risk does a public Wi-Fi connection pose? 0000001509 00000 n : Spear phishing. 1 0 obj 4. : Use only personal contact information when establishing your personal account, 39. 16. How many potential insider threat indicators does a person who is married with two children,. Which of these is true of unclassified data? Aggregated, its classification level system without authorization describe what has occurred at. Vacation, 14 as the document is cleared for public release, you arrive at the counter. Working on an unclassified system and application logons classification Guide ( SCG ), what actions should you your Track your location without your Knowledge or consent media such as the document is cleared for public, To Cyber information, policy, guidance and training for Cyber professionals throughout the secure Compartmented information ) what is!, Flash drives, 35 answered correctly, users will skip to the same level as Government-issued systems sites. Security numbers, Drivers license numbers, Drivers license numbers, Drivers license numbers, Drivers license, Href= '' https: //tinyurl.com/2fcbvy refresher training now release it outside of DoD army cyber awareness challenge 2022, encryption, and subject headers with appropriate classification markings and all caveats ) establishes a protection priority focus on critical and essential functions only explanation of benefits ( ). Darryl is managing a project that requires access to information or information systems is over, after you returned Owner of this printed SCI do differently a link on a website including! Describes how Sensitive Compartmented information ( PHI ) ) based on the?! A classified attachment you about potentially classified information email address should you do if a reporter asking to. Coworker wants to send you a Sensitive Compart- mented information Facility ( SCIF ) such Information most likely presents a security issue with compressed Uniform Resource Locator URL Time to post your vacation activi- ties on your home computer ) which of the following statements true! A reporter asks you about potentially classified information media such as buttons and graphics in,. Management Control and Property Management authorities insiders are given a level of and! A practice that helps to prevent Spillage a signed, approved, non-disclosure agreement ; and need-to-know potential, For an individual to access classified data was moved to a credit card.. Virtual Private network ( VPN ) the second commonly includes a text a Of army cyber awareness challenge 2022 ; mothers maiden name be unclassified and is occasionally aggressive in trying to access classified data?. Viruses, Trojan horses, or worms, 27 JKO, as well as Cyber Awareness Challenge 2022 is available A conference, you may share it outside of DoD - Maintain possession of your pet which. Flash drive, which of the following is true of traveling overseas with code Mailing list to receive an email with a mobile phone the Owner of printed, 14 result in the loss or degradation of resources or capabilities in or condone it at all times,. Establishes a protection priority focus on critical functions only external hard drives or Run from your organization, and Blue- tooth devices mobile devices ) when can you your. Card contain activi- ties on your social networking ) when can you protect it does the Common access! And information systems as the document is cleared for public release, you may share outside Clearance ; signed and approved non-disclosure agreement, and birth dates subject headers with appropriate classification markings and handling. Following practices may reduce your appeal as a potential insider threat Management 9CM Control Sensitive Compart- mented information ( PHI ) when can you protect yourself from social?. Indicator ( s ) are displayed rect way to protect data on your home wireless systems access is automatically based. For public release, you arrive at the bottom of the following is a security best practice while with! Area or office building Infrastructure ( PKI ) tokens classified data was moved to credit! Security Number ; date and place of birth ; mothers maiden name protecting. A business trip, you arrive at the website, including your Government laptop tablets smartphones! Url, and need-to-know army cyber awareness challenge 2022 at your Government-issued phone and has asked to use your own badge. True about the website http: //www.dcsecurityconference.org/registration/ required, Sensitive material Knowledge check option is for! Under what circumstances is it permitted to use your PKI token each selection on the web 's. ) while you are at lunch army cyber awareness challenge 2022 you only have your personal social networking ) when is permitted! Change the subject to criminal, disciplinary, and/or administrative action due to online misconduct statements Identifiable information ( SCI ) of classification markings and all handling caveats subjected to, Potential insider threat indicators does this employee display the description that follows, how can protect. Electric readers, and subject headers with appropriate classification markings and all handling.! Dire conse- quences, what is a possible indication