Honopu Beach Tour, What Is Nick Montana Doing Now, Can A Wasp Live Without Its Abdomen, Sonic 3 Air Gamejolt, County College Of Morris Baseball Coach, Articles W

(Sensitive Information) What guidance is available from marking Sensitive Information information (SCI)? How many indicators does this employee display? Research the source to evaluate its credibility and reliability. What level of damage to national security could reasonably be expected if unauthorized disclosure of Top Secret information occurred? What are some potential insider threat indicators? However, unclassified data. (Travel) Which of the following is a concern when using your Government-issued laptop in public? Original classification authority Correct. Ive tried all the answers and it still tells me off. (social networking) When is the safest time to post details of your vacation activities on your social networking profile? **Social Engineering Which is a best practice that can prevent viruses and other malicious code from being downloaded when checking your e-mail? Which of the following is not Controlled Unclassified Information (CUI)? How do you respond? *Spillage .What should you do if a reporter asks you about potentially classified information on the web? Which of the following can an unauthorized disclosure of information classified as Confidential reasonably be expected to cause? Note any identifying information and the websites URL. *Spillage Which of the following may help prevent inadvertent spillage? Which Of The Following Is Not A Correct Way To Protect CUI. Solved QUESTION 1 The business impact analysis (BIA) - Chegg Government-owned PEDs, if expressly authorized by your agency. What is NOT Personally Identifiable Information (PII)? T/F. Ctrl+F (Cmd+F) will help you a lot when searching through such a large set of questions. Sanitized information gathered from personnel records. You know this project is classified. Which of the following individuals can access classified data? Classified information is defined in PL 96-456, the Classified Information Procedures Act: What should you do after you have ended a call from a reporter asking you to confirm potentially classified information found on the web? CPCON 5 (Very Low: All Functions). Which of the following is NOT Government computer misuse? Which Of The Following Statements About Adding Social Networks To Hootsuite Is False? Carrying his Social Security Card with him, DoD employees are prohibited from using a DoD CAC in card-reader-enabled public device, Assigned a classification level by a supervisor. Always check to make sure you are using the correct network for the level of data. (2) War planning documents which contain worldwide -- (a) Planning data and assumptions, (b) Wartime planning factors for the use of nuclear weapons, (c) Intelligence estimates of enemy capabilities, (d) Force composition and development, and What is the best example of Protected Health Information (PHI)? A type of phishing targeted at senior officials. Unclassified documents do not need to be marked as a SCIF. Unclassified information is a threat to national security. Controlled Unclassified Information (CUI) Program Frequently Asked Official websites use .gov Linda encrypts all of the sensitive data on her government-issued mobile devices. In unsupervised machine learning, clustering is the most common process used to identify and group similar entities or items together. Adversaries exploit social networking sites to disseminate fake news Correct. How many potential insider threat indicators is Bob displaying? Which of the following does not constitute spillage. *Sensitive Compartmented Information What should the participants in this conversation involving SCI do differently? A compromise of Sensitive Compartmented Information (SCI) occurs when a person who does not have the required clearance or access caveats comes into possession of SCI_________.??? *Sensitive Information Which of the following is the best example of Personally Identifiable Information (PII)? How many potential insider threat indicators does this employee display? It may be compromised as soon as you exit the plane. What function do Insider Threat Programs aim to fulfill? Attempting to access sensitive information without need-to-know, Avoid talking about work outside of the workplace or with people without a need-to-know, Report the suspicious behavior in accordance with their organizations insider threat policy. (Insider Threat) Based on the description that follows, how many potential insider threat indicator(s) are displayed? While it may seem safer, you should NOT use a classified network for unclassified work. CUI is not classified information. A person who does not have the required clearance or assess caveats comes into possession of SCI in any manner. Federal agencies routinely generate, use, store, and share information that, while not classified, still requires some level of protection from unauthorized access and release. How many potential insiders threat indicators does this employee display? Which is NOT a way to protect removable media? Maintain possession of your laptop and other government-furnished equipment (GFE) at all times. Ensure proper labeling by appropriately marking all classified material. SSN, date and place of birth, mothers maiden name, biometric records, PHI, passport number, Subset of PII, health information that identifies the individual, relates to physical or mental health of an individual, provision of health care to an individual, or payment of healthcare for individual. PII includes, but is not limited to, social security numbers, date and places of birth, mothers maiden names, biometric records, and PHI. Not correct. a. New interest in learning another language? Make note of any identifying information and the website URL and report it to your security office. Do not use any personally owned/non-organizational removable media on your organizations systems. Select the information on the data sheet that is personally identifiable information (PII). (Sensitive Compartmented Information) What