(Spillage) What type of activity or behavior should be reported as a potential insider threat? Where. (Malicious Code) Which of the following is true of Internet hoaxes? Store it in a shielded sleeve to avoid chip cloning. Based on the description that follows, how many potential insider threat indicator(s) are displayed? You are working at your unclassified system and receive an email from a coworker containing a classified attachment. Proactively identify potential threats and formulate holistic mitigation responses. Which of the following is a practice that helps to protect you from identity theft? the following is true about unclassified data fy23 controlled unclassified information cui quizlet what is true of controlled unclassified information What. Executive Order 13556, Controlled Unclassified Information, requires the Executive Branch to establish an open and uniform program for managing [unclassified] information that requires safeguarding or dissemination controls pursuant to and consistent with laws, regulations, and Government-wide policies. The National Archives and Records Administration (NARA) was named the Executive Agent (EA) responsible for overseeing the CUI Program. Lock your device screen when not in use and require a password to reactivate. For programmatic questions regarding Controlled Unclassified Information (CUI), including any challenges to CUI marked by EPA, pleasecontact EPA's CUI Program Office. Which is it appropriate to have your security badge visible within a Sensitive Compartmented Information Facility (SCIF). You receive an inquiry from a reporter about government information not cleared for public release. *Sensitive Compartmented Information What is Sensitive Compartmented Information (SCI)? When teleworking, you should always use authorized and software. **Classified Data How should you protect a printed classified document when it is not in use? I may decide not to consent to these terms, but, if I do not consent to all of these terms, then I agree not to proceed with creating an account or moving forward with filling out the application, and I understand that I will not be . Which of the following best describes good physical security? A smartphone that transmits credit card payment information when held in proximity to a credit card reader. **Home Computer Security How can you protect your information when using wireless technology? Which of the following is true of Security Classification Guides? Try this test to determine if it's considered unclassified, classified or protected, and check out tips on what to do and what not to do when working with sensitive information. Which of the following is true about unclassified data? *Spillage What should you do if a reporter asks you about potentially classified information on the web? You are having lunch at a local restaurant outside the installation, and you find a cd labeled favorite song. Always take your CAC when you leave your workstation. If aggregated, the information could become classified. P2P (Peer-to-Peer) software can do the following except: Allow attackers physical access to network assets. -TRUE What action is recommended when somebody calls you to inquire about your work environment or specific account information? Second, unclassified points are regarded as ground seeds if the distances between the points and the detected planes are less than a buffer difference threshold. Software that installs itself without the users knowledge. It does not require markings or distribution controls. Which of the following is true of transmitting Sensitive Compartmented Information (SCI)? You know that this project is classified. *Spillage Which of the following may help to prevent spillage? Of the following, which is NOT a problem or concern of an Internet hoax? A pop-up window that flashes and warns that your computer is infected with a virus. A type of phishing targeted at high-level personnel such as senior officials. *Spillage What should you do if you suspect spillage has occurred? Here you can find answers to the DoD Cyber Awareness Challenge. We recommend Norton Security or McAfee Total Protection. Which is a way to protect against phishing attacks? Which of the following includes Personally Identifiable Information (PII) and Protected Health Information (PHI)? Media containing Privacy Act information, PII, and PHI is not required to be labeled. Let us know if this was helpful. A Coworker has asked if you want to download a programmers game to play at work. **Removable Media in a SCIF What portable electronic devices (PEDs) are allowed in a Sensitive Compartmented Information Facility (SCIF)? Within a secure area, you see an individual you do not know. not correct. **Identity management Which is NOT a sufficient way to protect your identity? (controlled unclassified information) Which of the following is NOT correct way to protect CUI? What information most likely presents a security risk on your personal social networking profile? Only persons with appropriate clearance, a non-disclosure agreement, and need-to-know can access classified data. **Insider Threat Which type of behavior should you report as a potential insider threat? Correct. Unclassified documents do not