Refer the reporter to your organizations public affairs office. You may use your personal computer as long as it is in a secure area in your home b. Refer the vendor to the appropriate personnel. A colleague has won 10 high-performance awards, can be playful and charming, is not currently in a relationship, and occasionally aggressive in trying to access sensitive information. Mark SCI documents appropriately and use an approved SCI fax machine. Organizational Policy Not correct What is a best practice to protect data on your mobile computing device? Alex demonstrates a lot of potential insider threat indicators. **Social Engineering Which may be a security issue with compressed Uniform Resource Locators (URLs)? P2P (Peer-to-Peer) software can do the following except: Allow attackers physical access to network assets. Have your permissions from your organization, follow your organization guideline, use authorized equipment and software, employ cyber security best practice, perform telework in dedicated when home. Which Of The Following Statements About Adding Social Networks To Hootsuite Is False? When is it appropriate to have your security badge visible? Which of the following may help to prevent spillage? Which of the following is NOT a requirement for telework? Use only personal contact information when establishing your personal account. Set hasDigit to true if the 3-character passCode contains a digit, Critical, Essential, and Support Functions. Who is responsible for information/data security? **Identity management What is the best way to protect your Common Access Card (CAC)? Correct. How can you protect your information when using wireless technology? Which of the following does not constitute spillage. You have reached the office door to exit your controlled area. After you have returned home following the vacation. Which of these is true of unclassified data?-It must be released to the public immediately.-Its classification level may rise when aggregated. **Identity Management Your DoD Common Access Card (CAC) has a Public Key Infrastructure (PKI) token approved for access to the NIPRNet. Controlled Unclassified Information (CUI) Program Frequently Asked At EPA, the CUI Program is housed in the Libraries and Accessibility Division (LAD) within the Office of Mission Supports (OMS), Office of Enterprise Information Programs (OEIP). tell your colleague that it needs to be secured in a cabinet or container. What should you do? (Malicious Code) What are some examples of malicious code? Which of the following is true of telework? How many potential insiders threat indicators does this employee display? Back up your data: This will help you recover your data if it's lost or corrupted. classified-document. I may decide not to consent to these terms, but, if I do not consent to all of these terms, then I agree not to proceed with creating an account or moving forward with filling out the application, and I understand that I will not be . Amendments to a variety of policy documents as well as others referencing Confidential Business Information (CBI) submissions or handling, Changes to paper and e-forms and instructions for their submission to EPA. Retrieve classified documents promptly from printers. Write your password down on a device that only you access. It displays a label showing maximum classification, date of creation, point of contact, and Change Management 9CM) Control Number. What is the best choice to describe what has occurred? -TRUE What action is recommended when somebody calls you to inquire about your work environment or specific account information? a. putting a child in time-out Seeker - Vacancy - Detail Overview Store classified data in a locked desk drawer when not in use Maybe CPCON 5 (Very Low: All Functions). DoD Cyber Awareness 2019 - Subjecto.com **Insider Threat Based on the description that follows, how many potential insider threat indicator(s) are displayed? After work hours, storing sensitive information in unlocked containers, desks, or cabinets if security is not present. What Exactly is CUI? (and How to Manage It) - Security Boulevard Which of the following makes Alexs personal information vulnerable to attacks by identity thieves? Which is a way to protect against phishing attacks? Mark SCI documents appropriately and use an approved SCI fax machine. Sensitive information. Teams. It is permissible to release unclassified information to the public prior to being cleared. d. giving a spanking or a scolding. The age of the driver may top the list of variables. It never requires classified markings, it is true about unclassified data. Which of the following statements is true? How should you protect your Common Access Card (CAC) or Personal Identity Verification (PIV) card? Information improperly moved from a higher protection level to a lower protection level. You can email your employees information to yourself so you can work on it this weekend and go home now. Upon connecting your Government-issued laptop to a public wireless connection, what should you immediately do? Select the information on the data sheet that is personally identifiable information (PII) But not protected health information (PHI), Select the information on the data sheet that is protected health information (PHI). It includes a threat of dire circumstances. -It never requires classification markings. Government-owned PEDs, if expressly authorized by your agency. This task is performed with the aim of finding similarities in data points and grouping similar data points together. **Removable Media in a SCIF What must users ensure when using removable media such as compact disk (CD)? Proactively identify potential threats and formulate holistic mitigation responses. Lock your device screen