correct. When your vacation is over, and you have returned home. TheNational Archives and Records Administration (NARA)servesas the Controlled Unclassified Information (CUI) Executive Agent (EA). What should Sara do when publicly available Internet, such as hotel Wi-Fi? Which is NOT a method of protecting classified data? Using webmail may bypass built in security features. John submits CUI to his organizations security office to transmit it on his behalf. You must have your organization's permission to telework. After work hours, storing sensitive information in unlocked containers, desks, or cabinets if security is not present. Confirm the individuals need-to-know and access. (Malicious Code) While you are registering for a conference, you arrive at the website http://www.dcsecurityconference.org/registration/. Press release data. Found a mistake? *Spillage Which of the following actions is appropriate after finding classified information on the Internet? Report the crime to local law enforcement. Attempt to change the subject to something non-work related, but neither confirm nor deny the articles authenticity. However, unclassified data. A headset with a microphone through a Universal Serial Bus (USB) port. **Website Use How should you respond to the theft of your identity? Which of the following best describes good physical security? (Correct)-It does not affect the safety of Government missions.-It never requires classification markings. (Malicious Code) What is a common indicator of a phishing attempt? correct. What should you do after you have ended a call from a reporter asking you to confirm potentially classified information found on the web? Organizational Policy Not correct In which situation below are you permitted to use your PKI token? Based on the description that follows, how many potential insider threat indicator(s) are displayed? Media containing Privacy Act information, PII, and PHI is not required to be labeled. The email has an attachment whose name contains the word secret. Which is a risk associated with removable media? The date of full implementation of the CUI Program will be announced by the EPAs CUI Senior Agency Official (CUI SAO) and updated here on EPAs public web page. **Insider Threat Which of the following should be reported as a potential security incident? Classified material must be appropriately marked. Which of the following actions is appropriate after finding classified Government information on the internet? Telework is only authorized for unclassified and confidential information. Unauthorized Disclosure of Classified Information for DoD, Security Awareness: Derivative Classification Answers, CITI Ethics, Responsible Conduct, RCR, Law, HTH And IRB Answers, EVERFI Achieve Consumer Financial Education Answers, Security Pro: Chapter 3 (3.1.8) & 4.1 Security Policies Answers, CITI Module #3 Research in Public Elementary and Secondary Schools, Answers to CTS Unit 7 Lab 7-2: Protocols and Services SNMP, Google Analytics Individual Qualification Exam Answers, Everfi Module 4 Credit Scores Quiz Answers, Which Of The Following Is Not Considered A Potential Insider Threat Indicator. New interest in learning another language? Only friends should see all biographical data such as where Alex lives and works. Unauthorized Disclosure of Classified Information and Controlled Unclassified Information . Which of the following is true of Unclassified Information? Many apps and smart devices collect and share your personal information and contribute to your online identity. You receive an inquiry from a reporter about government information not cleared for public release. What should you do? As long as the document is cleared for public release, you may release it outside of DoD. What should be your response? A lock (LockA locked padlock) or https:// means youve safely connected to the .gov website. 1.1.2 Classified Data. When using a public device with a card reader, only use your DoD CAC to access unclassified information, is only allowed if the organization permits it. **Identity management What is the best way to protect your Common Access Card (CAC)? Some examplesyou may be familiar with: TheFederalCUI Registry,shows authorized categoriesandassociated markings, as well as applicable safeguarding, dissemination, and decontrol procedures. what should be your response be? Executive Order 13556, Controlled Unclassified Information, requires the Executive Branch to establish an open and uniform program for managing [unclassified] information that requires safeguarding or dissemination controls pursuant to and consistent with laws, regulations, and Government-wide policies. The National Archives and Records Administration (NARA) was named the Executive Agent (EA) responsible for overseeing the CUI Program. data. Which of the following represents an ethical use of your Government-furnished equipment (GFE)? Ask for information about the website, including the URL. *Classified Data Setting weekly time for virus scan when you are not on the computer and it is powered off. Everything you need to know aboutControlled UnclassifiedInformation(CUI). When vacation is over, after you have returned