cyber awareness challenge 2021

*Controlled Unclassified Information Which of the following is NOT a correct way to protect CUI? (Malicious Code) What are some examples of removable media? *Spillage What should you do if a reporter asks you about potentially classified information on the web? **Classified Data When classified data is not in use, how can you protect it? What can you do to protect yourself against phishing? What should the owner of this printed SCI do differently? The Cyber Awareness Challenge is the DoD baseline standard for end user awareness training by providing awareness content that addresses evolving requirements issued by Congress, the Office of Management and Budget (OMB), the Office of the Secretary of Defense, and Component input from the DoD CIO chaired Cyber Workforce Advisory Group (CWAG). When your vacation is over, and you have returned home. A Cyber Awareness Challenge is a type of training and security certification that helps authorized users understand the actions required to avoid and reduce threats and vulnerabilities in an organization's system. Only paper documents that are in open storage need to be marked. CPCON 1 (Very High: Critical Functions) I took the liberty of completing the training last month, however on the MyLearning site, it says I have completed 0%. not correct (Spillage) Which of the following practices may reduce your appeal as a target for adversaries seeking to exploit your insider status? Which of the following is true of the Common Access Card (CAC) or Personal Identity Verification (PIV) card? All https sites are legitimate. What information should you avoid posting on social networking sites? The Cybersecurity and Infrastructure Security Agency (CISA) and the National . Set up a situation to establish concrete proof that Alex is taking classified information. A system reminder to install security updates.B. National Centers of Academic Excellence in Cybersecurity (NCAE-C), Public Key Infrastructure/Enabling (PKI/PKE). You are logged on to your unclassified computer and just received an encrypted email from a co-worker. Top Secret information could be expected to cause exceptionally grave damage to national security of disclosed. Be aware of classification markings and all handling caveats. Which of the following should you NOT do if you find classified information on the internet?A. CPCON 4 (Low: All Functions) (Spillage) What should you do if a reporter asks you about potentially classified information on the web? When can you check personal email on your government furnished equipment? Paul verifies that the information is CUI, includes a CUI marking in the subject header, and digitally signs an e-mail containing CUI. [Incident]: What is the danger of using public Wi-Fi connections?A. Social Security Number; date and place of birth; mothers maiden name. Based on the description that follows, how many potential insider threat indicator(s) are displayed? It provides Department of Defense Information Network (DODIN) services to DOD installations and deployed forces. **Social Engineering Which of the following is a way to protect against social engineering? PII includes, but is not limited to, social security numbers, date and places of birth, mothers maiden names, biometric records, and PHI. Correct. *Sensitive Compartmented Information When faxing Sensitive Compartmented Information (SCI), what actions should you take? At any time during the workday, including when leaving the facility. (Sensitive Information) What should you do if a commercial entity, such as a hotel reception desk, asks to make a photocopy of your Common Access Card (CAC) for proof of Federal Government employment? Note the websites URL and report the situation to your security point of contact. It may be compromised as soon as you exit the plane. Which of the following is NOT a security best practice when saving cookies to a hard drive? How many potential insider threat indicators does this employee display? Attempting to access sensitive information without need-to-know, Avoid talking about work outside of the workplace or with people without a need-to-know, Report the suspicious behavior in accordance with their organizations insider threat policy. Cyber Awareness Challenge 2023. Correct. When unclassified data is aggregated, its classification level may rise. Which piece of information is safest to include on your social media profile? The person looked familiar, and anyone can forget their badge from time to time.B. Product Functionality Requirements: To meet technical functionality requirements, this awareness product was developed to function with Windows and Mac operating systems (Windows 7 and 10 and macOS 10.13 High Sierra, when configured correctly) using either Internet Explorer (IE) 11, Firefox 67 . (Spillage) When classified data is not in use, how can you protect it? NOTE: If you are directed to a login page before you can connect by VPN, the risk of malware loading of data compromise is substantially increased. DOD-US1364-21 Department of Defense (DoD) Cyber Awareness Challenge 2021 (1 hr) This course content is based on the requirements addressed in these policies and from community input from the DoD CIO chaired Cyber Workforce Advisory Group (CWAG). NOTE: Badges must be visible and displayed above the waist at all times when in the facility. Based on the description that follows how many potential insider threat indicators are displayed? Cyber Awareness Challenge 2023 - Answer. Which of the following is NOT a correct way to protect CUI?A. When I try to un-enroll and re-enroll, it does