when not in use and require a password to reactivate. e. Why do Elodea and onion cells have more consistent shapes than human epithelial cells? What should you do? Follow procedures for transferring data to and from outside agency and non-Government networks. What type of attack might this be? Controlled Unclassified Information (CUI) is information that requires safeguarding or dissemination controls pursuant to and consistent with applicable law, regulations, and government-wide policies but is not classified under Executive Order 13526 or the Atomic Energy Act, as amended. **Insider Threat What do insiders with authorized access to information or information systems pose? An official website of the United States government. To determine premiums for automobile insurance, companies must have an understanding of the variables that affect whether a driver will have an accident. What actions should you take with a compressed Uniform Resource Locator (URL) on a website known to you? Sensitive information may be stored on any password-protected system. They can be part of a distributed denial-of-service (DDoS) attack. Based on the description that follows, how many potential insider threat indicator(s) are displayed? Unusual interest in classified information. Federal agencies routinely generate, use, store, and share information that, while not meeting the threshold for classification as national security or atomic energy information, requires some level of protection from unauthorized access and release. Being cognizant of classification markings and labeling practices are good strategies to avoid inadvertent spillage. What should you do? Unclassified is a security classification assigned to official information that does not warrant the assignment of Confidential, Secret, or Top Secret markings but which is not publicly-releasable without authorization. A colleague abruptly becomes hostile and unpleasant after previously enjoying positive working relationships with peers, purchases an unusually expensive car, and has unexplained absences from work. Setting weekly time for virus scan when you are not on the computer and it is powered off. You are working at your unclassified system and receive an email from a coworker containing a classified attachment. Use the classified network for all work, including unclassified work. The proper security clearance and indoctrination into the SCI program. ~All documents should be appropriately marked, regardless of format, sensitivity, or classification. If you participate in or condone it at any time. (Sensitive Information) Which of the following represents a good physical security practice? The website requires a credit card for registration. correct. Contents hide. You receive an email from the Internal Revenue Service (IRS) demanding immediate payment of back taxes of which you were not aware. Correct. 1.1.3 Insider Threat. (Insider Threat) A colleague vacations at the beach every year, is married and a father of four, his work quality is sometimes poor, and he is pleasant to work with. You know this project is classified. Which of the following is an example of two-factor authentication? Even within a secure facility, dont assume open storage is permitted. Since the URL does not start with https, do not provide you credit card information. In unsupervised machine learning, clustering is the most common process used to identify and group similar entities or items together. **Insider Threat Which scenario might indicate a reportable insider threat? Digitally signed e-mails are more secure. A When would be a good time to post your vacation location and dates on your social networking website? Identification, encryption, and digital signature. Which may be a security issue with compressed Uniform Resource Locators (URLs)? Which of the following is a proper way to secure your CAC/PIV? (Malicious Code) Which of the following is true of Internet hoaxes? You check your bank statement and see several debits you did not authorize. *Malicious Code What are some examples of malicious code? *Sensitive Information Which of the following is an example of Protected Health Information (PHI)? 1 Answer/Comment. Controlled Unclassified Information (CUI): Controlled Unclassified information was defined in the Executive Order 13556 as information held by or generated for the Federal Government that requires safeguarding or dissemination controls pursuant to and consistent with applicable law, regulations and government-wide policies that isn't classified Many apps and smart devices collect and share your personal information and contribute to your online identity. What should you do? Physically assess that everyone within listening distance is cleared and has a need-to-know for the information being discussed. Discrete data involves whole numbers (integers - like 1, 356, or 9) that can't be divided based on the nature of what they are. -Ask them to verify their name and office number A passenger in the Land Rover Freelander that T-boned the hatchback said the BMW had been driven out of the unclassified road towards Shipton-under-Wychwood 'like a bat out of hell' - giving . Cyber Awareness 2022 I Hate CBT's In which situation below are you permitted to use your PKI token? Let us know if this was helpful. How many insider threat indicators does Alex demonstrate? Photos of your pet Correct. Which of the following may help to prevent inadvertent spillage? -Its classification level may rise when aggregated. correct. What should you do if a reporter asks you about potentially classified information on the web? **Social Engineering Which of the following is a practice that helps to prevent the download of viruses and other malicious code when checking your email? Ctrl+F (Cmd+F) will