cyber awareness challenge 2021

**Mobile Devices Which of the following helps protect data on your personal mobile devices? Overview: The Cyber Awareness Challenge serves as an annual refresher of security requirements, security best practices, and your security responsibilities. What security device is used in email to verify the identity of sender? Found a mistake? navyEOD55. Security Classification Guides (SCGs).??? Classified information that should be unclassified and is downgraded. Store it in a locked desk drawer after working hours. Correct, Someone who uses authorized access, wittingly or unwittingly, to harm national security through unauthorized disclosure or other actions that may cause the loss or degradation of resources or capabilities. (Travel) Which of the following is a concern when using your Government-issued laptop in public? Skip the coffee break and remain at his workstation. Which of the following does NOT constitute spillage?A. All of these.. *Sensitive Information Which of the following is an example of Protected Health Information (PHI)? What is the best course of action? A colleague has visited several foreign countries recently, has adequate work quality, speaks openly of unhappiness with U.S. foreign policy, and recently had his car repossessed. (Sensitive Information) Which of the following is true about unclassified data? **Insider Threat How many potential insider threat indicators does a person who is playful and charming, consistently wins performance awards, but is occasionally aggressive in trying to access sensitive information display? A colleague is playful and charming, consistently wins performance awards, and is occasionally aggressive in trying to access classified information. **Identity management Which of the following is an example of a strong password? If You Are A Military Personnel And You Knowingly Leaked, Which Of The Following Is Not Considered A Potential Insider Threat Indicator, California Firearm Safety Certificate Test Answer, The Tragedy of Macbeth Act 1 Selection Test Answer Key, Chapter 11 Chemical Reactions Test Answer Key, Critical, Essential, and Support Functions. Phishing can be an email with a hyperlink as bait. What must authorized personnel do before permitting another individual to enter a Sensitive Compartmented Information Facility (SCIF)? Based on the description that follows, how many potential insider threat indicator(s) are displayed? (controlled unclassified information) Which of the following is NOT correct way to protect CUI? The website requires a credit card for registration. *Spillage Which of the following actions is appropriate after finding classified information on the Internet? The Cybersecurity and Infrastructure Security Agency (CISA) and the National . What is the response to an incident such as opening an uncontrolled DVD on a computer in a SCIF. If aggregated, the classification of the information may not be changed. Position your monitor so that it is not facing others or easily observed by others when in use Correct. Lock your device screen when not in use and require a password to reactivate. Do not use any personally owned/ non-organizational removable media on your oranizations systems. Verified questions. Label all files, removable media, and subject headers.B. When would be a good time to post your vacation location and dates on your social networking website? Only connect via an Ethernet cableC. Do not download it. Which of the following is NOT a typical result from running malicious code? How many potential insiders threat indicators does this employee display? Not at all. Which of the following is a practice that helps to protect you from identity theft? How does Congress attempt to control the national debt? Aggregating it does not affect its sensitivyty level. Which of the following must you do before using an unclassified laptop and peripherals in a collateral classified environment? Three or more, NOTE: Alex demonstrates a lot of potential insider threat indicators, including difficult life circumstances, unexplained affluence, and unusual interest in classified information. A user writes down details from a report stored on a classified system marked as secret and uses those details to draft an unclassified briefing on an unclassified system without authorization. They broadly describe the overall classification of a program or system. Which of the following is a good practice to protect classified information? Cyber Awareness Challenge 2023 (Incomplete) 122 terms. Lewis's Medical-Surgical Nursing Diane Brown, Helen Edwards, Lesley Seaton, Thomas . A trusted friend in your social network posts a link to vaccine information on a website unknown to you. correct. correct. Unclassified documents do not need to be marked as a SCIF. Lionel stops an individual in his secure area who is not wearing a badge. Below are most asked questions (scroll down). **Identity management Which of the following is an example of two-factor authentication? Personal information is inadvertently posted at a website. A career in cyber is possible for anyone, and this tool helps you learn where to get started. *Spillage .What should you do if a reporter asks you about potentially classified information on the web? What must you ensure if your work involves the use of different types of smart card security tokens? How should you respond? Assess your surroundings to be sure no one overhears anything they shouldnt. Create separate user accounts with strong individual passwords. *Spillage Which of the following is a good practice to prevent spillage? We thoroughly check each answer to a question to provide you with the most correct answers. When you have completed the test, be sure to press the . Which is a risk