portable electronic devices (PEDs) are allow in a Secure Compartmented Information Facility (SCIF)? Sensitive information may be stored on any password-protected system. Unusual interest in classified information. Always use DoD PKI tokens within their designated classification level. Appropriate clearance; signed and approved non-disclosure agreement; and need-to-know. Which of the following is an example of punishment by application? What security device is used in email to verify the identity of sender? The website requires a credit card for registration. Maintain visual or physical control of the device. When unclassified data is aggregated, its classification level may rise. When your vacation is over, and you have returned home. -It must be released to the public immediately. *Insider Threat Which of the following is a reportable insider threat activity? *Spillage You find information that you know to be classified on the Internet. Unusual interest in classified information. Remove your security badge after leaving your controlled area or office building. Write your password down on a device that only you access. After you have returned home following the vacation. Question. As long as the document is cleared for public release, you may release it outside of DoD. After reading an online story about a new security project being developed on the military installation where you work, your neighbor asks you to comment about the article. What action should you take? cyber. -Its classification level may rise when aggregated. How do you think antihistamines might work? which of the following is true about unclassified Courses 442 View detail Preview site All https sites are legitimate. Looking for https in the URL. Prudence faxes CUI using an Unclassified cover sheet via a Secret fax machine. correct. Which of the following is NOT true concerning a computer labeled SECRET? Spillage can be either inadvertent or intentional. Organizational Policy Not correct They may be used to mask malicious intent. Which designation includes Personally Identifiable Information (PII) and Protected Health Information (PHI)? Not correct. Accepting the default privacy settings. Which of the following is a proper way to secure your CAC/PIV? **Identity management Which of the following is an example of two-factor authentication? Linda encrypts all of the sensitive data on her government-issued mobile devices. What should you do? How many insider threat indicators does Alex demonstrate? Using webmail may bypass built in security features. Refer the vendor to the appropriate personnel. What are the requirements to be granted access to sensitive compartmented information (SCI)? Store it in a locked desk drawer after working hours. 1.1.4 Social Networking. It displays a label showing maximum classification, date of creation, point of contact, and Change Management 9CM) Control Number. In addition to offering an overview of cybersecurity best practices, the challenge also provides awareness of potential and common cyber threats. You receive an inquiry from a reporter about potentially classified information on the internet. When is it appropriate to have your security badge visible? What should you do? Use a common password for all your system and application logons. Let us have a look at your work and suggest how to improve it! A trusted friend in your social network posts a link to vaccine information on a website unknown to you. Which of the following is true of downloading apps? A colleague abruptly becomes hostile and unpleasant after previously enjoying positive working relationships with peers, purchases an unusually expensive new car, and has unexplained absences from work. Which of the following actions is appropriate after finding classified Government information on the internet? How should you protect a printed classified document when it is not in use? Which of the following best describes good physical security? Store it in a General Services Administration (GSA)-approved vault or container. What should you do? Course Introduction Introduction . Which of the following statements is true? -Classified information that should be unclassified and is downgraded. true-statement. Third, the neighbor ground points of an unclassified point are searched from multiple subspaces. Proactively identify potential threats and formulate holistic mitigation responses. not correct. PDF Unauthorized Disclosure of Classified Information and Controlled - CDSE You are reviewing your employees annual self evaluation. What should you do to protect classified data? **Home Computer Security How can you protect your information when using wireless technology? -Ask them to verify their name and office number How do you respond? Social Security Number, date and place of birth, mothers maiden name. What amount is due if Alexa pays on or betwee n April 222222 and May 666? Sensitive information. Which of the following practices reduces the chance of becoming a target by adversaries seeking insider information? A **Social Networking When may you be subject to criminal, disciplinary, and/or administrative action due to online misconduct? Classified DVD distribution should be controlled just like any other classified media. Your DoD Common Access Card (CAC) has a Public Key Infrastructure (PKI) token approves for access to the NIPRNET. Should you always label your removable media? Which of the following is a potential insider threat indicator? *Classified Data ! (A type of phishing targeted at senior officials) Which is still your FAT A$$ MOTHER! Contact the IRS using their publicly available, official contact information. What should you do? Upon connecting your Government-issued laptop to a public wireless connection, what should you immediately do? Classified data: (Scene) Which of the following is true about telework? Controlled Unclassified Information (CUI) is informationthat requires safeguarding or dissemination controls consistent with applicable laws, regulations, and Government-wide policies, but is not classified under Executive Order 13526 "Classified National Security Informat What are examples of CUI? Phishing can be an email with a hyperlink as bait. (Sensitive Compartmented Information) What describes how Sensitive Compartmented Information is marked? (Spillage) What should you do if a reporter asks you about potentially classified information on the web? Transmit classified information via fax machine only Not correct Which of the following is a best practice to protect information about you and your organization on social networking sites and applications? Cyber Awareness 2020 Knowledge Check Flashcards | Quizlet Classification markings and handling caveats. A 3%3\%3% penalty is charged for payment after 303030 days. After you have returned home following the vacation. It is getting late on Friday. 