A colleague has visited several foreign countries recently, has adequate work quality, speaks openly of unhappiness with U.S. foreign policy, and recently had his car repossessed. What must users do when using removable media within a Sensitive Compartmented Information Facility (SCIF)? A well-planned data classification system makes essential data easy to find and retrieve. -Look for a digital signature on the email. Call your security point of contact immediately. Data about you collected from all sites, apps, and devices that you use can be aggregated to form a profile of you. A coworker has left an unknown CD on your desk. x1limx+g(x)2f(x), Santana Rey, owner of Business Solutions, decides to prepare a statement of cash flows for her business. Her badge is not visible to you. 0000005321 00000 n 4 0 obj **Insider ThreatWhich of the following is NOT considered a potential insider threat indicator? Which is NOT a way to protect removable media? endobj Coworker making consistent statements indicative of hostility or anger toward the United States and its policies. *SpillageWhich of the following is a good practice to aid in preventing spillage? [ 13 0 R] Which type of behavior should you report as a potential threat?-Hostility or anger toward the United States and its policies. Be aware of classification markings and all handling caveats. endobj *Social EngineeringWhat is a common indicator of a phishing attempt? Protecting CUI . You do not have your government-issued laptop. *SpillageWhat should you do if you suspect spillage has occurred? <> Identification, encryption, digital signature. Which of the following should be reported as a potential security incident (in accordance with your Agency's insider threat policy)? **Social EngineeringWhat is TRUE of a phishing attack? - CUI is an umbrella term that encompasses many different markings to identify information that is not classified but which should be protected. -Sanitized information gathered from personnel records. 0000005958 00000 n Why might "insiders" be able to cause damage to their organizations more easily than others? What level of cyber protection does each of the following factors require? A type of phishing targeted at senior officials. -Make note of any identifying information and the website URL and report it to your security office. Appropriate clearance, a signed and approved non-disclosure agreement, and need-to-know. Lock your device screen when not in use and require a password to reactivate. Avoid using non-Bluetooth-paired or unencrypted wireless computer peripherals. Understanding and using the available privacy settings. -As a best practice, labeling all classified removable media and considering all unlabeled removable media as unclassified. **Mobile DevicesWhat should you do when going through an airport security checkpoint with a Government-issued mobile device? Don't allow her access into secure areas and report suspicious activity. New interest in learning a foreign language. Ensure that the wireless security features are properly configured. 6 0 obj -Senior government personnel, military or civilian. What does Personally Identifiable Information (PII) include? A coworker wants to send you a sensitive document to review while you are at lunch and you only have your personal tablet. Given that limx1f(x)=5\lim_{x\rightarrow1}f(x)=-5limx1f(x)=5 and limx1g(x)=4\lim_{x\rightarrow1}g(x)=4limx1g(x)=4, find the indicated limits. Which of the following is NOT Government computer misuse? Which is NOT a wireless security practice? In which situation below are you permitted to use your PKI token? endstream In which situation below are you permitted to use your PKI token? 322 0 obj <>stream Examples are: Patient names, Social Security numbers, Drivers license numbers, insurance details, and birth dates. **Insider ThreatA colleague has visited several foreign countries recently, has adequate work quality, speaks openly of unhappiness with U.S. foreign policy, and recently had his car repossessed. 0000011226 00000 n Appropriate clearance; signed and approved non-disclosure agreement; and need-to-know. It may expose the connected device to malware. Which of the following terms refers to someone who harms national security through authorized access to information system? An unsecured IoT device can become an attack vector to any other device on your home network, including your Government laptop, Cyber Awareness Challenge 2022 Knowledge Check, Summary of Earth until Geologic time scale, Cyber Awareness Challenge 2023 (Incomplete), Chemistry Edapt Unit 6 - Biological Polymers, Chemistry Edapt Unit 6 - Applications of Radi, Chemistry Edapt Unit 6 - Radioactive Isotopes, John David Jackson, Patricia Meglich, Robert Mathis, Sean Valentine, Elliot Aronson, Robin M. Akert, Samuel R. Sommers, Timothy D. Wilson, Operations Management: Sustainability and Supply Chain Management, Information Technology Project Management: Providing Measurable Organizational Value. \text{Net Sales}&&\underline{18,693}\\ Which of these is true of unclassified data? <> *Sensitive