FY24 Cyber Awareness Challenge Part 2
This deck covers key concepts from the FY24 Cyber Awareness Challenge, focusing on security practices, risk mitigation, and proper handling of sensitive information.
When e-mailing PII, which of the following should you do?
Key Terms
Which of the following must you do when using an unclassified laptop in a collateral classified environment?
Disable the embedded camera, microphone, and wifi
Use government-issued wired peripherals
Which of the following must you do when working in a SCIF?
Verify that all personnel in listening distance have a need-to-know.
Ensure that monitors do not provide unobstructed views.
Escort u...
Related Flashcard Decks
Study Tips
- Press F to enter focus mode for distraction-free studying
- Review cards regularly to improve retention
- Try to recall the answer before flipping the card
- Share this deck with friends to study together
| Term | Definition |
|---|---|
When e-mailing PII, which of the following should you do? | Encrypt the PII, Digitally sign the e-mail, Use your Government e-mail account |
What actions should you take in response to compromised Sensitive Compartmented Information (SCI)? | Call your security point of contact (POC) |
Which behavior represents a security concern? | Working on an unmarked document on the classified network |
Which of the following poses a physical security risk? | Posting an access roster in public view |
Which of the following must you do when using an unclassified laptop in a collateral classified environment? | Disable the embedded camera, microphone, and wifi |
Which of the following must you do when working in a SCIF? | Verify that all personnel in listening distance have a need-to-know. |
Which payment method poses the least risk? | Cash |
Which method of getting online poses the least risk? | Approved mobile hotspot. |
Which action will keep DoD data the safest when asked about what you are working on in public? | Leave the place |
What step should be taken to securely telework? | Secure the area so others cannot view your monitor |
Which of these personally-owned computer peripherals may be used with government-furnished equipment (GFE)? | HDMI monitor, USB keyboard |
What conditions are necessary to be granted access to Sensitive Compartmented Information (SCI)? | Top Secret clearance and indoctrination into the SCI program |
How can you mitigate the potential risk associated with a compressed URL? | Use the preview function to see where the link actually leads |
Which of the following uses of removeable media is appropriate? | Encrypting data stored on removable media. |
What does the Common Access Card (CAC) contain? | Certificates for identification, encryption, and digital signature |
You receive a text message from a package shipper notifying you that your package delivery is delayed due to needing updated delivery instructions from you. It provides a shortened link for you to provide the needed information. You are not expecting a package. What is the best course of action? | Delete the message. |
Which of the following is a step you should NOT take to protect against spillage? | Purge any device's memory before connecting it to a classified network |
Which of these is NOT a potential indicator that your device may be under a malicious code attack? | a notification for a system update that has been publicized |
Which of the following is an example of a strong password? | d+Uf_4RimUz |
Which of these is true of working within a Sensitive Compartmented Information Facility (SCIF)? | Authorized personnel who permit another individual to enter the SCIF are responsible for confirming the individual's need-to-know and access. |
Beth taps her phone at a payment terminal to pay for a purchase. Does this pose a security risk? | Yes, there is a risk that the signal could be intercepted and altered. |
Which best describes an insider threat? Someone who uses ___________ access, _____________, to harm national security through unauthorized disclosure, data modification, espionage, terrorism, or kinetic actions. | authorized; wittingly or unwittingly |
Which of the following is true of transmitting or transporting Sensitive Compartmented Information (SCI)? | Printed SCI must be retrieved promptly from the printer. |
Which of the following is an allowed use of government furnished equipment (GFE)? | Checking personal e-mail if your organization allows it |
Which of the following statements is true of DoD Unclassified data? | It may require access and distribution controls |
When linked to a specific individual, which of the following is NOT an example of Personally Identifiable Information (PII)? | Automobile make and model |
Which of the following is least likely to pose a risk to share on a social networking site? | Your pet's name |