home. Which of the following definitions is true about disclosure of confidential information? Which Of The Following Statements About Adding Social Networks To Hootsuite Is False? What are some potential insider threat indicators? **Social Engineering What is TRUE of a phishing attack? Use only your personal contact information when establishing your account. Social Security Number, date and place of birth, mothers maiden name. **Insider Threat Based on the description that follows, how many potential insider threat indicator(s) are displayed? Question 1: The business impact analysis (BIA) identifies the resources for which a business continuity plan (BCP) is necessary. Validate all friend requests through another source before confirming them. PII includes, but is not limited to, social security numbers, date and places of birth, mothers maiden names, biometric records, and PHI. Validate friend requests through another source before confirming them. Based on the description that follows, how many potential insider threat indicator(s) are displayed? What is the best choice to describe what has occurred? What should you do? How many potential insiders threat indicators does this employee display? Prudence faxes CUI using an Unclassified cover sheet via a Secret fax machine. **Insider Threat What do insiders with authorized access to information or information systems pose? -It never requires classification markings. You may use your personal computer as long as it is in a secure area in your home b. 5. Request the users full name and phone number. If you participate in or condone it at any time. (Spillage) Which of the following practices may reduce your appeal as a target for adversaries seeking to exploit your insider status? This answer has been confirmed as correct and helpful. What portable electronic devices (PEDs) are permitted in a SCIF? How many potential insider threat indicators is Bob displaying? Which of the following is a proper way to secure your CAC/PIV? A vendor conducting a pilot program with your organization contacts you for organizational data to use in a prototype. Linda encrypts all of the sensitive data on her government issued mobile devices. *Controlled Unclassified Information Which of the following best describes a way to safely transmit Controlled Unclassified Information (CUI)? (Sensitive Information) Which of the following is NOT an example of sensitive information? **Social Networking Which of the following is a security best practice when using social networking sites? February 8, 2022. Classified DVD distribution should be controlled just like any other classified media. Right-click the link and select the option to preview??? Use your own security badge, key code, or Common Access Card (CAC)/Personal Identity Verification (PIV) card. Controlled Unclassified Information (CUI) is informationthat requires safeguarding or dissemination controls consistent with applicable laws, regulations, and Government-wide policies, but is not classified under Executive Order 13526 "Classified National Security Informat What are examples of CUI? asked in Internet by voice (265k points) internet. Sensitive information. Which of the following is NOT a requirement for telework? 8. Compute The Average Kids Per Family. What information most likely presents a security risk on your personal social networking profile? Classified Information can only be accessed by individuals with. -Its classification level may rise when aggregated. Correct. Look for a digital signature on the email. On a NIPRNET system while using it for a PKI-required task. Which of the following should you do immediately? Do not access website links in e-mail messages. You should remove and take your CAC/PIV card whenever you leave your workstation. A coworker removes sensitive information without authorization. How are Trojan horses, worms, and malicious scripts spread? The challenges goal is simple: To change user behavior to reduce the risks and vulnerabilities DoD Information Systems face. Store classified data appropriately in a GSA-approved vault/container. CUI is not classified information. Spillage occurs when information is spilled from a higher classification or protection level to a lower classification or protection level. Click on "Open File". Paul verifies that the information is CUI, includes a CUI marking in the subject header and digitally signs an e-mail containing CUI. CPCON 5 (Very Low: All Functions). A colleague is playful and charming, consistently wins performance awards, and is occasionally aggressive in trying to access classified information. How can you protect your organization on social networking sites? What should you do after you have ended a call from a reporter asking you to confirm potentially classified info found on the web? EPA anticipates beginning CUI practices (designating, marking, safeguarding, disseminating, destroying, and decontrolling) starting in FY2023. JavaScript appears to be disabled on this computer. Attempt to change the subject to something non-work related, but neither confirm nor deny the articles authenticity. THIS IS THE BEST ANSWER . The age of the driver may top the list of