What information posted publicly on your personal social networking profile represents a security risk? ~All documents should be appropriately marked, regardless of format, sensitivity, or classification. Share sensitive information only on official, secure websites. Which of the following is true about unclassified data? Unauthorized Disclosure of Classified Information and Controlled Unclassified Information . CPCON 5 (Very Low: All Functions). Attempt to change the subject to something non-work related, but neither confirm nor deny the articles authenticity. As a security best practice, what should you do before exiting? NARA has the authority and responsibility to manage the CUI Program across the Federal government. (Correct) -It does not affect the safety of Government missions. **Insider Threat What type of activity or behavior should be reported as a potential insider threat? If you receive a phone call from a stranger asking for information about your invoice payment process, you should: Crucial information about a user or organization can be gained through. This answer has been confirmed as correct and helpful. Not correct correct. What should you do? Which of the following is true of sharing information in a Sensitive Compartmented Information Facility (SCIF)? Which method would be the BEST way to send this information? (removable media) If an incident occurs involving removable media in a Sensitive Compartmented Information Facility (SCIF), what action should you take? Executive Order 13526 Classified National Security Information, PersonallyIdentifiable Information (PII), Sensitive Personally Identifiable Information (SPII), Proprietary Business Information (PBI) or currently known within EPA as Confidential Business Information (CBI), Unclassified Controlled Technical Information (UCTI). The attributes of identified ground seeds are modified to ground points. What should be your response? Which of the following is true of the Common Access Card (CAC)? Based on the description that follows, how many potential insider threat indicator(s) are displayed? What is an indication that malicious code is running on your system? Store it in a locked desk drawer after working hours. Which of the following is a best practice to protect information about you and your organization on social networking sites and applications? Which of the following is a good practice to prevent spillage. Which of the following may help to prevent spillage? Do not forward, read further, or manipulate the file; Do not give out computer or network information, Do not follow instructions from unverified personnel. What information relates to the physical or mental health of an individual? Use only personal contact information when establishing personal social networking accounts, never use Government contact information. Which of the following personally-owned computer peripherals is permitted for use with Government-furnished equipment? Remove and take it with you whenever you leave your workstation. d. giving a spanking or a scolding. *Malicious Code After visiting a website on your Government device, a popup appears on your screen. That trust is bounded by the Oath of Office we took willingly. What should the participants in this conversation involving SCI do differently? be wary of suspicious e-mails that use your name and/or appear to come from inside your organization. Which of the following is an example of two-factor authentication? Which of the following is true of Unclassified information? Which of the following is true of Sensitive Compartmented Information (SCI)? (Sensitive Compartmented Information) Which of the following best describes the compromise of Sensitive Compartmented Information (SCI)? Teams. Which of the following is a concern when using your Government-issued laptop in public? Which of the following is true of Protected Health Information (PHI)? What is best practice while traveling with mobile computing devices? (Spillage) What should you do if a reporter asks you about potentially classified information on the web? Controlled Unclassified Information (CUI) is information that requires safeguarding or dissemination controls consistent with applicable laws, regulations, and Government-wide policies, but is not classified under Executive Order 13526 "Classified National Security Informat What are examples of CUI? Spillage occurs when information is spilled from a higher classification or protection level to a lower classification or protection level. When traveling or working away from your main location, what steps should you take to protect your devices and data? What should you do? Which of the following demonstrates proper protection of mobile devices? Remove your security badge, common access card (CAC), or personal identity verification (PIV) card. Write your password down on a device that only you access. In addition to offering an overview of cybersecurity best practices, the challenge also provides awareness of potential and common cyber threats. How many potential insider threat indicators does this employee display? Refer the vendor to the appropriate personnel. A colleague is playful and charming, consistently wins performance awards, and is occasionally aggressive in trying to access classified information. Which of the following demonstrates proper protection of mobile devices? What level of damage can the unauthorized disclosure of information classified as Top Secret reasonably be expected to cause? Which of the following is NOT an example of sensitive information? Darryl is managing a project that requires access to classified information. Correct. Understanding and using the available privacy settings. **Social Networking Your cousin posted a link to an article with an incendiary headline on social media. **Home Computer Security Which of the following is a best practice for securing your home computer? A measure of how much useful work each unit of input energy provides. Based on the description that follows how many potential insider threat indicators are displayed? Transmit classified information via fax machine only Not correct *Controlled Unclassified Information Which of the following is NOT an example of CUI? Some examplesyou may be familiar with: TheFederalCUI Registry,shows authorized categoriesandassociated markings, as well as applicable safeguarding, dissemination, and decontrol procedures. Only paper documents that are in open storage need to be marked. *Sensitive Compartmented Information Which of the following best describes the compromise of Sensitive Compartmented Information (SCI)? A type of phishing targeted at high-level personnel such as senior officials. Unusual interest in classified information. What structures visible in the stained preparation were invisible in the unstained preparation? You must have your organization's permission to telework c. You may use unauthorized software as long as your computer's antivirus software is up to date. Which of the following is true of the Common Access Card (CAC) or Personal Identity Verification (PIV) card? (Sensitive Compartmented Information) What portable electronic devices (PEDs) are allow in a Secure Compartmented Information Facility (SCIF)? classified-document. Executive Order 13556, Controlled Unclassified Information, requires the Executive Branch to establish an open and uniform program for managing [unclassified] information that requires safeguarding or dissemination controls pursuant to and consistent with laws, regulations, and Government-wide policies. The National Archives and Records Administration (NARA) was named the Executive Agent (EA) responsible for overseeing the CUI