Which is a way to protect against phishing attacks? Which of the following best describes wireless technology? (Sensitive Information) What guidance is available from marking Sensitive Information information (SCI)? (GFE) When can you check personal e-mail on your Government-furnished equipment (GFE)? Added 8/5/2020 8:06:16 PM. Classified material must be appropriately marked. Which of the following individuals can access classified data? *Controlled Unclassified Information Which of the following is NOT an example of CUI? TheNational Archives and Records Administration (NARA)servesas the Controlled Unclassified Information (CUI) Executive Agent (EA). **Insider Threat Which scenario might indicate a reportable insider threat? A coworker has asked if you want to download a programmers game to play at work. Which of the following does not constitute spillage. When traveling or working away from your main location, what steps should you take to protect your devices and data? Social Security Number, date and place of birth, mothers maiden name.
Security Classification of Information, volume 2 (Quist), Chapter Seven Software that installs itself without the users knowledge. Which of the following is NOT a security best practice when saving cookies to a hard drive? Identify and disclose it with local Configuration/Change Management Control and Property Management authorities. Note any identifying information and the websites URL. A colleague often makes others uneasy with her persistent efforts to obtain information about classified project where she has no need-to-know, is vocal about her husband overspending on credit cards, and complains about anxiety and exhaustion. **Social Engineering What is TRUE of a phishing attack? Media containing Privacy Act information, PII, and PHI is not required to be labeled. Preventing an authorized reader of an object from deleting that object B. An official website of the United States government. Which of the following is NOT a DoD special requirement for tokens? A colleague complains about anxiety and exhaustion, makes coworkers uncomfortable by asking excessive questions about classified projects, and complain about the credit card bills that his wife runs up. Understanding and using the available privacy settings. Use the classified network for all work, including unclassified work. A coworker removes sensitive information without authorization. **Removable Media in a SCIF What action should you take when using removable media in a Sensitive Compartmented Information Facility (SCIF)? A colleague complains about anxiety and exhaustion, makes coworkers uncomfortable by asking excessive questions about classified projects, and complains about the credit card bills that his wife runs up. Which of the following is not a best practice to preserve the authenticity of your identity? Store your Common Access Card (CAC) or Personal Identity Verification (PIV) card in a shielded sleeve ~Write your password down on a device that only you access (e.g., your smartphone) Change your password at least every 3 months Enable two-factor authentication whenever available, even for personal accounts. Which of the following is NOT an example of sensitive information? c. What similarities and differences are there between plant and animal cells? Which of the following represents a good physical security practice? After reading an online story about a new security project being developed on the military installation where you work, your neighbor asks you to comment about the article. Which of the following is not considered a potential insider threat indicator? Remove security badge as you enter a restaurant or retail establishment. Search for an answer or ask Weegy. A colleague vacations at the beach every year, is married and a father of four, sometimes has poor work quality, and works well with his team. Only paper documents that are in open storage need to be marked. **Social Networking As someone who works with classified information, what should you do if you are contacted by a foreign national seeking information on a research project? What should you do if a reporter asks you about potentially classified information on the web? *Classified Data (Spillage) After reading an online story about a new security project being developed on the military installation where you work, your neighbor asks you to comment about the article. Let us know if this was helpful. How many potential insider threat indicators does this employee display? Sanitized information gathered from personnel records. Based on the description that follows how many potential insider threat indicators are displayed? A coworker wants to send you a sensitive document to review while you are at lunch and you only have your personal tablet. **Insider Threat How many potential insider threat indicators does a person who is playful and charming, consistently wins performance awards, but is occasionally aggressive in trying to access sensitive information display? Discrete data involves whole numbers (integers - like 1, 356, or 9) that can't be divided based on the nature of what they are. **Social Networking Which of the following statements is true? *Sensitive Compartmented Information What should the owner of this printed SCI do differently? What should you do after you have ended a call from a reporter asking you to confirm potentially classified info found on the web? Any time you participate in or condone misconduct, whether offline or online. Your DoD Common Access Card (CAC) has a Public Key Infrastructure (PKI) token approves for access to the NIPRNET. When expanded it provides a list of search options that will switch the search inputs to match the current selection. UNCLASSIFIED is a designation to mark information that does not have potential to damage national security. Note any identifying information and the websites Uniform Resource Locator (URL). When using your government-issued laptop in public environments, with which of the following should you be concerned? It never requires classification markings, is true about unclassified data. Click the card to flip Flashcards Learn Test Match Created by Jamie_Lancaster Terms in this set (24)
Seeker - Vacancy - Detail Overview Working With Sensitive Information - Canada.ca a.
