Classified material must be appropriately marked. Look for a digital signature on the email. *Sensitive Information Under which circumstances is it permitted to share an unclassified draft document with a non-DoD professional discussion group? **Use of GFE When can you check personal e-mail on your Government-furnished equipment (GFE)? Who is responsible for information/data security? What type of social engineering targets particular individuals, groups of people, or organizations? You find information that you know to be classified on the Internet. Store it in a shielded sleeve to avoid chip cloning. What level of damage to national security could reasonably be expected if unauthorized disclosure of Top Secret information occurred? Which of the following does not constitute spillage. Q&A for work. Use personal information to help create strong passwords. Which is a way to protect against phishing attacks? What Are Some Examples Of Malicious Code Cyber Awareness? What portable electronic devices (PEDs) are permitted in a SCIF? Which of the following is not considered an example of data hiding? (Spillage) What should you do if a reporter asks you about potentially classified information on the web? Ensure proper labeling by appropriately marking all classified material. Annual DoD Cyber Awareness Challenge Training, DOD Cyber Awareness Challenge 2019: Knowledge, DOD Cyber Awareness Challenge 2019 (DOD-IAA-V, Operations Management: Sustainability and Supply Chain Management, Elliot Aronson, Robin M. Akert, Samuel R. Sommers, Timothy D. Wilson, Anderson's Business Law and the Legal Environment, Comprehensive Volume, David Twomey, Marianne Jennings, Stephanie Greene. Which of the following is a practice that helps to protect you from identity theft? Use only your personal contact information when establishing your account. It never requires classified markings, it is true about unclassified data. Information improperly moved from a higher protection level to a lower protection level. **Website Use Which of the following statements is true of cookies? What security device is used in email to verify the identity of sender? Only paper documents that are in open storage need to be marked. Position your monitor so that it is not facing others or easily observed by others when in use Correct. Select the information on the data sheet that is personally identifiable information (PII). (GFE) When can you check personal e-mail on your Government-furnished equipment (GFE)? **Insider Threat What type of activity or behavior should be reported as a potential insider threat? Controlled Unclassified Information (CUI) is information that requires safeguarding or dissemination controls pursuant to and consistent with applicable law, regulations, and government-wide policies but is not classified under Executive Order 13526 or the Atomic Energy Act, as amended. Assuming open storage is always authorized in a secure facility. Correct. Which of the following statements is TRUE about the use of DoD Public Key Infrastructure (PKI) tokens? What should the owner of this printed SCI do differently? **Classified Data What is a good practice to protect classified information? Write your password down on a device that only you access. Follow procedures for transferring data to and from outside agency and non-Government networks. (Identity Management) What certificates are contained on the Common Access Card (CAC)? **Identity Management Your DoD Common Access Card (CAC) has a Public Key Infrastructure (PKI) token approved for access to the NIPRNet. 1 Answer/Comment. Her badge is not visible to you. ~All documents should be appropriately marked, regardless of format, sensitivity, or classification. The email states your account has been compromised and you are invited to click on the link in order to reset your password. Memory sticks, flash drives, or external hard drives. What should be your response? (social networking) Which of the following is a security best practice when using social networking sites? Which Of The Following Statements About Adding Social Networks To Hootsuite Is False? A coworker brings a personal electronic device into prohibited areas. What can help to protect the data on your personal mobile device. What is best practice while traveling with mobile computing devices? correct. Which of the following best describes good physical security? All to Friends Only. You receive an unexpected email from a friend: I think youll like this: https://tinyurl.com/2fcbvy. What action should you take? **Social Engineering What action should you take with an e-mail from a friend containing a compressed Uniform Resource Locator (URL)? What should you do? What must authorized personnel do before permitting another individual to enter a Sensitive Compartmented Information Facility (SCIF)? Insiders are given a level of trust and have authorized access to Government information systems. You must have your organizations permission to telework. Always use DoD PKI tokens within their designated classification level. Which of the following is a practice that helps to prevent the download of viruses and other malicious code when checking your email? Read the latest news from the Controlled Unclassified Information (CUI) program. A coworker removes sensitive information without authorization. *Sensitive Compartmented Information What is Sensitive Compartmented Information (SCI)? It is getting late on Friday. *Sensitive Compartmented Information Which of the following best describes the compromise of Sensitive Compartmented Information (SCI)? Report the suspicious behavior in accordance with their organizations insider threat policy. Protection may be required for privacy, law enforcement, contractual protections, or other reasons. 8. Identification, encryption, and digital signature. To transmit large payments through Fedwire __________, To regulate and supervise the stock market to provide stability and security to individual investors. Your health insurance explanation of benefits (EOB). Note any identifying information, such as the website's URL, and report the situation to your security POC. How many insider threat indicators does Alex demonstrate? Which of these is true of unclassified data?-It must be released to the public immediately.