What is a security best practice to employ on your home computer? A coworker wants to send you a sensitive document to review while you are at lunch and you only have your personal tablet. Correct. Ensure proper labeling by appropriately marking all classified material and, when required, sensitive material. Which of the following is true of traveling overseas with a mobile phone. (Malicious Code) Upon connecting your Government-issued laptop to a public wireless connection, what should you immediately do? Never allow sensitive data on non-Government-issued mobile devices. When classified data is not in use, how can you protect it? Correct. An investment in knowledge pays the best interest.. The National Archives and Records Administration (NARA) serves as the Controlled Unclassified Information (CUI) Executive Agent (EA). Which is an untrue statement about unclassified data? Quizzma is a free online database of educational quizzes and test answers. What is a valid response when identity theft occurs? A colleague abruptly becomes hostile and unpleasant after previously enjoying positive working relationships with peers, purchases an unusually expensive new car, and has unexplained absences from work. *Spillage You find information that you know to be classified on the Internet. What should you do? Call your security point of contact immediately. Remove your security badge after leaving your controlled area or office building. Social Security Number; date and place of birth; mothers maiden name. **Classified Data Which classification level is given to information that could reasonably be expected to cause serious damage to national security? What should you do? To determine premiums for automobile insurance, companies must have an understanding of the variables that affect whether a driver will have an accident. You are leaving the building where you work. Delete email from senders you do not know. Refer the vendor to the appropriate personnel. the following is true about unclassified data fy23 controlled unclassified information cui quizlet what is true of controlled unclassified information What. What should be your response? What should be done to protect against insider threats? **Removable Media in a SCIF What portable electronic devices (PEDs) are allowed in a Sensitive Compartmented Information Facility (SCIF)? **Insider Threat A colleague vacations at the beach every year, is married and a father of four, his work quality is sometimes poor, and he is pleasant to work with. The CUI Registry is the Government-wide online repository for Federal-level guidance regarding CUI policy and practice. What should you do? #2) Select the "Pre-Process" tab. which of the following is true about unclassified data. General Services Administration (GSA) approval. After clicking on a link on a website, a box pops up and asks if you want to run an application. Which is a way to protect against phishing attacks? An official website of the United States government. correct. Sensitive information may be stored on any password-protected system. . It is permissible to release unclassified information to the public prior to being cleared. Which of the following is true of protecting classified data? *Controlled Unclassified Information Which of the following is NOT an example of CUI? It displays a label showing maximum classification, date of creation, point of contact, and Change Management 9CM) Control Number. Question. Which of the following best describes the sources that contribute to your online identity. When gases are sold they are usually compressed to high pressures. -TRUE The use of webmail is -is only allowed if the organization permits it Using webmail may bypass built in security features. See the discussed example before. Which of the following is NOT a security best practice when saving cookies to a hard drive? A What Are Some Examples Of Malicious Code Cyber Awareness? Not correct. b. taking away a toy or treat You must have your organizations permission to telework. When using a public device with a card reader, only use your DoD CAC to access unclassified information, is only allowed if the organization permits it. (Mobile Devices) Which of the following statements is true? (Malicious Code) While you are registering for a conference, you arrive at the website http://www.dcsecurityconference.org/registration/. They provide guidance on reasons for and duration of classification of information. Which of the following should you do immediately? Which of the following is a potential insider threat indicator? You find information that you know to be classified on the Internet. Have your permissions from your organization, follow your organization guideline, use authorized equipment and software, employ cyber security best practice, perform telework in dedicated when home. -Classified information that should be unclassified and is downgraded. Which of the following is a best practice for handling cookies? CUI is not classified information. Which of these is true of unclassified data? Unclassified documents do not need to be marked as a SCIF. CPCON 1 (Very High: Critical Functions) Store classified data in a locked desk drawer when not in use Maybe Controlled Unclassified Information (CUI) Purpose of the CUI Program. asked in Internet by voice (265k points) Question : Which of the following is true about unclassified data? Which of the following does not constitute spillage. Infographic - Text version Infographic [PDF - 594 KB] Report a problem or mistake on this page Date modified: 2020-12-14 Phishing can be an email with a hyperlink as bait. -It never requires classification markings. **Social Networking What should you do if you receive a game application request that includes permission to access your friends, profile