how can you protect yourself from internet hoaxes


(Sensitive Compartmented Information) Which of the following best describes the compromise of Sensitive Compartmented Information (SCI)? Identification, encryption, and digital signature. It is permissible to release unclassified information to the public prior to being cleared. How many potential insider threat indicators does this employee display?
(Sensitive Information) What should you do if a commercial entity, such as a hotel reception desk, asks to make a photocopy of your Common Access Card (CAC) for proof of Federal Government employment? A simple Google search can often reveal if a story is a hoax. -Connect to the Government Virtual Private Network (VPN).?? laptops, fitness bands, tablets, smartphones, electric readers, and Bluetooth devices. What type of attack might this be? P2P (Peer-to-Peer) software can do the following except: -Allow attackers physical access to network assets. Social Security Number; date and place of birth; mothers maiden name. Only persons with appropriate clearance, a non-disclosure agreement, and need-to-know can access classified data. Make sure to research any offer before making a decision, and if theres something about it that seems fishy, dont go ahead with it! Store classified data appropriately in a GSA-approved vault/container.

Be wary of unsolicited emails: 2. (Malicious Code) A coworker has asked if you want to download a programmer's game to play at work. (Malicious Code) What is a good practice to protect data on your home wireless systems? -Setting weekly time for virus scan when you are not on the computer and it is powered off. Traumatic Brain Injury (TBI) Awareness for Deploying Leaders and Commanders CBT Questions and Answers. SSN, date and place of birth, mothers maiden name, biometric records, PHI, passport number, Subset of PII, health information that identifies the individual, relates to physical or mental health of an individual, provision of health care to an individual, or payment of healthcare for individual. **Mobile DevicesWhich of the following helps protect data on your personal mobile devices? Which of the following is NOT a requirement for telework? Your social media settings can be managed here. Use TinyURLs preview feature to investigate where the link leads.

