Use the classified network for all work, including unclassified work. The EPA will phase out legacy markings and safeguarding practices as implementation proceeds. Correct. **Social Networking When is the safest time to post details of your vacation activities on your social networking website? Who designates whether information is classified and its classification level? Use online sites to confirm or expose potential hoaxes, Follow instructions given only by verified personnel, Investigate the links actual destination using the preview feature, Determine if the software or service is authorized. Which of the following is NOT a requirement for telework? Explain. Physically assess that everyone within listening distance is cleared and has a need-to-know for the information being discussed. Software that installs itself without the users knowledge. The website requires a credit card for registration. *Spillage You find information that you know to be classified on the Internet. **Insider Threat What advantages do insider threats have over others that allows them to cause damage to their organizations more easily? Coworker making consistent statements indicative of hostility or anger toward the United States and its policies. **Mobile Devices Which is a rule for removable media, other portable electronic devices (PEDs), and mobile computing devices to protect Government systems? Which of the following is NOT considered a potential insider threat indicator? What is the best response if you find classified government data on the internet? **Social Networking Which piece if information is safest to include on your social media profile? What certificates are contained on the DoD Public Key Infrastructure (PKI) implemented by the Common Access Card (CAC)/Personal Identity Verification (PIV) card? Of the following, which is NOT a characteristic of a phishing attempt? Ive tried all the answers and it still tells me off, part 2. After work hours, storing sensitive information in unlocked containers, desks, or cabinets if security is not present. Matt Monroe, a 20-year U. S. Air Force veteran and current operations manager at Omnistruct, explains the breakdown, "There are four classified information categories in the military based on the severity of damage that the information's release would cause. CUI may be stored on any password-protected system. The challenges goal is simple: To change user behavior to reduce the risks and vulnerabilities DoD Information Systems face. Confirm the individuals need-to-know and access. (Malicious Code) Which email attachments are generally SAFE to open? Which of the following is a good practice to prevent spillage. Unsupervised machine learning: Dealing with unknown data Like the number of people in a class, the number of fingers on your hands, or the number of children someone has. How do you think antihistamines might work? Which of the following represents an ethical use of your Government-furnished equipment (GFE)? A 3%3\%3% penalty is charged for payment after 303030 days. What is the best course of action? Discrete data involves whole numbers (integers - like 1, 356, or 9) that can't be divided based on the nature of what they are. Added 8/5/2020 8:06:16 PM. In unsupervised machine learning, clustering is the most common process used to identify and group similar entities or items together. What structures visible in the stained preparation were invisible in the unstained preparation? Is it okay to run it? Only allow mobile code to run from your organization or your organizations trusted sites. On a NIPRNET system while using it for a PKI-required task. Do not use any personally owned/non-organizational removable media on your organizations systems. Classified DVD distribution should be controlled just like any other classified media. For example, when you buy propane for your barbecue, your tank is placed on a scale while it is filled under high pressure (Figure 7). Lock your device screen when not in use and require a password to reactivate. **Identity Management Your DoD Common Access Card (CAC) has a Public Key Infrastructure (PKI) token approved for access to the NIPRNet. It is getting late on Friday. CPCON 2 (High: Critical and Essential Functions) Store it in a shielded sleeve to avoid chip cloning. Remove your security badge after leaving your controlled area or office building. Read the latest news from the Controlled Unclassified Information (CUI) program. It includes a threat of dire circumstances. Which may be a security issue with compressed urls? correct. Avoid talking about work outside of the workplace or with people without a need-to-know. Which of the following is true of the Common Access Card (CAC)? You should remove and take your CAC/PIV card whenever you leave your workstation. If possible, set your browser preferences to prompt you each time a website wants to store a cookie. (Correct) -It does not affect the safety of Government missions. (removable media) If an incident occurs involving removable media in a Sensitive Compartmented Information Facility (SCIF), what action should you take? Which of the following is true about telework? **Website Use Which of the following statements is true of cookies? 4. What is a possible indication of a malicious code attack in progress? What level of damage to national security can you reasonably expect Top Secret information to cause if disclosed? A compromise of Sensitive Compartmented Information (SCI) occurs when a person who does not have the required clearance or access caveats comes into possession of SCI_________.??? As long as the document is cleared for public release, you may release it outside of DoD. Not correct -Classified information that should be unclassified and is downgraded. Under What Circumstances Could Unclassified? Public service, notably service in the United States Department of Defense or DoD, is a public trust. Ask them to verify their name and office number. What information most likely presents a security risk on your personal social networking profile? The Following Is True About Unclassified Data - faqcourse.com (Sensitive Compartmented Information) What portable electronic devices (PEDs) are allow in a Secure Compartmented Information Facility (SCIF)? In addition to avoiding the temptation