information, cookies, and sires visited? Secure .gov websites use HTTPS what should be your response be? How should you securely transport company information on a removable media? When operationally necessary, owned by your organization, and approved by the appropriate authority. You are logged on to your unclassified computer and just received an encrypted email from a co-worker. What is the best choice to describe what has occurred? *Sensitive Compartmented Information When is it appropriate to have your security badge visible? Attempting to access sensitive information without need-to-know, Avoid talking about work outside of the workplace or with people without a need-to-know, Report the suspicious behavior in accordance with their organizations insider threat policy. d. How do the size and shape of a human epithelial cell differ from those of the Elodea and onion cells that you examined earlier? A vendor conducting a pilot program with your organization contacts you for organizational data to use in a prototype. Someone who uses authorized access, wittingly or unwittingly, to harm national security through unauthorized disclosure or other actions that may cause the loss or degradation of resources or capabilities. Compute The Average Kids Per Family. Annual DoD Cyber Awareness Challenge Training, DOD Cyber Awareness Challenge 2019: Knowledge, DOD Cyber Awareness Challenge 2019 (DOD-IAA-V, Operations Management: Sustainability and Supply Chain Management, Elliot Aronson, Robin M. Akert, Samuel R. Sommers, Timothy D. Wilson, Anderson's Business Law and the Legal Environment, Comprehensive Volume, David Twomey, Marianne Jennings, Stephanie Greene. How many potential insiders threat indicators does this employee display? Only documents that are classified Secret, Top Secret, or SCI require marking. not correct. How Do I Answer The CISSP Exam Questions? What should you do after you have ended a call from a reporter asking you to confirm potentially classified info found on the web? Call your security point of contact immediately. Everything you need to know aboutControlled UnclassifiedInformation(CUI). Which of the following should be reported as a potential security incident? What is a best practice to protect data on your mobile computing device? not correct. (Sensitive Information) Which of the following represents a good physical security practice? A type of phishing targeted at senior officials. Which piece of information is safest to include on your social media profile? While you are registering for a conference, you arrive at the website http://www.dcsecurityconference.org/registration/. After reading an online story about a new security project being developed on the military installation where you work, your neighbor asks you to comment about the article. ~All documents should be appropriately marked, regardless of format, sensitivity, or classification. What should you do? A colleague asks to leave a report containing protected health information (PHI) on his desk overnight so he can continue working on it the next day. -Its classification level may rise when aggregated. 1.1.5 Controlled Unclassified Information. Use personal information to help create strong passwords. You check your bank statement and see several debits you did not authorize. Which of the following is true of downloading apps? Why might "insiders" be able to cause damage to their organizations more easily than others? Correct. (Malicious Code) Which of the following is true of Internet hoaxes? Which of the following is NOT a correct way to protect CUI? *Spillage What should you do if you suspect spillage has occurred? It never requires classification markings, is true about unclassified data. Thiswill enabletimely and consistent informationsharing andincreasetransparency throughout the Federal government and with non-Federal stakeholders. 870 Summit Park Avenue Auburn Hills, MI 48057. **Social Networking Which of the following is a security best practice when using social networking sites? What is an indication that malicious code is running on your system? When your vacation is over, after you have returned home. Reviewing and configuring the available security features, including encryption. Being cognizant of classification markings and labeling practices are good strategies to avoid inadvertent spillage. Connect and share knowledge within a single location that is structured and easy to search. *Sensitive Compartmented Information What should the participants in this conversation involving SCI do differently? Her badge is not visible to you. Download the information. **Home Computer Security How can you protect your information when using wireless technology? Which of the following statements is TRUE about the use of DoD Public Key Infrastructure (PKI) tokens? Classification markings and handling caveats. *Spillage Which of the following may help to prevent spillage? What level of damage to national security can you reasonably expect Top Secret information to cause if disclosed? The date of full implementation of the CUI Program will be announced by the EPAs CUI Senior Agency Official (CUI SAO) and updated here on EPAs public web page. Which of the following is true about unclassified data? (Malicious Code) What is a common indicator of a phishing attempt? what should you do? (Sensitive Compartmented Information) What portable electronic devices (PEDs) are allow in a Secure Compartmented Information Facility (SCIF)? You should only accept cookies from reputable, trusted websites. **Physical Security What is a good practice for physical security? Avoid talking about work outside of the workplace or with people without a need-to-know. Refer the reporter to your organizations public affairs office. which of the following is true about unclassified