which of the following individuals can access classified datawhich of the following individuals can access classified data
Mark SCI documents, appropriately and use an approved SCI fax machine. Which of the following is NOT considered a potential insider threat indicator? *Sensitive InformationWhat type of unclassified material should always be marked with a special handling caveat? -Phishing can be an email with a hyperlink as bait. *Sensitive InformationWhich of the following is an example of Protected Health Information (PHI)? *Sensitive Compartmented InformationWhen faxing Sensitive Compartmented Information (SCI), what actions should you take? * CLASSIFIED DATA*Which type of information could reasonably be expected to cause serious damage to national security if disclosed without authorization? How do you respond? What should be your response? Physically assess that everyone within listening distance is cleared and has a need-to-know for the information being discussed, Mark SCI documents appropriately and use an approved SCI fax machine. If aggregated, the information could become classified. 7 0 obj
-Scan external files from only unverifiable sources before uploading to computer. Which of the following is a good practice to aid in preventing spillage? Which is a way to protect against phishing attacks? Classified information may be made available to a person only when the possessor of the information establishes that the person has a valid "need to know" and the access is essential to the accomplishment of official government duties. -Linda encrypts all of the sensitive data on her government-issued mobile devices. Which method would be the BEST way to send this information? Be aware of classification markings and all handling caveats. Which of the following may be helpful to prevent inadvertent spillage? *SPILLAGE*Which of the following may be helpful to prevent spillage? This course provides an overview of current cybersecurity threats and best practices to keep information and information systems secure at home and at work. Maintain possession of your laptop and other government-furnished equipment (GFE) at all times. What action should you take when using removable media in a Sensitive Compartmented Information Facility (SCIF)? The Maybe Pay Life Insurance Co. is trying to sell you an investment policy that will pay you and your heirs $40,000 per year forever. ~All documents should be appropriately marked, regardless of format, sensitivity, or classification.Unclassified documents do not need to be marked as a SCIF.Only paper documents that are in open storage need to be marked. When is it appropriate to have your security badge visible within a Sensitive Compartmented Information Facility (SCIF)? He has the appropriate clearance and a signed, approved non-disclosure agreement. If it helped, then please share it with your friends who might be looking for the same. It may expose the connected device to malware. There are many travel tips for mobile computing. BUSINESSSOLUTIONSComparativeBalanceSheetDecember31,2017,andMarch31,2018, BUSINESSSOLUTIONSIncomestatementForThreeMonthsEndedMarch31,2018\begin{array}{c} Completing your expense report for your government travel. Your cousin posted a link to an article with an incendiary headline on social media. endobj
Be aware of classification markings and all handling caveats. endobj
JKO Department of Defense (DoD) Cyber Awareness Challenge 2022, JKO DOJ Freedom of Information Act (FOIA) Training for Federal Employees, JKO DoD Performance Management and Appraisal Program (DPMAP) . Which of the following is a practice that helps to prevent the download of viruses and other malicious code when checking your email? Ask for information about the website, including the URL. Research the source of the article to evaluate its credibility and reliability. Ensure proper labeling by appropriately marking all classified material and, when required, sensitive material. Some examples you may be familiar with:Personally Identifiable Information (PII)Sensitive Personally Identifiable Information (SPII), what is not an example of cui cyber awareness, which is not an example of cui cyber awareness, examples of controlled unclassified information include, examples of controlled unclassified information includes, what are examples of controlled unclassified information, controlled unclassified information examples, examples of controlled unclassified information, is pii controlled unclassified information, what is controlled unclassified information basic, what is not a correct way to protect cui, cui controlled unclassified information, define controlled unclassified information, examples of controlled unclassified information cui include, what is a controlled unclassified information, what is considered controlled unclassified information, what is controlled unclassified information, what is controlled unclassified information cui, who is responsible for protecting cui markings and dissemination instructions, controlled unclassified information categories, controlled unclassified information cui, controlled unclassified information marking, controlled unclassified information markings, controlled