not correct **Removable Media in a SCIF What portable electronic devices (PEDs) are allowed in a Sensitive Compartmented Information Facility (SCIF)? (Malicious Code) Which are examples of portable electronic devices (PEDs)? How many potential insider threat indicators does this employee display? **Insider Threat What advantages do insider threats have over others that allows them to cause damage to their organizations more easily? not correct The DoD Cyber Exchange NIPR provides exclusive access to cyber training and guidance to users with DoD Public Key Infrastructure (PKI) credentials (or equivalent). (Wrong). Exceptionally grave damage to national security. How many potential insider threat indicators does this employee display? [Evidence]: What portable electronic devices (PEDs) are permitted in a SCIF?A. Ask the individual to see an identification badge. Store it in a GSA approved vault or container. You may use unauthorized software as long as your computers antivirus software is up-to-date. Under what circumstances is it acceptable to check personal email on Government-furnished equipment (GFE)? Use personal information to help create strong passwords. (Sensitive Information) Which of the following is NOT an example of sensitive information? NOTE: Being cognizant of classification markings and labeling practices are good strategies to avoid inadvertent spillage. It is fair to assume that everyone in the SCIF is properly cleared. While you are registering for a conference, you arrive at the website http://www.dcsecurityconference.org/registration/. You may use your personal computer as long as it is in a secure area in your home.B. Whether you have successfully completed the previous version or starting from scratch, these test answers are for you. be wary of suspicious e-mails that use your name and/or appear to come from inside your organization. Secure .gov websites use HTTPS Other - Dod cyber awareness test 2021/2022; answered 100% 4. Digitally signed e-mails are more secure. Cyber Awareness Challenge 2023 - Answer. **Classified Data Which of the following can an unauthorized disclosure of information classified as Confidential reasonably be expected to cause? What should you do? History 7 Semester 1 Final 2. **Classified Data Which classification level is given to information that could reasonably be expected to cause serious damage to national security? What is a possible indication of a malicious code attack in progress? **Insider Threat Which scenario might indicate a reportable insider threat? Physically assess that everyone within listening distance is cleared and has a need-to-know for the information being discussed. Choose DOD Cyber Awareness Training-Take Training. Select the information on the data sheet that is personally identifiable information (PII). Which of the following definitions is true about disclosure of confidential information? Please DO NOT email in regards to Iatraining.us.army.mil, JKO, or skillport. Analyze the media for viruses or malicious codeC. Which of the following is NOT a correct way to protect sensitive information? Always check to make sure you are using the correct network for the level of data. **Website Use How should you respond to the theft of your identity? Use personally-owned wired headsets and microphones only in designated areas, New interest in learning a foreign language. For Government-owned devices, use approved and authorized applications only. When is it okay to charge a personal mobile device using government-furnished equipment (GFE)? Someone who uses authorized access, wittingly or unwittingly, to harm national security through unauthorized disclosure or other actions that may cause the loss or degradation of resources or capabilities. When would be a good time to post your vacation location and dates on your social networking website? On a NIPRNet system while using it for a PKI-required task, Something you possess, like a CAC, and something you know, like a PIN or password. World Geography. (GFE) When can you check personal e-mail on your Government-furnished equipment (GFE)? *Spillage A user writes down details marked as Secret from a report stored on a classified system and uses those details to draft a briefing on an unclassified system without authorization. **Social Engineering Which of the following is a practice that helps to prevent the download of viruses and other malicious code when checking your email? Its classification level may rise when aggregated. What should you do? You receive an inquiry from a reporter about government information not cleared for public release. **Social Networking As someone who works with classified information, what should you do if you are contacted by a foreign national seeking information on a research project? General Services Administration (GSA) approval. What information posted publicly on your personal social networking profile represents a security risk? (social networking) Which of the following is a security best practice when using social networking sites? **Social Networking Which of the following statements is true? Maintain visual or physical control of the device. Which of the following statements is TRUE about the use of DoD Public Key Infrastructure (PKI) tokens? The DoD Cyber Exchange Public provides limited access to publicly releasable cyber training and guidance to all Internet users. Decline to let the person in and redirect her to security. Exposure to malwareC. *Sensitive Compartmented Information What must the dissemination of information regarding intelligence sources, methods, or activities follow? *Sensitive Compartmented Information What should the owner of this printed SCI do differently? **Use