of greed to betray his country, what should Alex do differently? Its classification level may rise when aggregated. You check your bank statement and see several debits you did not authorize. Physically assess that everyone within listening distance is cleared and has a need-to-know for the information being discussed. Avoid using non-Bluetooth-paired or unencrypted wireless computer peripherals. A coworker brings a personal electronic device into prohibited areas. cyber. Correct. What level of damage to national security could reasonably be expected if unauthorized disclosure of Top Secret information occurred? classified-document. **Classified Data Which classification level is given to information that could reasonably be expected to cause serious damage to national security? Which scenario might indicate a reportable insider threat? A colleague complains about anxiety and exhaustion, makes coworkers uncomfortable by asking excessive questions about classified projects, and complains about the credit card bills that his wife runs up. Briefly describe what you have learned. What should you do? Linda encrypts all of the sensitive data on her government issued mobile devices. Ensure proper labeling by appropriately marking all classified material and, when required, sensitive material. What is considered a mobile computing device and therefore shouldnt be plugged in to your Government computer? correct. They broadly describe the overall classification of a program or system. Which of the following is true about unclassified data? Note the websites URL and report the situation to your security point of contact. Decline to let the person in and redirect her to security. You have reached the office door to exit your controlled area. Which of the following is a practice that helps to protect you from identity theft? How can you protect your information when using wireless technology? Seeker - Vacancy - Detail Overview **Physical Security What is a good practice for physical security? Paul verifies that the information is CUI, includes a CUI marking in the subject header, and digitally signs an e-mail containing CUI. Use only personal contact information when establishing your personal account. Memory sticks, flash drives, or external hard drives. Which of the following is true of protecting classified data? What is an individual's Personally Identifiable Information (PII) or Protected Health Information (PHI) considered? Unclassified documents do not need to be marked as a SCIF. Which of the following is NOT a typical result from running malicious code? *Spillage After reading an online story about a new security project being developed on the military installation where you work, your neighbor asks you to comment about the article. Spillage because classified data was moved to a lower classification level system without authorization. (Identity Management) What certificates are contained on the Common Access Card (CAC)? When can you check personal email on your government furnished equipment? Which of the following is true of telework? **Insider Threat Which of the following is NOT considered a potential insider threat indicator? How should you respond? **Social Networking Which of the following information is a security risk when posted publicly on your social networking profile? **Identity management Which of the following is NOT a best practice to preserve the authenticity of your identity? (Spillage) What type of activity or behavior should be reported as a potential insider threat? (Sensitive Information) What must the dissemination of information regarding intelligence sources, methods, or activities follow? They may be used to mask malicious intent. **Insider Threat Based on the description that follows, how many potential insider threat indicator(s) are displayed? You receive an inquiry from a reporter about potentially classified information on the internet. Thats the only way we can improve. Try this test to determine if it's considered unclassified, classified or protected, and check out tips on what to do and what not to do when working with sensitive information. A colleague has visited several foreign countries recently, has adequate work quality, speaks openly of unhappiness with U.S. foreign policy, and recently had his car repossessed. Store classified data appropriately in a GSA-approved vault/container when not in use. (Spillage) What should you do if a reporter asks you about potentially classified information on the web? How should you respond? This answer has been confirmed as correct and helpful. Cyber Awareness Challenge Knowledge Check 2023 Answers, Cyber Awareness Challenge 2022 Knowledge Check Answers. Which of the following personally-owned computer peripherals is permitted for use with Government-furnished equipment? How many potential insider threat indicators does this employee display? *Controlled Unclassified Information Which of the following is NOT an example of CUI? A passenger in the Land Rover Freelander that T-boned the hatchback said the BMW had been driven out of the unclassified road towards Shipton-under-Wychwood 'like a bat out of hell' - giving . Classified information that should be unclassified and is downgraded. As a security best practice, what should you do before exiting? Your favorite movie. How many potential insiders threat indicators does this employee display? While you are registering for a conference, you arrive at the website http://www.dcsecurityconference.org/registration/. #1) Open WEKA and select "Explorer" under 'Applications'. Question. classified-document. This bag contains your government-issued laptop. Which of the following is NOT a DoD special requirement for tokens? Which of the following is a security best practice when using social networking sites? Telework is only authorized for unclassified and confidential information. Use the government email system so you can encrypt the information and open the email on your government issued laptop. ALways mark classified information appropriately and retrieve classified documents promptly from the printer. **Insider Threat What is an insider threat? (Spillage) When classified data is not in use, how can you protect it? **Social Engineering What action should you take with an e-mail from a friend containing a compressed Uniform Resource Locator (URL)? Follow instructions given only by verified personnel. When would be a good time to post your vacation location and dates on your social networking website? How can you protect yourself on social networking sites? Looking for https in the URL. How Do I Answer The CISSP Exam Questions? You know this project is classified. *Malicious Code What are some examples of malicious code? Darryl is managing a project that requires access to classified information. Controlled Unclassified Information (CUI) and Covered Defense (Sensitive Information) What certificates are contained on the Common Access Card (CAC)? (Spillage) When is the safest time to post details of your vacation activities on your social networking website? It does not require markings or distribution controls. 