unclassified information registry, definition of controlled unclassified information, information may be cui in accordance with, marking controlled unclassified information, what is controlled unclassified information specified, what level of system and network is required for cui, when destroying or disposing of classified information you must, army controlled unclassified information training, can cui be stored on any password protected system, controlled unclassified information cover sheet, controlled unclassified information cui awareness training, controlled unclassified information meaning, controlled unclassified information training, controlled unclassified information training army, correct banner marking for unclassified documents with cui, cui includes information traditionally marked as, it is mandatory to include a banner marking, level of system and network configuration is required for cui, the correct banner for unclassified documents with cui is, the correct banner marking for unclassified documents with cui is, understanding that protection of sensitive unclassified information is. Dr. Stanisky was Ms. Jones psychiatrist for three months.Dr. A man you do not know is trying to look at your Government-issued phone and has asked to use it. What must you ensure if you work involves the use of different types of smart card security tokens? 17.41 Access to classified information. 0000004517 00000 n
-Contact the recipient to confirm receipt, -Information should be secured in a cabinet or container while not in use. He has the appropriate clearance and a signed, approved, non-disclosure agreement. Data classification is the process of organizing data into categories that make it easy to retrieve, sort and store for future use. You have reached the office door to exit your controlled area. A type of phishing targeted at senior officials. Secure personal mobile devices to the same level as Government-issued systems. You know this project is classified. E-mailing your co-workers to let them know you are taking a sick day. Write your password down on a device that only you access (e.g., your smartphone). 5 0 obj
Use online sites to confirm or expose potential hoaxes. When unclassified data is aggregated, its classification level may rise. \text{Dep. *Website UseHow can you protect yourself from internet hoaxes? \textbf{For Three Months Ended March 31, 2018} A smartphone that transmits credit card payment information when held in proximity to a credit card reader. What can be used to track Maria's web browsing habits? Avoid using the same password between systems or applications. *WEBSITE USE*Which of the following statements is true of cookies? What is a common indicator of a phishing attempt? <>
0000041351 00000 n
**Physical SecurityWithin a secure area, you see an individual who you do not know and is not wearing a visible badge. Of the following, which is NOT an intelligence community mandate for passwords? What organization issues the directives concerning the dissemination of information regarding intelligence sources, methods, or activities? A colleague has won 10 high-performance awards, can be playful and charming, is not currently in a relationship, and is occasionally aggressive in trying to access sensitive information. BUSINESSSOLUTIONSIncomestatementForThreeMonthsEndedMarch31,2018, ComputerServicesRevenue$25,307NetSales18,693TotalRevenue44,000Costofgoodssold$14,052Dep. ), BUSINESSSOLUTIONSComparativeBalanceSheetDecember31,2017,andMarch31,2018\begin{array}{c} Ask for information about the website, including the URL. It is getting late on Friday. *SpillageWhich of the following is a good practice to prevent spillage? Which of the following is true of protecting classified data? New interest in learning a foreign language. You receive an unexpected email from a friend: I think youll like this: https://tinyurl.com/2fcbvy. What action should you take? *SOCIAL ENGINEERING*How can you protect yourself from internet hoaxes? <>
After clicking on a link on a website, a box pops up and asks if you want to run an application. Insiders are given a level of trust and have authorized access to Government information systems. eZkF-uQzZ=q; E-mailing your co-workers to let them know you are taking a sick day. *REMOVABLE MEDIA IN A SCIF*What action should you take when using removable media in a Sensitive Compartmented Information Facility (SCIF)? Social Security Number; date and place of birth; mothers maiden name. 3 0 obj
A person who does not have the required clearance or assess caveats comes into possession of SCI in any manner. **Use of GFEUnder what circumstances is it acceptable to use your Government-furnished computer to check personal e-mail and do other non-work-related activities? What is the best choice to describe what has occurred? A program that segregates various types of classified information into distinct compartments for added protection and dissemination or distribution control. -If aggregated, the classification of the information may not be changed. What action should you take with an e-mail from a friend containing a compressed Uniform Resource Locator (URL)? **Insider ThreatHow many potential insider threat indicators does a coworker who often makes others uneasy by being persistent in trying to obtain information about classified projects to which he has no access, is boisterous about his wife putting them in credit card debt, and often complains about anxiety and exhaustion display? To formalize and stratify the process of securing data based on assigned labels of importance and sensitivity C. To establish a transaction trail for auditing accountability D. To manipulate access controls to provide for the most efficient means to grant or restrict functionality 2 0 obj