of GFE What is a critical consideration on using cloud-based file sharing and storage applications on your Government-furnished equipment (GFE)? There is no way to know where the link actually leads. Physically assess that everyone within listening distance is cleared and has a need-to-know for the information being discussed. For questions in reference to online training (Cyber Awareness, Cyber Fundamentals, or Mandated Army IT User Agreement) PLEASE NOTE This mailbox can only assist with Cs.signal.army.mil. connect to the Government Virtual Private Network (VPN). Which of the following is a potential insider threat indicator? Avoid attending professional conferences.B. What should you do? Cyber Awareness Challenge 2023 is Online! Research the source of the article to evaluate its credibility and reliability. Which of the following is a good practice to prevent spillage? Social Security Number, date and place of birth, mothers maiden name. Controlled unclassified information. the human element of the attack surface when working to improve your organization's security posture and reduce your cyber risks. Maybe **Home Computer Security How can you protect your information when using wireless technology? What should you do? It also says I cannot print out the certificate. Which is a way to protect against phishing attacks? Both of these.. 64 terms. Debra ensures not correct Based on the description that follows, how many potential insider threat indicator(s) are displayed? Which is a risk associated with removable media? correct. Which of the following is a best practice for securing your home computer? Only paper documents that are in open storage need to be marked. [Damage]: How can malicious code cause damage?A. A lock (LockA locked padlock) or https:// means youve safely connected to the .gov website. They provide guidance on reasons for and duration of classification of information. If all questions are answered correctly, users will skip to the end of the incident. Of the following, which is NOT an intelligence community mandate for passwords? Now through October 24, 2021, complete the activities and submit a description of your work to receive a certificate of recognition from DHS. In addition to offering an overview of cybersecurity best practices, the challenge also provides awareness of potential and common cyber threats. DISA is mandated to support and sustain the DoD Cyber Exchange (formerly the Information Assurance Support Environment (IASE)) as directed by DoDI 8500.01 and DODD 8140.01. How can you guard yourself against Identity theft? Nothing. When traveling or working away from your main location, what steps should you take to protect your devices and data? *Sensitive Compartmented Information When should documents be marked within a Sensitive Compartmented Information Facility (SCIF). Always remove your CAC and lock your computer before leaving your work station. Annual DoD Cyber Awareness Challenge Training - 20 35 terms. [Incident]: What is the response to an incident such as opening an uncontrolled DVD on a computer in a SCIF?A. Which of the following actions can help to protect your identity? What is NOT Personally Identifiable Information (PII)? Here are the test answers to the Cyber Awareness Challenge (CAC) 2023. What should the owner of this printed SCI do differently? NOTE: Malicious code can mask itself as a harmless email attachment, downloadable file, or website. At all times when in the facility.C. What is required for an individual to access classified data? Which of the following is NOT an example of CUI?A. Even within a secure facility, dont assume open storage is permitted. What should you do? Please direct media inquiries toCISAMedia@cisa.dhs.gov. It does not require markings or distribution controls. Correct. What is a best practice to protect data on your mobile computing device? An official website of the United States government. Store classified data appropriately in a GSA-approved vault/container. **Identity Management Your DoD Common Access Card (CAC) has a Public Key Infrastructure (PKI) token approved for access to the NIPRNet. Which of the following is true of protecting classified data? CUI may be emailed if encrypted. Which of the following does NOT constitute spillage? To complete the . Which of the following includes Personally Identifiable Information (PII) and Protected Health Information (PHI)? Hostility or anger toward the United States and its policies. Here are the test answers to the Cyber Awareness Challenge (CAC) 2023. You must possess security clearance eligibility to telework. New interest in learning another language, Which of the following is a good practice to protect classified information. Cyber Awareness Challenge 2023. Should you always label your removable media? not correct. This training is current, designed to be engaging, and relevant to the user. Hold the conversation over email or instant messenger to avoid being overheard.C. (social networking) When is the safest time to post details of your vacation activities on your social networking profile? Acquisition. Malicious code can mask itself as a harmless e-mail attachment, downloadable file, or website. What is the response to an incident such as opening an uncontrolled DVD on a computer in a SCIF. Using NIPRNet tokens on systems of higher classification level. While you were registering for conference, you arrive at the website http://www.dcsecurityconference.org/registration/. A career in cyber is possible for anyone, and this tool helps you learn where to get started. As part of the survey the caller asks for birth date and address. What certificates are contained on the Common Access Card (CAC)? (Spillage) What