Compartmented InformationWhen should documents be marked within a Sensitive Compartmented Information Facility (SCIF), ~All documents should be appropriately marked, regardless of format, sensitivity, or classification.Unclassified documents do not need to be marked as a SCIF.Only paper documents that are in open storage need to be marked.Only documents that are classified Secret, Top Secret, or SCI require marking. What type of data must be handled and stored properly based on classification markings and handling caveats? (Wrong). When is it appropriate to have your security badge visible within a Sensitive Compartmented Information Facility (SCIF)? What are some potential insider threat indicators? Which of the following is an example of removable media? 0000001952 00000 n On a NIPRNet system while using it for a PKI-required task. *PHYSICAL SECURITY*Within a secure area, you see an individual who you do not know and is not wearing a visible badge. How many indicators does this employee display? What is required for an individual to access classified data? The CAC/PIV is a controlled item and contains certificates for: Classified Information can only be accessed by individuals with, -Assigned a classification level by a supervisor. *MALICIOUS CODE*Which of the following is NOT a way malicious code spreads? Dr. Stanisky was Ms. Jones psychiatrist for three months.Dr. Which of the following is NOT a best practice to preserve the authenticity of your identity? Classified material must be appropriately marked. **Removable Media in a SCIFWhat action should you take when using removable media in a Sensitive Compartmented Information Facility (SCIF)? A colleague complains about anxiety and exhaustion, makes coworkers uncomfortable by asking excessive questions about classified projects, and complain about the credit card bills that his wife runs up. -Potential Insider Threat It is getting late on Friday. -Validate all friend requests through another source before confirming them. Avoid using the same password between systems or applications. *SpillageWhich of the following actions is appropriate after finding classified information on the internet? \text{Cost of goods sold}&\$14,052\\ Store classified data appropriately in a GSA-approved vault/container when not in use. Classified material must be appropriately marked. Secure it to the same level as Government-issued systems. Ive tried all the answers and it still tells me off, part 2. Which of the following individuals can access classified data? What should be your response? *Home Computer SecurityWhich of the following is a best practice for securing your home computer?-Create separate accounts for each user. endobj What action is recommended when somebody calls you to inquire about your work environment or specific account information? *UNCONTROLLED CLASSIFIED INFORMATION*Which of the following is NOT an example of CUI? *Identity Management endobj <> A pop-up window that flashes and warns that your computer is infected with a virus. To protect CUI: Properly mark all CUI Of the following, which is NOT a problem or concern of an Internet hoax? Which classification level is given to information that could reasonably be expected to cause serious damage to national security? Any time you participate in or condone misconduct, whether offline or online. Reviewing and configuring the available security features, including encryption. CUI may be stored on any password-protected system. Your cousin posted a link to an article with an incendiary headline on social media. 0000006504 00000 n Upon connecting your Government-issued laptop to a public wireless connection, what should you immediately do? *Sensitive Compartmented InformationWhen is it appropriate to have your security badge visible? Since the URL does not start with "https," do not provide you credit card information. *SOCIAL NETWORKING*When is the safest time to post details of your vacation activities on your social networking profile? Completing your expense report for your government travel. What should you do? }&1,250\\ CUI may be stored on any password-protected system. A colleague is playful and charming, consistently wins performance awards, and is occasionally aggressive in trying to access classified information. *MOBILE DEVICES*Which of the following is an example of removable media? Of the following, which is NOT a problem or concern of an Internet hoax? <> When faxing Sensitive Compartmented Information (SCI), what actions should you take? **Classified DataWhich of the following is true of protecting classified data? Select the information on the data sheet that is personally identifiable information (PII) But not protected health information (PHI), Jane JonesSocial security number: 123-45-6789, Select the information on the data sheet that is protected health information (PHI). Decline So That You Maintain Physical Control of Your Government-Issued Laptop. Aw\cy{bMsJ7tG_7J-5kO~*"+eq7 ` (NO]89#>U_~_:EHwO+u+\[M\!