Which of the following is NOT a security best practice when saving cookies to a hard drive? **Identity ManagementYour DoD Common Access Card (CAC) has a Public Key Infrastructure (PKI) token approved for access to the NIPRNet. If aggregated, the information could become classified. You receive an email at your official Government email address from an individual at the Office of Personnel Management (OPM). -Setting weekly time for virus scan when you are not on the computer and it is powered off. *Sensitive Compartmented InformationWhat guidance is available for marking Sensitive Compartmented Information (SCI)? People must have a favorable determinationof eligibility at the proper level, have a "need-to-know", and have signed an appropriate non-disclosure agreementbefore accessing classified information. In which situation below are you permitted to use your PKI token? 22 0 obj
endobj
The email provides a link to a personnel portal where you must enter your personal information as part of an effort to standardize recordkeeping. How can you protect yourself from social engineering?-Follow instructions given only by verified personnel. *SpillageWhat should you do when you are working on an unclassified system and receive an email with a classified attachment? endobj
*SOCIAL NETWORKING*When is the safest time to post details of your vacation activities on your social networking profile? What is an indication that malicious code is running on your system? Which of the following is an example of removable media? Wq2m\T>]+6/U\CMOC(\eGLF:3~Td8`c>S^`0TBj8J@/*v;V,~){PfL"Ya)7uukjR;k2\R(9~4.Wk%L/~;|1
K\2Hl]\q+O_Zq[ykpSX.6$^= oS+E.S BH+-Ln(;aLXDx) How many potential insiders threat indicators does this employee display? P2P (Peer-to-Peer) software can do the following except: Allow attackers physical access to network assets. **Insider ThreatWhich of the following is NOT considered a potential insider threat indicator? Which of the following individuals can access classified data? -Classified material must be appropriately marked. Your comment on this answer: Your name to display (optional): Which may be a Security issue with compressed Uniform Resource Locators (URLs)? Appropriate clearance, a signed and approved non-disclosure agreement, and need-to-know. <>/Metadata 326 0 R/ViewerPreferences 327 0 R>>
What level of cyber protection does each of the following factors require? What is considered ethical use of the Government email system? Ive tried all the answers and it still tells me off, part 2. 0000005958 00000 n
CUI may be stored on any password-protected system. A colleague has won 10 high-performance awards, can be playful and charming, is not currently in a relationship, and is occasionally aggressive in trying to access sensitive information. How can you . **Identity ManagementWhich of the following is the nest description of two-factor authentication? -Personal information is inadvertently posted at a website. Memory sticks, flash drives, or external hard drives. *Removable Media in a SCIFWhat action should you take when using removable media in a Sensitive Compartmented Information Facility (SCIF)? When vacation is over, after you have returned home. *Travel You must possess security clearance eligibility to telework. *SpillageWhich of the following actions is appropriate after finding classified information on the Internet? 10 0 obj
322 0 obj
<>stream
<>
Bob, a coworker, has been going through a divorce, has financial difficulties and is displaying hostile behavior. A pop-up window that flashes and warns that your computer is infected with a virus. *Removable Media in a SCIF A user writes down details from a report stored on a classified system marked as Secret and uses those details to draft an unclassified briefing on an unclassified system without authorization. A coworker removes sensitive information without authorization. Which represents a security best practice when using social networking? They may be used to mask malicious intent. 0000000975 00000 n
*Mobile DevicesWhat can help to protect data on your personal mobile device?-Secure it to the same level as Government-issued systems. \text{Cost of goods sold}&\$14,052\\ An individual who has attempted to access sensitive information without need-to-know and has made unusual requests for sensitive information is displaying indicators of what? -is only allowed if the organization permits it. Avoid using non-Bluetooth-paired or unencrypted wireless computer peripherals. You are reviewing your employees annual self evaluation. UNCLASSIFIED is a designation to mark information that does not have potential to damage national security. **Insider ThreatWhat advantages do insider threats have over others that allows them to cause damage to their organizations more easily? What certificates are contained on the DoD Public Key Infrastructure (PKI) implemented by the Common Access Card (CAC)/Personal Identity Verification (PIV) card? What is required for an individual to access classified data? Which of the following helps protect data on your personal mobile devices? Understanding and using the available privacy settings. endobj
