Use personally-owned wired headsets and microphones only in designated areas, New interest in learning a foreign language. However, unclassified data. What type of activity or behavior should be reported as a potential insider threat? You must have your organizations permission to telework. CUI is an umbrella term that encompasses many different markings toidentifyinformationthat is not classified but which should be protected. The EPA will phase out legacy markings and safeguarding practices as implementation proceeds. (removable media) If an incident occurs involving removable media in a Sensitive Compartmented Information Facility (SCIF), what action should you take? It is created or received by a healthcare provider, health plan, or employer. Store it in a locked desk drawer after working hours. When gases are sold they are usually compressed to high pressures. Of the following, which is NOT a security awareness tip? Some examplesyou may be familiar with: TheFederalCUI Registry,shows authorized categoriesandassociated markings, as well as applicable safeguarding, dissemination, and decontrol procedures. Call your security point of contact immediately. When using a fax machine to send sensitive information, the sender should do which of the following? Delete email from senders you do not know. A compromise of Sensitive Compartmented Information (SCI) occurs when a person who does not have the required clearance or access caveats comes into possession of SCI_________.??? The following practices help prevent viruses and the downloading of malicious code except. Note any identifying information and the websites Uniform Resource Locator (URL). Using NIPRNet tokens on systems of higher classification level. correct. Neither confirm or deny the information is classified. (GFE) When can you check personal e-mail on your Government-furnished equipment (GFE)? Which of the following is true about telework? Only use Government-furnished or Government-approved equipment to process PII. See the discussed example before. (Malicious Code) What are some examples of removable media? When your vacation is over, after you have returned home. A lock (LockA locked padlock) or https:// means youve safely connected to the .gov website. Cyber Awareness Challenge Knowledge Check 2023 Answers, Cyber Awareness Challenge 2022 Knowledge Check Answers. Which may be a security issue with compressed urls? CUI must be handled using safeguarding or dissemination controls. Search by Location. Remove and take it with you whenever you leave your workstation. What would you do if you receive a game application request on your government computer that includes permission to access your friends, profile information, cookies, and sites visited? (Malicious Code) What are some examples of malicious code? -It never requires classification markings. **Physical Security Within a secure area, you see an individual who you do not know and is not wearing a visible badge. A coworker uses a personal electronic device in a secure area where their use is prohibited. Have your permissions from your organization, follow your organization guideline, use authorized equipment and software, employ cyber security best practice, perform telework in dedicated when home. Thiswill enabletimely and consistent informationsharing andincreasetransparency throughout the Federal government and with non-Federal stakeholders. A trusted friend in your social network posts a link to vaccine information on a website unknown to you. -It must be released to the public immediately. What actions should you take prior to leaving the work environment and going to lunch? (Spillage) What advantages do insider threats have over others that allows them to cause damage to their organizations more easily? Correct. Which of the following is NOT a typical result from running malicious code? **Insider Threat What type of activity or behavior should be reported as a potential insider threat? What should you do if someone forgets their access badge (physical access)? Verify the identity of all individuals.??? **Social Networking Which of the following best describes the sources that contribute to your online identity? Third, the neighbor ground points of an unclassified point are searched from multiple subspaces. Unusual interest in classified information. Correct, Someone who uses authorized access, wittingly or unwittingly, to harm national security through unauthorized disclosure or other actions that may cause the loss or degradation of resources or capabilities. What should you do? (Correct) -It does not affect the safety of Government missions. Accepting the default privacy settings. Which of the following is a good practice for telework? "Unclassified" or a lack of security marking denotes non-sensitive information. There are many travel tips for mobile computing. Use only personal contact information when establishing your personal account. (Insider Threat) A colleague vacations at the beach every year, is married and a father of four, his work quality is sometimes poor, and he is pleasant to work with. Which of the following is true of Unclassified information? When vacation is over, after you have returned home. A colleague vacations at the beach every year, is married and a father of four, sometimes has poor work quality, and works well with his team. In addition to avoiding the temptation of greed to betray his country, what should Alex do differently? You are reviewing your employees annual self evaluation. The age of the driver may top the list of variables. Only friends should see all biographical data such as where Alex lives and works. You should only accept cookies from reputable, trusted websites. Filter by: All $ Off % Off Free Online Offline. b. Do not download it. **Social Engineering Which of the following is a practice that helps to prevent the download of viruses and other malicious code when checking your email? Permitted Uses of Government-Furnished Equipment (GFE). Government-owned PEDs, if expressly authorized by your agency. DoD Unclassified data: Must be cleared before being released to the public May require applci aton i of Controled l Uncasl sed Iifi nformaton i (CU)I access and distribution controls Must be clearly marked as Unclassified or CUI if included in a classified document or classified storage area correct. A colleague saves money for an overseas vacation every year, is a . To determine premiums for automobile insurance, companies must have an understanding of the variables that affect whether a driver will have an accident. Someone who uses authorized access, wittingly or unwittingly, to harm national security through unauthorized disclosure or other