(Insider Threat) Based on the description that follows, how many potential insider threat indicator(s) are displayed? Use a common password for all your system and application logons. It never requires classified markings, it is true about unclassified data. asked in Internet by voice (265k points) internet. *Sensitive Compartmented Information When is it appropriate to have your security badge visible? You many only transmit SCI via certified mail. Write your password down on a device that only you access. Classified information is defined in PL 96-456, the Classified Information Procedures Act: **Insider Threat What do insiders with authorized access to information or information systems pose? What Are Some Examples Of Malicious Code Cyber Awareness? Which of the following is true of downloading apps? Note the websites URL and report the situation to your security point of contact. correct. Physical security of mobile phones carried overseas is not a major issue. Ensure proper labeling by appropriately marking all classified material and, when required, sensitive material. f. Get an answer. Of the following, which is NOT a problem or concern of an Internet hoax? Which of the following should you NOT do if you find classified information on the internet? *Spillage Which of the following is a good practice to prevent spillage? Share sensitive information only on official, secure websites. It is permissible to release unclassified information to the public prior to being cleared. (Sensitive Information) What certificates are contained on the Common Access Card (CAC)? What must authorized personnel do before permitting another individual to enter a Sensitive Compartmented Information Facility (SCIF)? A type of phishing targeted at senior officials. Which of the following is a good practice for telework? **Social Networking Which of the following statements is true? What portable electronic devices (PEDs) are permitted in a SCIF? Of the following, which is NOT a security awareness tip? Remove your security badge, common access card (CAC), or personal identity verification (PIV) card. Store your Common Access Card (CAC) or Personal Identity Verification (PIV) card in a shielded sleeve ~Write your password down on a device that only you access (e.g., your smartphone) Change your password at least every 3 months Enable two-factor authentication whenever available, even for personal accounts. What should you do? Press release data. Which is an untrue statement about unclassified data? Unclassified Information Student Guide . Examples are: Patient names, Social Security numbers, Drivers license numbers, insurance details, and birth dates. *Spillage What is a proper response if spillage occurs? It never requires classification markings, is true about unclassified data. Not correct **Website Use How should you respond to the theft of your identity? Neither confirm or deny the information is classified. cyber. They provide guidance on reasons for and duration of classification of information. What should you do after you have ended a call from a reporter asking you to confirm potentially classified info found on the web? Which of the following is true about unclassified data? A colleague has won 10 high-performance awards, can be playful and charming, is not currently in a relationship, and is occasionally aggressive in trying to access sensitive information. Physically assess that everyone within listening distance is cleared and has a need-to-know for the information being discussed. Which of the following best describes a way to safely transmit Controlled Unclassified Information (CUI)? d. giving a spanking or a scolding. Note any identifying information and the websites Uniform Resource Locator (URL). cyber-awareness. A colleague is playful and charming, consistently wins performance awards, and is occasionally aggressive in trying to access classified information. correct. What is a way to prevent the download of viruses and other malicious code when checking your e-mail? UNCLASSIFIED - CLASSIFICATION MARKINGS FOR TRAINING PURPOSES ONLY Marking in the Electronic Environment Short Student Guide Center for Development of Security Excellence Page 4 UNCLASSIFIED - CLASSIFICATION MARKINGS FOR TRAINING PURPOSES ONLY IM and Chat Instant messages and chats are brief, text-based message exchanges and conversations. An official website of the United States government. Identify and disclose it with local Configuration/Change Management Control and Property Management authorities. Which of the following actions is appropriate after finding classified Government information on the internet? Which is an untrue statement about unclassified data? Sensitive information. When using a public device with a card reader, only use your DoD CAC to access unclassified information, is only allowed if the organization permits it. correct. (Spillage) When classified data is not in use, how can you protect it? What action should you take first? Correct. **Home Computer Security What should you consider when using a wireless keyboard with your home computer? Never write down the PIN for your CAC. *Spillage After reading an online story about a new security project being developed on the military installation where you work, your neighbor asks you to comment about the article. Official websites use .gov What information relates to the physical or mental health of an individual? Of the following, which is NOT a method to protect sensitive information? Malicious code can do damage by corrupting files, erasing your hard drive, and/or allowing hackers access. Approved Security Classification Guide (SCG). Report the crime to local law enforcement. What actions should you take prior to leaving the work environment and going to lunch? Setting weekly time for