Program. Correct. ~All documents should be appropriately marked, regardless of format, sensitivity, or classification. You must have your organization's permission to telework. Which of the following is true of Security Classification Guides? You are having lunch at a local restaurant outside the installation, and you find a cd labeled favorite song. What security device is used in email to verify the identity of sender? Correct Question. They may wittingly or unwittingly use their authorized access to perform actions that result in the loss or degradation of resources or capabilities. Asked 8/5/2020 6:29:36 PM. Many apps and smart devices collect and share your personal information and contribute to your online identity. Use the classified network for all work, including unclassified work. Why might "insiders" be able to cause damage to their organizations more easily than others? *Spillage What should you do if you suspect spillage has occurred? There are no choices provides which make it hard to pick the untrue statement about unclassified data. **Social Engineering Which of the following is a way to protect against social engineering? Which of these is true of unclassified data? How many insider threat indicators does Alex demonstrate? What is NOT Personally Identifiable Information (PII)? Which of the following is NOT a typical result from running malicious code? Which of the following is NOT a good way to protect your identity? By Quizzma Team / Technology. A program that segregates various type of classified information into distinct compartments for added protection and dissemination for distribution control. Use a common password for all your system and application logons. Correct. While it may seem safer, you should NOT use a classified network for unclassified work. Which of the following should be reported as a potential security incident? Coworker making consistent statements indicative of hostility or anger toward the United States and its policies. What does Personally Identifiable information (PII) include? Store your Common Access Card (CAC) or Personal Identity Verification (PIV) card in a shielded sleeve ~Write your password down on a device that only you access (e.g., your smartphone) Change your password at least every 3 months Enable two-factor authentication whenever available, even for personal accounts. What is required for an individual to access classified data? **Insider Threat Based on the description that follows, how many potential insider threat indicator(s) are displayed? What is the basis for the handling and storage of classified data? **Classified Data Which of the following can an unauthorized disclosure of information classified as Confidential reasonably be expected to cause? A colleague complains about anxiety and exhaustion, makes coworkers uncomfortable by asking excessive questions about classified projects, and complains about the credit card bills that his wife runs up. Based on the description that follows, how many potential insider threat indicator (s) are displayed? (Correct)-It does not affect the safety of Government missions.-It never requires classification markings. What are some potential insider threat indicators? Log in for more information. What should you do? Which of the following is not considered a potential insider threat indicator? *Controlled Unclassified Information Which is a best practice for protecting Controlled Unclassified Information (CUI)? Software that installs itself without the users knowledge. What action should you take? Report the crime to local law enforcement. Who is responsible for information/data security? **Classified Data Which of the following is a good practice to protect classified information? Store it in a shielded sleeve to avoid chip cloning. *Spillage Which of the following actions is appropriate after finding classified information on the Internet? Which is NOT a way to protect removable media? Physically assess that everyone within listening distance is cleared and has a need-to-know for the information being discussed. Updated 8/5/2020 8:06:16 PM. Which of the following is a security best practice for protecting Personally Identifiable Information (PII)? How can you protect yourself from social engineering? You know this project is classified. **Removable Media in a SCIF What portable electronic devices (PEDs) are allowed in a Sensitive Compartmented Information Facility (SCIF)? What type of attack might this be? Information should be secured in a cabinet or container while not in use. Use the classified network for all work, including unclassified work. A colleague asks to leave a report containing protected health information (PHI) on his desk overnight so he can continue working on it the next day. It includes a threat of dire circumstances. When is it okay to charge a personal mobile device using government-furnished equipment (GFE)? *Spillage. Annual DoD Cyber Awareness Challenge Training, DOD Cyber Awareness Challenge 2019: Knowledge, DOD Cyber Awareness Challenge 2019 (DOD-IAA-V, Operations Management: Sustainability and Supply Chain Management, Elliot Aronson, Robin M. Akert, Samuel R. Sommers, Timothy D. Wilson, Anderson's Business Law and the Legal Environment, Comprehensive Volume, David Twomey, Marianne Jennings, Stephanie Greene. As long as the document is cleared for public release, you may share it outside of DoD. Look for a digital signature on the email. c. What similarities and differences are there between plant and animal cells? Memory sticks, flash drives, or external hard drives. It may be compromised as soon as you exit the plane. Which of the following is NOT a type of malicious code? CPCON 1 (Very High: Critical Functions) Even within a secure facility, dont assume open storage is permitted. Organizational Policy Not correct Which of the following does not constitute spillage. Report the crime to local law enforcement. Access requires a formal need-to-know determination issued by the Director of National Intelligence.? What should you consider when using a wireless keyboard with your home computer? The physical security of the device. All data transfers via the internet are not 100% secure and there might be some security vulnerabilities. Secure .gov websites use HTTPS Which is an untrue statement about unclassified data? What action should you take? **Social Networking Which of the following statements is true? Which of the following is NOT a security best practice when saving cookies to a hard drive? What is the best course of action? Which of the following definitions is true about disclosure of confidential information? Identification, encryption, and digital signature. which of the following is true about unclassified data. *Malicious Code What are some examples of malicious code? classified-document. Physical security of mobile phones carried overseas is not a major issue. How many potential insider threat indicators is Bob displaying? **Use of GFE Under what circumstances is it acceptable to use your Government-furnished computer to check personal e-mail and do other non-work-related activities? *Spillage You find information that you know to be classified on the Internet. Reviewing and configuring the available security features, including encryption. *Spillage What is a proper response if spillage occurs? Examples are: Patient names, Social Security numbers, Drivers license numbers, insurance details, and birth dates. correct.
Cream Color Paint Sherwin Williams,
The Ingredients By Jason Reynolds Text,
Are You An Optimist Or A Pessimist Quiz Printable,
Who Has Gary Muehlberger Dog Trapper,
Articles W
which of the following is true about unclassified data