actions that may cause the loss or degradation of resources or capabilities. you don't need to do anything special to protect this information When expanded it provides a list of search options that will switch the search inputs to match the current selection. What can you do to protect yourself against phishing? CUI may be stored only on authorized systems or approved devices. What should you do? Which of the following demonstrates proper protection of mobile devices? When would be a good time to post your vacation location and dates on your social networking website? CPCON 1 (Very High: Critical Functions) Store classified data appropriately in a GSA-approved vault/container when not in use. What is an individual's Personally Identifiable Information (PII) or Protected Health Information (PHI) considered? -Ask them to verify their name and office number Which of the following is true of using DoD Public key Infrastructure (PKI) token? It may expose the connected device to malware. Report the crime to local law enforcement. -TRUE The use of webmail is -is only allowed if the organization permits it Using webmail may bypass built in security features. A pop-up window that flashes and warns that your computer is infected with a virus. You receive an inquiry from a reporter about potentially classified information on the internet. (Physical Security) which Cyberspace Protection Condition (CPCON) establishes a protection priority focus on critical and essential functions only? You are logged on to your unclassified computer and just received an encrypted email from a co-worker. *Spillage What is a proper response if spillage occurs? Click the card to flip Flashcards Learn Test Match Created by Jamie_Lancaster Terms in this set (24) Which of the following is an example of a strong password? *Spillage Which of the following actions is appropriate after finding classified information on the Internet? Which of the following is true of Sensitive Compartmented Information (SCI)? **Insider Threat Which type of behavior should you report as a potential insider threat? (Sensitive Compartmented Information) What describes how Sensitive Compartmented Information is marked? Always use DoD PKI tokens within their designated classification level. *Spillage You find information that you know to be classified on the Internet. Her badge is not visible to you. A user writes down details from a report stored on a classified system marked as Secret and uses those details to draft an unclassified briefing on an unclassified system without authorization. Use your own security badge, key code, or Common Access Card (CAC)/Personal Identity Verification (PIC) card. what should be your response be? Which of the following is a good practice to avoid email viruses? Briefly describe what you have learned. At all times while in the facility. Which of the following may help to prevent inadvertent spillage? not correct Maintain possession of your laptop and other government-furnished equipment (GFE) at all times. Which of these is true of unclassified data? A coworker wants to send you a sensitive document to review while you are at lunch and you only have your personal tablet. This button displays the currently selected search type. Based on the description that follows how many potential insider threat indicators are displayed? What should you do? New interest in learning another language? Proactively identify potential threats and formulate holistic mitigation responses. Your comments are due on Monday. **Insider Threat What is an insider threat? Confirm the individuals need-to-know and access. What describes how Sensitive Compartmented Information is marked? (Insider Threat) Based on the description that follows, how many potential insider threat indicator(s) are displayed? **Insider Threat Which of the following should be reported as a potential security incident? __________, To supervise bank holding companies and state member banks __________, To make loans to businesses who want to expand their operations __________, To operate the check-clearing system for the nation __________, to provide financial services to the federal government and serve as the bankers bank for commercial banks and other depositary institutions __________, To serve as the fiscal agent of the U.S. government __________, To place printed paper currency and newly minted coins into circulation __________. (Sensitive Information) What certificates are contained on the Common Access Card (CAC)? **Physical Security At which Cyberspace Protection Condition (CPCON) is the priority focus on critical functions only? Which of the following is true of Protected Health Information (PHI)? laptops, fitness bands, tablets, smartphones, electric readers, and Bluetooth devices. Discuss why gases, such as barbecue propane gas, are sold by mass and not by volume. be wary of suspicious e-mails that use your name and/or appear to come from inside your organization. (Sensitive Compartmented Information) What portable electronic devices (PEDs) are allow in a Secure Compartmented Information Facility (SCIF)? What should you do to protect yourself while on social networks? Spear Phishing attacks commonly attempt to impersonate email from trusted entities. Unclassified information cleared for public release. Correct. **Insider Threat Based on the description that follows, how many potential insider threat indicator(s) are displayed? Following instructions from verified personnel. The popup asks if you want to run an application. While you are registering for a conference, you arrive at the website http://www.dcsecurityconference.org/registration/. **Social Engineering Which may be a security issue with compressed Uniform Resource Locators (URLs)? A type of phishing targeted at high-level personnel such as senior officials. correct. What function do Insider Threat Programs aim to fulfill? It is not corporate intellectual property unless created for or included in requirements related to a government contract. What certificates are contained on the DoD Public Key Infrastructure (PKI) implemented by the Common Access Card (CAC)/Personal Identity Verification (PIV) card? What should you do to protect classified data? How many potential insiders threat indicators does this employee display? What level of damage to national security could reasonably be expected if unauthorized disclosure of Top Secret information occurred? It should only be in a system while actively using it for a PKI-required task.
African Proverbs About Fathers,
Teletubbies Numbers 3 Version 2,
Why Didn't Frank Sinatra Attend Dean Martin's Funeral,
Are Victoria Secret Fitting Rooms Open 2021,
Ivanhoe Club Membership Cost,
Articles W