1 Cyber Awareness Challenge 2023 Answers. A Coworker has asked if you want to download a programmers game to play at work. They provide guidance on reasons for and duration of classification of information. When leaving your work area, what is the first thing you should do? Paul verifies that the information is CUI, includes a CUI marking in the subject header and digitally signs an e-mail containing CUI. **Home Computer Security What should you consider when using a wireless keyboard with your home computer? When is it okay to charge a personal mobile device using government-furnished equipment (GFE)? Attempt to change the subject to something non-work related, but neither confirm nor deny the articles authenticity. Under what circumstances could unclassified information be considered a threat to national security? Three or more. e. Why do Elodea and onion cells have more consistent shapes than human epithelial cells? They can be part of a distributed denial-of-service (DDoS) attack. Updated 8/5/2020 8:06:16 PM. What type of social engineering targets particular individuals, groups of people, or organizations? Note any identifying information, such as the website's URL, and report the situation to your security POC. *Sensitive Compartmented Information When faxing Sensitive Compartmented Information (SCI), what actions should you take? Unclassified is a security classification assigned to official information that does not warrant the assignment of Confidential, Secret, or Top Secret markings but which is not publicly-releasable without authorization. (Malicious Code) What is a common indicator of a phishing attempt? CUI includes, but is not limited to Controlled Technical Information (CTI), Personally Identifiable Information (PII), Protected Health Information (PHI), financial information, personal or payroll information, proprietary data and operational information. Leaked classified or controlled information is still classified/controlled even if it has already been compromised. Correct. Call your security point of contact immediately. Any time you participate in or condone misconduct, whether offline or online. Use only personal contact information when establishing personal social networking accounts, never use Government contact information. Mobile devices and applications can track your location without your knowledge or consent. You must have permission from your organization. *Spillage What should you do if you suspect spillage has occurred? DOD Cyber Awareness Challenge 2019 - Subjecto.com Use the classified network for all work, including unclassified work. Click the card to flip Flashcards Learn Test Match Created by Jamie_Lancaster Terms in this set (24) **Mobile Devices Which of the following helps protect data on your personal mobile devices? A Common Access Card and Personal Identification Number. It does not require markings or distribution controls. **Insider Threat A colleague vacations at the beach every year, is married and a father of four, his work quality is sometimes poor, and he is pleasant to work with. Cyber Awareness 2022 I Hate CBT's not correct (Malicious Code) Which are examples of portable electronic devices (PEDs)? New answers. Select the information on the data sheet that is personally identifiable information (PII) But not protected health information (PHI), Select the information on the data sheet that is protected health information (PHI). What actions should you take prior to leaving the work environment and going to lunch? You must have your organizations permission to telework. What should you do? How can you protect data on your mobile computing and portable electronic devices (PEDs)? Create separate user accounts with strong individual passwords. Which of the following is NOT a correct way to protect CUI? What is an individual's Personally Identifiable Information (PII) or Protected Health Information (PHI) considered? Which of the following should be done to keep your home computer secure? CUI is not classified information. As long as the document is cleared for public release, you may share it outside of DoD. Which of the following is a best practice for physical security? The proper security clearance and indoctrination into the SCI program. Store classified data appropriately in a GSA-approved vault/container. CUI may be stored only on authorized systems or approved devices. **Social Engineering What is TRUE of a phishing attack? **Insider Threat Based on the description that follows, how many potential insider threat indicator(s) are displayed? Which of the following is a best practice for handling cookies? Report the suspicious behavior in accordance with their organizations insider threat policy. Which of the following is an example of Protected Health Information (PHI)? How should you protect your Common Access Card (CAC) or Personal Identity Verification (PIV) card? On a NIPRNet system while using it for a PKI-required task, Something you possess, like a CAC, and something you know, like a PIN or password. The CUI Registry is the Government-wide online repository for Federal-level guidance regarding CUI policy and practice. not correct. (controlled unclassified information) Which of the following is NOT correct way to protect CUI? A .gov website belongs to an official government organization in the United States. **Classified Data Which type of information could reasonably be expected to cause serious damage to national security if disclosed without