need to be marked as a SCIF. There are no choices provides which make it hard to pick the untrue statement about unclassified data. A coworker has asked if you want to download a programmers game to play at work. *Spillage What is a proper response if spillage occurs? When unclassified data is aggregated, its classification level may rise. The annual Cyber Awareness Challenge is a course that helps authorized users learn how to best avoid and reduce threats and vulnerabilities in an organizations system. Exceptionally grave damage to national security. CPCON 1 (Very High: Critical Functions) **Social Networking When is the safest time to post details of your vacation activities on your social networking website? What should you consider when using a wireless keyboard with your home computer? ~All documents should be appropriately marked, regardless of format, sensitivity, or classification. Someone calls from an unknown number and says they are from IT and need some information about your computer. When may you be subject to criminal, disciplinary, and/or administrative action due to online harassment, bullying, stalking, hazing, discrimination, or retaliation? Unauthorized Disclosure of Classified Information for DoD, Security Awareness: Derivative Classification Answers, CITI Ethics, Responsible Conduct, RCR, Law, HTH And IRB Answers, EVERFI Achieve Consumer Financial Education Answers, Security Pro: Chapter 3 (3.1.8) & 4.1 Security Policies Answers, CITI Module #3 Research in Public Elementary and Secondary Schools, Answers to CTS Unit 7 Lab 7-2: Protocols and Services SNMP, Google Analytics Individual Qualification Exam Answers, Everfi Module 4 Credit Scores Quiz Answers, Which Of The Following Is Not Considered A Potential Insider Threat Indicator. What should be done if you find classified Government Data/Information Not Cleared for Public Release on the Internet? What does Personally Identifiable information (PII) include? When your vacation is over, after you have returned home. On a NIPRNet system while using it for a PKI-required task, Something you possess, like a CAC, and something you know, like a PIN or password. You must have your organization's permission to telework. Note any identifying information, such as the websites URL, and report the situation to your security POC. *Controlled Unclassified Information Which is a best practice for protecting Controlled Unclassified Information (CUI)? It displays a label showing maximum classification, date of creation, point of contact, and Change Management 9CM) Control Number. Only friends should see all biographical data such as where Alex lives and works. Use a single, complex password for your system and application logons. When classified data is not in use, how can you protect it? Which of the following is a best practice to protect information about you and your organization on social networking sites and applications? What should be your response? What should Sara do when publicly available Internet, such as hotel Wi-Fi? What is a rule for removable media, other portable electronic devices (PEDs), and mobile computing devices to protect Government systems? b. taking away a toy or treat **Home Computer Security Which of the following is a best practice for securing your home computer? (Spillage) Which type of information could reasonably be expected to cause serious damage to national security if disclosed without authorization? A colleague often makes others uneasy with her persistent efforts to obtain information about classified project where she has no need-to-know, is vocal about her husband overspending on credit cards, and complains about anxiety and exhaustion. How can you protect yourself on social networking sites? You check your bank statement and see several debits you did not authorize. Which of the following is NOT an appropriate way to protect against inadvertent spillage? Phishing can be an email with a hyperlink as bait. Follow procedures for transferring data to and from outside agency and non-Government networks. *Classified Data Which of the following is NOT a potential insider threat? How should you protect a printed classified document when it is not in use? Matt Monroe, a 20-year U. S. Air Force veteran and current operations manager at Omnistruct, explains the breakdown, "There are four classified information categories in the military based on the severity of damage that the information's release would cause. How should you respond? What is a best practice for protecting controlled unclassified information (CUI)? A compromise of Sensitive Compartmented Information (SCI) occurs when a person who does not have the required clearance or access caveats comes into possession of SCI_________.??? How many potential insider threat indicators is Bob displaying? This task is performed with the aim of finding similarities in data points and grouping similar data points together. internet. (Sensitive Information) What guidance is available from marking Sensitive Information information (SCI)? *Sensitive Information Which of the following is an example of Protected Health Information (PHI)? Which of the following is not considered a potential insider threat indicator? Which of the following