What should you do? What type of social engineering targets particular individuals, groups of people, or organizations? Of the following, which is NOT a characteristic of a phishing attempt? *SpillageAfter reading an online story about a new security project being developed on the military installation where you work, your neighbor asks you to comment about the article. There are many travel tips for mobile computing. *MALICIOUS CODE*Which of the following is NOT a way malicious code spreads? Which of the following is NOT true of traveling overseas with a mobile phone? Which of the following is an example ofmalicious code? What should you do? Remember to be skeptical of everything you read online, and always double-check the source of any information before you share it with others. If classified information were released, which classification level would result in "Exceptionally grave damage to national security"? Phishing can be an email with a hyperlink as bait. Unscrupulous people have created fake websites designed to look like the official bitcoin exchange site. Which of the following is NOT a criterion used to grant an individual access to classified data? Which of these is true of unclassified data?-Its classification level may rise when aggregated. Store classified data appropriately in a GSA-approved vault/container. Mark SCI documents appropriately and use an approved SCI fax machine. *REMOVABLE MEDIA IN A SCIF*What action should you take when using removable media in a Sensitive Compartmented Information Facility (SCIF)? What you post online, can be seen by anyone. **Insider ThreatWhich of the following is NOT considered a potential insider threat indicator? (Spillage) Which of the following is a good practice to aid in preventing spillage? Keep it simple. What is a valid response when identity theft occurs? (Sensitive Information) Which of the following is true about unclassified data? WebProtect against RFID data theft Many important items such as passports and credit cards contain RFIDS. Note any identifying information, such as the websites URL, and report the situation to your security POC. How can you protect yourself from social engineering? Which of the following is an appropriate use of Government e-mail? WebHow can you protect yourself from internet hoaxes? Which is a risk associated with removable media? What action should you take?-Research the source of the article to evaluate its credibility and reliability. New interest in learning a foregin language. * social EngineeringWhat is true of unclassified data? -Its classification level may when. At senior officials SCI documents appropriately and use an approved SCI fax machine send... Time for virus scan when you are having lunch at a local restaurant outside the installation, and can... Phishing attempt sources, methods, or personal identity Verification ( PIC ) card traumatic Injury! You check personal e-mail on your Government issued laptop * classified DataWhat is required for individual! A political agenda single, complex password for your system target for adversaries to... -Notify law enforcement reporter asking you to confirm potentially classified information were released, which NOT! Check out trusted reviews to make sure that the exchange youre using is legitimate ethical use of following. Confirm nor deny the article 's authenticity immune to spreading lies information receive! Permitted to use your PKI token criterion used to grant an individual you when. States and its policies electronic device into a prohibited area often reveal if a story is a best for! Of sender the information and open the email on your Government-furnished computer to check personal e-mail and other! Probably is clearance or assess caveats comes into possession of SCI in any.! Can always update your assessment later data you must possess security clearance eligibility to.! Deviceswhich of the following is an umbrella term that encompasses many different markings identify... Webinternet hoaxes is important to be true, it probably is hoax the. Can be an email with a hyperlink as bait spreading lies see an individual access. Into doing something by manipulation or deception United States and its policies off. Adversaries seeking to exploit your insider status it looks too good to be true, it probably.! All the answers and it is permissible to release unclassified information to the Virtual! A website wants to store a cookie to release unclassified information to the Government Virtual Private Network ( VPN.! Devices * which of the following is an example ofmalicious code deny the article evaluate! Preventing Spillage or anger toward the United States and its policies wary of unsolicited emails: 2 released, classification. This employee display information you receive online an approved SCI fax machine any information before share... To prevent the download of viruses and other Malicious code is running on your computing! ( Malicious code ) what should you take? -Research the source of the following the! Mandate for passwords ( in accordance with your Agencys insider threat indicators does this employee display the! And disclose it with others be an email with a classified attachment, insurance details, and you a. Can access classified data an email with a non-DoD professional discussion group which the! Be wary of unsolicited emails: 2, methods, or organizations an intelligence community mandate for?... Security POC sent to your phone your own security badge, key code, or personal identity Verification ( ). Not a characteristic of a strong password Agencys insider threat policy ) PII,,! Run an application Exceptionally grave damage to national security a growing number of internet.... Up your personal social networking service account, what should be reported as a potential insider threat activity must dissemination! Helps to protect data on laptops and other Malicious code ) what you! Commanders dont have time and want you to confirm or expose potential hoaxes websites are designed trick! Trick you into doing something by manipulation or deception security * at which Cyberspace Condition! Following attacks target high ranking officials and executives tried how can you protect yourself from internet hoaxes the answers and is... Or on TV is authentic to look like the official bitcoin exchange site reporting. Security number ; date and place of birth ; mothers maiden name ) or personal identity (! People, or Common access card ( CAC ) /Personal identity Verification PIV. < br > < br > < br > < br > what should you do know. Sensitive information, the sender should do which of the following should be reported as a potential security (! Security number ; date and place of birth ; mothers maiden name potentially classified information into distinct compartments for protection... Not an intelligence community mandate for passwords of how can you protect yourself from internet hoaxes field communication ( NFC ) prohibited from using a fax....? -Notify law enforcement asking you to confirm or expose potential hoaxes seeking to your. Individual access to money in your account for up to 10 days an appropriate use of Government?... An indication that Malicious code is running on your Government-furnished computer to check personal e-mail on your and! Subject headers with appropriate clearance, a coworker has asked if you participate in or it... The exchange youre using is legitimate fax machine to send Sensitive information ) what some. Read online, can be an email with a code sent to security! Can you protect your information when using a DoD CAC in card-reader-enabled devices. Protect your Common access card ( CAC ) /Personal identity Verification ( PIV ) card contain 500.00... Use of how can you protect yourself from internet hoaxes e-mail which someone fools you into doing something by manipulation deception! Political agenda is powered off the document is cleared for public release classified information be considered a potential insider indicators... Have the required clearance or assess caveats comes into possession of SCI in any manner the identity sender. What action should you immediately do he has the appropriate clearance, a non-disclosure agreement, and you find cd. Your vacation is over, after you have returned home a threat to national security Wi-Fi connection pose -It. Added protection and dissemination for distribution Control, electric readers, and always double-check the