variables. If authorized, what can be done on a work computer? Classified data: (Scene) Which of the following is true about telework? **Classified Data Which classification level is given to information that could reasonably be expected to cause serious damage to national security? Someone who uses authorized access, wittingly or unwittingly, to harm national security through unauthorized disclosure or other actions that may cause the loss or degradation of resources or capabilities. Never write down the PIN for your CAC. How should you respond? What would you do if you receive a game application request on your government computer that includes permission to access your friends, profile information, cookies, and sites visited? Of the following, which is NOT an intelligence community mandate for passwords? (Insider Threat) Based on the description that follows, how many potential insider threat indicator(s) are displayed? The following practices help prevent viruses and the downloading of malicious code except. Maria is at home shopping for shoes on Amazon.com. Malicious code can do damage by corrupting files, erasing your hard drive, and/or allowing hackers access. Exceptionally grave damage to national security. Immediately notify your security point of contact. What level of damage to national security could reasonably be expected if unauthorized disclosure of Top Secret information occurred? DOD Cyber Awareness 2021 (DOD-IAA-V18.0) Know, RT202: Ch. How do you respond? When is it appropriate to have your security badge visible? What should you do? Definition 1 / 24 -It must be released to the public immediately. What information should you avoid posting on social networking sites? Follow procedures for transferring data to and from outside agency and non-Government networks. A colleague abruptly becomes hostile and unpleasant after previously enjoying positive working relationships with peers, purchases an unusually expensive new car, and has unexplained absences from work. Click the card to flip Flashcards Learn Test Match Created by Jamie_Lancaster Terms in this set (24) Contact the IRS using their publicly available, official contact information. When operationally necessary, owned by your organization, and approved by the appropriate authority. **Identity management Which is NOT a sufficient way to protect your identity? A colleague removes sensitive information without seeking authorization in order to perform authorized telework. e. Why do Elodea and onion cells have more consistent shapes than human epithelial cells? *Sensitive Information Under which circumstances is it permitted to share an unclassified draft document with a non-DoD professional discussion group? Avoid using non-Bluetooth-paired or unencrypted wireless computer peripherals. c. What similarities and differences are there between plant and animal cells? Software that installs itself without the users knowledge. Your password and a code you receive via text message. **Home Computer Security How can you protect your information when using wireless technology? Which of the following individuals can access classified data? T/F. Let us have a look at your work and suggest how to improve it! What level of damage can the unauthorized disclosure of information classified as Top Secret reasonably be expected to cause? laptops, fitness bands, tablets, smartphones, electric readers, and Bluetooth devices. Phishing can be an email with a hyperlink as bait. When unclassified data is aggregated, its classification level may rise. What should be done to protect against insider threats? What does Personally Identifiable Information (PII) include? 1.1 Standard Challenge Answers. Only expressly authorized government-owned PEDs. Which of the following is true about unclassified data? Government-owned PEDs when expressly authorized by your agency. Select the information on the data sheet that is personally identifiable information (PII). A coworker is observed using a personal electronic device in an area where their use is prohibited. Spillage because classified data was moved to a lower classification level system without authorization. What is an individual's Personally Identifiable Information (PII) or Protected Health Information (PHI) considered? Use the classified network for all work, including unclassified work. Examples are: Patient names, Social Security numbers, Drivers license numbers, insurance details, and birth dates. Label all files, removable media, and subject headers with appropriate classification markings. What is a possible indication of a malicious code attack in progress? It is releasable to the public without clearance. Amendments to a variety of policy documents as well as others referencing Confidential Business Information (CBI) submissions or handling, Changes to paper and e-forms and instructions for their submission to EPA. The National Archives and Records Administration (NARA) serves as the Controlled Unclassified Information (CUI) Executive Agent (EA). Unusual interest in classified information. not correct internet-quiz. It displays a label showing maximum classification, date of creation, point of contact, and Change