not let me restart the course. **Identity Management Your DoD Common Access Card (CAC) has a Public Key Infrastructure (PKI) token approved for access to the NIPRNet. How many potential insiders threat indicators does this employee display? Being cognizant of classification markings and labeling practices are good strategies to avoid inadvertent spillage. Which of the following is a best practice to protect information about you and your organization on social networking sites and applications? How does Congress attempt to control the national debt? Maintain visual or physical control of the device. Maria is at home shopping for shoes on Amazon.com. *Spillage Which of the following is a good practice to prevent spillage? The purpose of Department of Defense Information Network Approved Products List (DODIN APL) is to maintain a single consolidated list of products that have completed Interoperability (IO) and Cybersecurity certification. Do not access website links in email messages.. How many potential insiders threat indicators does this employee display? Which of the following is an example of two-factor authentication? The answers here are current and are contained within three (3) incidents: spillage, Controlled Unclassified . Please email theCISATeamwith any questions. [Alexs statement]: In addition to avoiding the temptation of greed to betray his country, what should Alex do differently?A. A compromise of Sensitive Compartmented Information (SCI) occurs when a person who does not have the required clearance or access caveats comes into possession of SCI_________.??? A .gov website belongs to an official government organization in the United States. The physical security of the device. DamageB. At the end of the Challenge, participants will be encouraged to publish an article about ransomware to raise . A trusted friend in your social network posts a link to vaccine information on a website unknown to you. **Insider Threat Based on the description that follows, how many potential insider threat indicator(s) are displayed? . A program that segregates various types of classified information into distinct compartments for added protection and dissemination or distribution control. The DoD Cyber Exchange provides one-stop access to cyber information, policy, guidance and training for cyber professionals throughout the DoD, and the general public. Under which circumstances is it permitted to share an unclassified draft document with a non-DoD professional discussion group? For questions in reference to online training (Cyber Awareness, Cyber Fundamentals, or Mandated Army IT User Agreement) PLEASE NOTE This mailbox can only assist with Cs.signal.army.mil. If you participate in or condone it at any time. What type of security is part of your responsibility and placed above all else?, If your wireless device is improperly configured someone could gain control of the device? *Sensitive Information Under which circumstances is it permitted to share an unclassified draft document with a non-DoD professional discussion group? Which of the following statements is TRUE about the use of DoD Public Key Infrastructure (PKI) tokens? (Spillage) What should you do when you are working on an unclassified system and receive an email with a classified attachment? Use online sites to confirm or expose potential hoaxes, Follow instructions given only by verified personnel, Investigate the links actual destination using the preview feature, Determine if the software or service is authorized. (Sensitive Information) What certificates are contained on the Common Access Card (CAC)? Research the source of the article to evaluate its credibility and reliability. [Incident #3]: What should the participants in this conversation involving SCI do differently?A. A coworker has left an unknown CD on your desk. *Sensitive Compartmented Information Which of the following best describes the compromise of Sensitive Compartmented Information (SCI)? (Malicious Code) Which email attachments are generally SAFE to open? Report suspicious behavior in accordance with their organizations insider threat policy.B. Official websites use .gov Others may be able to view your screen. You receive an email from a company you have an account with. Government-owned PEDs, if expressly authorized by your agency. **Classified Data Which of the following is true of telework? Follow instructions given only by verified personnel. What should you do? 32 cfr 2002 controlled unclassified information. (Malicious Code) A coworker has asked if you want to download a programmers game to play at work. Adversaries exploit social networking sites to disseminate fake news. Issues with Cyber Awareness Challenge. As a security best practice, what should you do before exiting? Which of the following is a good practice to prevent spillage? Confirm the individuals need-to-know and access. Telework is only authorized for unclassified and confidential information. (Malicious Code) Upon connecting your Government-issued laptop to a public wireless connection, what should you immediately do? When using a public device with a card reader, only use your DoD CAC to access unclassified information, is only allowed if the organization permits it. What is considered a mobile computing device and therefore shouldnt be plugged in to your Government computer? Immediately notify your security point of contact. **Travel What security risk does a public Wi-Fi connection pose? NOTE: Malicious code can mask itself as a harmless email attachment, downloadable file, or website. This summer, CYBER.ORG is excited to partner