You receive an unexpected email from a friend: I think youll like this: https://tinyurl.com/2fcbvy. What action should you take? If you participate in or condone it at any time. Social Security Number, date and place of birth, mothers maiden name. Paul verifies that the information is CUI, includes a CUI marking in the subject header and digitally signs an e-mail containing CUI. After work hours, storing sensitive information in unlocked containers, desks, or cabinets if security is not present. Use only personal contact information when establishing your personal account. What should be your response? *Sensitive Compartmented Information When should documents be marked within a Sensitive Compartmented Information Facility (SCIF). What should be done to protect against insider threats? Delete email from senders you do not know. Which is an untrue statement about unclassified data? It includes a threat of dire circumstances. **Classified Data Which of the following is true of protecting classified data? Do not use any personally owned/non-organizational removable media on your organizations systems. A program that segregates various types of classified information into distinct compartments for added protection and dissemination or distribution control. In which situation below are you permitted to use your PKI token? **Social Networking When may you be subject to criminal, disciplinary, and/or administrative action due to online misconduct? If classified information were released, which classification level would result in Exceptionally grave damage to national security? (Malicious Code) Which of the following is NOT a way that malicious code spreads? Contact the IRS using their publicly available, official contact information. Contents hide. Classified information is defined in PL 96-456, the Classified Information Procedures Act: *Sensitive Information Which of the following is an example of Protected Health Information (PHI)? What should be done if you find classified Government Data/Information Not Cleared for Public Release on the Internet? *Spillage After reading an online story about a new security project being developed on the military installation where you work, your neighbor asks you to comment about the article. **Social Networking Which of the following best describes the sources that contribute to your online identity? For example, when you buy propane for your barbecue, your tank is placed on a scale while it is filled under high pressure (Figure 7). A Common Access Card and Personal Identification Number. A passenger in the Land Rover Freelander that T-boned the hatchback said the BMW had been driven out of the unclassified road towards Shipton-under-Wychwood 'like a bat out of hell' - giving . (Spillage) Which type of information could reasonably be expected to cause serious damage to national security if disclosed without authorization? *Sensitive Compartmented Information What should the participants in this conversation involving SCI do differently? CUI may be stored on any password-protected system. DoD Unclassified data: Must be cleared before being released to the public May require applci aton i of Controled l Uncasl sed Iifi nformaton i (CU)I access and distribution controls Must be clearly marked as Unclassified or CUI if included in a classified document or classified storage area Jozeal. What should you do if a reporter asks you about potentially classified information on the web? Classified data: (Scene) Which of the following is true about telework? Let us know if this was helpful. How many potential insiders threat indicators does this employee display? Which designation marks information that does not have potential to damage national security? *Sensitive Compartmented Information Which of the following best describes the compromise of Sensitive Compartmented Information (SCI)? Maintain possession of your laptop and other government-furnished equipment (GFE) at all times. CUI is not classified information. The answer has been confirmed to be correct. **Website Use While you are registering for a conference, you arrive at the website http://www.dcsecurityconference.org/registration/. What is considered ethical use of the Government email system? Telework is only authorized for unclassified and confidential information. **Insider Threat Which type of behavior should you report as a potential insider threat? Which of the following is a clue to recognizing a phishing email? Which is a good practice to protect classified information? Appropriate clearance; signed and approved non-disclosure agreement; and need-to-know. Which of the following is a best practice for physical security? Which Of The Following Is Not A Correct Way To Protect CUI. Maria is at home shopping for shoes on Amazon.com. How many potential insider threat indicators does this employee display? Lock your device screen when not in use and require a password to reactivate. You must have your organizations permission to telework. Ask for information about the website, including the URL. Any time you participate in or condone misconduct, whether offline or online. (Malicious Code) What are some examples of malicious code? Controlled Unclassified Information (CUI) is informationthat requires safeguarding or dissemination controls consistent with applicable laws, regulations, and Government-wide policies, but is not classified under Executive Order 13526 "Classified National Security Informat What are examples of CUI? **Classified Data Which of the following must you do before using and unclassified laptop and peripherals in a collateral environment? A Coworker has asked if you want to download a programmers game to play at work. **Insider Threat Based on the description that follows, how many potential insider threat indicator(s) are displayed? CUI includes, but is not limited to Controlled Technical Information (CTI), Personally Identifiable Information (PII), Protected Health Information (PHI), financial information, personal or payroll information, proprietary data and operational information. Antihistamines are used to treat the symptoms, such as sneezing, that are due to inflammation caused by irritants in the airways. Phishing can be an email with a hyperlink as bait. What information most likely presents a security risk on your personal social networking profile? **Social Networking When is the safest time to post details of your vacation activities on your social networking profile? The popup asks if you want to run an application. A coworker uses a personal electronic device in a secure area where their use is prohibited. 