DOD Cyber Awareness Chalenge 2024
DoD IT How many social engineering indicators are present in this e-mail?
3+
Friend Request Shaun S.
Deny
Share a Post Soda Scare!
Keep Scrolling
True or false? Voice-activated smart devices can collect and share your personal information.
True
Which of the following mat indicate a malicious code attack? Select all that apply. Then select Submit.
-A new app suddenly appears on the device. - The device slows down. -A new tab appears in the Web browser.
Which of the following must you do when using an unclassified laptop in a collateral classified environment?
-Disable the embedded camera, microphone, and Wi-Fi -Use government-issued wired peripherals
How can malicious code spread? Select all that apply. Then select Submit.
-E-mail attachments. -Downloading files. -Visiting infected websites.
Which of these personally-owned computer peripherals may be used with government-furnished equipment?
-HDMI Monitor -USB keyboard
How can you prevent the download of malicious code? Select all that apply. Then select Submit.
-Scan external files before uploading to your device. -Research apps and their vulnerabilities before downloading.
DoD Software How many social engineering indicators are present in this e-mail?
3+
Which method of getting online poses the least risk?
Approved mobile hotspot
Select an action to take in response to compromised Sensitive Compartmented Information (SCI).
Call your security point of contact (POC)
Which payment method poses the least risk?
Cash
Which of these individuals demonstrated behavior that could lead to the compromise of SCI?
Col. Cockateil
Employee Passport Number Adams, Jeff A12345678 Brown, Marty B23456789 Clark, Tina C34567890 What type of information does this personnel roster represent?
Controlled Unclassified Information (CUI)
Create post Location: ABC Theatre
Delete
Your meeting notes are Unclassified. This means that your notes:
Do not have the potential to damage national security.
True or false? The best way to keep your passport safe is to carry it with you.
False
Which action will keep DoD data the safest?
Leave the coffee shop
Clue: Dr. Dove printed a classified document and retrieved it promptly from the printer. Does this behavior represent a security concern?
No
Clue: Mr. Macaw and a colleague had a conversation about a shared project in the SCIF after verifying no one was nearby. Does this behavior represent a security concern?
No
How do you protect your Common Access Card (CAC) or Personal Identity Verification (PIV) card? I use my CAC occasionally as a secondary photo identification.
No
Is this an appropriate use of government-furnished equipment (GFE)?
No
What kind of passwords do you use? I use Password1 as one of my passwords.
No
Which of the following poses a physical security risk?
Posting an access roster in public view
How should Bob's colleagues respond?
Report Bob
SELECT AN ACTION. Fwd: Save Thanksgiving
Research Claim
Employee Passport Number Adams, Jeff A12345678 Brown, Marty B23456789 Clark, Tina C34567890 When e-mailing this personnel roster, which of the following should you do?
SELECT ALL
This is not an appropriate use if GFE. Why?
SELECT ALL
Which of the following must you do when working in a SCIF?
SELECT ALL
What step should be taken next to securely telework?
Secure the area so others cannot view your monitor
True or false? You should monitor your credit card statements for unauthorized purchases.
True
CHOOSE AN ACTION! You find an unlabeled thumb drive in the parking area outside your workplace, what should you do?
Turn it in to your security officer
Clue: COL. Cockatiel worked on an unmarked document on the classified network. Does this behavior represent a security concern?
Yes
Does Bob demonstrate potential insider threat indicators?
Yes
Does this action pose a potential security risk?
Yes
How do you secure your accounts? I receive a text message code when logging in with a password.
Yes