Cyber awareness 2024-2025
Key cybersecurity concepts including secure behavior during virtual meetings, handling suspicious emails, proper use of removable media, understanding Personally Identifiable Information (PII), and Controlled Unclassified Information (CUI) guidelines to protect government data and personal privacy.
Steve occasionally runs errands during virtual meetings. He joins the meetings using his approved government device. Does this pose a security concern?
Yes, Steve's actions do pose a security concern.
Key Terms
Steve occasionally runs errands during virtual meetings. He joins the meetings using his approved government device. Does this pose a security concern?
Yes, Steve's actions do pose a security concern.
Steve occasionally runs errands during virtual meetings. He joins the meetings using his approved government device. Does this pose a security concern?
Yes. Eavesdroppers may be listening to Steve's conversation.
No, because Steve is using a government-approved device.
Maybe. It depends on whether Steve uses headphones and how loudly he talks.
No. No one else is going to be paying attention to what Steve is doing, as phone calls in public places are common.
Yes. Eavesdroppers may be listening to Steve's conversation.
John receives an e-mail about a potential shutdown of a major social service unless a petition receives enough signatures. Which of the following actions should John
NOT take with the e-mail?
Forward it
Mark it as junk
Research the claim
Delete it
Forward it to
When allowed, which of the following is an appropriate use of removable media?
Downloading data from classified networks
Destroying removable media with a refrigerator magnet
Labeling media that contains personally identifiable information (PII)
Discarding unneeded removable media in the trash
Labeling media that contains personally identifiable information (PII)
When linked to a specific individual, which of the following is NOT an example of Personally Identifiable Information (PIl)?
Fingerprint records
Smartphone brand and model
Mother's maiden name
Payment for the provision of healthcare
Smartphone brand and model
Which of the following is true of Controlled Unclassified Information (CUI)?
It belongs to a defined category established in the DoD CUI Registry.
It is another term for any Unclassified information that has not been cleared for public release.
It poses no risk to Government missions or interests.
It is marked as CUl at the discretion of the information owner.
It belongs to a defined category established in the DoD CUI Registry.
Related Flashcard Decks
Study Tips
- Press F to enter focus mode for distraction-free studying
- Review cards regularly to improve retention
- Try to recall the answer before flipping the card
- Share this deck with friends to study together
| Term | Definition |
|---|---|
Steve occasionally runs errands during virtual meetings. He joins the meetings using his approved government device. Does this pose a security concern? | Yes, Steve's actions do pose a security concern. |
Steve occasionally runs errands during virtual meetings. He joins the meetings using his approved government device. Does this pose a security concern? | Yes. Eavesdroppers may be listening to Steve's conversation. |
John receives an e-mail about a potential shutdown of a major social service unless a petition receives enough signatures. Which of the following actions should John | Forward it to |
When allowed, which of the following is an appropriate use of removable media? | Labeling media that contains personally identifiable information (PII) |
When linked to a specific individual, which of the following is NOT an example of Personally Identifiable Information (PIl)? | Smartphone brand and model |
Which of the following is true of Controlled Unclassified Information (CUI)? | It belongs to a defined category established in the DoD CUI Registry. |
What is a best practice for creating user accounts for your home computer? | Create separate accounts for each user and tailor each password to what will be easy for the individual user to remember |
What are the requirements for access to Sensitive Compartmented Information (SCI)? | The appropriate level of security clearance eligibility and a need-to-know |
Which of the following is a best practice for telework and remote work? | Connect to your Government Virtual Private Network (VPN). |
Which of the following is an example of a strong passi | •bRobr@791*P |
You receive an e-mail with a link to run an anti-virus scan. Your IT department has not sent links like this in the past. The e-mail is not digitally signed. What action should you take? | Report the e-mail to your security POC or help desk. |
How can you prevent viruses and malicious code? | Scan all e-mail attachments |
You receive an e-mail with a link to run an anti-virus scan. Your IT department has not sent links like this in the past. The e-mail is not digitally signed. What action should you take? | Report the e-mail to your security POC or help desk. |
How can you prevent viruses and malicious code? | Scan all e-mail attachments |