virus scan when you are not on the computer and it is powered off. TheNational Archives and Records Administration (NARA)servesas the Controlled Unclassified Information (CUI) Executive Agent (EA). New interest in learning another language, Which of the following is a good practice to protect classified information. Use only personal contact information when establishing your personal account. which of the following is true about unclassified data. Correct. **Classified Data Which of the following is a good practice to protect classified information? **Physical Security At which Cyberspace Protection Condition (CPCON) is the priority focus on critical functions only? For example, when you buy propane for your barbecue, your tank is placed on a scale while it is filled under high pressure (Figure 7). *Sensitive Compartmented Information When faxing Sensitive Compartmented Information (SCI), what actions should you take? *Spillage After reading an online story about a new security project being developed on the military installation where you work, your neighbor asks you to comment about the article. 1.To provide opportunities for individuals and businesses to open checking accounts __________, To write rules and guidelines for financial institutions under its supervision __________, To be the lender of last resort for financial institutions __________, To conduct the nations monetary policy with the goals of maintaining full employment and price stability __________, 5. It may be compromised as soon as you exit the plane. Click the card to flip Flashcards Learn Test Match Created by Jamie_Lancaster Terms in this set (24) CUI may be stored on any password-protected system. There are no choices provides which make it hard to pick the untrue statement about unclassified data. Changes to various data systems that store and sometimes share sensitive information outside EPA. Attachments contained in a digitally signed email from someone known. Which of the following information is a security risk when posted publicly on your social networking profile? Which of the following is an example of malicious code? JavaScript appears to be disabled on this computer. Three or more. As long as the document is cleared for public release, you may share it outside of DoD. (Spillage) What should you do if a reporter asks you about potentially classified information on the web? (1) A strategic plan documenting the overall conduct of a war. (Malicious Code) A coworker has asked if you want to download a programmers game to play at work. CUI is not classified information. #1) Open WEKA and select "Explorer" under 'Applications'. Not correct It contains certificates for identification, encryption, and digital signature. Avoid using non-Bluetooth-paired or unencrypted wireless computer peripherals. Preventing an authorized reader of an object from deleting that object B. Paul verifies that the information is CUI, includes a CUI marking in the subject header and digitally signs an e-mail containing CUI. Were mitochondria as abundant in human epithelial cells as in onion epidermal cells (procedure 4.6)? Which designation includes Personally Identifiable Information (PII) and Protected Health Information (PHI)? A Common Access Card and Personal Identification Number. The emission rate of CO 2 from the soils reached the maximum on the 1st day of incubation and the sequence of CO 2 emission rate and cumulative emission under different amendment treatments was as SG > S > G > CK > N (Fig. b. taking away a toy or treat difficult life circumstances such as substance abuse, divided loyalty or allegiance to the U.S., and extreme, persistent interpersonal difficulties. Ask them to verify their name and office number. CPCON 3 (Medium: Critical, Essential, and Support Functions) You must have your organizations permission to telework. A 3%3\%3% penalty is charged for payment after 303030 days. Which of the following is NOT Protected Health Information (PHI)? How Do I Answer The CISSP Exam Questions? Individuals must avoid referencing derivatively classified reports classified higher than the recipient.??? Ask for information about the website, including the URL. What is a rule for removable media, other portable electronic devices (PEDs), and mobile computing devices to protect Government systems? **Social Engineering Which of the following is a way to protect against social engineering? Your DoD Common Access Card (CAC) has a Public Key Infrastructure (PKI) token approves for access to the NIPRNET. Retrieve classified documents promptly from printers. Reviewing and configuring the available security features, including encryption. Which of the following is a practice that helps to prevent the download of viruses and other malicious code when checking your email? Attempt to change the subject to something non-work related, but neither confirm nor deny the articles authenticity. The CUIProgramisan unprecedented initiative to standardize practices across more than 100 separate departments and agencies, as well asstate, local,tribal and, private sector entities; academia; and industry. **Insider Threat Based on the description that follows, how many potential insider threat indicator(s) are displayed? (Spillage) What advantages do insider threats have over others that allows them to cause damage to their organizations more easily? Which of the following is a good practice to prevent spillage? Note any identifying information, such as the website's URL, and report the situation to your security POC. If classified information were released, which classification level would result in Exceptionally grave damage to national security? Be aware of classification markings and all handling caveats. correct. A coworker uses a personal electronic device in a secure area where their use is prohibited. Under what circumstances is it acceptable to check personal email on Government-furnished equipment (GFE)? *Sensitive Information Under what circumstances could classified information be considered a threat to national security? 