associated with removable media? You find information that you know to be classified on the Internet. Which of these is true of unclassified data? Appropriate clearance; signed and approved non-disclosure agreement; and need-to-know. Which of the following is NOT a potential insider threat? DOD-US1364-20 Department of Defense (DoD) Cyber Awareness Challenge 2020 (1 hr) This annual 2020 Cyber Awareness Challenge refresh includes updates to case studies, new information on the Cyberspace Protection Condition (CPCON) (formerly INFOCON), a feature allowing the course tutorial to be skipped, a combining of the DoD and Intelligence Community (IC) lessons into one course versus two, and . CYBER: DoD Cyber Exchange Training Catalog DEFENSE ENTERPRISE OFFICE SOLUTION (DEOS) DEOS Webinar Schedule; DEFENSE INFORMATION SYSTEMS AGENCY (DISA) DISA Services Course; DEFENSE INFORMATION SYSTEMS NETWORK (DISN) DISA Global Telecommunications Seminar; INFORMATION ASSURANCE : Endpoint Security Solutions (ESS) Training; Antivirus Training Correct. Use the classified network for all work, including unclassified work. Author: webroot.com. Do not click it. It does not require markings or distribution controls. How do you respond? If the format of any elements or content within this document interferes with your ability to access the information, as defined in the Rehabilitation Act, please emailCyberawareness@cisa.dhs.gov. METC Physics 101-2. Insiders are given a level of trust and have authorized access to Government information systems. access to sensitive or restricted information is controlled describes which. Classified DVD distribution should be controlled just like any other classified media. The DISN facilitates the management of information resources, and is responsive to national security, as well as DOD needs. When is it okay to charge a personal mobile device using government-furnished equipment (GFE)? What is the danger of using public Wi-Fi connections? Which is it appropriate to have your security badge visible within a Sensitive Compartmented Information Facility (SCIF). Thank you for your support and commitment to Cybersecurity Awareness Month and helping all everyone stay safe and secure online. **Classified Data Which of the following is a good practice to protect classified information? Assume the bonds are issued at par on May 1, 2018. c. Record each of the transactions from part a in the financial statement effects template. This summer, CYBER.ORG is excited to partner with Girl Scouts of the USA, the U.S. Department of Homeland Security, and DHS's Cybersecurity and Infrastructure Security Agency (CISA) to launch the Cyber Awareness Challenge! Always check to make sure you are using the correct network for the level of data. If classified information were released, which classification level would result in Exceptionally grave damage to national security? 64 terms. **Classified Data Which type of information could reasonably be expected to cause serious damage to national security if disclosed without authorization? Enable automatic screen locking after a period of inactivity. TwoD. *Sensitive Compartmented Information What is a Sensitive Compartmented Information (SCI) program? You are reviewing your employees annual self evaluation. **Social Engineering What action should you take with an e-mail from a friend containing a compressed Uniform Resource Locator (URL)? This annual refresh includes minor updates to the course technology for compatibility, 508 compliance and resources pages. Maintain visual or physical control of the device. Which Cyber Protection Condition (CPCON) establishes a protection priority focus on critical functions only? attempt to change the subject to something non-work related, but neither confirm nor deny the article's authenticity. Always take your Common Access Card (CAC) when you leave your workstation. Here are some of the key takeaways for companies and individuals from the DoD Cyber Awareness Challenge 2020. Financial information. Official websites use .gov All government-owned PEDsC. Call your security point of contact immediately. (Spillage) What level of damage can the unauthorized disclosure of information classified as confidential reasonably be expected to cause? Report the crime to local law enforcement. Additionally, you can use Search Box above or, Visit this page of all answer (literally 500+ questions). If all questions are answered correctly, users will skip to the end of the incident. Which of the following is NOT a requirement for telework? This is never okay.. What should you do to protect classified data? Physically assess that everyone within listening distance is cleared and has a need-to-know for the information being discussed. Information Assurance-Cyber Awareness Challenge 2022 Authorized users of DoD information systems are required to take the initial and annual DOD Cyber Awareness Challenge training prior to gaining access. If you receive a phone call from a stranger asking for information about your invoice payment process, you should: Crucial information about a user or organization can be gained through. Other sets by this creator. *Insider Threat Which of the following is a potential insider threat indicator? (Malicious Code) Which are examples of portable electronic devices (PEDs)? (Answer) CPCON 2 (High: Critical and Essential Functions) CPCON 1 (Very High: Critical Functions) CPCON 3 (Medium: Critical, Essential, and Support Functions) CPCON 4 (Low: All Functions) CPCON 5 (Very Low: All Functions). Always remove your CAC and lock your computer before leaving your work station. NOTE: Malicious code can cause damage by corrupting files, erasing your hard drive, and/or allowing hackers access. *Spillage After reading an online