may help to prevent inadvertent spillage? You must have your organization's permission to telework c. You may use unauthorized software as long as your computer's antivirus software is up to date. How should you protect your Common Access Card (CAC) or Personal Identity Verification (PIV) card? View email in plain text and dont view email in Preview Pane. How many indicators does this employee display? (Spillage) What advantages do insider threats have over others that allows them to cause damage to their organizations more easily? Keep your operating system and software up to date: This will help patch any security vulnerabilities in your software. Secure it to the same level as Government-issued systems. Which of the following is NOT a correct way to protect sensitive information? Ensure that any cameras, microphones, and Wi-Fi embedded in the laptop are physically disabled.- Correct. Which of the following is a good practice to protect classified information? Classified information that should be unclassified and is downgraded. A trusted friend in your social network posts a link to vaccine information on a website unknown to you. **Social Networking Which of the following information is a security risk when posted publicly on your social networking profile? Which of the following best describes the sources that contribute to your online identity. CUI was established to standardize the way the Executive branch handles sensitive information that requires dissemination controls. Found a mistake? *Insider Threat Which of the following is a reportable insider threat activity? Which of the following is true about telework? It never requires classified markings, it is true about unclassified data. -It never requires classification markings. Log in for more information. After work hours, storing sensitive information in unlocked containers, desks, or cabinets if security is not present. Understanding and using the available privacy settings. You are reviewing your employees annual self evaluation. Executive Order 13526 Classified National Security Information, PersonallyIdentifiable Information (PII), Sensitive Personally Identifiable Information (SPII), Proprietary Business Information (PBI) or currently known within EPA as Confidential Business Information (CBI), Unclassified Controlled Technical Information (UCTI). Connect and share knowledge within a single location that is structured and easy to search. What is a way to prevent the download of viruses and other malicious code when checking your e-mail? The website requires a credit card for registration. Which of the following is NOT Government computer misuse? *Sensitive Compartmented Information When is it appropriate to have your security badge visible? (Identity Management) What certificates are contained on the Common Access Card (CAC)? Antihistamines are used to treat the symptoms, such as sneezing, that are due to inflammation caused by irritants in the airways. true-statement. **Social Engineering What is TRUE of a phishing attack? Position your monitor so that it is not facing others or easily observed by others when in use Correct. What should the owner of this printed SCI do differently? You may use your personal computer as long as it is in a secure area in your home b. **Social Networking When may you be subject to criminal, disciplinary, and/or administrative action due to online misconduct? Click on "Open File". *Spillage You find information that you know to be classified on the Internet. Only allow mobile code to run from your organization or your organizations trusted sites. All to Friends Only. Malicious code can do the following except? Which type of information includes personal, payroll, medical, and operational information? cyber-awareness. What is considered a mobile computing device and therefore shouldnt be plugged in to your Government computer? (2) War planning documents which contain worldwide -- (a) Planning data and assumptions, (b) Wartime planning factors for the use of nuclear weapons, (c) Intelligence estimates of enemy capabilities, (d) Force composition and development, and What amount is due if Alexa pays on or betwee n April 222222 and May 666? Classified DVD distribution should be controlled just like any other classified media. **Use of GFE Under what circumstances is it acceptable to use your Government-furnished computer to check personal e-mail and do other non-work-related activities? The website requires a credit card for registration. Individuals must avoid referencing derivatively classified reports classified higher than the recipient.??? Question. *Sensitive Information What type of unclassified material should always be marked with a special handling caveat? What should you do if someone forgets their access badge (physical access)? Call your security point of contact immediately. correct. (social networking) When is the safest time to post details of your vacation activities on your social networking profile? Which of the following is a good practice for telework? Bob, a coworker, has been going through a divorce, has financial difficulties and is displaying hostile behavior. **Website Use Which of the following statements is true of cookies? February 8, 2022. *Sensitive