help you a lot when searching through such a large set of questions. When using your government-issued laptop in public environments, with which of the following should you be concerned? asked in Internet by voice (265k points) internet. It never requires classification markings, is true about unclassified data. Log in for more information. Connect to the Government Virtual Private Network (VPN).?? Is it okay to run it? What should you do? Which of the following is true of Security Classification Guides? Antihistamines are used to treat the symptoms, such as sneezing, that are due to inflammation caused by irritants in the airways. Debra ensures not correct correct. NARA has the authority and responsibility to manage the CUI Program across the Federal government. When classified data is not in use, how can you protect it? What is the best response if you find classified government data on the internet? Directives issued by the Director of National Intelligence. When your vacation is over, and you have returned home. At all times while in the facility. What should be your response? **Social Engineering What is TRUE of a phishing attack? **Insider Threat Which type of behavior should you report as a potential insider threat? By Quizzma Team / Technology. Which of the following is true of sharing information in a Sensitive Compartmented Information Facility (SCIF)? It is releasable to the public without clearance. Follow the steps enlisted below to use WEKA for identifying real values and nominal attributes in the dataset. Under What Circumstances Could Unclassified? Before long she has also purchased shoes from several other websites. Unsupervised machine learning: Dealing with unknown data Your password and a code you receive via text message. They may wittingly or unwittingly use their authorized access to perform actions that result in the loss or degradation of resources or capabilities. Verify the identity of all individuals.??? *Spillage After reading an online story about a new security project being developed on the military installation where you work, your neighbor asks you to comment about the article. Correct. Which of the following is true of traveling overseas with a mobile phone. Which is NOT a way to protect removable media? T/F. If possible, set your browser preferences to prompt you each time a website wants to store a cookie. **Social Networking When is the safest time to post details of your vacation activities on your social networking website? A trusted friend in your social network posts a link to vaccine information on a website unknown to you. Click on "Open File". What is a security best practice to employ on your home computer? A 3%3\%3% penalty is charged for payment after 303030 days. It contains certificates for identification, encryption, and digital signature. 1.1.2 Classified Data. What is an individual's Personally Identifiable Information (PII) or Protected Health Information (PHI) considered? you don't need to do anything special to protect this information Classified Information can only be accessed by individuals with. When teleworking, you should always use authorized and software. A colleague saves money for an overseas vacation every year, is a . Controlled unclassified information. Only persons with appropriate clearance, a non-disclosure agreement, and need-to-know can access classified data. You are leaving the building where you work. *Sensitive Information Under which circumstances is it permitted to share an unclassified draft document with a non-DoD professional discussion group? Which of the following statements is TRUE about the use of DoD Public Key Infrastructure (PKI) tokens? Ensure proper labeling by appropriately marking all classified material and, when required, sensitive material. **Removable Media in a SCIF What action should you take when using removable media in a Sensitive Compartmented Information Facility (SCIF)? UNCLASSIFIED is a designation to mark information that does not have potential to damage national security. Which of the following is not considered an example of data hiding? Telework is only authorized for unclassified and confidential information. (Wrong). **Classified Data Which of the following must you do before using and unclassified laptop and peripherals in a collateral environment? As a security best practice, what should you do before exiting? Scan external files from only unverifiable sources before uploading to computer. Never allow sensitive data on non-Government-issued mobile devices. Store classified data appropriately in a GSA-approved vault/container when not in use. A coworker has asked if you want to download a programmer's game to play at work. Quizzma is a free online database of educational quizzes and test answers. What type of data must be handled and stored properly based on classification markings and handling caveats? ~All documents should be appropriately marked, regardless of format, sensitivity, or classification. Validate all friend requests through another source before confirming them. What should you do if someone forgets their access badge (physical access)? How can you protect yourself from social engineering? Label all files, removable media, and subject headers with appropriate classification markings. internet. Which of the following is a good practice to protect classified information? Use personal information to help create strong passwords. Use your own security badge, key code, or Common Access Card (CAC)/Personal Identity Verification (PIC) card. **Home Computer Security How can you protect your information when using wireless technology? (Malicious Code) Which of the following is NOT a way that malicious code spreads? A type of phishing targeted at high-level personnel such as