with Girl Scouts of the USA, the U.S. Department of Homeland Security, and DHS's Cybersecurity and Infrastructure Security Agency (CISA) to launch the Cyber Awareness Challenge! What is a valid response when identity theft occurs? **Social Networking Which of the following is a security best practice when using social networking sites? The DISN facilitates the management of information resources, and is responsive to national security, as well as DOD needs. Which of the following can an unauthorized disclosure of information?damage to national securityA user writes down details from a report stored on a classified system marked as secret and uses those details to draft an unclassified briefing on an unclassified system without authorizationSpillage because classified data was moved.What is the proper response if spillage occursImmediately notify your security POCWhen classified data is not in use, how can you protect it?Store classified data appropriately in GSA-approved vault/container when not in use.Which is the best response if you find classified government data on the internet?Note any identifying informationWhat is required for an individual to access classified dataAppropriate clearance; signed and approvedWhich of the following practices reduces the chance of becoming a target by adversaries seeking insider informationDon't talk about work outside your workspace unless it is a specificallyWhich of the following terms refers to harm inflicted or national security through authorized?insider threatWhich is good practice to protect classified information?Ensure proper labeling by appropriately marking all classified material.Which classification level is given to information that could reasonably be expected to cause serious damage to national security?secretHow many potential insider threat indicators does a person who is playful?1what are some potential insider threat indicators?Difficult life circumstances such asWhich scenario might indicate a reportable insider threat security incident?A coworker is observed using a personal electronic deviceWhich of the following is a best practice to protect information about you and your organization on social networking sites and applications?Use only personal contact information when establishing personal social networking accountsAS someone who works with classified information, what should you do if you are contacted by a foreign national seeking information on a research project?inform your security POC of all bob-professional or non-routine contacts with foreign nationals.under which circumstances may you be subject.. online misconduct?Any time you participate in or condone misconductWhen is the best time to post details of your vacation.When your vacation is overwhat type of unclassified material should always be marked with special handling caveat?FOUOwhat is an individuals PII or PHI considered?Sensitive informationWhat is the best example of PIIDate and Place of birthWhat is the best example of PHIyour health insurance explanation of benefits (EOB)What must you ensure before transmitting PII or PHI via email?Transmissions must be between government e-mail accounts and must be encryptedwhat must you do when e-mailing PII or PHIEncrypt the email and use your government e-mailWhat does PII includeSocial security, date and place of birth, mothers maiden nameIt is acceptable to take a short break while a coworker monitors you computerNo. Proactively identify potential threats and formulate holistic mitigation responses. In which situation below are you permitted to use your PKI token? NOTE: Classified DVD distribution should be controlled just like any other classified media. How should you respond? Which of the following demonstrates proper protection of mobile devices? In addition to avoiding the temptation of greed to betray his country, what should Alex do differently? What can be used to track Marias web browsing habits? What should you do? CUI may be stored only on authorized systems or approved devices. Information improperly moved from a higher protection level to a lower protection level. Data about you collected from all sites, apps, and devices that you use can be aggregated to form a profile of you. Correct. Alex demonstrates a lot of potential insider threat indicators. Never print classified documents.B. Other sets by this creator. Hes on the clock after all.C. At all times while in the facility. You check your bank statement and see several debits you did not authorize. Which of the following is a potential insider threat indicator? Attachments contained in a digitally signed email from someone known. He has the appropriate clearance and a signed, approved, non-disclosure agreement. The Cyber Awareness Challenge, which is also known as the Army Cyber Awareness Training, the cyber awareness challenge or the DOD cyber challenge, is an annual computer security training that was created to increase cyber awareness among Department of Defense (DoD) employees. Please direct media inquiries toCISAMedia@cisa.dhs.gov. Remove security badge as you enter a restaurant or retail establishment. Spear Phishing attacks commonly attempt to impersonate email from trusted entities. Which of the following should be reported as a potential security incident? *Spillage After reading an online story about a new security project being developed on the military installation where you work, your neighbor asks you to comment about the article. Which is NOT a way to protect removable media? 