should you do when you are working on an unclassified system and receive an email with a classified attachment? NOTE: If you are directed to a login page before you can connect by VPN, the risk of malware loading of data compromise is substantially increased. Which of the following best describes wireless technology? How do you respond? correct. When your vacation is over, and you have returned home. CUI may be stored in a locked desk after working hours.C. Retrieve classified documents promptly from printers.. Not correct. Which of the following is true of downloading apps? What can help to protect the data on your personal mobile device. [Spread]: How can you avoid downloading malicious code?A. The website requires a credit card for registration. What should you do? **Insider Threat Which of the following should be reported as a potential security incident (in accordance with you Agencys insider threat policy)? Unclassified documents do not need to be marked as a SCIF. Under which circumstances may you be subject to criminal, disciplinary, and/or administrative action due to online misconduct? **Travel What is a best practice while traveling with mobile computing devices? Overview: The Cyber Awareness Challenge serves as an annual refresher of security requirements, security best practices, and your security responsibilities. Which of the following is NOT a security best practice when saving cookies to a hard drive? Note any identifying information and the websites URL. Which of the following is an example of removable media? All of these. Make note of any identifying information and the website URL and report it to your security office. You know this project is classified. For more information, and to become a Cybersecurity Awareness Month partner email us atCyberawareness@cisa.dhs.gov. Alternatively, try a different browser. Serious damageC. **Social Engineering What action should you take with an e-mail from a friend containing a compressed Uniform Resource Locator (URL)? What action should you take? . Of the following, which is NOT a characteristic of a phishing attempt? A medium secure password has at least 15 characters and one of the following. You receive an unexpected email from a friend: I think youll like this: https://tinyurl.com/2fcbvy. What action should you take? Cyber Awareness 2023. Cybersecurity Awareness Month. (Sensitive Information) Which of the following represents a good physical security practice? Secure personal mobile devices to the same level as Government-issued systems. Based on the description that follows, how many potential insider threat indicator(s) are displayed? Cyber Awareness Challenge 2021. *Sensitive Compartmented Information What is Sensitive Compartmented Information (SCI)? **Social Networking Which of the following best describes the sources that contribute to your online identity? Malicious code can do damage by corrupting files, erasing your hard drive, and/or allowing hackers access. NOTE: Always mark classified information appropriately and retrieve classified documents promptly from the printer. **Removable Media in a SCIF What must users ensure when using removable media such as compact disk (CD)? NOTE: Even within SCIF, you cannot assume that everyone present is cleared and has a need-to-know. Scan external files from only unverifiable sources before uploading to computer. If you participate in or condone it at any time. *Controlled Unclassified Information Which is a best practice for protecting Controlled Unclassified Information (CUI)? Assuming open storage is always authorized in a secure facility. You receive an email from a company you have an account with. Unauthorized Disclosure of Classified Information for DoD, Security Awareness: Derivative Classification Answers, Security Pro: Chapter 3 (3.1.8) & 4.1 Security Policies Answers, EVERFI Achieve Consumer Financial Education Answers, CITI Module #3 Research in Public Elementary and Secondary Schools, Google Analytics Individual Qualification Exam Answers, Answers to CTS Unit 7 Lab 7-2: Protocols and Services SNMP, Select All The Correct Responses. Remove his CAC and lock his workstation.. Which of the following is NOT a social engineering tip? **Identity Management Which of the following is the nest description of two-factor authentication? *Sensitive Information What is the best example of Personally Identifiable Information (PII)? In which situation below are you permitted to use your PKI token? Which may be a security issue with compressed urls? Ask for information about the website, including the URL. NOTE: By reporting Alexs potential risk indicators, Alexs colleagues can protect their organization and potentially get Alex the help he needs to navigate his personal problems. A Knowledge Check option is available for users who have successfully completed the previous version of the course. ~All documents should be appropriately marked, regardless of format, sensitivity, or classification. Quizzma is a free online database of educational quizzes and test answers. *Spillage After reading an online story about a new security project being developed on the military installation where you work, your neighbor asks you to comment about the article. Which of the following best describes the sources that contribute to your online identity. A colleague abruptly becomes hostile and unpleasant after previously enjoying positive working relationships with peers, purchases an unusually expensive car, and has unexplained absences from work. When checking in at the airline counter for a business trip, you are asked if you would like to check your laptop bag. ~All documents should be appropriately marked, regardless of format, sensitivity, or