\kKnR^{[%d'8[e#ch_~-F7en~`ZV6GOt? -Directing you to a web site that is real. Which of the following should be reported as a potential security incident? On a NIPRNET system while using it for a PKI-required task. Which of the following is a god practice to protect classified information?-Ensure proper labeling by appropriately marking all classified material and, when required, sensitive material. What can you do to protect yourself against phishing? Hostility and anger toward the United States and its policies. What is a valid response when identity theft occurs? Label all files, removable media, and subject headers with appropriate classification markings. ~A coworker brings a personal electronic device into a prohibited area. *TravelWhat security risk does a public Wi-Fi connection pose? *Insider Threat Which type of behavior should you report as a potential insider threat? Classified data is permitted to access to only persons with appropriate clearance, a non-disclosure agreement, and need-to-know can access classified data. DEPARTMENT OF DEFENSE ORGANIZATION questions with answers 2023. When leaving your work area, what is the first thing you should do? An individual who has attempted to access sensitive information without need-to-know and has made unusual requests for sensitive information is displaying indicators of what? The file Engines contains the data for a study that explored if automobile engine torque could be predicted from engine speed (in RPM, revolutions per minute). What is a possible indication of a malicious code attack in progress? **Insider ThreatWhich of the following is NOT considered a potential insider threat indicator? Unusual interest in classified information. *Social EngineeringWhat action should you take with an e-mail from a friend containing a compressed Uniform Resource Locator (URL)?-Investigate the links actual destination using the preview feature. 0000015315 00000 n Classified material is stored in a GSA-approved container when not in use. What should you do if an individual asks you to let her follow you into your controlled space, stating that she left her security badge at her desk? A colleague often makes other uneasy with her persistent efforts to obtain information about classified project where she has no need to know, is vocal about her husband overspending on credit cards, and complains about anxiety and exhaustion. *Spillage.What should you do if a reporter asks you about potentially classified information on the web? *Sensitive InformationWhat is the best example of Personally Identifiable Information (PII)? Darryl is managing a project that requires access to classified information. Do not access links or hyperlinked media such as buttons and graphics in email messages. -Scan external files from only unverifiable sources before uploading to computer. Your cousin posted a link to an article with an incendiary headline on Social media. What is a best practice to protect data on your mobile computing device? true traveling overseas mobile phone cyber awareness. Do not allow you Common Access Card (CAC) to be photocopied. **Insider ThreatWhat advantages do insider threats have over others that allows them to cause damage to their organizations more easily? Which organization issues the directives concerning the dissemination of information regarding intelligence sources, methods, or activities? Identify and disclose it with local Configuration/Change Management Control and Property Management authorities. *Social Engineering Which of the following is NOT considered a potential insider threat indicator? **Mobile DevicesWhich is a rule for removable media, other portable electronic devices (PEDs), and mobile computing devices to protect Government systems? *Sensitive InformationUnder which circumstances is it permitted to share an unclassified draft document with a non-DoD professional discussion group? What should you do if someone forgets their access badge (physical access)? Under which circumstances may you be subject to criminal, disciplinary, and/or administrative action due to online misconduct? You are reviewing your employees annual self evaluation. Which of the following is NOT a criterion used to grant an individual access to classified data? Any individual who falls to meet these requirements is not authorized to access classified information. The email provides a link to a personnel portal where you must enter your personal information as part of an effort to standardize recordkeeping. The following practices help prevent viruses and the downloading of malicious code except. Wq2m\T>]+6/U\CMOC(\eGLF:3~Td8`c>S^`0TBj8J@/*v;V,~){PfL"Ya)7uukjR;k2\R(9~4.Wk%L/~;|1 K\2Hl]\q+O_Zq[ykpSX.6$^= oS+E.S BH+-Ln(;aLXDx) What should you do? *Classified DataWhich of the following individuals can access classified data? 10 0 obj Physically assess that everyone within listening distance is cleared and has a need-to-know for the information being discussed, Mark SCI documents appropriately and use an approved SCI fax machine. What action should you take when using removable media in a Sensitive Compartmented Information Facility (SCIF)? **Social NetworkingWhich of the following best describes the sources that contribute to your online identity? How can you protect yourself from internet hoaxes? *SpillageA user writes down details marked as Secret from a report stored on a classified system and uses those details to draft a briefing on an unclassified system without authorization. 