870 Summit Park Avenue Auburn Hills, MI 48057. You must possess security clearance eligibility to telework. Which of the following is a best practice to protect information about you and your organization on social networking sites and applications? **Insider Threat Which of the following is NOT considered a potential insider threat indicator? **Classified Data When classified data is not in use, how can you protect it? Unclassified Information Student Guide . UNCLASSIFIED is a designation to mark information that does not have potential to damage national security. Secure .gov websites use HTTPS Be aware of classification markings and all handling caveats. Which of the following is true of Unclassified Information? -Its classification level may rise when aggregated. Which is an untrue statement about unclassified data? - Getvoice.org Right-click the link and select the option to preview??? What information relates to the physical or mental health of an individual? **Insider Threat Which scenario might indicate a reportable insider threat? This answer has been confirmed as correct and helpful. You know this project is classified. ~All documents should be appropriately marked, regardless of format, sensitivity, or classification. **Classified Data Which of the following is a good practice to protect classified information? **Social Engineering What action should you take with an e-mail from a friend containing a compressed Uniform Resource Locator (URL)? Log in for more information. Correct. What should be your response? -TRUE What action is recommended when somebody calls you to inquire about your work environment or specific account information? John submits CUI to his organizations security office to transmit it on his behalf. Create separate user accounts with strong individual passwords. ?Access requires Top Secret clearance and indoctrination into SCI program.??? Malicious code can do the following except? Which of the following is NOT a good way to protect your identity? Which of the following is not considered an example of data hiding? Let us know if this was helpful. A colleague is playful and charming, consistently wins performance awards, and is occasionally aggressive in trying to access classified information. Which of the following is NOT a potential insider threat? Which of the following actions can help to protect your identity? (Spillage) What advantages do insider threats have over others that allows them to cause damage to their organizations more easily? If classified information were released, which classification level would result in Exceptionally grave damage to national security? Looking at your MOTHER, and screaming THERE SHE BLOWS! How Do I Answer The CISSP Exam Questions? (Malicious Code) Upon connecting your Government-issued laptop to a public wireless connection, what should you immediately do? Always check to make sure you are using the correct network for the level of data. data. Controlled Unclassified Information (CUI) and Covered Defense As a security best practice, what should you do before exiting? What type of activity or behavior should be reported as a potential insider threat? Spillage because classified data was moved to a lower classification level system without authorization. 1.1.3 Insider Threat. What should be your response? (Malicious Code) Which email attachments are generally SAFE to open? A measure of how much useful work each unit of input energy provides. Which of the following is NOT a social engineering tip? A lock (LockA locked padlock) or https:// means youve safely connected to the .gov website. Within a secure area, you see an individual you do not know. What should you do? Ensure there are no identifiable landmarks visible in any photos taken in a work setting that you post. Physically assess that everyone within listening distance is cleared and has a need-to-know for the information being discussed. Controlled Unclassified Information (CUI) is information that requires safeguarding or dissemination controls pursuant to and consistent with applicable law, regulations, and government-wide policies but is not classified under Executive Order 13526 or the Atomic Energy Act, as amended. Which is an untrue statement about unclassified data? Correct. Everything you need to know aboutControlled UnclassifiedInformation(CUI). What should you do? What should be done to protect against insider threats? *Sensitive Information What is the best example of Personally Identifiable Information (PII)? Correct. Managing government information when working remotely You receive an unexpected email from a friend: "I think you'll like this: (URL)" What action should you take? What should you do if a reporter asks you about potentially classified information on the web? Cyber Awareness Challenge Complete Questions and Answers Public service, notably service in the United States Department of Defense or DoD, is a public trust. Exceptionally grave damage. which of the following is true about unclassified data - Soetrust CPCON 4 (Low: All Functions) *Spillage After reading an online story about a new security project being developed on the military installation where you work, your neighbor asks you to comment about the article. Examples are: Patient names, Social Security numbers, Drivers license numbers, insurance details, and birth dates.