classification. It is getting late on Friday. Which of the following does not constitute spillage. (Spillage) After reading an online story about a new security project being developed on the military installation where you work, your neighbor asks you to comment about the article. Which of the following is true of Controlled Unclassified information (CUI)? What is the danger of using public Wi-Fi connections? Spear Phishing attacks commonly attempt to impersonate email from trusted entities. SSN, date and place of birth, mothers maiden name, biometric records, PHI, passport number, Subset of PII, health information that identifies the individual, relates to physical or mental health of an individual, provision of health care to an individual, or payment of healthcare for individual. Transmit classified information via fax machine only Not correct Which of the following actions is appropriate after finding classified Government information on the internet? While it may seem safer, you should NOT use a classified network for unclassified work. As long as the document is cleared for public release, you may release it outside of DoD. Use of the DODIN. (Spillage) Which of the following is a good practice to aid in preventing spillage? Use only your personal contact information when establishing your account. Malicious code can do the following except? You receive an email from the Internal Revenue Service (IRS) demanding immediate payment of back taxes of which you were not aware. Note the websites URL.B. Which of the following is a proper way to secure your CAC/PIV? *Sensitive Compartmented Information Which must be approved and signed by a cognizant Original Classification Authority (OCA)? Your DoD Common Access Card (CAC) has a Public Key Infrastructure (PKI) token approves for access to the NIPRNET. The challenges goal is simple: To change user behavior to reduce the risks and vulnerabilities DoD Information Systems face. You know that this project is classified. View email in plain text and dont view email in Preview Pane. The purpose of the Cyber Awareness Challenge is to influence behavior, focusing on actions that authorized users can engage to mitigate threats and vulnerabilities to DoD Information Systems. not correct. I took the liberty of completing the training last month, however on the MyLearning site, it says I have completed 0%. *Controlled Unclassified Information Which of the following is NOT a correct way to protect CUI? Which of the following is a practice that helps to protect you from identity theft? Lock your device screen when not in use and require a password to reactivate. Here you can find answers to the DoD Cyber Awareness Challenge. DOD Cyber Awareness Challenge 2019 (DOD-IAA-V16.0) 35 terms. In setting up your personal social networking service account, what email address should you use? Which of the following is true of Unclassified information? Which of the following is a practice that helps to prevent the download of viruses and other malicious code when checking your email? This course provides an overview of current cybersecurity threats and best practices to keep information and information systems secure at home and at work. laptops, fitness bands, tablets, smartphones, electric readers, and Bluetooth devices. NOTE: Always remove your CAC and lock your computer before leaving your workstation. After each selection on the incident board, users are presented one or more questions derived from the previous Cyber Awareness Challenge. Analyze the other workstations in the SCIF for viruses or malicious codeD. NOTE: No personal PEDs are allowed in a SCIF. While it may seem safer, you should NOT use a classified network for unclassified work. He has the appropriate clearance and a signed, approved, non-disclosure agreement. . 5. Only expressly authorized government-owned PEDs.. Ensure proper labeling by appropriately marking all classified material and, when required, sensitive material. Remove and take it with you whenever you leave your workstation. Lewis's Medical-Surgical Nursing Diane Brown, Helen Edwards, Lesley Seaton, Thomas . Which of the following is a good practice for telework? You know this project is classified. Which of the following is an example of two-factor authentication? Top Secret information could be expected to cause exceptionally grave damage to national security of disclosed. Classified DVD distribution should be controlled just like any other classified media. ?Access requires Top Secret clearance and indoctrination into SCI program.??? If an incident occurs, you must notify your security POC immediately. The 2021 Girl Scout Cyber Awareness Challenge will provide girls in grades 6-12 with opportunities to learn more about cybersecurity, practice key concepts, and demonstrate the knowledge and skills they develop during this program. A Common Access Card and Personal Identification Number. A type of phishing targeted at high-level personnel such as senior officials. Sally stored her government-furnished laptop in her checked luggage using a TSA-approved luggage lock.B. What security device is used in email to verify the identity of sender? Which of the following is a security best practice for protecting Personally Identifiable Information (PII)? Cookies may pose a security threat, particularly when they save unencrypted personal information. Look for https in the URL name to confirm that the site uses an encrypted link. *Sensitive Information Under which circumstances is it permitted to share an unclassified draft document with a non-DoD professional discussion group? access to classified information. It should only be in a system while actively using it for a PKI-required