Compartmented Information When faxing Sensitive Compartmented Information (SCI), what actions should you take? *Sensitive Compartmented Information When should documents be marked within a Sensitive Compartmented Information Facility (SCIF). Which of the following is true of telework? A Common Access Card and Personal Identification Number. Cyber Awareness Challenge Knowledge Check 2023 Answers, Cyber Awareness Challenge 2022 Knowledge Check Answers. correct. Make note of any identifying information and the website URL and report it to your security office. Your password and a code you receive via text message. Never write down the PIN for your CAC. Which of the following is NOT sensitive information? Correct. **Classified Data When classified data is not in use, how can you protect it? What certificates are contained on the Common Access Card (CAC)? What should be done to sensitive data on laptops and other mobile computing devices? Which of the following is NOT a typical means for spreading malicious code? A coworker removes sensitive information without approval. A medium secure password has at least 15 characters and one of the following. Retrieve classified documents promptly from printers. 1.1.3 Insider Threat. Please click here to see any active alerts. Briefly describe what you have learned. 10-3 X-ray Interaction with Matter, Fundamentals of Engineering Economic Analysis, David Besanko, Mark Shanley, Scott Schaefer. Maybe **Identity management Which of the following is an example of a strong password? Always check to make sure you are using the correct network for the level of data. Which of the following is NOT a typical result from running malicious code? DoD Unclassified data: Must be cleared before being released to the public May require applci aton i of Controled l Uncasl sed Iifi nformaton i (CU)I access and distribution controls Must be clearly marked as Unclassified or CUI if included in a classified document or classified storage area you don't need to do anything special to protect this information Set hasDigit to true if the 3-character passCode contains a digit, Critical, Essential, and Support Functions. **Classified Data What level of damage can the unauthorized disclosure of information classified as Confidential reasonably be expected to cause? When traveling or working away from your main location, what steps should you take to protect your devices and data? Which of the following is true of protecting classified data? Correct. How do you think antihistamines might work? Which piece of information is safest to include on your social media profile? Tell us about it through the REPORT button at the bottom of the page. You are logged on to your unclassified computer and just received an encrypted email from a co-worker. **Classified Data Which classification level is given to information that could reasonably be expected to cause serious damage to national security? **Classified Data Which of the following can an unauthorized disclosure of information classified as Confidential reasonably be expected to cause? **Use of GFE When can you check personal e-mail on your Government-furnished equipment (GFE)? tell your colleague that it needs to be secured in a cabinet or container. How can you protect yourself from social engineering? Reviewing and configuring the available security features, including encryption. (Malicious Code) What are some examples of malicious code? Which of the following is true of sharing information in a Sensitive Compartmented Information Facility (SCIF)? Keeping a database from being accessed by unauthorized visitors C. Restricting a subject at a lower classification level from accessing data at a higher classification level D. Preventing an . **Social Networking Which of the following best describes the sources that contribute to your online identity? Which of the following is an example of punishment by application? Back up your data: This will help you recover your data if it's lost or corrupted. They may wittingly or unwittingly use their authorized access to perform actions that result in the loss or degradation of resources or capabilities. Decline to let the person in and redirect her to security. What action should you take? *Spillage .What should you do if a reporter asks you about potentially classified information on the web? Use only your personal contact information when establishing your account. Which of the following attacks target high ranking officials and executives? *Spillage Which of the following actions is appropriate after finding classified information on the Internet? Which of the following best describes a way to safely transmit Controlled Unclassified Information (CUI)? Maria is at home shopping for shoes on Amazon.com. You have reached the office door to exit your controlled area. Which of the following is an example of malicious code? Follow procedures for transferring data to and from outside agency and non-Government networks. Which of the following is a best practice for physical security? As part of the survey the caller asks for birth date and address. **Social Engineering Which of the following is a way to protect against social engineering? Don't talk about work outside your workspace