1.1 Standard Challenge Answers. Which is NOT a way to protect removable media? To determine premiums for automobile insurance, companies must have an understanding of the variables that affect whether a driver will have an accident. Prudence faxes CUI using an Unclassified cover sheet via a Secret fax machine. Which of the following is NOT considered a potential insider threat indicator? Information should be secured in a cabinet or container while not in use. A coworker wants to send you a sensitive document to review while you are at lunch and you only have your personal tablet. Who designates whether information is classified and its classification level? Never allow sensitive data on non-Government-issued mobile devices. On a NIPRNet system while using it for a PKI-required task, Something you possess, like a CAC, and something you know, like a PIN or password. There is no way to know where the link actually leads. The challenges goal is simple: To change user behavior to reduce the risks and vulnerabilities DoD Information Systems face. However, unclassified data. Is it permitted to share an unclassified draft document with a non-DoD professional discussion group? Physically assess that everyone within listening distance is cleared and has a need-to-know for the information being discussed. *Sensitive Information Which of the following is the best example of Personally Identifiable Information (PII)? ?Access requires Top Secret clearance and indoctrination into SCI program.??? Decline to let the person in and redirect her to security. Select the information on the data sheet that is personally identifiable information (PII). What level of damage to national security could reasonably be expected if unauthorized disclosure of Top Secret information occurred? Which of the following does NOT constitute spillage? Search for an answer or ask Weegy. CUI was established to standardize the way the Executive branch handles sensitive information that requires dissemination controls. CUI is government created or owned information that requires safeguarding or dissemination controls consistent with applicable laws, regulations and government wide policies. What information should you avoid posting on social networking sites? Permitted Uses of Government-Furnished Equipment (GFE). Which type of information includes personal, payroll, medical, and operational information? Do not forward, read further, or manipulate the file; Do not give out computer or network information, Do not follow instructions from unverified personnel. Correct. Darryl is managing a project that requires access to classified information. What should be your response? (Identity Management) What certificates are contained on the Common Access Card (CAC)? What are the requirements to be granted access to sensitive compartmented information (SCI)? When gases are sold they are usually compressed to high pressures. **Classified Data Which of the following is true of telework? Unauthorized Disclosure of Classified Information for DoD, Security Awareness: Derivative Classification Answers, CITI Ethics, Responsible Conduct, RCR, Law, HTH And IRB Answers, EVERFI Achieve Consumer Financial Education Answers, Security Pro: Chapter 3 (3.1.8) & 4.1 Security Policies Answers, CITI Module #3 Research in Public Elementary and Secondary Schools, Answers to CTS Unit 7 Lab 7-2: Protocols and Services SNMP, Google Analytics Individual Qualification Exam Answers, Everfi Module 4 Credit Scores Quiz Answers, Which Of The Following Is Not Considered A Potential Insider Threat Indicator. Use online sites to confirm or expose potential hoaxes, Follow instructions given only by verified personnel, Investigate the links actual destination using the preview feature, Determine if the software or service is authorized. (Malicious Code) What is a good practice to protect data on your home wireless systems? **Social Engineering Which of the following is a practice that helps to prevent the download of viruses and other malicious code when checking your email? Classified DVD distribution should be controlled just like any other classified media. *Sensitive Information Under what circumstances could classified information be considered a threat to national security? How do you think antihistamines might work? The Registry is updated as agencies continue to submit governing authorities that authorize the protection and safeguarding of sensitive information. Search by Location. cyber. *Spillage What should you do if you suspect spillage has occurred? What is best practice while traveling with mobile computing devices? what should you do? (Physical Security) which Cyberspace Protection Condition (CPCON) establishes a protection priority focus on critical and essential functions only? Store it in a GSA approved vault or container. Your DoD Common Access Card (CAC) has a Public Key Infrastructure (PKI) token approves for access to the NIPRNET. Only persons with appropriate clearance, a non-disclosure agreement, and need-to-know can access classified data. CPCON 4 (Low: All Functions) It does not require markings or distribution controls. You have reached the office door to exit your controlled area. Question 1: The business impact analysis (BIA) identifies the resources for which a business continuity plan (BCP) is necessary. Which of the following is NOT a typical means for spreading malicious code? Always check to make sure you are using the correct network for the level of data. What can be used to track Marias web browsing habits? A man you do not know is trying to look at your Government-issued phone and has asked to use it. catra's real name elizabeth, shamea morton first husband,
Greenpeace Successes And Failures,
Mobile Homes With Land For Sale Deland, Fl,
The Final Sentence Of The Passage Serves To,
Race Car Decibel Levels,
Articles W