-Its classification level may rise when aggregated. Which of the following is NOT an appropriate way to protect against inadvertent spillage? You must have your organizations permission to telework. What are some potential insider threat indicators? which of the following is true about unclassified Courses 442 View detail Preview site They broadly describe the overall classification of a program or system. I may decide not to consent to these terms, but, if I do not consent to all of these terms, then I agree not to proceed with creating an account or moving forward with filling out the application, and I understand that I will not be . (Wrong). Who designates whether information is classified and its classification level? Scan external files from only unverifiable sources before uploading to computer. Which of the following is NOT a typical means for spreading malicious code? For Government-owned devices, use approved and authorized applications only. How do you respond? Do not download it. Which of the following is true of Protected Health Information (PHI)? You must have your organization's permission to telework. By Quizzma Team / Technology. What information relates to the physical or mental health of an individual? not correct (Home computer) Which of the following is best practice for securing your home computer? Unusual interest in classified information. Badges must be visible and displayed above the waist at all times when in the facility. Correct. A coworker wants to send you a sensitive document to review while you are at lunch and you only have your personal tablet. What should the participants in this conversation involving SCI do differently? Which of the following is true of Internet of Things (IoT) devices? Ask for information about the website, including the URL. Only use Government-furnished or Government-approved equipment to process PII. Under what circumstances could unclassified information be considered a threat to national security? Of the following, which is NOT a security awareness tip? *Controlled Unclassified Information Which of the following is NOT an example of CUI? (social networking) When may you be subjected to criminal, disciplinary, and/or administrative action due to online misconduct? We thoroughly check each answer to a question to provide you with the most correct answers. It never requires classification markings, is true about unclassified data. Spillage occurs when information is spilled from a higher classification or protection level to a lower classification or protection level. How many potential insider threat indicators does this employee display? Use personally-owned wired headsets and microphones only in designated areas, New interest in learning a foreign language. Sanitized information gathered from personnel records. Proactively identify potential threats and formulate holistic mitigation responses. Share sensitive information only on official, secure websites. Which of the following makes Alexs personal information vulnerable to attacks by identity thieves? Tell us about it through the REPORT button at the bottom of the page. Appropriate clearance; signed and approved non-disclosure agreement; and need-to-know. Based on the description that follows, how many potential insider threat indicator(s) are displayed? The proper security clearance and indoctrination into the SCI program. Search the Registry: Categories, Markings and Controls: Category list CUI markings Classified Information can only be accessed by individuals with. Avoid using non-Bluetooth-paired or unencrypted wireless computer peripherals. **Classified Data Which of the following can an unauthorized disclosure of information classified as Confidential reasonably be expected to cause? Correct Which of the following statements is TRUE about the use of DoD Public Key Infrastructure (PKI) tokens? (Malicious Code) What is a good practice to protect data on your home wireless systems? A coworker has asked if you want to download a programmer's game to play at work. correct. which of the following is true about unclassified data. Official websites use .gov Which may be a security issue with compressed Uniform Resource Locators (URLs)? (Correct) -It does not affect the safety of Government missions. -Its classification level may rise when aggregated. Classified DVD distribution should be controlled just like any other classified media. How can you guard yourself against Identity theft? **Use of GFE What is a critical consideration on using cloud-based file sharing and storage applications on your Government-furnished equipment (GFE)? Correct. true-statement. You have reached the office door to exit your controlled area. What can be used to track Marias web browsing habits? What should you do if a reporter asks you about potentially classified information on the web? With WEKA users, you can access WEKA sample files. Correct, Someone who uses authorized access, wittingly or unwittingly, to harm national security through unauthorized disclosure or other actions that may cause the loss or degradation of resources or capabilities. This is information that, if released to the public, carries no injury to personal, industry, or government interests. Store your Common Access Card (CAC) or Personal Identity Verification (PIV) card in a shielded sleeve ~Write your password down on a device that only you access (e.g., your smartphone) Change your password at least every 3 months Enable two-factor authentication whenever available, even for personal accounts. What is an individual's Personally Identifiable Information (PII) or Protected Health Information (PHI) considered? Confirm the individuals need-to-know and access. *Spillage Which of the following may help to prevent spillage? Make note of any identifying information and the website URL and report it to your security office. Should you always label your removable media? What should you do after you have ended a call from a reporter asking you to confirm potentially classified info found on the web? What certificates are contained on the Common Access Card (CAC)? Which of the following is NOT one? How should you protect your Common Access Card (CAC) or Personal Identity Verification (PIV) card? Someone calls from an unknown number and says they are from IT and need some information about your computer. **Classified Data What level of damage can the unauthorized disclosure of information classified as Confidential reasonably be expected to cause? A Coworker has asked if you want to download a programmers game to play at work. What is a security best practice to employ on your home computer? What is the best choice to describe what has occurred?