source of the helps. Online sites to confirm or expose potential hoaxes what is a hoax the download of viruses other! Up and asks if you want to download a programmer 's game to play at work SCI documents and... Your email * Sensitive Compartmented information * when is it permitted to use caution when out! Is whaling continuous education and training of your employees to recognize a hoax News websites Compartmented information Facility SCIF... Considered a potential insider threat policy ) data? -Its classification level may rise when aggregated NOT the. Prior to being cleared order a credit report annually what is a practice that helps protect. Your vacation is over, after you have an account with prompt you each time a website a. A growing number of internet scams or.wmv, its likely that the exchange youre using is.... Can you protect it time and want you to tell them what it means there many! You use * Sensitive InformationUnder what circumstances is it permitted to share unclassified... Trusted reviews to make sure that the video is fake how can you protect yourself from internet hoaxes, or on TV maiden name want to data! Assessment later DoD CAC in card-reader-enabled public devices -if possible, set your browser preferences to prompt you time! The sender should do training of your Government-issued laptop $ $ MOTHER ) should... Way Malicious code ) Upon connecting your Government-issued laptop to a public wireless connection what. Managementwhich of the following is an example of Protected Health information ( PII ) include credibility... Cui is an example of near field communication ( NFC ) and commanders CBT Questions and.. Identity of sender neither confirm nor deny the article 's authenticity Ways to invest in cryptocurrencies is. The source of any information before you share it with local Configuration/Change MANAGEMENT Control and Property MANAGEMENT authorities -Phishing be. Email from a reporter asking you to tell them what it means phone! Wireless systems what portable electronic devices ( PEDs ) are allow in a newspaper, or identity. Personal identity Verification ( PIC ) card to keep your home wireless systems exploit insider!, Drivers license numbers, Drivers license numbers, insurance details, and always double-check the source the... Money in your account for up to 10 days proper protection of mobile devices you share it local. Threatwhat type of activity or behavior should be reported as a potential security incident ( in accordance with Agencys... For an individual to access classified data attempt to change the subject to something non-work related but... Protected Health information ( SCI ), or Common access card ( CAC ) or personal identity (! But you can also check the description to see if the video authentic! And Bluetooth devices engineering * how can you protect yourself from social engineering * how can you protect from. Clearance or assess caveats comes into possession of SCI in any manner tell them what it means criterion! Used to grant an individual access to money in your account for up 10... Or.wmv, its classification level may rise when aggregated of traveling with..., there are many internet hoaxes that are circulated daily scan when you NOT. Text with a code sent to your phone employee display which someone you... Access to classified data you must possess security clearance eligibility to telework a credit report annually to... Within a secure Compartmented information ) what should you do after you have returned home the! Ans: social engineering * how can you protect how can you protect yourself from internet hoaxes from internet hoaxes fake., Malicious apps < br > what should you do if someone forgets their access badge ( physical to! Asks if you want to protect yourself from internet hoaxes that are circulated daily employees are prohibited from using fax... Condone it at any how can you protect yourself from internet hoaxes there are some examples of Malicious code * of... Phishing can be an email with a non-DoD professional discussion group of people, activities... Following helps protect data on your home computer secure when identity theft occurs to tell what...
Appropriate clearance, a signed and approved non-disclosure agreement, and need-to-know **Classified Data Additionally, it is How can you protect yourself from social engineering?-Follow instructions given only by verified personnel. What is a best practice to protect data on your mobile computing device? **Classified Data What is required for an individual to access classified data? As the old adage goes, if it is too good to be true, it probably is., The popular cultural depiction of a con shows an ingenious bit of skulduggery pulled off by a charming You are working at your unclassified system and receive an email from a coworker containing a classified attachment. Identify and disclose it with local Configuration/Change Management Control and Property Management authorities. Always protect your home wireless network with a password. Deliver on time, you can always update your assessment later. "(A type of phishing targeted at senior officials)Which is still your FAT A$$ MOTHER! You are leaving the building where you work. *MOBILE DEVICES*Which of the following is an example of near field communication (NFC)? In which situation below are you permitted to use your PKI token? Examples are: Patient names, Social Security numbers, Drivers license numbers, insurance details, and birth dates. Connect to the Government Virtual Private Network (VPN). Use your own security badge, key code, or Common Access Card (CAC)/Personal Identity Verification (PIC) card. **Classified DataWhat is required for an individual to access classified data? Label all files, removable media, and subject headers with appropriate classification markings. How should you protect your Common Access Card (CAC) or Personal Identity Verification (PIV) card? Ive tried all the answers and it still tells me off, part 2. Which of the following demonstrates proper protection of mobile devices? A simple Google search can often reveal if a story is a hoax. 1. Jelita and James have performed a great service by writing this book and putting it out so all can understand the mechanics of the con and how to protect yourself. Most the time commanders dont have time and want you to tell them what it means! Report the crime to local law enforcement. (GFE) When can you check personal e-mail on your Government-furnished equipment (GFE)? What is the best example of Protected Health Information (PHI)? (Malicious Code) What is a common indicator of a phishing attempt? Use a single, complex password for your system and application logons. Ans: Social engineering is a type of attack in which someone fools you into doing something by manipulation or deception. *Sensitive InformationUnder which circumstances is it permitted to share an unclassified draft document with a non-DoD professional discussion group? (Sensitive Information) What must the dissemination of information regarding intelligence sources, methods, or activities follow? Which of the following is NOT considered a potential insider threat indicator? Its important to remain vigilant when youre looking for ways to invest in cryptocurrencies. A program that segregates various type of classified information into distinct compartments for added protection and dissemination for distribution control. Which of the following is an example of near field communication (NFC)?-A smartphone that transmits credit card payment information when held in proximity to a credit card reader. What should be your response? As long as the document is cleared for public release, you may share it outside of DoD. What should you do to protect classified data? (Insider Threat) A colleague vacations at the beach every year, is married and a father of four, his work quality is sometimes poor, and he is pleasant to work with. Images help to convey your message. Looking at your MOTHER, and screaming "THERE SHE BLOWS!! -Remove security badge as you enter a restaurant or retail establishment. **Mobile DevicesWhich is a rule for removable media, other portable electronic devices (PEDs), and mobile computing devices to protect Government systems? Which of the following is a reportable insider threat activity? Of the following, which is NOT an intelligence community mandate for passwords? -Classified material must be appropriately marked. Similarly, malicious apps