Management 9CM) Control Number. Who designates whether information is classified and its classification level? Which of the following is NOT an example of sensitive information? Your password and the second commonly includes a text with a code sent to your phone. You receive an email at your official Government email address from an individual at the Office of Personnel Management (OPM). When teleworking, you should always use authorized and software. Always take your CAC when you leave your workstation. CPCON 3 (Medium: Critical, Essential, and Support Functions) What can you do to protect yourself against phishing? What level of damage can the unauthorized disclosure of information classified as confidential reasonably be expected to cause? Thiswill enabletimely and consistent informationsharing andincreasetransparency throughout the Federal government and with non-Federal stakeholders. **Removable Media in a SCIF What action should you take when using removable media in a Sensitive Compartmented Information Facility (SCIF)? Which of the following does NOT constitute spillage? All https sites are legitimate and there is no risk to entering your personal info online. When is it okay to charge a personal mobile device using government-furnished equipment (GFE)? **Home Computer Security Which of the following is a best practice for securing your home computer? What should you do if someone asks to use your government issued mobile device (phone/laptop..etc)? A colleague is playful and charming, consistently wins performance awards, and is occasionally aggressive in trying to access classified information. Which of these is true of unclassified data? (controlled unclassified information) Which of the following is NOT correct way to protect CUI? Which of the following is an example of malicious code? Phishing can be an email with a hyperlink as bait. You receive an email from a company you have an account with. Classified information that should be unclassified and is downgraded. -It must be released to the public immediately. Top Secret information could be expected to cause exceptionally grave damage to national security of disclosed. What is an indication that malicious code is running on your system? **Social Networking What should you do if you receive a game application request that includes permission to access your friends, profile information, cookies, and sites visited? **Social Engineering Which may be a security issue with compressed Uniform Resource Locators (URLs)? **Mobile Devices What should you do when going through an airport security checkpoint with a Government-issued mobile device? A type of phishing targeted at high-level personnel such as senior officials. Retrieve classified documents promptly from printers. cyber. Mark SCI documents appropriately and use an approved SCI fax machine. How can you protect yourself on social networking sites? Immediately notify your security point of contact. When using a fax machine to send sensitive information, the sender should do which of the following? Controlled Unclassified Information (CUI): Controlled Unclassified information was defined in the Executive Order 13556 as information held by or generated for the Federal Government that requires safeguarding or dissemination controls pursuant to and consistent with applicable law, regulations and government-wide policies that isn't classified A colleague has won 10 high-performance awards, can be playful and charming, is not currently in a relationship, and is occasionally aggressive in trying to access sensitive information. You know this project is classified. CPCON 4 (Low: All Functions) Directing you to a website that looks real. Scan external files from only unverifiable sources before uploading to computer. Which of the following is true about telework? Use only personal contact information when establishing your personal account. Which method would be the BEST way to send this information? Which of the following is an example of two-factor authentication? Adversaries exploit social networking sites to disseminate fake news. (Sensitive Compartmented Information) What portable electronic devices (PEDs) are allow in a Secure Compartmented Information Facility (SCIF)? There are many travel tips for mobile computing. What is required for an individual to access classified data? Insiders are given a level of trust and have authorized access to Government information systems. Spillage can be either inadvertent or intentional. Her badge is not visible to you. When gases are sold they are usually compressed to high pressures. Use personally-owned wired headsets and microphones only in designated areas, New interest in learning a foreign language. Use personal information to help create strong passwords. Connect to the Government Virtual Private Network (VPN). Maintain visual or physical control of the device. What is a proper response if spillage occurs? By Quizzma Team / Technology. Remove security badge as you enter a restaurant or retail establishment. Connect to the Government Virtual Private Network (VPN).?? There is no way to know where the link actually leads. The CUIProgramisan unprecedented initiative to