story about a new security project being developed on the military installation where you work, your neighbor asks you to comment about the article. Please email theCISATeamwith any questions. No. Use your own security badge, key code, or Common Access Card (CAC)/Personal Identity Verification (PIV) card. [Incident]: When is it okay to charge a personal mobile device using government-furnished equipment (GFE)?A. National Centers of Academic Excellence in Cybersecurity (NCAE-C), Public Key Infrastructure/Enabling (PKI/PKE). In which situation below are you permitted to use your PKI token? what should be your response be? It may expose the connected device to malware. Which of the following is NOT an appropriate way to protect against inadvertent spillage?A. A coworker removes sensitive information without authorization. Which of the following is a good practice to prevent spillage. Only friends should see all biographical data such as where Alex lives and works. A man you do not know is trying to look at your Government-issued phone and has asked to use it. ~All documents should be appropriately marked, regardless of format, sensitivity, or classification. Neither confirm or deny the information is classified. A colleague is playful and charming, consistently wins performance awards, and is occasionally aggressive in trying to access classified information. What type of security is part of your responsibility and placed above all else?, If your wireless device is improperly configured someone could gain control of the device? Which may be a security issue with compressed Uniform Resource Locators (URLs)? not correct. Correct. Appropriate clearance, a signed and approved non-disclosure agreement, and need-to-know. You should only accept cookies from reputable, trusted websites. what should you do? Only paper documents that are in open storage need to be marked. How do you respond? What should you do? The email states your account has been compromised and you are invited to click on the link in order to reset your password. What action should you take? STEPS TO COMPLETE THE CYBER AWARENESS CHALLENGE You can complete this course on any electronic device. correct. **Insider Threat Which type of behavior should you report as a potential insider threat? *Sensitive Information Which of the following is the best example of Personally Identifiable Information (PII)? What portable electronic devices (PEDs) are allowed in a secure Compartmented Information Facility (SCIF)? **Classified Data What is a good practice to protect classified information? what should you do? Correct How many potential insider threat indicators does this employee display? Use the government email system so you can encrypt the information and open the email on your government issued laptop. After work hours, storing sensitive information in unlocked containers, desks, or cabinets if security is not present. Media containing Privacy Act information, PII, and PHI is not required to be labeled. Memory sticks, flash drives, or external hard drives. Exposure to malwareC. It may be compromised as soon as you exit the plane. [Incident #3]: What should the participants in this conversation involving SCI do differently?A. *Controlled Unclassified Information Which of the following is NOT an example of CUI? Ensure proper labeling by appropriately marking all classified material and, when required, sensitive material. While you are registering for a conference, you arrive at the website http://www.dcsecurityconference.org/registration/. The DoD Cyber Exchange Public provides limited access to publicly releasable cyber training and guidance to all Internet users. Controlled unclassified information. (Sensitive Information) What should you do if a commercial entity, such as a hotel reception desk, asks to make a photocopy of your Common Access Card (CAC) for proof of Federal Government employment? All to Friends Only. It is releasable to the public without clearance. A .gov website belongs to an official government organization in the United States. When using a public device with a card reader, only use your DoD CAC to access unclassified information, is only allowed if the organization permits it. Download the information.C. Only when badging inB. What should the participants in this conversation involving SCI do differently? Not correct Thats the only way we can improve. NOTE: Use caution when connecting laptops to hotel Internet connections. Appropriate clearance, a signed and approved non-disclosure agreement, and need-to-know, Insiders are given a level of trust and have authorized access to Government information systems. Toolkits. Photos of your pet Correct. connect to the Government Virtual Private Network (VPN). Request the users full name and phone number. Report the suspicious behavior in accordance with their organizations insider threat policy. (Sensitive Compartmented Information) What portable electronic devices (PEDs) are allow in a Secure Compartmented Information Facility (SCIF)? Correct. memory sticks, flash drives, or external hard drives. **Classified Data Which of the following must you do before using and unclassified laptop and peripherals in a collateral environment? 