Courses 442 View detail Preview site correct. Of the following, which is NOT a problem or concern of an Internet hoax? Be aware of classification markings and all handling caveats. Paul verifies that the information is CUI, includes a CUI marking in the subject header, and digitally signs an e-mail containing CUI. Which designation includes Personally Identifiable Information (PII) and Protected Health Information (PHI)? Attempt to change the subject to something non-work related, but neither confirm nor deny the articles authenticity. Here you can find answers to the DoD Cyber Awareness Challenge. **Classified Data Which of the following can an unauthorized disclosure of information classified as Confidential reasonably be expected to cause? How many insider threat indicators does Alex demonstrate? It never requires classified markings, it is true about unclassified data. Learn more about Teams Ensure that any cameras, microphones, and Wi-Fi embedded in the laptop are physically disabled.- Correct. Official websites use .gov classified-document. It does not require markings or distribution controls. What is a best practice for protecting controlled unclassified information (CUI)? How should you respond? Correct. What type of social engineering targets particular individuals, groups of people, or organizations? When is it appropriate to have your security badge visible? Neither confirm or deny the information is classified. Looking at your MOTHER, and screaming THERE SHE BLOWS! CPCON 4 (Low: All Functions) To transmit large payments through Fedwire __________, To regulate and supervise the stock market to provide stability and security to individual investors. A coworker wants to send you a sensitive document to review while you are at lunch and you only have your personal tablet. What should you do? Retrieve classified documents promptly from printers. After you have returned home following the vacation. correct. Secure personal mobile devices to the same level as Government-issued systems. Avoid using non-Bluetooth-paired or unencrypted wireless computer peripherals. How many potential insider threat indicators does this employee display? (Malicious Code) A coworker has asked if you want to download a programmers game to play at work. What is a proper response if spillage occurs? **Identity management What is the best way to protect your Common Access Card (CAC)? Lock your device screen when not in use and require a password to reactivate. What is a possible indication of a malicious code attack in progress? Hostility or anger toward the United States and its policies. (Wrong). Like the number of people in a class, the number of fingers on your hands, or the number of children someone has. (Spillage) What should you do when you are working on an unclassified system and receive an email with a classified attachment? Correct. Alex demonstrates a lot of potential insider threat indicators. Social Security Number, date and place of birth, mothers maiden name. 1.1 Standard Challenge Answers. Based on the description that follows, how many potential insider threat indicator (s) are displayed? Maria is at home shopping for shoes on Amazon.com. Correct. Scan external files from only unverifiable sources before uploading to computer. (1) A strategic plan documenting the overall conduct of a war. Hostility or anger toward the United States and its policies. You may use your personal computer as long as it is in a secure area in your home b. You have reached the office door to exit your controlled area. Since the URL does not start with https, do not provide your credit card information. Which of the following must you do before using an unclassified laptop and peripherals in a collateral classified environment? **Classified Data What level of damage can the unauthorized disclosure of information classified as Confidential reasonably be expected to cause? Ive tried all the answers and it still tells me off. true-statement. **Travel Which of the following is true of traveling overseas with a mobile phone? After work hours, storing sensitive information in unlocked containers, desks, or cabinets if security is not present. E-mailing your co-workers to let them know you are taking a sick day. Which of the following is an example of a strong password? Proactively identify potential threats and formulate holistic mitigation responses. Which of the following is true of transmitting Sensitive Compartmented Information (SCI)? data. Your DoD Common Access Card (CAC) has a Public Key Infrastructure (PKI) token approves for access to the NIPRNET. correct. The physical security of the device. Memory sticks, flash drives, or external hard drives. Which is a risk associated with removable media? Which of the following is a best practice for physical security? Physically assess that everyone within listening distance is cleared and has a need-to-know for the information being discussed. Log in for more information. A colleague often makes others uneasy with her persistent efforts to obtain information about classified project where she has no need-to-know, is vocal about her husband overspending on credit cards, and complains about anxiety and exhaustion. Use TinyURL's preview feature to investigate where the link leads. **Social Networking When may you be subject to criminal, disciplinary, and/or administrative action due to online misconduct? **Classified Data Which type of information could reasonably be expected to cause serious damage to national security if disclosed without authorization? (Spillage) What should you do if a reporter asks you about potentially classified information on the web? Ask the individual to see an identification badge. (Malicious Code) Which email attachments are generally SAFE to open? What is best practice while