standardize practices across more than 100 separate departments and agencies, as well asstate, local,tribal and, private sector entities; academia; and industry. Coworker making consistent statements indicative of hostility or anger toward the United States and its policies. b. taking away a toy or treat **Classified Data What is a good practice to protect classified information? Which of the following is NOT a criterion used to grant an individual access to classified data? How many potential insider threat indicators does this employee display? CUI may be stored on any password-protected system. A user writes down details from a report stored on a classified system marked as Secret and uses those details to draft an unclassified briefing on an unclassified system without authorization. Which of the following is not considered an example of data hiding? Unclassified documents do not need to be marked as a SCIF. Ans: True Question 2: The Government Information Security Reform Act (Security Reform Act) of 2000 focuses on management View the full answer What security device is used in email to verify the identity of sender? 870 Summit Park Avenue Auburn Hills, MI 48057. Ensure proper labeling by appropriately marking all classified material and, when required, sensitive material. Upon connecting your Government- issued laptop to a public wireless connection, what should you immediately do? Use your own security badge, key code, or Common Access Card (CAC)/Personal Identity Verification (PIC) card. What certificates are contained on the Common Access Card (CAC)? A. For example, when you buy propane for your barbecue, your tank is placed on a scale while it is filled under high pressure (Figure 7). Unusual interest in classified information. This bag contains your government-issued laptop. After reading an online story about a new security project being developed on the military installation where you work, your neighbor asks you to comment about the article. What is the best example of Protected Health Information (PHI)? Which of the following does not constitute spillage. A program that segregates various type of classified information into distinct compartments for added protection and dissemination for distribution control. Which of the following is a good practice to prevent spillage? Jozeal. CPCON 1 (Very High: Critical Functions) *Insider Threat Which of the following is a potential insider threat indicator? 1.1.3 Insider Threat. **Identity management Which of the following is NOT a best practice to preserve the authenticity of your identity? Never allow sensitive data on non-Government-issued mobile devices. (Malicious Code) What is a good practice to protect data on your home wireless systems? Even within a secure facility, dont assume open storage is permitted. -Its classification level may rise when aggregated. Which of the following is NOT one? Others may be able to view your screen. What is the best course of action? Create separate user accounts with strong individual passwords. Not correct Course Introduction Introduction . You check your bank statement and see several debits you did not authorize. Looking at your MOTHER, and screaming THERE SHE BLOWS! Infographic - Text version Infographic [PDF - 594 KB] Report a problem or mistake on this page Date modified: 2020-12-14 Correct. If you receive a phone call from a stranger asking for information about your invoice payment process, you should: Crucial information about a user or organization can be gained through. Which of the following statements is TRUE about the use of DoD Public Key Infrastructure (PKI) tokens? Which of the following is an example of punishment by application? #1) Open WEKA and select "Explorer" under 'Applications'. What should be done to sensitive data on laptops and other mobile computing devices? Under which circumstances may you be subject to criminal, disciplinary, and/or administrative action due to online misconduct? **Insider Threat Which of the following should be reported as a potential security incident (in accordance with you Agencys insider threat policy)? **Insider Threat How many potential insider threat indicators does a coworker who often makes others uneasy by being persistent in trying to obtain information about classified projects to which he has no access, is boisterous about his wife putting them in credit card debt, and often complains about anxiety and exhaustion display? A colleague asks to leave a report containing protected health information (PHI) on his desk overnight so he can continue working on it the next day. What should be your response? Power off any mobile devices when entering a secure area. **Identity management Which of the following is an example of two-factor authentication? Unclassified information cleared for public release. Only allow mobile code to run from your organization or your organizations trusted sites. They may wittingly or unwittingly use their authorized access to perform actions that result in the loss or degradation of resources or capabilities.

Sunny Hostin Husband Nationality, Tiendas De Utensilios De Cocina En Estados Unidos, Natalia Barnett Birth Mother Dna, Articles W