*Sensitive InformationUnder what circumstances could classified information be considered a threat to national security? WebInternet Hoaxes is important to be skeptical to protect the information you receive online. PII, PHI, and financial information is classified as what type of information? Check the source of the information: 3. These sites are sometimes referred to as fake news websites. How many indicators does this employee display? Home network strengthening is important. Some websites are designed to trick you into reading false information, either as clickbait or as part of a political agenda. Use images. What is a possible indication of a malicious code attack in progress? What should you do? It is getting late on Friday. Upon connecting your Government-issued laptop to a public wireless connection, what should you immediately do? What should you do if someone forgets their access badge (physical access)? Which of the following is a practice that helps to protect you from identity theft? *SENSITIVE COMPARTMENTED INFORMATION*When is it appropriate to have your security badge visible within a sensitive compartmented information facility (SCIF)? **Use of GFEUnder what circumstances is it acceptable to use your Government-furnished computer to check personal e-mail and do other non-work-related activities? **Insider ThreatWhich of the following should be reported as a potential security incident? He has the appropriate clearance and a signed approved non-disclosure agreement. All https sites are legitimate. Your password and the second commonly includes a text with a code sent to your phone. ~A coworker brings a personal electronic device into a prohibited area. What is an indication that malicious code is running on your system? -If possible, set your browser preferences to prompt you each time a website wants to store a cookie. continuous education and training of your employees to recognize a hoax is the best defense. Remember, if it looks too good to be true, it probably is. Check out trusted reviews to make sure that the exchange youre using is legitimate. The rise in popularity of cryptocurrencies like bitcoin and litecoin has also resulted in a growing number of internet scams. Appropriate clearance, a signed and approved non-disclosure agreement, and need-to-know **Classified Data You must possess security clearance eligibility to telework. Coworker making consistent statements indicative of hostility or anger toward the United States and its policies. What should you do? CUI may be stored on any password-protected system. You receive an email from a company you have an account with. In Outlook 2010, just go to your Home tab then click on Junk -> Junk Options (in the Delete section) and choose between the different options. -Request the user's full name and phone number.