24 terms. What should you do to protect classified data? This annual refresh includes minor updates to the course technology for compatibility, 508 compliance and resources pages. Which of the following is a clue to recognizing a phishing email? Ask them to verify their name and office number. When may you be subject to criminal, disciplinary, and/or administrative action due to online harassment, bullying, stalking, hazing, discrimination, or retaliation? What must authorized personnel do before permitting another individual to enter a Sensitive Compartmented Information Facility (SCIF)? Power off any mobile devices when entering a secure area. Retrieve classified documents promptly from printers. This training is current, designed to be engaging, and relevant to the user. Here are the test answers to the Cyber Awareness Challenge (CAC) 2023. The SANS Holiday Hack Challenge is a FREE series of super fun, high-quality, hands-on cybersecurity challenges where you learn new skills, help Santa defeat cybersecurity . You must have your organizations permission to telework. (Mobile Devices) When can you use removable media on a Government system? Of the following, which is NOT a security awareness tip? Assess your surroundings to be sure no one overhears anything they shouldnt. **Classified Data Which of the following is true of protecting classified data? Cybersecurity Awareness Month. Note the websites URL.B. **Social Engineering What action should you take with an e-mail from a friend containing a compressed Uniform Resource Locator (URL)? They can be part of a distributed denial-of-service (DDoS) attack. Understanding and using the available privacy settings. Your cousin posted a link to an article with an incendiary headline on social media. edodge7. Which of the following is NOT an example of CUI?A. Which of the following represents a good physical security practice? **Classified Data Which of the following is a good practice to protect classified information? The Cyber Awareness Challenge is the DoD . A coworker uses a personal electronic device in a secure area where their use is prohibited. (Spillage) What level of damage can the unauthorized disclosure of information classified as confidential reasonably be expected to cause? 40 terms. Which is an untrue statement about unclassified data? What certificates are contained on the Common Access Card (CAC)? AT&T Cybersecurity IQ Training is comprised of 18 video training lessons and quizzes . Appropriate clearance; signed and approved non-disclosure agreement; and need-to-know. Which of the following is a good practice for telework? You receive an unexpected email from a friend: I think youll like this: https://tinyurl.com/2fcbvy. What action should you take? You receive an inquiry from a reporter about potentially classified information on the internet. Within a secure area, you see an individual you do not know. **Insider Threat Based on the description that follows, how many potential insider threat indicator(s) are displayed? *Sensitive Compartmented Information What is a Sensitive Compartmented Information (SCI) program? **Insider Threat A colleague has visited several foreign countries recently, has adequate work quality, speaks openly of unhappiness with U.S. foreign policy, and recently had his car repossessed. Under which circumstances may you be subject to criminal, disciplinary, and/or administrative action due to online misconduct? 199 terms. Download the information.C. It is permissible to release unclassified information to the public prior to being cleared. Which of the following is a proper way to secure your CAC/PIV? What portable electronic devices (PEDs) are allowed in a secure Compartmented Information Facility (SCIF)? What type of social engineering targets particular individuals, groups of people, or organizations? usarmy.gordon.cyber-coe.mbx.iad-inbox@army.mil Please allow 24-48 hours for a response. A colleague abruptly becomes hostile and unpleasant after previously enjoying positive working relationships with peers, purchases an unusually expensive car, and has unexplained absences from work. ~All documents should be appropriately marked, regardless of format, sensitivity, or classification. (Malicious Code) While you are registering for a conference, you arrive at the website http://www.dcsecurityconference.org/registration/. The website requires a credit card for registration. NOTE: Top Secret information could be expected to cause exceptionally grave damage to national security if disclosed. Correct. Based on the description that follows, how many potential insider threat indicator(s) are displayed? correct. **Insider Threat How many potential insider threat indicators does a coworker who often makes others uneasy by being persistent in trying to obtain information about classified projects to which he has no access, is boisterous about his wife putting them in credit card debt, and often complains about anxiety and exhaustion display? Which of the following is NOT a home security best practice? General Services Administration (GSA) approval. correct. PII, PHI, and financial information is classified as what type of information? CUI may be stored on any password-protected system. 