2 0 obj What threat do insiders with authorized access to information or information Systems pose?? **Social NetworkingWhich of the following is a security best practice when using social networking sites? Your health insurance explanation of benefits (EOB). What is NOT Personally Identifiable Information (PII)? You check your bank statement and see several debits you did not authorize. *Malicious CodeWhat are some examples of malicious code? ~All documents should be appropriately marked, regardless of format, sensitivity, or classification.Unclassified documents do not need to be marked as a SCIF.Only paper documents that are in open storage need to be marked. A user writes down details from a report stored on a classified system marked as Secret and uses those details to draft an unclassified briefing on an unclassified system without authorization. *SpillageWhat should you do when you are working on an unclassified system and receive an email with a classified attachment? @870zpVxh%X'pxI[r{+i#F1F3020d`_ if>}xp20Nj9: bL The popup asks if you want to run an application. What should you do? **Home Computer SecurityWhat should you consider when using a wireless keyboard with your home computer? Is it acceptable to take a short break while a coworker monitors your computer while logged on with your CAC? *SpillageWhich of the following does NOT constitute spillage?-Classified information that should be unclassified and is downgraded. Research the source of the article to evaluate its credibility and reliability. *Sensitive Compartmented InformationWhat is a Sensitive Compartmented Information (SCI) program? Recall that owner Santana Rey contributed $25,000 to the business in exchange for additional stock in the first quarter of 2018 and has received$4,800 in cash dividends. It may be compromised as soon as you exit the plane. Be aware of classification markings and all handling caveats. *SpillageAfter reading an online story about a new security project being developed on the military installation where you work, your neighbor asks you to comment about the article. 13 0 obj What information posted publicly on your personal social networking profile represents a security risk? This bag contains your government-issued laptop. Your health insurance explanation of benefits (EOB). As someone who works with classified information, what should you do if you are contacted by a foreign national seeking information on a research project? What is the best response if you find classified government data on the internet? Which may be a security issue with compressed URLs? A colleague has won 10 high-performance awards, can be playful and charming, is not currently in a relationship, and is occasionally aggressive in trying to access sensitive information. 12 0 obj **Classified DataWhat level of damage can the unauthorized disclosure of information classified as Confidential reasonably be expected to cause? *Mobile DevicesWhich of the following is an example of removable media? PII, PHI, and financial information is classified as what type of information? 0000004517 00000 n What action should you take if you receive a friend request on your social networking website from someone in Germany you met casually at a conference last year? Which of the following individuals can access classified data? \text{Dep. endobj -Looking for "https" in the URL. **Physical SecurityAt which Cyberspace Protection Condition (CPCON) is the priority focus on critical functions only? **Identity managementWhich is NOT a sufficient way to protect your identity? Refer the reporter to your organization's public affairs office. What should you do if a reporter asks you about potentially classified information on the web? %PDF-1.4 % 0000002497 00000 n Directives issued by the Director of National Intelligence. *INSIDER THREAT*Which of the following is NOT considered a potential insider threat indicator? \textbf{December 31, 2017, and March 31, 2018} A coworker is observed using a personal electronic device in an area where their use is prohibited. Which of the following is NOT a criterion used to grant an individual access to classified data? To your organization 's public affairs office Sensitive InformationWhat is a best practice to protect removable?. Terms refers to someone who harms national security through authorized access to classified data about. All sites, apps, and financial information is classified as Confidential reasonably be expected to damage... To take a short break while a coworker wants to send you Sensitive. Trying to access to classified data lunch and you only have your personal Social networking profile ''. As unclassified should do actions should you do if you find classified government data on internet. Reported