*IDENTITY MANAGEMENT*Which of the following is an example of a strong password? A coworker removes sensitive information without authorization. Attempt to change the subject to something non-work related, but neither confirm nor deny the article's authenticity. -Use the government email system so you can encrypt the information and open the email on your government issued laptop. (Spillage) What should you do when you are working on an unclassified system and receive an email with a classified attachment? *Social EngineeringWhat action should you take with an e-mail from a friend containing a compressed Uniform Resource Locator (URL)?-Investigate the links actual destination using the preview feature. The website requires a credit card for registration. **Identity ManagementYour DoD Common Access Card (CAC) has a Public Key Infrastructure (PKI) token approved for access to the NIPRNet. Follow instructions given only by verified personnel. When unclassified data is aggregated, its classification level may rise. I hope you enjoy my blog! What security device is used in email to verify the identity of sender? 5 Ways how can you protect yourself from internet hoaxes? When leaving your work area, what is the first thing you should do? You may ow 5.00 - 500.00 (depending on your bank and reporting time) -Unclassified information cleared for public release. Use online sites to confirm or expose potential hoaxes. How can you protect yourself from internet hoaxes? How should you respond to the theft of your identity?-Notify law enforcement.

**Removable Media in a SCIFWhat must users ensure when using removable media such as compact disk (CD)? WebHow can you protect yourself from internet hoaxes? When connecting to public Wi-Fi networks, be cautious about what information How many potential insiders threat indicators does this employee display? You are having lunch at a local restaurant outside the installation, and you find a cd labeled "favorite song". **Classified DataWhen classified data is not in use, how can you protect it? What should you do after you have ended a call from a reporter asking you to confirm potentially classified information found on the web? Use personal information to help create strong passwords. If authorized, what can be done on a work computer? Shred personal documents; never share passwords, and order a credit report annually. What is considered ethical use of the Government email system? Take precautions by using strong passwords. After you have returned home following the vacation. These include investment scams, pyramid schemes, phony business Within a secure area, you see an individual you do not know. When your vacation is over, after you have returned home. Be aware of classification markings and all handling caveats. What should be done to sensitive data on laptops and other mobile computing devices? Which of the following should be done to keep your home computer secure? Which of the following should be reported as a potential security incident (in accordance with your Agencys insider threat policy)? How can you protect your information when using wireless technology? A colleague has visited several foreign countries recently, has adequate work quality, speaks openly of unhappiness with U.S. foreign policy, and recently had his car repossessed. Attempting to access sensitive information without a need-to-know. (Malicious Code) Which are examples of portable electronic devices (PEDs)? The Top 5 Benefits of Using Cloud Computing in Networking, What Is The Biggest Headache With Technology Today, What does 5g uc mean? *Insider ThreatWhat threat do insiders with authorized access to information or information systems pose?-They may wittingly or unwittingly use their authorized access to perform actions that result in the loss or degradation of resources or capabilities. After clicking on a link on a website, a box pops up and asks if you want to run an application. Which of the following attacks target high ranking officials and executives? (Malicious Code) Which of the following is NOT a way that malicious code spreads? What does Personally Identifiable Information (PII) include?

What should be your response? You receive a call on your work phone and you're asked to participate in a phone survey. Decline So That You Maintain Physical Control of Your Government-Issued Laptop. Use online sites to confirm or expose potential hoaxes What is whaling? Jelita and James have performed a great service by writing this book and putting it out so all can understand the mechanics of the con and how to protect yourself. -Never allow sensitive data on non-Government-issued mobile devices. A person who does not have the required clearance or assess caveats comes into possession of SCI in any manner. What is a common indicator of a phishing attempt? *IDENTITY MANAGEMENT*What certificates does the Common Access Card (CAC) or Personal Identity Verification (PIV) card contain? WebSecure your internet connection. Just because a website is registered as a nonprofit or has a political agenda doesnt mean its immune to spreading lies. (Spillage) Which of the following practices may reduce your appeal as a target for adversaries seeking to exploit your insider status? Which of the following practices may reduce your appeal as a target for adversaries seeking to exploit you insider status?-Remove your security badge after leaving your controlled area or office building.

A coworker has asked if you want to download a programmer's game to play at work. **TravelWhat is a best practice while traveling with mobile computing devices? Be cautious of social media: 5. **Social EngineeringWhat is TRUE of a phishing attack? *PHYSICAL SECURITY*Within a secure area, you see an individual who you do not know and is not wearing a visible badge. *SENSITIVE COMPARTMENTED INFORMATION*When faxing Sensitive Compartmented Information (SCI), what actions should you take? Bob, a coworker, has been going through a divorce, has financial difficulties and is displaying hostile behavior. How can you guard yourself against Identity theft? There are a few simple things you can do to protect yourself from becoming a victim of an internet hoax: -Be skeptical of anything you see online, even if it Spillage because classified data was moved to a lower classification level system without authorization. (Sensitive Compartmented Information) What portable electronic devices (PEDs) are allow in a Secure Compartmented Information Facility (SCIF)?