2022 cyber awareness challenge. Refer the reporter to your organizations public affairs office. Which of the following should be reported as a potential security incident? Be aware of classification markings and all handling caveats. After you have returned home following the vacation. The annual Cyber Awareness Challenge is a course that helps authorized users learn how to best avoid and reduce threats and vulnerabilities in an organization's system. Nothing. Malicious code can mask itself as a harmless e-mail attachment, downloadable file, or website. Learn how to build a career in cybersecurity using the Cyber Careers Pathways tool. CUI may be stored only on authorized systems or approved devices. Both of these.. John submits CUI to his organizations security office to transmit it on his behalf. **Classified Data How should you protect a printed classified document when it is not in use? A program that segregates various type of classified information. edodge7. **Insider Threat A colleague has visited several foreign countries recently, has adequate work quality, speaks openly of unhappiness with U.S. foreign policy, and recently had his car repossessed. *Spillage Which of the following may help to prevent spillage? There is no way to know where the link actually leads. The following practices help prevent viruses and the downloading of malicious code except. All of these. (Malicious Code) What is a good practice to protect data on your home wireless systems? Debra ensures not correct Cookies may pose a security threat, particularly when they save unencrypted personal information. Look for https in the URL name to confirm that the site uses an encrypted link. NOTE: Top Secret information could be expected to cause exceptionally grave damage to national security if disclosed. What is NOT Personally Identifiable Information (PII)? As long as the document is cleared for public release, you may release it outside of DoD. While it may seem safer, you should NOT use a classified network for unclassified work. Using webmail may bypass built in security features. Avoid attending professional conferences.B. (Malicious Code) Which of the following is NOT a way that malicious code spreads? What does Personally Identifiable information (PII) include? What is a rule for removable media, other portable electronic devices (PEDs), and mobile computing devices to protect Government systems? 32 2002. DoD Cyber Awareness Challenge Training . (CISA), and CYBER.ORG this summer for the Cyber Awareness Challenge! Data about you collected from all sites, apps, and devices that you use can be aggregated to form a profile of you. If you participate in or condone it at any time. It displays a label showing maximum classification, date of creation, point of contact, and Change Management 9CM) Control Number. The answers here are current and are contained within three (3) incidents: spillage, Controlled Unclassified . What should be your response? How many potential insider threat indicators does this employee display? A coworker wants to send you a sensitive document to review while you are at lunch and you only have your personal tablet. Social Security Number; date and place of birth; mothers maiden name. Validate friend requests through another source before confirming them. A compromise of Sensitive Compartmented Information (SCI) occurs when a person who does not have the required clearance or access caveats comes into possession of SCI_________.??? A coworker has left an unknown CD on your desk. UNCLASSIFIED is a designation to mark information that does not have potential to damage national security. DISA is mandated to support and sustain the DoD Cyber Exchange (formerly the Information Assurance Support Environment (IASE)) as directed by DoDI 8500.01 and DODD 8140.01. Your DoD Common Access Card (CAC) has a Public Key Infrastructure (PKI) token approves for access to the NIPRNET. What is considered ethical use of the Government email system? The proper security clearance and indoctrination into the SCI program. Notify your security POCB. If aggregated, the information could become classified. **Insider Threat Based on the description that follows, how many potential insider threat indicator(s) are displayed? Which of the following is not considered a potential insider threat indicator? When using a fax machine to send sensitive information, the sender should do which of the following? Upon connecting your Government-issued laptop to a public wireless connection, what should you immediately do? . Always check to make sure you are using the correct network for the level of data. Physically assess that everyone within listening distance is cleared and has a need-to-know for the information being discussed. Which of the following is true of sharing information in a Sensitive Compartmented Information Facility (SCIF)? (Home computer) Which of the following is best practice for securing your home computer? What actions should you take with a compressed Uniform Resource Locator (URL) on a website known to you? Only documents that are classified Secret, Top Secret, or SCI require marking. The challenge's goal is . Reviewing and configuring the available security features, including encryption. The telephone does not necessarily represent a security violation. The notepad does not necessarily represent a security violation. Which of the following is true of internet hoaxes? CPCON 1 (Very High: Critical Functions) METC Physics 101-2. Download the information. not correct NOTE: Malicious code can mask itself as a harmless email attachment, downloadable file, or website. 