Back to AI Flashcard MakerInformation Technology /FY24 Cyber Awareness Challenge Part 2

FY24 Cyber Awareness Challenge Part 2

Information Technology27 CardsCreated 5 months ago

This deck covers key concepts from the FY24 Cyber Awareness Challenge, focusing on security practices, risk mitigation, and proper handling of sensitive information.

When e-mailing PII, which of the following should you do?

Encrypt the PII, Digitally sign the e-mail, Use your Government e-mail account
Tap or swipe ↕ to flip
Swipe ←→Navigate
1/27

Key Terms

Term
Definition
When e-mailing PII, which of the following should you do?
Encrypt the PII, Digitally sign the e-mail, Use your Government e-mail account
What actions should you take in response to compromised Sensitive Compartmented Information (SCI)?
Call your security point of contact (POC)
Which behavior represents a security concern?
Working on an unmarked document on the classified network
Which of the following poses a physical security risk?
Posting an access roster in public view

Which of the following must you do when using an unclassified laptop in a collateral classified environment?

Disable the embedded camera, microphone, and wifi

Use government-issued wired peripherals

Which of the following must you do when working in a SCIF?

Verify that all personnel in listening distance have a need-to-know.

Ensure that monitors do not provide unobstructed views.

Escort u...

Related Flashcard Decks

Study Tips

  • Press F to enter focus mode for distraction-free studying
  • Review cards regularly to improve retention
  • Try to recall the answer before flipping the card
  • Share this deck with friends to study together
TermDefinition
When e-mailing PII, which of the following should you do?
Encrypt the PII, Digitally sign the e-mail, Use your Government e-mail account
What actions should you take in response to compromised Sensitive Compartmented Information (SCI)?
Call your security point of contact (POC)
Which behavior represents a security concern?
Working on an unmarked document on the classified network
Which of the following poses a physical security risk?
Posting an access roster in public view

Which of the following must you do when using an unclassified laptop in a collateral classified environment?

Disable the embedded camera, microphone, and wifi

Use government-issued wired peripherals

Which of the following must you do when working in a SCIF?

Verify that all personnel in listening distance have a need-to-know.

Ensure that monitors do not provide unobstructed views.

Escort uncleared personnel and warn others in the SCIF.

Which payment method poses the least risk?
Cash
Which method of getting online poses the least risk?
Approved mobile hotspot.
Which action will keep DoD data the safest when asked about what you are working on in public?
Leave the place
What step should be taken to securely telework?
Secure the area so others cannot view your monitor
Which of these personally-owned computer peripherals may be used with government-furnished equipment (GFE)?
HDMI monitor, USB keyboard
What conditions are necessary to be granted access to Sensitive Compartmented Information (SCI)?
Top Secret clearance and indoctrination into the SCI program
How can you mitigate the potential risk associated with a compressed URL?
Use the preview function to see where the link actually leads
Which of the following uses of removeable media is appropriate?
Encrypting data stored on removable media.
What does the Common Access Card (CAC) contain?
Certificates for identification, encryption, and digital signature
You receive a text message from a package shipper notifying you that your package delivery is delayed due to needing updated delivery instructions from you. It provides a shortened link for you to provide the needed information. You are not expecting a package. What is the best course of action?
Delete the message.
Which of the following is a step you should NOT take to protect against spillage?
Purge any device's memory before connecting it to a classified network
Which of these is NOT a potential indicator that your device may be under a malicious code attack?
a notification for a system update that has been publicized
Which of the following is an example of a strong password?
d+Uf_4RimUz
Which of these is true of working within a Sensitive Compartmented Information Facility (SCIF)?
Authorized personnel who permit another individual to enter the SCIF are responsible for confirming the individual's need-to-know and access.
Beth taps her phone at a payment terminal to pay for a purchase. Does this pose a security risk?
Yes, there is a risk that the signal could be intercepted and altered.
Which best describes an insider threat? Someone who uses ___________ access, _____________, to harm national security through unauthorized disclosure, data modification, espionage, terrorism, or kinetic actions.
authorized; wittingly or unwittingly
Which of the following is true of transmitting or transporting Sensitive Compartmented Information (SCI)?
Printed SCI must be retrieved promptly from the printer.
Which of the following is an allowed use of government furnished equipment (GFE)?
Checking personal e-mail if your organization allows it
Which of the following statements is true of DoD Unclassified data?
It may require access and distribution controls
When linked to a specific individual, which of the following is NOT an example of Personally Identifiable Information (PII)?
Automobile make and model
Which of the following is least likely to pose a risk to share on a social networking site?
Your pet's name