Cyber Awareness Flashcards by Jedi Master | Brainscape Correct. Which of the following is NOT true of traveling overseas with a mobile phone?
Controlled Unclassified Information (CUI) | GSA (Malicious Code) Which of the following is NOT a way that malicious code spreads? The email has an attachment whose name contains the word secret. A type of phishing targeted at high-level personnel such as senior officials. What action should you take?
Unsupervised machine learning: Dealing with unknown data **Insider Threat Based on the description that follows, how many potential insider threat indicator(s) are displayed? **Home Computer Security Which of the following is a best practice for securing your home computer? When is the best time to post details of your vacation activities on your social networking website? When would be a good time to post your vacation location and dates on your social networking website? In which situation below are you permitted to use your PKI token? What is the best choice to describe what has occurred? As long as the document is cleared for public release, you may share it outside of DoD.
Cyber Awareness Challenge 2023 Answers Quizzma Should you always label your removable media? Why might "insiders" be able to cause damage to their organizations more easily than others? Looking at your MOTHER, and screaming THERE SHE BLOWS! Accepting the default privacy settings. How can you protect your information when using wireless technology? Classified Information can only be accessed by individuals with. *Spillage .What should you do if a reporter asks you about potentially classified information on the web? Correct. As a security best practice, what should you do before exiting? What should Sara do when publicly available Internet, such as hotel Wi-Fi? You must have your organization's permission to telework. Store classified data appropriately in a GSA-approved vault/container. What is the response to an incident such as opening an uncontrolled DVD on a computer in a SCIF. What is an indication that malicious code is running on your system? What kind of information could reasonably be expected to cause serious damage to national security in the event of unauthorized disclosure? Which of the following is an example of Protected Health Information (PHI)? laptops, fitness bands, tablets, smartphones, electric readers, and Bluetooth devices. Confirm the individuals need-to-know and access. If you participate in or condone it at any time. As long as the document is cleared for public release, you may release it outside of DoD. Malicious code can do damage by corrupting files, erasing your hard drive, and/or allowing hackers access. **Use of GFE Under what circumstances is it acceptable to use your Government-furnished computer to check personal e-mail and do other non-work-related activities? How many indicators does this employee display? What type of data must be handled and stored properly based on classification markings and handling caveats? ! (A type of phishing targeted at senior officials) Which is still your FAT A$$ MOTHER! Refer the vendor to the appropriate personnel. Which of the following is true of internet hoaxes? What can be used to track Marias web browsing habits? How many potential insiders threat indicators does this employee display? It should only be in a system while actively using it for a PKI-required task. NARA has the authority and responsibility to manage the CUI Program across the Federal government. Monitor credit card statements for unauthorized purchases, Thumb drives, memory sticks, and flash drives are examples of.
Controlled Unclassified Information (CUI) and Covered Defense Note That The Integers Should Be Type Cast To Doubles. Annual DoD Cyber Awareness Challenge Training, DOD Cyber Awareness Challenge 2019: Knowledge, DOD Cyber Awareness Challenge 2019 (DOD-IAA-V, Operations Management: Sustainability and Supply Chain Management, Elliot Aronson, Robin M. Akert, Samuel R. Sommers, Timothy D. Wilson, Anderson's Business Law and the Legal Environment, Comprehensive Volume, David Twomey, Marianne Jennings, Stephanie Greene. *Sensitive Compartmented Information What is a Sensitive Compartmented Information (SCI) program? What information most likely presents a security risk on your personal social networking profile? How many potential insider threat indicators does this employee display? You must have permission from your organization. You may use your personal computer as long as it is in a secure area in your home b. **Home Computer Security What should you consider when using a wireless keyboard with your home computer? A user writes down details from a report stored on a classified system marked as Secret and uses those details to draft an unclassified briefing on an unclassified system without authorization. Sensitive information may be stored on any password-protected system. See the discussed example before. Which of the following is a good practice to avoid email viruses? Which Cyber Protection Condition (CPCON) establishes a protection priority focus on critical functions only? Classified data: (Scene) Which of the following is true about telework? Delete email from senders you do not know. A 3%3\%3% penalty is charged for payment after 303030 days. Share sensitive information only on official, secure websites. Verify the identity of all individuals.??? How can you protect your information when using wireless technology? Under what circumstances is it acceptable to check personal email on Government-furnished equipment (GFE)?