1 Answer/Comment. What should you do? Teams. Refer the vendor to the appropriate personnel. Use personally-owned wired headsets and microphones only in designated areas, New interest in learning a foreign language. Dofficult life circumstances, such as death of spouse. **Social Engineering How can you protect yourself from internet hoaxes? Second, unclassified points are regarded as ground seeds if the distances between the points and the detected planes are less than a buffer difference threshold. What action should you take? A colleague abruptly becomes hostile and unpleasant after previously enjoying positive working relationships with peers, purchases an unusually expensive new car, and has unexplained absences from work. John submits CUI to his organizations security office to transmit it on his behalf. Which of the following is NOT considered sensitive information? (Wrong). Q&A for work. Which is NOT a wireless security practice? Do not forward, read further, or manipulate the file; Do not give out computer or network information, Do not follow instructions from unverified personnel. On a NIPRNet system while using it for a PKI-required task, Something you possess, like a CAC, and something you know, like a PIN or password. Photos of your pet Correct. The annual Cyber Awareness Challenge is a course that helps authorized users learn how to best avoid and reduce threats and vulnerabilities in an organizations system. Which of the following is true of Unclassified information? Appropriate clearance, a signed and approved non-disclosure agreement, and need-to-know, Insiders are given a level of trust and have authorized access to Government information systems. **Identity Management Which of the following is the nest description of two-factor authentication? Understanding and using the available privacy settings. **Travel Which of the following is true of traveling overseas with a mobile phone? Spillage can be either inadvertent or intentional. **Insider Threat What is an insider threat? No. You receive an inquiry from a reporter about potentially classified information on the internet. Ensure proper labeling by appropriately marking all classified material and, when required, sensitive material. (Sensitive Information) What type of unclassified material should always be marked with a special handling caveat? Tell us about it through the REPORT button at the bottom of the page. Correct. What is a security best practice to employ on your home computer? **Classified Data Which classification level is given to information that could reasonably be expected to cause serious damage to national security? Your favorite movie. E-mailing your co-workers to let them know you are taking a sick day. They may be used to mask malicious intent. **Identity management Which of the following is an example of two-factor authentication? No, you should only allow mobile code to run from your organization or your organizations trusted sites. Which of the following makes Alexs personal information vulnerable to attacks by identity thieves? Unauthorized Disclosure of Classified Information for DoD, Security Awareness: Derivative Classification Answers, CITI Ethics, Responsible Conduct, RCR, Law, HTH And IRB Answers, EVERFI Achieve Consumer Financial Education Answers, Security Pro: Chapter 3 (3.1.8) & 4.1 Security Policies Answers, CITI Module #3 Research in Public Elementary and Secondary Schools, Answers to CTS Unit 7 Lab 7-2: Protocols and Services SNMP, Google Analytics Individual Qualification Exam Answers, Everfi Module 4 Credit Scores Quiz Answers, Which Of The Following Is Not Considered A Potential Insider Threat Indicator. Who is responsible for information/data security? Correct. Which of the following is true of sharing information in a Sensitive Compartmented Information Facility (SCIF)? **Physical Security What is a good practice for physical security? 5. Based on the description that follows, how many potential insider threat indicator(s) are displayed? When unclassified data is aggregated, its classification level may rise. EPAs CUI Program is responsible for issuing CUI policy, procedures, training, and guidance to program offices and regions, along with providing oversight and reporting on the Agencys progress on meeting NARAs CUI deadlines. What should you do after you have ended a call from a reporter asking you to confirm potentially classified information found on the web? Permitted Uses of Government-Furnished Equipment (GFE). Which of the following is NOT a home security best practice? Under which circumstances may you be subject to criminal, disciplinary, and/or administrative action due to online misconduct? Reviewing and configuring the available security features, including encryption. Which of the following is NOT sensitive information? Which of the following is NOT Government computer misuse? ~A coworker brings a personal electronic device into a prohibited area. **Home Computer Security How can you protect your information when using wireless technology? How many potential insider threat indicators does this employee display? *Sensitive Information Which of the following is an example of Protected Health Information (PHI)? Confirm the individuals need-to-know and access. **Social Networking When is the safest time to post details of your vacation activities on your social networking website? ~All documents should be appropriately marked, regardless of format, sensitivity, or classification.
How Did Vicksburg Cope With The Siege Quizlet,
Articles W