Cyber Awareness Challenge 2024
Based on the description provided, how many insider threat indicators are present? Elyse has worked for a DoD agency for more than 10 years. She is a diligent employee who receives excellent performance reviews and is a valued team member. She has two children and takes them on a weeklong beach vacation every summer. She spent a semester abroad in France as a teenager and plans to take her children to visit France when they are older.
0
Which of the following is permitted when using an unclassified laptop within a collateral classified space?
A government-issued WIRED headset with microphone
Which of the following is permitted within a Sensitive Compartmented Information Facility (SCIF)?
An authorized Government-owned Portable Electronic Device (PED)
What does the Common Access Card (CAC) contain?
Certificates for identification, encryption, and digital signature
You receive a text message from a package shipper notifying you that your package delivery is delayed due to needing updated delivery instructions from you. It provides a shortened link for you to provide the needed information. You are not expecting a package. What is the best course of action?
Delete the message
Which of the following is NOT a best practice for protecting data on a mobile device?
Disable automatic screen locking after a period of inactivity
Mabel is a government employee who needs to share a document containing contractor proprietary information with her supervisor. Which of the following describes the most appropriate way for Mabel to do this?
Encrypt it and send it via digitally signed Government e-mail.
Which of the following uses of removeable media is appropriate?
Encrypting data stored on removable media
Carl receives an e-mail about a potential health risk caused by a common ingredient in processed food. Which of the following actions should Carl NOT take with the e-mail?
Forward it
Where are you permitted to use classified data?
Only in areas with security appropriate to the classification level
Which of the following is a best practice to protect your identity?
Order a credit report annually
Which of the following is a step you should NOT take to protect against spillage?
Purge any device's memory before connecting it to a classified network
You receive an e-mail with a link to schedule a time to update software on your government furnished laptop. Your IT department has not scheduled software updates like this in the past and has not announced this software update. The e-mail is not digitally signed. What action should you take?
Report the e-mail to your security POC or help desk
Which type of data could reasonably be expected to cause serious damage to national security?
Secret
Which of the following is an authoritative source for derivative classification?
Security Classification Guide
What conditions are necessary to be granted access to Sensitive Compartmented Information (SCI)?
Top Secret clearance and indoctrination into the SCI program
How can you protect your home computer?
Turn on the password feature
Which of the following is an appropriate use of government e-mail?
Using a digital signature when sending attachments
Tom is working on a report that contains employees' names, home addresses, and salary. Which of the following is Tom prohibited from doing with the report?
Using his home computer to print the report while teleworking
Which of the following is NOT an appropriate use of your Common Access Card (CAC)?
Using it as photo identification with a commercial entity
Which of the following is a best practice for managing connection requests on social networking sites?
Validate connection requests through another source if possible
Which of the following is true of telework?
You must have permission from your organization to telework
Which of the following is NOT a best practice for teleworking in an environment where Internet of Things (IoT) devices are present?
Use the devices' default security settings