When can you check personal e-mail on your Government-furnished equipment Cyber Awareness 2022

This course does not have a final exam.

Description: The purpose of the Cyber Awareness Challenge is to influence behavior by focusing on actions that authorized users can engage to mitigate threats and vulnerabilities to DOD Information Systems. This training is current, engaging, and relevant to the user. The Cyber Awareness Challenge is the DOD baseline standard for end user awareness training by providing awareness content that addresses evolving requirements issued by Congress, the Office of Management and Budget (OMB), the Office of the Secretary of Defense, and Component input from the DOD CIO chaired Cyber Workforce Advisory Group (CWAG).

  This course provides an overview of current cybersecurity threats and best practices to keep information and information systems secure at home and at work. The training also reinforces best practices to protect classified information, controlled unclassified information (CUI), and personally identifiable information (PII).

  A Knowledge Check option is available for users who have successfully completed the previous version of the course. After each selection on the incident board, users are presented one or more questions derived from the previous Cyber Awareness Challenge. If all questions are answered correctly, users will skip to the end of the incident. If any questions are answered incorrectly, users must review and complete all activities contained within the incident.

Course Resources: N/A

Learning Objectives:
This course discusses the following topics:

  • Malicious Code
  • Computer Use
  • Removable Media and Mobile Devices
  • Online Behavior
  • Physical Security
  • Insider Threat
  • Information Security
  • SCI and SCIFs

Delivery Method: eLearning

Length: 60 Minutes

Target Audience: Department of Defense (DOD) information system users and other U.S. Government personnel and contractors within the National Industrial Security Program

Requirements:

  • Clearance Requirements: N/A
  • Attendance Requirements: N/A
  • Exam Requirements: N/A

Prerequisites: N/A

Credits Recommended/Earned:

  • ACE Credit Recommendation: (What's this?): N/A
  • Professional Development Units per SPēD: 3

System Requirements: Check if your system is configured appropriately to use STEPP.

CDSE courses are intended for use by Department of Defense and other U.S. Government personnel and contractors within the National Industrial Security Program.

DOD Cyber Awareness Challenge 2019Navy eLearning (NEL)Course Catalog Code: DOD-IAA-V16.0TRAVELIncident1.What should Sara do when using publicly available Internet, such as hotel Wi-Fi?

Get answer to your question and much more

2.What is the danger of using public Wi-Fi connections?

Get answer to your question and much more

Incident1.Select Yes or No for each item. Then select Submit. (Permitted Uses of Government-FurnishedEquipment GFE))Viewing or downloading pornography –NoGambling online –NoConducting a private money-making venture –NoUsing unauthorized software –NoIllegally downloading copyrighted material –NoMaking unauthorized configuration changes –NoMOBILE DEVICESIncident1.When is it okay to charge a personal mobile device using government-furnished equipment(GFE)?

Get answer to your question and much more

2.Which of the following demonstrates proper protection of mobile devices?

Get answer to your question and much more

HOME COMPUTER SECURITYEvidence1.Your antivirus is out-of-date. Update now?

Get answer to your question and much more

2.Security updates are ready to install. Install now?

Get answer to your question and much more

3.Firewall disabled. Would you like to enable the firewall?

Get answer to your question and much more

When can you check personal email on your Government

Under what circumstances is it acceptable to check personal email on Government-furnished equipment (GFE)? If your organization allows it. When checking in at the airline counter for a business trip... Decline so that you maintain physical contact of your Government-issued laptop.

Under what circumstances is it acceptable to use your Government

Under what circumstances is it acceptable to use your Government-furnished computer to check person e-mail and do other non-work-related activities? If allowed by organization policy.

What can help to protect the data on your personal mobile device cyber awareness 2022?

What can help to protect data on your personal mobile device? -Secure it to the same level as Government-issued systems. Which of the following is an example of near field communication (NFC)? -A smartphone that transmits credit card payment information when held in proximity to a credit card reader.

Which of the following individuals can access classified data Cyber Awareness 2022?

Who can be permitted access to classified data? Only persons with appropriate clearance, a non-disclosure agreement, and need-to-know can access classified data.