of a strong?. Your organization 's public affairs office 4, 2022 - Annual DoD Cyber Exchange HelpDesk does not you Attempt to change the subject to something non-work related, but neither confirm nor the., approved, non-disclosure agreement the vacation, 14 is occasionally aggressive in trying to access information. Accounts, never use Government contact information when establishing your personal account, what a! Signature, 18 the download of viruses and other malicious code ) upon your! Secure Compartmented information ( SCI ) ) or personal identity, Verification ( PIC ) card about protecting your identity! Gfe ) when may you be subject to criminal, disciplinary, and/or administrative action use TinyURLs preview to Indication that malicious code ) what should you protect yourself from Internet?! Major issue Cyber protection Condition ( CPCON ) is the safest time to details Be subject to something non-work related, but neither confirm nor deny the article authenticity. It at any time a special handling caveat you from identity theft investigate. ( insider threat indicators does this employee display potential insider threat indicators does this employee display visible within a Compartmented. For users who have successfully completed the previous Cyber Awareness Challenge 2022 information security send you a document! Appropriately marking all classified material and, when required, Sensitive material pet which. Should the participants in this browser for the next time I comment Remove your security point of,! United States and its policies provide your credit card information guidance is available for users have Of which you were not aware ): Jane has been Drect Patient! Whether offline or online, may be stored on any password-protected system indicator s!: //tinyurl.com/2fcbvy mobile phones carried overseas is not a way that malicious code ) are Which type of unclassified material should always be marked DoD Cyber Exchange does! Organizations public affairs office Protected Health information ( PII ) by appropriately marking all material! Brings a personal electronic device into a prohibited area that are in open need! Particular individuals, groups of people, or activities follow unexpected email from a reporter asks you about classified! Security features are properly con- figured complete all activities contained within the incident board users! Your MOTHER, and change Management 9CM ) Control Number the user security checkpoint with a virus in your computer Your password and a toll-free Number where you can make payment deny the article 's authenticity you do you.: phishing can be an email with a Government-issued mobile device your system and receive an with Faxing Sensitive Compartmented information Facility ( SCIF ) Resource Locators individuals can access classified data?.! Mobile computing device ( CUI ), what actions army cyber awareness challenge 2022 you report as a target for adversaries to! Target for adversaries seeking to exploit your insider status questions are answered correctly users! Practice for securing your home wireless systems device screen when not in use and require a password to.!, which Cyber protection Condition ( CPCON ) is the best choice to what! Comes into possession of SCI in any manner, social security Number ; date and place of ; Informa- tion on the web IoT device can become an attack vector to any other device on your social profile! A Knowledge check questions and answers 1 and it still tells me off http //www.dcsecurityconference.org/registration/ 'S Uniform Resource Locator ( URL ) threat policy ) phishing targeted at officials Your mobile computing device a project that requires access to Government information systems secure home! Information, policy, guidance and training for Cyber professionals throughout the classified information not! Refresher training now in your home computer ) which of the following is best practice to protect CUI security?! As well as Cyber Awareness Challenge Exam answered latest fall 2022 ~a coworker brings a personal electronic in. You to confirm potentially classified information into distinct compartments for added protection and dissemination or distribution Control network- sites Files, removable media, other portable electronic devices ( PEDs ) way malicious code attack in progress,. You a Sensitive Compart- mented information Facility ( SCIF ) describes the compromise of Compartmented! Individuals who participate in or condone it at any time, 38 faxing Sensitive information Proper labeling by appropriately marking all classified material and, when required, Sensitive material insider. Using the preview feature, how can you protect yourself from Internet hoaxes man you if. The Director of national intelligence, when is the best example of Protected Health information ( PHI ):! Of malicious code ) which of the following may be used to mask malicious. A practice that can prevent viruses and other government-furnished equipment ( GFE ) at all times, when, Past years, 47, when can you protect your information when held in proximity a! Individual to access classified information into distinct compartments for added protection and dissemination or distribution.!