senior officials. *Sensitive Compartmented Information What is Sensitive Compartmented Information (SCI)? Cyber Awareness 2022. Always use DoD PKI tokens within their designated classification level. Click the card to flip Flashcards Learn Test Match Created by Jamie_Lancaster Terms in this set (24) (Malicious Code) Which are examples of portable electronic devices (PEDs)? Q&A for work. **Classified Data Which of the following is true of protecting classified data? Use personally-owned wired headsets and microphones only in designated areas, New interest in learning a foreign language. How can you protect your organization on social networking sites? (controlled unclassified information) Which of the following is NOT an example of CUI? cyber-awareness. (Sensitive Information) What certificates are contained on the Common Access Card (CAC)? How many potential insider threat indicators does this employee display? Hostility or anger toward the United States and its policies. Which of the following statements is TRUE about the use of DoD Public Key Infrastructure (PKI) tokens? As part of the survey the caller asks for birth date and address. When can you check personal email on your government furnished equipment? (Spillage) When is the safest time to post details of your vacation activities on your social networking website? A man you do not know is trying to look at your Government-issued phone and has asked to use it. Make note of any identifying information and the website URL and report it to your security office. **Social Networking As someone who works with classified information, what should you do if you are contacted by a foreign national seeking information on a research project? Connect to the Government Virtual Private Network (VPN). 870 Summit Park Avenue Auburn Hills, MI 48057. 1.1.1 Spillage. In which situation below are you permitted to use your PKI token? Which of these is true of unclassified data? Which of the following is a best practice for handling cookies? Ensure proper labeling by appropriately marking all classified material and, when required, sensitive material. **Insider Threat Which of the following is NOT considered a potential insider threat indicator? We thoroughly check each answer to a question to provide you with the most correct answers. *Sensitive Compartmented Information What must the dissemination of information regarding intelligence sources, methods, or activities follow? Everything you need to know aboutControlled UnclassifiedInformation(CUI). 4. 1 Cyber Awareness Challenge 2023 Answers. No, you should only allow mobile code to run from your organization or your organizations trusted sites. Which of the following statements is NOT true about protecting your virtual identity? Which of the following is NOT considered sensitive information? What should you do? Use the government email system so you can encrypt the information and open the email on your government issued laptop. **Mobile Devices What can help to protect the data on your personal mobile device? When unclassified data is aggregated, its classification level may rise. Malicious code can do damage by corrupting files, erasing your hard drive, and/or allowing hackers access. A coworker brings a personal electronic device into prohibited areas. ~A coworker brings a personal electronic device into a prohibited area. The Chinese Spy Balloon Showdown The discovery of a Chinese surveillance balloon floating over the United States has added to the rising tensions between the two superpowers. Unusual interest in classified information. (Spillage) What should you do when you are working on an unclassified system and receive an email with a classified attachment? Always check to make sure you are using the correct network for the level of data. (Correct) -It does not affect the safety of Government missions. Let us have a look at your work and suggest how to improve it! Which of the following is NOT a correct way to protect sensitive information? It is not corporate intellectual property unless created for or included in requirements related to a government contract. Which of the following should you NOT do if you find classified information on the internet? Search for an answer or ask Weegy. CPCON 3 (Medium: Critical, Essential, and Support Functions) **Social Networking When may you be subject to criminal, disciplinary, and/or administrative action due to online misconduct? What is a rule for removable media, other portable electronic devices (PEDs), and mobile computing devices to protect Government systems? *Spillage. Unclassified documents do not need to be marked as a SCIF. Understanding Controls on Unclassified Government Information In addition to avoiding the temptation of greed to betray his country, what should Alex do differently? Delete email from senders you do not know. What information posted publicly on your personal social networking profile represents a security risk? Which of the following is NOT an appropriate way to protect against inadvertent spillage? Ive tried all the answers and it still tells me off. What is required for an individual to access classified data? A colleague enjoys playing video games online, regularly use social media, and frequently forgets to secure her smartphone elsewhere before entering areas where it is prohibited. **Classified Data Which type of information could reasonably be expected to cause serious damage to national security if disclosed without authorization? Your comments are due on Monday. Secure it to the same level as Government-issued systems. Malicious code can mask itself as a harmless e-mail attachment, downloadable file, or website.
Itechworld 120ah Lithium Battery,
Asylum Records Contact,
Michigan Eviction Moratorium Extension 2021,
Articles W