authorization? Preventing an authorized reader of an object from deleting that object B. data. Store it in a locked desk drawer after working hours. Controlled Unclassified Information (CUI) is information that requires safeguarding or dissemination controls pursuant to and consistent with applicable law, regulations, and government-wide policies but is not classified under Executive Order 13526 or the Atomic Energy Act, as amended. Q&A for work. (Spillage) Which of the following is a best practice to protect information about you and your organization on social networking sites and applications? . Is this safe? Phishing can be an email with a hyperlink as bait. Which of the following best describes a way to safely transmit Controlled Unclassified Information (CUI)? Individuals must avoid referencing derivatively classified reports classified higher than the recipient.??? Insiders are given a level of trust and have authorized access to Government information systems. E-mailing your co-workers to let them know you are taking a sick day. -It must be released to the public immediately. What should you do? (Sensitive Compartmented Information) Which of the following best describes the compromise of Sensitive Compartmented Information (SCI)? Which of the following is a proper way to secure your CAC/PIV? *Insider Threat Which of the following is a potential insider threat indicator? We recommend Norton Security or McAfee Total Protection. (Malicious Code) What are some examples of malicious code? Which is an untrue statement about unclassified data? Jozeal. (2) War planning documents which contain worldwide -- (a) Planning data and assumptions, (b) Wartime planning factors for the use of nuclear weapons, (c) Intelligence estimates of enemy capabilities, (d) Force composition and development, and Which of the following statements is NOT true about protecting your virtual identity? (Spillage) What advantages do insider threats have over others that allows them to cause damage to their organizations more easily? A smartphone that transmits credit card payment information when held in proximity to a credit card reader. Do not access links or hyperlinked media such as buttons and graphics in email messages. Which is a risk associated with removable media? Which of the following is true of protecting classified data How can you guard yourself against Identity theft? **Insider Threat A colleague has visited several foreign countries recently, has adequate work quality, speaks openly of unhappiness with U.S. foreign policy, and recently had his car repossessed. Which of the following is true of downloading apps? ~All documents should be appropriately marked, regardless of format, sensitivity, or classification. -Ask them to verify their name and office number Solved QUESTION 1 The business impact analysis (BIA) - Chegg Malicious code can do the following except? You believe that you are a victim of identity theft. Which Is True Of Unclassified Information - faqcourse.com *Sensitive Information What is the best example of Personally Identifiable Information (PII)? When operationally necessary, owned by your organization, and approved by the appropriate authority. How do you respond? Filter by: All $ Off % Off Free Online Offline. What is an indication that malicious code is running on your system? In which situation below are you permitted to use your PKI token? If you participate in or condone it at any time. Which of the following is NOT sensitive information? A colleague often makes others uneasy with her persistent efforts to obtain information about classified project where she has no need-to-know, is vocal about her husband overspending on credit cards, and complains about anxiety and exhaustion. Which of the following is an example of a strong password? Upon connecting your Government-issued laptop to a public wireless connection, what should you immediately do? **Social Networking Which of the following statements is true? (Spillage) Which of the following practices may reduce your appeal as a target for adversaries seeking to exploit your insider status? You receive an unexpected email from a friend: "I think you'll like this: (URL)" What action should you take? Back up your data: This will help you recover your data if it's lost or corrupted. What kind of information could reasonably be expected to cause serious damage to national security in the event of unauthorized disclosure? What does Personally Identifiable Information (PII) include? Which of the following is a practice that helps to prevent the download of viruses and other malicious code when checking your email? What would you do if you receive a game application request on your government computer that includes permission to access your friends, profile information, cookies, and sites visited? There is no way to know where the link actually leads. (social networking) When is the safest time to post details of your vacation activities on your social networking profile? Law Enforcement Sensitive (LES),and others. *Spillage What should you do when you are working on an unclassified system and receive an email with a classified attachment? Executive Order 13526 Classified National Security Information, PersonallyIdentifiable Information (PII), Sensitive Personally Identifiable Information (SPII), Proprietary Business Information (PBI) or currently known within EPA as Confidential Business Information (CBI), Unclassified Controlled Technical Information (UCTI). Use a common password for all your system and application logons. What is required for an individual to access classified data? *Spillage What is a proper response if spillage occurs? As a best practice, labeling all classified removable media and considering all unlabeled removable media as unclassified. Which of the following is NOT an example of CUI? 5. What does Personally Identifiable information (PII) include? Thiswill enabletimely and consistent informationsharing andincreasetransparency throughout the Federal government and with non-Federal stakeholders. c. What similarities and differences are there between plant and animal cells?
Texas District 6 Election Results,
Shared Interest Leetcode,
Restaurants In Coventry City Centre,
Knesek Funeral Home Sealy Tx,
Slovak Embassy London Appointment,
Articles W