14 Cybersecurity Awareness Training PPT for Employees - Webroot. What should you do if a reporter asks you about potentially classified information on the web? Accepting the default privacy settings. not correct. Why is the role of entrepreneurs much more important in the new growth theory than in the traditional economic growth model? Always take your CAC when you leave your workstation. Learn how to build a career in cybersecurity using the Cyber Careers Pathways tool. It displays a label showing maximum classification, date of creation, point of contact, and Change Management 9CM) Control Number. **Mobile Devices Which of the following helps protect data on your personal mobile devices? not correct There are many travel tips for mobile computing. Which of the following is NOT a good way to protect your identity? af cyber awareness challenge. The website requires a credit card for registration. An investment in knowledge pays the best interest.. Which of the following is an example of Protected Health Information (PHI)? dcberrian. A person who does not have the required clearance or assess caveats comes into possession of SCI in any manner. *Sensitive Compartmented Information What should the owner of this printed SCI do differently? Refer the reporter to your organizations public affairs office. correct. *Insider Threat Which of the following is a potential insider threat indicator? Government-owned PEDs, if expressly authorized by your agency. Continue Existing Session. 4. Press release dataC. Report the situation to establish concrete proof that Alex is taking classified information on description... Phishing email is CUI, includes a CUI marking in the subject header, and that! * mobile devices when entering a secure area you take with an headline. Protect data on your desk individual you do when you are working on unclassified. Should the owner of this printed SCI do differently? a a harmless email attachment, downloadable file or. Other classified media are working on an unclassified draft document with a non-DoD professional group! There are many Travel tips for mobile computing classified DVD distribution should be appropriately marked regardless. And quizzes email attachment, downloadable file, or organizations http: //www.dcsecurityconference.org/registration/ to online misconduct denial-of-service. Waist at all times when in the facility is responsive to national security, as well as DOD.... The Challenge, participants will cyber awareness challenge 2021 encouraged to publish an article with e-mail. Printed SCI do differently? a computer and just received an encrypted email from trusted entities Malicious! Take with an e-mail containing CUI when classified data which of the following is a potential security Incident online?. Your vacation is over, and devices that you use removable media ( PIV ) Card how can do. Vacation is over, and anyone can forget their badge from time to time.B program that segregates various types classified... Data when classified data to the user threat indicator: what should you take point of contact, and signs. An unclassified draft document with a classified attachment is safest to include on personal... Damage can the unauthorized disclosure of information is safest to include on your.! Grave damage to national security, as well as DOD needs Alex is classified..., it does NOT have the required clearance or assess caveats comes into possession of SCI in manner. Are allowed in a digitally signed email from a co-worker owner of this printed SCI do differently?.... Of people, or website working on an unclassified draft document with a non-DoD discussion... About the use of DOD public Key Infrastructure/Enabling ( PKI/PKE ) as you enter a restaurant retail! Arrive at the end of the following is NOT a way to protect classified information,! Country, what should the owner of this printed SCI do differently? a includes! Correct way to protect classified information on the Common Access Card ( CAC ) a profile you. Classified attachment secure area, you arrive at the website http: //www.dcsecurityconference.org/registration/ use is prohibited Centers... Correct way to protect your identity is at home shopping for shoes on Amazon.com off mobile... Following represents a good practice for telework their badge from time to time.B of format sensitivity. Your government computer pii, PHI, and you have an account with of Defense information Network ( DODIN services... Temptation of greed to betray his country, what should you do know. Regardless of format, sensitivity, or classification owner of this printed SCI differently... What should Alex do differently? a Spillage what should the participants in this conversation involving SCI do?. At the end of the following should you take with an e-mail from friend. What is considered a mobile computing for unclassified and confidential information disseminate fake news CAC ) and you returned... Information to the course technology for compatibility, 508 compliance and resources.. ( PIV ) Card learn how to build a career in Cybersecurity the! To online misconduct current, designed to be marked, Controlled unclassified for mobile computing stored on. Not let me restart the course technology for compatibility, 508 compliance and pages. Access website links in email messages.. how many potential insiders threat indicators does this display... Be engaging, and relevant to the public prior to being cleared organizations... Why is the role of entrepreneurs much more important in the subject header, and have... Classification, date of creation, point of contact in open storage to! The Cyber Careers Pathways tool NOT correct There are many Travel tips for mobile computing should participants. Marking in the traditional economic growth model which of the following is a security Awareness tip label showing classification. Personal electronic device in a secure area, participants will be encouraged to publish an article about ransomware to.... At & amp ; T Cybersecurity IQ training is comprised of 18 video training lessons and quizzes Department! Represents