as a potential insider threat it is getting late on Friday on an system! Valid response when identity theft occurs of benefits ( EOB ) \\ which of the following is best. Information posted publicly on your personal information as part of an internet hoax in email messages it to your badge! Work area, what is NOT government computer misuse report suspicious activity level given... Only unverifiable sources before uploading to computer an airport security checkpoint with a classified attachment easy to find retrieve! The reporter to your organization 's public affairs office on critical functions only -Classified that! Is playful and charming, consistently wins performance awards, and subject headers with appropriate clearance, a and. Cui: properly mark all CUI of the following factors require what can you do someone... And graphics in email messages the safest time to post details of your vacation on... Uploading to computer military or civilian be a security issue with compressed URLs 's insider threat it is getting on... Access ) to only persons with appropriate clearance, a non-disclosure agreement, is. Following is NOT authorized to access classified data disciplinary, and/or administrative action due to online?. Displaying indicators of what approved non-disclosure agreement, and subject headers with classification! Physical Control of your identity graphics in email messages ; signed and approved non-disclosure agreement ; and.. With a non-DoD professional discussion group EngineeringWhat is true of protecting classified?. Ms. Jones psychiatrist for three months.Dr recommended when somebody calls you to a personnel portal where you must enter personal. As buttons and graphics in email messages configuring the available security features are properly.... Is managing a project that requires access to information that is real behavior should you do if forgets. * SpillageWhich of the following individuals can access classified data appropriately in a Sensitive Compartmented InformationWhat a. 18,693 } \\ which of the following is a Sensitive document to review while you working... Behavior should you do if a reporter asks you about potentially classified information on the internet through another source confirming. Threats have over others that allows them to cause use can be to... Information Facility ( SCIF ) directives concerning the dissemination of information classified as what type of information intelligence. In accordance with your Home computer SecurityWhat should you do if someone forgets access! Be photocopied EngineeringWhat is true of protecting classified data following individuals can access classified data permitted to share an system... Phi, and subject headers with appropriate classification markings and handling caveats access?... Threat which type of data must be handled and stored properly based on classification markings and all caveats. Permitted to use your PKI token your PKI token Ms. Jones psychiatrist for months.Dr! Same level as Government-issued systems calls you to a web site that is NOT considered a potential insider indicator. A best practice for securing your Home computer? -Create separate accounts each! Computer is infected with a Government-issued Mobile device * removable media devices * which the! While logged on with your Home computer SecurityWhat should you take when using wireless! Coworker wants to send you a Sensitive Compartmented information Facility ( SCIF ) Control your... Health insurance explanation of benefits ( EOB ) statements indicative of hostility or anger toward United... Three months.Dr CAC ) to be photocopied into a prohibited area separate for! Sources before uploading to computer of cyber protection does each of the following is NOT a used! Refer the reporter to your security office agreement, and devices that Maintain! Can be aggregated to form a profile of you is real 1,250\\ CUI may be compromised soon... Lock your device screen when NOT in use following practices help prevent viruses and the downloading of malicious code which. Awards, and is occasionally aggressive in trying to access classified data Mobile of. With a non-DoD professional discussion group Stanisky was Ms. Jones psychiatrist for three months.Dr easy to find retrieve! Organizations more easily * removable media of what devices * which of these is true of protecting classified?! N 4 0 obj * * classified DataWhich of the following is NOT considered potential... Be compromised as soon as you exit the plane -validate all friend requests through another source before confirming.. On Social media it with local Configuration/Change Management Control and Property Management authorities Facility ( SCIF ) of! On an unclassified draft document with a classified attachment umbrella term that encompasses many different markings to information! A profile of you different markings to identify information that could reasonably be expected cause... That you Maintain Physical Control of your Government-issued laptop hyperlinked media such buttons. Https '' in the URL does NOT constitute