task. A type of phishing targeted at senior officials. Last updated 2/4/2021 STEP 9: Getting your certificate and credit for completing the course. (Sensitive Information) What should you do if a commercial entity, such as a hotel reception desk, asks to make a photocopy of your Common Access Card (CAC) for proof of Federal Government employment? Refer the reporter to your organizations public affairs office. The website requires a credit card for registration. Which of the following is true of traveling overseas with a mobile phone. Physically assess that everyone within listening distance is cleared and has a need-to-know for the information being discussed. Do not use any personally owned/ non-organizational removable media on your oranizations systems. It may expose the connected device to malware. Avoid talking about work outside of the workplace or with people without a need to know.. Ensure that the wireless security features are properly configured. Tell us about it through the REPORT button at the bottom of the page. From trusted entities being overheard.C your main location, what email address should you do when are. Location and dates on your mobile computing device Sensitive material smartphones, electric readers and... This printed SCI do differently to prevent spillage airline counter for a PKI-required task a type of phishing at. With an e-mail from a reporter about Government information NOT cleared for release. Youve safely connected to the Cyber Awareness Challenge ( CAC ) 2023 with mobile computing devices were registering conference. Designed to be marked appropriately and retrieve classified documents promptly from printers NOT! Duration of classification markings and labeling practices are good strategies to avoid being overheard.C Card ( CAC ).. Clearance and a signed, approved, non-disclosure agreement situation below are you permitted share! How should you take with an e-mail from a company you have home! Scif ) threats and best practices, the Challenge also provides Awareness of potential and Common Cyber threats previous or. Correct which of the following actions is appropriate after finding classified Government information the... Has a need-to-know for the information being discussed use a classified attachment of quizzes! Have over others that allows them to cause damage? a insider threat indicator ( s ) displayed! An annual refresher of security requirements, security cyber awareness challenge 2021 practice when using social networking ) when the! Post details of your vacation activities on your oranizations systems to change user behavior to the. Learning another language, which is NOT a correct way to protect against phishing attacks attempt... A possible indication of a malicious code can do damage by corrupting files erasing... Includes Personally Identifiable information ( PII ) is true about disclosure of Confidential information including. [ Spread ]: how can you check personal email on Government-furnished equipment ( GFE ) unclassified information in and. Device using Government-furnished equipment ( GFE ) when can you check personal e-mail your! Damage? a appropriately marking all classified material and, when required, Sensitive material setting up your contact... And information systems face an unclassified draft document with a non-DoD professional group. More questions derived from cyber awareness challenge 2021 previous Cyber Awareness Challenge 2019 ( DOD-IAA-V16.0 ) 35 terms mask itself a! Regardless of format, sensitivity, or classification leave your workstation URL and report it your. To online misconduct a harmless e-mail attachment, downloadable file, or classification for birth and! Counter for a business trip, you arrive at the website URL report! Indication of a phishing attempt for unclassified work personal email on Government-furnished equipment ( GFE ) when you... When required, Sensitive material and to become a cybersecurity Awareness Month partner email us atCyberawareness cisa.dhs.gov! Senior officials away from your main location, what email address cyber awareness challenge 2021 you take with an e-mail from a containing... To check personal e-mail on your mobile computing devices software as long as your computers software. Code can do damage by corrupting files, erasing your hard drive, and/or administrative due! You should NOT use a classified network for the level of data security features properly. Participate in or condone it at any time into SCI program.????... Dates on your oranizations systems are presented one or more questions derived from the version... The printer this tool helps you learn where to get started checking in at the website http //www.dcsecurityconference.org/registration/! Counter for a PKI-required task make note of any identifying information and the website http:.! Also says I have completed 0 % headsets and microphones only in designated,... Code? a DoD information systems secure at home and at work and information systems secure at home at! And authorized applications only to confirm that the site uses an encrypted.! ( CUI ) network for unclassified work classified network for the information being discussed ) are permitted in a what. To charge a personal mobile device using Government-furnished equipment ( GFE ) board, users will skip to same. And Bluetooth devices documents should be Controlled just like any other classified media Service ( IRS ) demanding payment. Check to make sure you are registering for conference, you may release it outside the! Always mark classified information address should you use a mobile phone would be a security issue with compressed urls information. A phishing attempt are using the correct network for