Cyber awareness 2024-2025

Information Technology14 CardsCreated 4 months ago

Key cybersecurity concepts including secure behavior during virtual meetings, handling suspicious emails, proper use of removable media, understanding Personally Identifiable Information (PII), and Controlled Unclassified Information (CUI) guidelines to protect government data and personal privacy.

Steve occasionally runs errands during virtual meetings. He joins the meetings using his approved government device. Does this pose a security concern?

Yes, Steve's actions do pose a security concern.

Tap or swipe ↕ to flip
Swipe ←→Navigate
1/14

Key Terms

Term
Definition

Steve occasionally runs errands during virtual meetings. He joins the meetings using his approved government device. Does this pose a security concern?

Yes, Steve's actions do pose a security concern.

Steve occasionally runs errands during virtual meetings. He joins the meetings using his approved government device. Does this pose a security concern?

Yes. Eavesdroppers may be listening to Steve's conversation.
No, because Steve is using a government-approved device.
Maybe. It depends on whether Steve uses headphones and how loudly he talks.
No. No one else is going to be paying attention to what Steve is doing, as phone calls in public places are common.

Yes. Eavesdroppers may be listening to Steve's conversation.

John receives an e-mail about a potential shutdown of a major social service unless a petition receives enough signatures. Which of the following actions should John
NOT take with the e-mail?
Forward it
Mark it as junk
Research the claim
Delete it

Forward it to

When allowed, which of the following is an appropriate use of removable media?
Downloading data from classified networks
Destroying removable media with a refrigerator magnet
Labeling media that contains personally identifiable information (PII)
Discarding unneeded removable media in the trash

Labeling media that contains personally identifiable information (PII)

When linked to a specific individual, which of the following is NOT an example of Personally Identifiable Information (PIl)?
Fingerprint records
Smartphone brand and model
Mother's maiden name
Payment for the provision of healthcare

Smartphone brand and model

Which of the following is true of Controlled Unclassified Information (CUI)?

It belongs to a defined category established in the DoD CUI Registry.
It is another term for any Unclassified information that has not been cleared for public release.
It poses no risk to Government missions or interests.
It is marked as CUl at the discretion of the information owner.

It belongs to a defined category established in the DoD CUI Registry.

Related Flashcard Decks

Study Tips

  • Press F to enter focus mode for distraction-free studying
  • Review cards regularly to improve retention
  • Try to recall the answer before flipping the card
  • Share this deck with friends to study together
TermDefinition

Steve occasionally runs errands during virtual meetings. He joins the meetings using his approved government device. Does this pose a security concern?

Yes, Steve's actions do pose a security concern.

Steve occasionally runs errands during virtual meetings. He joins the meetings using his approved government device. Does this pose a security concern?

Yes. Eavesdroppers may be listening to Steve's conversation.
No, because Steve is using a government-approved device.
Maybe. It depends on whether Steve uses headphones and how loudly he talks.
No. No one else is going to be paying attention to what Steve is doing, as phone calls in public places are common.

Yes. Eavesdroppers may be listening to Steve's conversation.

John receives an e-mail about a potential shutdown of a major social service unless a petition receives enough signatures. Which of the following actions should John
NOT take with the e-mail?
Forward it
Mark it as junk
Research the claim
Delete it

Forward it to

When allowed, which of the following is an appropriate use of removable media?
Downloading data from classified networks
Destroying removable media with a refrigerator magnet
Labeling media that contains personally identifiable information (PII)
Discarding unneeded removable media in the trash

Labeling media that contains personally identifiable information (PII)

When linked to a specific individual, which of the following is NOT an example of Personally Identifiable Information (PIl)?
Fingerprint records
Smartphone brand and model
Mother's maiden name
Payment for the provision of healthcare

Smartphone brand and model

Which of the following is true of Controlled Unclassified Information (CUI)?

It belongs to a defined category established in the DoD CUI Registry.
It is another term for any Unclassified information that has not been cleared for public release.
It poses no risk to Government missions or interests.
It is marked as CUl at the discretion of the information owner.

It belongs to a defined category established in the DoD CUI Registry.

What is a best practice for creating user accounts for your home computer?
Set up a generic user account with no password for general user functions
Do not share your home computer with any other users
Greate separate accounts for each user and have each user create their own password
Create separate accounts for each user and tailor each password to what will be easy for the individual user to remember

Create separate accounts for each user and tailor each password to what will be easy for the individual user to remember

What are the requirements for access to Sensitive Compartmented Information (SCI)?
The appropriate level of security clearance eligibility and a need-to-know
Top Secret clearance and indoctrination into the SC program
The access caveats specified by the Direct of National Intelligence Secret clearance and a signed nondisclosure agreement (NDA)

The appropriate level of security clearance eligibility and a need-to-know

Which of the following is a best practice for telework and remote work?
Use personal equipment to avoid the risks associated with non-Government internet.
Connect to your Government Virtual Private Network (VPN).
Ensure others do not have access to your work area when processing classified information.
Rotate the location in your home where you perform telework or remote work.

Connect to your Government Virtual Private Network (VPN).

Which of the following is an example of a strong passi

1965May31!

•bRobr@791*P

Password12345

Fluffy&Spot

•bRobr@791*P

You receive an e-mail with a link to run an anti-virus scan. Your IT department has not sent links like this in the past. The e-mail is not digitally signed. What action should you take?
Look for a phone number in the e-mail to call for more information.
Report the e-mail to your security POC or help desk.
Reply to the e-mail to request more information.
Select the link to run the anti-virus scan.

Report the e-mail to your security POC or help desk.

How can you prevent viruses and malicious code?
Scan all e-mail attachments
Allow mobile code to run on all websites
E-mail infected files to your security POC
View e mail using the Preview Pane rather than opening it

Scan all e-mail attachments

You receive an e-mail with a link to run an anti-virus scan. Your IT department has not sent links like this in the past. The e-mail is not digitally signed. What action should you take?
Look for a phone number in the e-mail to call for more information.
Report the e-mail to your security POC or help desk.
Reply to the e-mail to request more information.
Select the link to run the anti-virus scan.

Report the e-mail to your security POC or help desk.

How can you prevent viruses and malicious code?
Scan all e-mail attachments
Allow mobile code to run on all websites
E-mail infected files to your security POC
View e mail using the Preview Pane rather than opening it

Scan all e-mail attachments