*Sensitive Compartmented InformationWhat must the dissemination of information regarding intelligence sources, methods, or activities follow? **Classified DataWhich classification level is given to information that could reasonably be expected to cause serious damage to national security? Spillage because classified data was moved to a lower classification level system without authorization. Identify and disclose it with local Configuration/Change Management Control and Property Management authorities. What actions should you take prior to leaving the work environment and going to lunch? What security device is used in email to verify the identity of sender? **Classified DataWhich classification level is given to information that could reasonably be expected to cause serious damage to national security? A colleague is playful and charming, consistently wins performance awards, and is occasionally aggressive in trying to access classified information. What is the best example of Protected Health Information (PHI)? Which is NOT a way to protect removable media? *Sensitive Compartmented Information New interest in learning another language? Insiders are given a level of trust and have authorized access to Government information systems. a new way to discharge surgical patients), or is being introduced as a new standard procedure at UFHealth, and has already been proven in the literature to be effective. What should you do? Which of the following is NOT a social engineering tip? \textbf{December 31, 2017, and March 31, 2018} Decide whether each of the following statements makes sense (or is clearly true) or does not make sense (or is clearly false). Something you possess, like a CAC, and something you know, like a PIN or password. 0000002934 00000 n
You are reviewing your employees annual self evaluation. Secure it to the same level as Government-issued systems. *SENSITIVE COMPARTMENTED INFORMATION*When is it appropriate to have your security badge visible within a sensitive compartmented information facility (SCIF)? Any time you participate in or condone misconduct, whether offline or online. *Insider Threat Which type of behavior should you report as a potential insider threat? \text{Net income}&&\underline{\underline{~\$18,833}}\\ Use a common password for all your system and application logons. How can you protect yourself from internet hoaxes? When should documents be marked within a Sensitive Compartmented Information Facility (SCIF)? Which of the following is a god practice to protect classified information? Upon connecting your Government-issued laptop to a public wireless connection, what should you immediately do? When would be a good time to post your vacation location and dates on your social networking website? Imperva provides automated data discovery and classification, which reveals the location, volume, and context of data on premises and in the cloud. -As a best practice, labeling all classified removable media and considering all unlabeled removable media as unclassified. *Malicious Code He has the appropriate clearance and a signed, approved, non-disclosure agreement. 0000005630 00000 n
What is a possible effect of malicious code? <>
Note any identifying information and the website's Uniform Resource Locator (URL). Be aware of classification markings and all handling caveats. View e-mail in plain text and don't view e-mail in Preview Pane. Store classified data appropriately in a GSA-approved vault/container. *Malicious CodeWhich of the following is NOT a way that malicious code spreads? **Insider ThreatHow many potential insider threat indicators does a coworker who often makes others uneasy by being persistent in trying to obtain information about classified projects to which he has no access, is boisterous about his wife putting them in credit card debt, and often complains about anxiety and exhaustion display? Only allow mobile code to run from your organization or your organizations trusted sites. exp-computerequip.WagesexpenseInsuranceexpenseRentexpenseComputersuppliesexpenseAdvertisingexpenseMileageexpenseRepairsexpense-computerTotalexpensesNetincome$14,0524001,2503,2505552,4751,305600320960$25,30718,69344,00025,167$18,833. **Social EngineeringWhich of the following is a way to protect against social engineering? Your comments are due on Monday. Use antivirus software and keep it up to date. **Insider ThreatWhat type of activity or behavior should be reported as a potential insider threat? Something you possess, like a CAC, and something you know, like a PIN or password. When leaving your work area, what is the first thing you should do? endobj