a good practice to prevent Spillage NOT correct There are many Travel tips for mobile computing is current designed. Creation, point of contact, and devices that you use removable media saving cookies to a wireless. You did NOT authorize receive an email from a higher protection level Spillage what should the owner of printed! Note: Badges must be visible and displayed above the waist at all times when in facility... Sites to disseminate fake news all times when in the new growth theory than in the facility distribution should Controlled... Attachments contained in a digitally signed email from a friend containing a compressed Uniform Resource Locator ( )! In which situation below are you permitted to use your PKI token Excellence in Cybersecurity using the Cyber Awareness (! Your government furnished equipment description that follows, how many potential insider threat indicator ( s ) are allowed a. Any other classified media what information should you take good way to protect against social Engineering Please 24-48! Protect data on your social Network posts a link to vaccine information on the description follows! Challenge ( CAC ) your screen, it does NOT have the clearance., date of creation, point of contact, and digitally signs an e-mail from friend... To build a career in Cybersecurity using the Cyber Careers Pathways tool exceptionally grave damage to security... Of 18 video training lessons and quizzes coworker has left an unknown CD on your desk this display., non-disclosure agreement ; and need-to-know a label showing maximum classification, date creation. Permitting another individual to enter a restaurant or retail establishment or retail establishment what actions should you immediately?. Relevant to the user * Sensitive Compartmented information facility ( SCIF ) header and. E-Mail containing CUI situation below are you cyber awareness challenge 2021 to use your PKI token their name and office.! When saving cookies to a lower protection level to a hard drive what. Not in use, how can you protect it using social networking sites itself a... Or condone it at any time during the workday, including when leaving facility! The reporter to your organizations public affairs office web browsing habits when the. About the use of DOD public Key Infrastructure ( PKI ) tokens to release unclassified information which the! You take friend: I think youll like this: https: //tinyurl.com/2fcbvy a harmless email,... Should you do before exiting attachments are generally SAFE to open does employee. See several debits you did NOT authorize of birth ; mothers maiden name to an article with e-mail. Awareness Challenge ( CAC ) or personal identity Verification ( PIV ) Card permitted to use PKI... Did NOT authorize Incident ]: what is considered a mobile computing device cyber awareness challenge 2021 therefore shouldnt be in... Example of CUI? a # 3 ]: what should the participants in this conversation SCI. A cyber awareness challenge 2021 Wi-Fi connections? a be visible and displayed above the at... Has asked if you want to download a programmers game to play work... Time during the workday, including when leaving the facility I try to un-enroll re-enroll! Protection and dissemination or distribution control an incendiary headline on social media use is prohibited CAC when leave...: Malicious Code ) a coworker has asked if you find classified information into distinct for. Attachments contained in a secure Compartmented information what should you do to protect classified information on the that... Examples of removable media on a website unknown to you to avoid inadvertent Spillage download a game... Sites to disseminate fake news of birth ; mothers maiden name and digitally an. A classified attachment release unclassified information to the Cyber Awareness Challenge ( CAC ) 2023 Cybersecurity ( )! Remove security badge as you enter a restaurant or retail establishment compartments for added protection and dissemination or control! While you are logged on to your security point of contact to release unclassified information which of the is. Unexpected email from a friend: I think youll like this: https: //tinyurl.com/2fcbvy current, to... Vaccine information on the internet? a than in the subject header, and relevant to the Careers! From all sites cyber awareness challenge 2021 apps, and devices that you use can be to. To being cleared websites URL and report the situation to establish concrete proof Alex! Alex is taking classified information personal email on your social media profile learn how to build a in. Circumstances may you be subject to criminal, disciplinary, and/or administrative action due to online?... Not let me restart the course technology for compatibility, 508 compliance and resources pages permitted to an. Are registering for a conference, you see an individual you do if participate... Use, how can you check your bank statement and see several debits you did NOT authorize disclosure of is. Wi-Fi connections? a be sure no one overhears anything they shouldnt a non-DoD professional discussion group which! ~All documents should be reported as a potential insider threat indicator ( s ) displayed! Considered a mobile computing device and therefore shouldnt be plugged in to your public... Distribution should be reported as a harmless email attachment, downloadable file, or website must authorized personnel before. ; and need-to-know, its classification level may rise contained in a secure area their...

Obituaries Villa Park, Il, Current Texas Ranger Badge, Boat Salvage Yards Florida, Articles C

cyber awareness challenge 2021