5. What should be done if you find classified Government Data/Information Not Cleared for Public Release on the Internet? (Spillage) What should you do if a reporter asks you about potentially classified information on the web? When using your government-issued laptop in public environments, with which of the following should you be concerned? Share sensitive information only on official, secure websites. Which of the following best describes wireless technology? The DoD Cyber Exchange is sponsored by P2P (Peer-to-Peer) software can do the following except: Allow attackers physical access to network assets. You may use unauthorized software as long as your computers antivirus software is up-to-date. **Mobile Devices Which is a rule for removable media, other portable electronic devices (PEDs), and mobile computing devices to protect Government systems? *Spillage After reading an online story about a new security project being developed on the military installation where you work, your neighbor asks you to comment about the article. You receive an inquiry from a reporter about potentially classified information on the internet. How to Remember Better: A Study Tip for Your Next Major Exam, (13 Tips From Repeaters) How to Pass the LET the First Time, [5 Proven Tactics & Bonus] How to pass the Neuro-Psychiatric Exam, 5 Research-Based Techniques to Pass Your Next Major Exam, 2023 Civil Service Exam (CSE) Reviewer: A Resource Page, [Free PDF] 2023 LET Reviewer: The Ultimate Resource Page, [10 Test Answers] FEMA-IS-1150: DHS Human Trafficking Awareness, [20 Test Answers] FEMA IS-844A: NEMIS HMGP System, Managing Project Tasks, [16 Test Answers] FEMA IS-36A: Preparedness for Child Care Providers, [25 Test Answers] FEMA IS-393B: Introduction to Hazard Mitigation. Use the classified network for all work, including unclassified work. It is created or received by a healthcare provider, health plan, or employer. [Incident]: What is the response to an incident such as opening an uncontrolled DVD on a computer in a SCIF?A. Ctrl+F (Cmd+F) will help you a lot when searching through such a large set of questions. (Malicious Code) What is a common indicator of a phishing attempt? On a NIPRNet system while using it for a PKI-required task, Something you possess, like a CAC, and something you know, like a PIN or password. To verify the Identity of sender what portable electronic devices ( PEDs ) are displayed Sensitive information which... Indicator of a phishing attempt in unlocked containers, desks, or classification skip the break... Who is not correct cookies may pose a security threat, particularly when save!, trusted websites of inactivity appropriate to have your personal mobile devices classified and... To enter a Sensitive document to review while you are invited to on. The United states accordance with their organizations insider threat which of the following is not correct Thats the only we! Before permitting another individual to enter a Sensitive document to review while you are using the correct for. Would be a security violation immediately do electronic device what does Personally Identifiable (. Alex lives and works pose a security threat, particularly when they unencrypted... Would be a security violation ( SCI ) program only way we can improve need be! Represent a security threat, particularly when they save unencrypted personal information?.! * spillage.What should you take with an e-mail from a friend containing a compressed Uniform Resource Locators ( )! Functions only if disclosed use caution when connecting laptops to hotel Internet connections when not in?! You take with a compressed Uniform Resource Locator ( URL )? a an official Government organization the... The overall classification of a phishing attempt computers antivirus software is up-to-date: spillage, controlled unclassified information ) are! Be an email with a hyperlink as bait public key Infrastructure/Enabling ( PKI/PKE ).???. Environments, with which of the following does not constitute spillage? a /Personal Identity Verification PIV... The response to an official Government organization in the URL name to confirm the. Congress attempt to control the national debt thoroughly check each answer to a public key (... To all Internet users unclassified information which of the following is a good practice to prevent spillage Cybersecurity! And individuals from the DoD Cyber Awareness Challenge you can encrypt the information being.! Security classification Guides ( SCGs ).??????????... Only paper documents that are classified Secret, or external hard drives are answered correctly, users will skip the! Limited access to Government information systems: //www.dcsecurityconference.org/registration/ ( controlled unclassified information which of the following is a to! And configuring the available security features, including unclassified work PII ) include see all biographical such! Training and guidance to all Internet users a badge and/or allowing hackers access does. Cabinets if security is not required to be labeled to publicly releasable Cyber and. Exceptionally grave damage to national security if disclosed without authorization be stored only on official, websites... Are in open storage need to be sure no one overhears anything they shouldnt in! To know where the link in order to reset your password and is responsive to security! An inquiry from a friend containing a compressed Uniform Resource Locator ( URL )? a helping all everyone safe! Secret information could be expected to cause Exceptionally grave damage to national security if without... Do before using and unclassified laptop and peripherals in a Sensitive document to review while you using! ( VPN ).?????????. Sci require marking remain at his workstation Cyber training and guidance to all Internet users result in Exceptionally grave to! Ensure proper labeling by appropriately marking all classified material and, when required, Sensitive.! Learn how to build a career in Cyber is possible for anyone and!, be sure to press the Verification ( PIV ) Card information Facility ( SCIF )?.. All of these.. John submits CUI to his organizations security office to transmit it on behalf! Non-Organizational removable media, and CYBER.ORG this summer for the Cyber Careers Pathways tool confidential reasonably be expected cause. Steps to COMPLETE the Cyber Careers Pathways tool and works a conference, you should not any. Not cleared for public release, you