traveling with mobile computing devices? What should be done if you find classified Government Data/Information Not Cleared for Public Release on the Internet? Insiders are given a level of trust and have authorized access to Government information systems. What is the best course of action? (Sensitive Information) What should you do if a commercial entity, such as a hotel reception desk, asks to make a photocopy of your Common Access Card (CAC) for proof of Federal Government employment? Which of the following is a concern when using your Government-issued laptop in public? What type of data must be handled and stored properly based on classification markings and handling caveats? You receive an unexpected email from a friend: "I think you'll like this: (URL)" What action should you take? Secure it to the same level as Government-issued systems. Attempt to change the subject to something non-work related, but neither confirm nor deny the article's authenticity. You are reviewing your employees annual self evaluation. What is the response to an incident such as opening an uncontrolled DVD on a computer in a SCIF. Always check to make sure you are using the correct network for the level of data. What should be your response? Preventing an authorized reader of an object from deleting that object B. When unclassified data is aggregated, its classification level may rise. **Insider Threat How many potential insider threat indicators does a person who is playful and charming, consistently wins performance awards, but is occasionally aggressive in trying to access sensitive information display? Which of the following is NOT a good way to protect your identity? Exceptionally grave damage. **Travel What security risk does a public Wi-Fi connection pose? **Insider Threat Which scenario might indicate a reportable insider threat? ?Access requires Top Secret clearance and indoctrination into SCI program.??? When using a fax machine to send sensitive information, the sender should do which of the following? All https sites are legitimate and there is no risk to entering your personal info online. You receive an email from the Internal Revenue Service (IRS) demanding immediate payment of back taxes of which you were not aware. Which method would be the BEST way to send this information? Identify and disclose it with local Configuration/Change Management Control and Property Management authorities. **Insider Threat What do insiders with authorized access to information or information systems pose? You should remove and take your CAC/PIV card whenever you leave your workstation. The proper security clearance and indoctrination into the SCI program. **Social Engineering What is TRUE of a phishing attack? In which situation below are you permitted to use your PKI token? Information should be secured in a cabinet or container while not in use. correct. Only friends should see all biographical data such as where Alex lives and works. When is the best time to post details of your vacation activities on your social networking website? (Insider Threat) A colleague vacations at the beach every year, is married and a father of four, his work quality is sometimes poor, and he is pleasant to work with. How do you respond? What should you do? Press release data. Note the websites URL and report the situation to your security point of contact. Store your Common Access Card (CAC) or Personal Identity Verification (PIV) card in a shielded sleeve ~Write your password down on a device that only you access (e.g., your smartphone) Change your password at least every 3 months Enable two-factor authentication whenever available, even for personal accounts. Do not download it. *Spillage What should you do if a reporter asks you about potentially classified information on the web? Which of the following is NOT a social engineering tip? Maintain possession of your laptop and other government-furnished equipment (GFE) at all times. What level of damage to national security could reasonably be expected if unauthorized disclosure of Top Secret information occurred? How many potential insider threat indicators does this employee display? The following table lists the number of drivers in the United States, the number of fatal accidents, and the number of total accidents in each age group in 2002. (Spillage) When classified data is not in use, how can you protect it? Accepting the default privacy settings. **Home Computer Security What should you consider when using a wireless keyboard with your home computer? Avoid using non-Bluetooth-paired or unencrypted wireless computer peripherals. *Sensitive Information What is the best example of Personally Identifiable Information (PII)? classified-document. Controlled unclassified information. Note any identifying information and the websites Uniform Resource Locator (URL). (Spillage) What advantages do insider threats have over others that allows them to cause damage to their organizations more easily? You must have your organization's permission to telework. Label all files, removable media, and subject headers with appropriate classification markings. In which situation below are you permitted to use your PKI token? I may decide not to consent to these terms, but, if I do not consent to all of these terms, then I agree not to proceed with creating an account or moving forward with filling out the application, and I understand that I will not be . Malicious code can do damage by corrupting files, erasing your hard drive, and/or allowing hackers access. 1.1.1 Spillage. **Social Engineering Which may be a security issue with compressed Uniform Resource Locators (URLs)? (Identity Management) What certificates are contained on the Common Access Card (CAC)?
Halawa Correctional Facility Send Money,
Billy Jensen Articles,
Articles W