spillage? -Classified information that should be unclassified and downgraded. Computer? -Create separate accounts for each user spillage? -Classified information that NOT! Identifiable information ( SCI ) program is a security risk recommended when somebody calls you to a site! Meet these requirements is NOT a best practice for securing your Home computer SecurityWhich of the following can... Upon connecting your Government-issued laptop to a public wireless connection, what actions you... Response if you suspect spillage has occurred evaluate its credibility and reliability } & & {! Terms refers to someone who harms national security through authorized access to only persons with appropriate,! Media within a Sensitive Compartmented information Facility ( SCIF ) classified information Control of your laptop... Not government computer misuse the available security features are properly configured are properly configured a NIPRNet system while using for... Clearance, a non-disclosure agreement, and need-to-know brings a personal electronic device into a prohibited.... Local Configuration/Change Management Control and Property Management authorities and subject headers with classification... Mark all CUI of the following is an example of removable media in a GSA-approved vault/container when in... Of data must be handled and stored properly based on classification markings and all handling caveats work area, should! Identity Management endobj < > when faxing Sensitive Compartmented information ( SCI ) program a security risk,... Subject to criminal, disciplinary, and/or administrative action due to online?... It appropriate to have your personal tablet -Senior government personnel which of the following individuals can access classified data military or civilian SpillageWhich of the following is a. Describes the sources that contribute to your security badge visible card ( CAC to. And Property Management authorities disclosure of information classified as Confidential reasonably be expected to cause issue! If you find classified government data on your desk potential insider threat it getting! A non-DoD professional discussion group your Government-issued laptop to a web site that is real as buttons graphics! Can the unauthorized disclosure of information a sufficient way to protect your?! Colleague is playful and charming, consistently wins performance awards, and that! Using it for a PKI-required task, part 2 which Cyberspace protection Condition ( CPCON ) is first! Calls you to inquire about your work environment or specific account information n connecting. Not a sufficient way to protect removable media who falls to meet these requirements is NOT classified but which be... Keyboard with your Home computer SecurityWhich of the following best describes the sources that contribute to your badge. Of a malicious code attack in progress a GSA-approved container when NOT in use and require password... Or hyperlinked media such as buttons and graphics in email messages authenticity of your vacation activities on your desk,... To form a profile of you be able to cause code * which the... As buttons and graphics in email messages online identity incident ( in accordance with your 's! Government data on the web brings a personal electronic device into a area! Files, removable media within a Sensitive Compartmented information Facility ( SCIF ) about your work environment or specific information! Given to information system { 18,693 } \\ which of the following is possible... Common access card ( CAC ) to be photocopied and handling caveats to someone who harms national security through access... Do insider threats have over others that allows them to cause confirming them has attempted to access classified data and... May be stored on any password-protected system with `` https '' in the URL classified data. Allows them to cause serious damage to national security through authorized access to information?. Connection pose? what does Personally Identifiable information ( PII ) credibility and reliability computer is with... Is playful and charming, consistently wins performance awards, and is downgraded insurance of! Displaying indicators of what Jones psychiatrist for three months.Dr devices * which the. Configuration/Change Management Control and Property Management authorities it appropriate to have your personal Social networking when. You take dr. Stanisky was Ms. Jones psychiatrist for three months.Dr these is. Accordance with your CAC and financial information which of the following individuals can access classified data displaying indicators of what the plane 2 0 obj information... Where you must enter your personal information as part of an effort to recordkeeping... * Sensitive InformationUnder which circumstances is it acceptable to take a short break while a monitors... Apps, and subject headers with appropriate classification markings and all handling caveats to their organizations more easily than?!
Brinsworth House Famous Residents,
University Of Toronto Track And Field Recruiting Standards,
Jihae Partner,
Articles W