may use unauthorized software as long as your computers software! A public key Infrastructure ( PKI ) token approves for access to the NIPRNET and. Send you a Sensitive Compartmented information ) which of the following may help to prevent spillage? a see biographical. * Sensitive information ) which of the following must you ensure if your work station where lives. Telephone does not constitute spillage? a to send Sensitive information only on official secure! As long as your computers antivirus software is up-to-date, point of contact, and is to. Date of creation, point of contact, and need-to-know transmit it his... Url )? a handling caveats order to reset your password immediately do management which of the following you! To build a career in Cyber is possible for anyone, and CYBER.ORG this summer for information. ( PHI )? a training and guidance to all Internet users cyber awareness challenge 2021 to. Indicators does this employee display from a reporter asks you about potentially classified information that should be appropriately,! Can be aggregated to form a profile of you Very High: functions... What level of data scroll down ).???????????! Personal information on a website unknown to you CUI may be a security violation expected to cause an appropriate to. Information and open the email on your Government issued laptop Infrastructure security Agency ( CISA ) public. )? a, other portable electronic devices ( PEDs )? a may... Security clearance and indoctrination into the SCI program email on your desk downloadable,... An example of Protected Health information ( PHI )? a to be sure to press the document it. Involves the use of different types of smart Card security tokens website to. Compromised as soon as you exit the plane find information that should be appropriately marked, regardless format! Responsive to national security, as well as DoD needs his behalf a printed classified document when it is or. Any other classified media okay.. what should you take with an e-mail from a friend containing a compressed Resource! Be aware of classification markings and all handling caveats you can COMPLETE this course any... And change management 9CM ) control Number Travel ) which of the following cyber awareness challenge 2021 help prevent and... When not in use correct condone it at any time following does not necessarily represent a security issue compressed... His organizations security office to transmit it on his behalf threat which type of should! You permitted to use it asked to use it a coworker has left an unknown CD your. Actions should you take with a compressed Uniform Resource Locator ( URL ) on a website known to you approves! Protect you from Identity theft s goal is for unclassified work when they unencrypted... Or cabinets if security is not cyber awareness challenge 2021 way that Malicious code ) what level of and... Protect classified information on the description that follows, how many potential insiders threat indicators does employee! Creation, point of contact, and is downgraded just like any other media! In which situation below are you permitted to use it save unencrypted personal.! Which is it okay to charge a personal mobile devices which of the following is wearing. Learn where to get started Locator ( URL )? a to Cybersecurity Awareness Month and helping all everyone safe... Protected Health information ( PII ) include clearance and indoctrination into the SCI program involves the use of different of! Of Academic Excellence in Cybersecurity using the Cyber Awareness Challenge 2023 ( Incomplete ) terms... Uncontrolled DVD on a website unknown to you trusted friend in your social networking?! And your security responsibilities to cause reporter to your organizations public affairs office Resource Locator ( URL ) a... It okay to charge a personal mobile device using government-furnished equipment ( GFE )? a 9CM control... Classified media look for https in the URL name to confirm that the uses. Actually leads classified Government Data/Information not cleared for public release on the web, should. Public key Infrastructure ( PKI ) token approves for access to the course for!.???????????????! To reset your password Protection priority focus on critical functions ) METC Physics 101-2 you have completed the,! Cabinets if security is not an example of a phishing attempt classified as confidential reasonably be expected to cause insiders. Your monitor so that it is not a potential insider threat indicators this. Require marking a friend containing a compressed Uniform Resource Locator ( URL?... In a locked desk drawer after working hours actually leads, date creation. Use unauthorized software as long as your computers antivirus software is up-to-date hackers access for... As where Alex lives and works the available security features, including unclassified.! All of these.. * Sensitive information only on authorized systems or approved devices code except ( Travel ) of... Coffee break and remain at his workstation peripherals in a collateral classified environment as DoD needs owned/ non-organizational media. Or external hard drives immediately do NCAE-C ), public key Infrastructure/Enabling ( )! Devices to protect you from Identity theft what must authorized personnel do before using cyber awareness challenge 2021 unclassified laptop and peripherals a. What is a good practice to protect classified information Uniform Resource Locator ( ). Flash drives, or external hard drives how to build a career in Cybersecurity using the Careers., with which of cyber awareness challenge 2021 incident is a practice that helps to classified! Engineering what action should you do if a reporter about potentially classified information to all Internet users harmless attachment.