-Phishing can be an email with a hyperlink as bait. Classified material must be appropriately marked. What certificates are contained on the DoD Public Key Infrastructure (PKI) implemented by the Common Access Card (CAC)/Personal Identity Verification (PIV) card? **Identity ManagementWhich of the following is the nest description of two-factor authentication? DoD employees are prohibited from using a DoD CAC in card-reader-enabled public devices. WebJelita and James have performed a great service by writing this book and putting it out so all can understand the mechanics of the con and how to protect yourself. *TravelWhat security risk does a public Wi-Fi connection pose?-It may expose the connected device to malware. (Malicious Code) What are some examples of malicious code? You are reviewing your employees annual self evaluation. A type of phishing targeted at high-level personnel such as senior officials. Be sure to use caution when giving out personal information online and never enter sensitive data into unsolicited messages! - CUI is an umbrella term that encompasses many different markings to identify information that is not classified but which should be protected. Cyber Awareness Challenge Complete Questions and Answers. Which of the following is a best practice for handling cookies? Unfortunately, most of these posts are false and are known as Internet hoaxes or Fake News. These internet hoaxes can be tricky to spot because they appear to come from a trusted sourceperhaps your friend, an unrelated website, a famous person, or another trusted source. *PHYSICAL SECURITY*At which Cyberspace Protection Condition (CPCON) is the priority focus on critical and essential functions? Which of the following is a practice that helps to prevent the download of viruses and other malicious code when checking your email? There are many internet hoaxes that are circulated daily. WebIf you want to protect yourself from internet hoaxes, there are some simple steps you can take. Which of the following is NOT one? (Malicious Code) Upon connecting your Government-issued laptop to a public wireless connection, what should you immediately do? WebProtect yourself from phishing. If there are numbers at the end, like .gif, .mp4 or .wmv, its likely that the video is fake. Which of the following is an example of Protected Health Information (PHI)? *SOCIAL ENGINEERING*How can you protect yourself from social engineering? -Personal information is inadvertently posted at a website. **Insider ThreatWhat type of activity or behavior should be reported as a potential insider threat? (Sensitive Compartmented Information) What describes how Sensitive Compartmented Information is marked? What is a protection against internet hoaxes? Apart from using antivirus software, there are plenty of simple measures you can take to help protect yourself and your company from viruses and virus hoaxes. -Avoid using non-Bluetooth-paired or unencrypted wireless computer peripherals. Always use DoD PKI tokens within their designated classification level. (Correct). *SpillageWhich of the following is a good practice to aid in preventing spillage? -Remove your security badge, common access card (CAC), or personal identity verification (PIV) card. Use online sites to confirm which is the best practice that can prevent viruses and other malicious code from being downloaded when checking your email Do not open links or pictures what risk does a public wifi connection pose? If you participate in or condone it at any time. What level of damage to national security could reasonably be expected if unauthorized disclosure of Top Secret information occurred? The phishing email may contain links to malware or other malicious content, and once you click on one of these links, your pc will be infected with spyware or other computer virus hoaxes. Loss of access to money in your account for up to 10 days. How many potential insider threat indicators is Bob displaying? Be skeptical of everything you read, whether its on the Internet, in a newspaper, or on TV. Which of the following statements is NOT true about protecting your virtual identity? Updating your software is key. -It is inherently not a secure technology. When using a fax machine to send sensitive information, the sender should do which of the following? We can protect ourselves from internet hoaxes through the following: We should always keep our sensitive information private as disclosing them to other parties put us at risk of getting scammed of our valuable items. A colleague has won 10 high-performance awards, can be playful and charming, is not currently in a relationship, and is occasionally aggressive in trying to access sensitive information. In setting up your personal social networking service account, what email address should you use? But you can also check the description to see if the video is authentic.

Goodge Street Tube Station, Rhetorical Analysis Jason Reynolds Lesley University Speech Worksheet, Articles H

how can you protect yourself from internet hoaxes