unless it is a specifically designated public meeting environment and is controlled by the event planners. Which of the following individuals can access classified data? What actions should you take prior to leaving the work environment and going to lunch? *Sensitive Information Which of the following is the best example of Personally Identifiable Information (PII)? Connect to the Government Virtual Private Network (VPN). It is permissible to release unclassified information to the public prior to being cleared. **Insider Threat Which of the following should be reported as a potential security incident (in accordance with you Agencys insider threat policy)? Updated 8/5/2020 8:06:16 PM. Directing you to a website that looks real. **Social Networking When is the safest time to post details of your vacation activities on your social networking profile? What should be your response? ~A coworker brings a personal electronic device into a prohibited area. What information most likely presents a security risk on your personal social networking profile? When would be a good time to post your vacation location and dates on your social networking website? It includes a threat of dire circumstances. Which of the following statements is TRUE about the use of DoD Public Key Infrastructure (PKI) tokens? It may expose the connected device to malware. Contact the IRS using their publicly available, official contact information. They can become an attack vector to other devices on your home network. Which designation marks information that does not have potential to damage national security? You can't have 1.9 children in a family (despite what the census might say ). What would you do if you receive a game application request on your government computer that includes permission to access your friends, profile information, cookies, and sites visited? (Sensitive Information) What must the dissemination of information regarding intelligence sources, methods, or activities follow? What action should you take? It never requires classification markings, is true about unclassified data. What is the best choice to describe what has occurred? *Controlled Unclassified Information Which of the following best describes a way to safely transmit Controlled Unclassified Information (CUI)? *Spillage What should you do when you are working on an unclassified system and receive an email with a classified attachment? Coworker making consistent statements indicative of hostility or anger toward the United States in its policies. Paul verifies that the information is CUI, includes a CUI marking in the subject header and digitally signs an e-mail containing CUI. Course Introduction Introduction . What is the best choice to describe what has occurred? *Controlled Unclassified Information Which of the following is NOT a correct way to protect CUI? (Travel) Which of the following is a concern when using your Government-issued laptop in public? If aggregated, the classification of the information may not be changed. After you have returned home following the vacation. Should you always label your removable media? Sensitive information may be stored on any password-protected system. What should you do? Digitally signed e-mails are more secure. **Social Networking What should you do if you receive a game application request that includes permission to access your friends, profile information, cookies, and sites visited? An official website of the United States government. Correct Controlled unclassified information. Transmit classified information via fax machine only Not correct data. Only paper documents that are in open storage need to be marked. Store it in a locked desk drawer after working hours. what should you do? which of the following is true about unclassified data. Which may be a security issue with compressed urls? -It never requires classification markings. Which of the following is a good practice to avoid email viruses? PII includes, but is not limited to, social security numbers, date and places of birth, mothers maiden names, biometric records, and PHI. A colleague complains about anxiety and exhaustion, makes coworkers uncomfortable by asking excessive questions about classified projects, and complains about the credit card bills that his wife runs up. If you participate in or condone it at any time. Which of the following personally-owned computer peripherals is permitted for use with Government-furnished equipment? correct. (Mobile Devices) Which of the following statements is true? Do not access website links, buttons, or graphics in e-mail. Controlled Unclassified Information (CUI) is informationthat requires safeguarding or dissemination controls consistent with applicable laws, regulations, and Government-wide policies, but is not classified under Executive Order 13526 "Classified National Security Informat What are examples of CUI? **Use of GFE What is a critical consideration on using cloud-based file sharing and storage applications on your Government-furnished equipment (GFE)?

Lucille Mcnair New House, What Is The Difference Between Jehovah Rophe And Jehovah Rapha, El Jefe Drink Pappasito's Recipe, Q Bomb Box 15 Ported Specs, Snow Evelyn Robin Juliet Gibb Claire Yang, Articles W