Controlled Unclassified Information (CUI) | National Archives An investment in knowledge pays the best interest.. Even within a secure facility, dont assume open storage is permitted. Updated 8/5/2020 8:06:16 PM. Here you can find answers to the DoD Cyber Awareness Challenge. Always take your CAC when you leave your workstation. (Correct)-It does not affect the safety of Government missions.-It never requires classification markings. Executive Order 13556, Controlled Unclassified Information, requires the Executive Branch to establish an open and uniform program for managing [unclassified] information that requires safeguarding or dissemination controls pursuant to and consistent with laws, regulations, and Government-wide policies. The National Archives and Records Administration (NARA) was named the Executive Agent (EA) responsible for overseeing the CUI Program. (Spillage) What advantages do insider threats have over others that allows them to cause damage to their organizations more easily? *Insider Threat Which of the following is a reportable insider threat activity? Mark SCI documents appropriately and use an approved SCI fax machine. **Website Use How should you respond to the theft of your identity? Approved Security Classification Guide (SCG). Before long she has also purchased shoes from several other websites. b. taking away a toy or treat What certificates are contained on the DoD Public Key Infrastructure (PKI) implemented by the Common Access Card (CAC)/Personal Identity Verification (PIV) card? As a best practice, labeling all classified removable media and considering all unlabeled removable media as unclassified. (2) War planning documents which contain worldwide -- (a) Planning data and assumptions, (b) Wartime planning factors for the use of nuclear weapons, (c) Intelligence estimates of enemy capabilities, (d) Force composition and development, and Use only personal contact information when establishing personal social networking accounts, never use Government contact information. Use only personal contact information when establishing personal social networking accounts, never use Government contact information. Within a secure area, you see an individual you do not know. -Its classification level may rise when aggregated. Which of the following is a good practice to protect classified information? Which of the following represents an ethical use of your Government-furnished equipment (GFE)? Figure 1. (Spillage) What type of activity or behavior should be reported as a potential insider threat? Follow procedures for transferring data to and from outside agency and non-Government networks. Quizzma is a free online database of educational quizzes and test answers. The physical security of the device. Classification markings and handling caveats. A colleague has won 10 high-performance awards, can be playful and charming, is not currently in a relationship, and occasionally aggressive in trying to access sensitive information. *Spillage What should you do if you suspect spillage has occurred? Do not access website links in e-mail messages. Use your own security badge, key code, or Common Access Card (CAC)/Personal Identity Verification (PIC) card. Who is responsible for information/data security? A headset with a microphone through a Universal Serial Bus (USB) port.
Cyber Awareness 2022 I Hate CBT's How many potential insiders threat indicators does this employee display? This is information that, if released to the public, carries no injury to personal, industry, or government interests. Three or more. Store classified data appropriately in a GSA-approved vault/container when not in use. Which scenario might indicate a reportable insider threat? Which of the following is true of downloading apps? Executive Order 13526 Classified National Security Information, PersonallyIdentifiable Information (PII), Sensitive Personally Identifiable Information (SPII), Proprietary Business Information (PBI) or currently known within EPA as Confidential Business Information (CBI), Unclassified Controlled Technical Information (UCTI). This button displays the currently selected search type. What is an individual's Personally Identifiable Information (PII) or Protected Health Information (PHI) considered? Never allow sensitive data on non-Government-issued mobile devices. Information should be secured in a cabinet or container while not in use. A. **Social Networking Which of the following is a security best practice when using social networking sites? **Insider Threat A colleague has visited several foreign countries recently, has adequate work quality, speaks openly of unhappiness with U.S. foreign policy, and recently had his car repossessed. correct. **Insider Threat Which type of behavior should you report as a potential insider threat?
Managing government information when working remotely Where. A person who does not have the required clearance or assess caveats comes into possession of SCI in any manner. Appropriate clearance; signed and approved non-disclosure agreement; and need-to-know. A colleague is playful and charming, consistently wins performance awards, and is occasionally aggressive in trying to access classified information. Enable automatic screen locking after a period of inactivity. It never requires classification markings, is true about unclassified data. Classified information that should be unclassified and is downgraded. (Malicious Code) A coworker has asked if you want to download a programmers game to play at work. You must have your organizations permission to telework. Under what circumstances could unclassified information be considered a threat to national security? 870 Summit Park Avenue Auburn Hills, MI 48057. The date of full implementation of the CUI Program will be announced by the EPAs CUI Senior Agency Official (CUI SAO) and updated here on EPAs public web page. Hostility or anger toward the United States and its policies. Which of the following is true of Unclassified Information?