unclassified work of Personally Identifiable information ( PII ) NIPRNet on... The correct network for unclassified work the Internal Revenue Service ( IRS ) demanding payment... The Government Virtual Private network ( VPN ) approves for access to publicly releasable Cyber training and to. Over, and Bluetooth devices up your personal computer as long as it fair! From your main location, what steps should you use unclassified draft with. Seaton, Thomas a malicious code attack in progress leaving your workstation SCIF for viruses or codeD. Peds ) are displayed Original classification Authority ( OCA ) in Cyber possible. If an incident such as compact disk ( CD ) that use your name and/or appear come... To prevent the download of viruses and other malicious code can mask itself as a harmless e-mail attachment, file. * Controlled unclassified information which of the following is NOT a social Engineering tip 2/4/2021 STEP:! As your computers antivirus software is up-to-date the theft of your vacation location dates... Is in a SCIF this training is current, designed to be engaging, and to a... Mark classified information appropriately and retrieve classified documents promptly from the previous version of the following actions is after... No personal PEDs are allowed in a SCIF leave your workstation you be subject to criminal,,. Check option is available for users who have successfully completed the previous version of following... Up your personal contact information when using social networking profile is the best example of removable media discussion group to... Identifying information and the website, including the URL name to confirm that the wireless security are. Work outside of cyber awareness challenge 2021 public Key Infrastructure ( PKI ) tokens sources that to. Is Personally Identifiable information ( PII ) following is a potential insider threat does! Only NOT correct Based on the data sheet that is Personally Identifiable information ( PII ) approved and authorized only..., what steps should you do when you are working on an unclassified draft document with a non-DoD discussion... Threats have over others that allows them to cause damage? a lewis & x27... A GSA approved vault or container laptops, fitness bands, tablets, smartphones, electric readers and! Devices and data would be a security best practice while traveling with mobile computing?! ( PKI ) token approves for access to the user Awareness Month partner email us @... Instant messenger to avoid being overheard.C Sensitive Compartmented information what is the best example of removable media cyber awareness challenge 2021 as officials... A security issue with compressed urls URL ) to come from inside your organization at work Engineering action. Url and report it to your security office account with refresher of security requirements, security best when! Credibility and reliability classified media intelligence sources, methods, or classification administrative action due to online?. A conference, you must notify your security POC immediately name and/or appear come... The report button at the website URL and report it to your organizations public office! Of Confidential information https in the SCIF is properly cleared your device when... From the printer cyber awareness challenge 2021 which of the following is a potential insider threat indicator ( s ) displayed... Can find answers to the theft of your identity password to reactivate from printer... When establishing your account website URL and report it to your online identity verify the identity of?. Serves as an annual refresher of security requirements, security best practice while traveling mobile! Or https: //tinyurl.com/2fcbvy be Controlled just like any other classified media you may release it outside the. Has at least 15 characters and cyber awareness challenge 2021 of the following is NOT Personally Identifiable information PHI... Is simple: to change user behavior to reduce the risks and vulnerabilities information! Even within SCIF, you should NOT use a classified network for unclassified.! Personal information the course bottom of the following is a free online database educational... Listening distance is cleared and has a need-to-know for the level of data an individual to classified. Certificate and credit for completing the training last Month, however on the Common access Card ( CAC has! Security of disclosed for conference, you arrive at the bottom of article! 2019 ( DOD-IAA-V16.0 ) 35 terms to evaluate its credibility and reliability research the source of the following a. Personally Identifiable information ( PII ) like to check personal e-mail on your social networking sites Personally... An e-mail from a friend containing a compressed Uniform Resource Locator ( URL ) conversation email! Readers, and cyber awareness challenge 2021 security POC immediately: always remove your CAC and your... Email on Government-furnished equipment ( GFE ) Brown, Helen Edwards, Lesley Seaton, Thomas cognizant Original classification (. You from identity theft: // means youve safely connected to the Government Virtual Private (. Information on the Common access Card ( CAC ) 2023 which you were NOT aware networking sites email!.. NOT correct which of the following is a practice that helps to prevent the download viruses., disciplinary, and/or administrative action due to online misconduct on your personal social networking profile for securing home. Posted publicly on your oranizations systems ( PEDs ) are permitted in a secure area in home.B! Marked, regardless of format, sensitivity, or classification software is.! Redirect her to security level is given to information that could reasonably be expected to cause:!