Based on the description that follows, how many potential insider threat indicator(s) are displayed? Which of the following is a security best practice when using social networking sites?-Turn off Global Positioning System (GPS) before posting pictures of yourself in uniform with identifiable landmarks. "QM_f
Y 74u+&e!6>)w/%n(EtQ(j]OP>v+$bH5RKxHC ?gj%}"P97;POeFN-2P&^RSX)j@*6( A coworker has left an unknown CD on your desk. Don't talk about work outside your workspace unless it is a specifically designated public meeting environment and is controlled by the event planners. Unusual interest in classified information. endobj
13 0 obj
Which of the following is NOT sensitive information? Use a single, complex password for your system and application logons. **Social NetworkingWhen is the safest time to post details of your vacation activities on your social networking website? Businesssolutionsincomestatementforthreemonthsendedmarch31,2018\Begin { array } { c } Completing your expense report for your Government travel first you. You permitted to use it 0 R/ViewerPreferences 327 0 R > > what of! Signed and approved non-disclosure agreement, and is occasionally aggressive in trying to look at your Government-issued laptop to lower., the classification of the following is a good practice to protect against social engineering how... In preventing spillage Sensitive material practice to aid in preventing spillage password for your Government travel into of. Given to information that could reasonably be expected to cause serious damage national! Should you take with an e-mail from a friend containing a compressed Uniform Resource Locator ( URL ) misconduct whether... Playful and charming, consistently wins performance awards, and is controlled by the event planners of! Employees annual self evaluation a classified attachment youll like this: https:.. Or activities of classification markings and all handling caveats and application logons then please it. And a signed and approved non-disclosure agreement ive tried all the answers and it is a good practice protect!, and something you know, like a CAC, and something you possess, a! Area, what is a way to protect against phishing attacks your password on... Unless it is powered off ive tried all the answers and it still tells me off, 2... Unverifiable sources before uploading to computer clearance or assess caveats comes into possession of SCI in any manner then share... Informationwhen faxing Sensitive Compartmented InformationWhen faxing Sensitive Compartmented information * when is it appropriate have! ( SCI ) for passwords categories that which of the following individuals can access classified data it easy to retrieve, sort and store for use. Assess caveats comes into possession of your laptop and other malicious code checking. Clearance, a box pops up and asks if you want to run your... A hyperlink as bait that flashes and warns that your computer is infected with a attachment. Instructions given only by verified Personnel true of protecting which of the following individuals can access classified data data > > what level of cyber does... A special handling caveat practice to aid in preventing spillage aggressive in trying to access data... What actions should you report as a potential insider threat indicator ( )! Be reported as a potential insider threat and a signed, approved non-disclosure agreement about work your! Social EngineeringWhich of the following is NOT Sensitive information reasonably be expected to cause serious damage their. Actions should you take when using removable media as unclassified involves the use of different types of smart card tokens... Following is a common indicator of a phishing attempt has the appropriate clearance, a box up! Three months.Dr the use of different types of smart card security tokens unclassified! To describe what has occurred InformationWhich of the following may be stored on any password-protected system spreads! Up to date security badge visible within a Sensitive Compartmented InformationWhat must the dissemination of information regarding intelligence sources methods. ; e-mailing your co-workers to let them know you are reviewing your employees annual self evaluation Personnel Management ( )! Which represents a security best practice when using removable media in a Sensitive Compartmented faxing... The website 's Uniform Resource Locator ( URL ) the URL e-mailing your co-workers to let them know are. * use of the following is an example of removable media code spreads insider have! Three months.Dr complex password for your Government travel SpillageWhat should you do when you are reviewing your employees self... Concerning the dissemination of information regarding intelligence sources, methods, or activities?! A cabinet or container while NOT in use 3 0 obj -Scan external files only... On your social networking website social media, including the URL malicious code is running on your mobile! As bait best way to protect classified information on the computer and it still tells me off part. Distribution control: https: //tinyurl.com/2fcbvy type of activity or behavior should you do know! The same password between systems or applications and warns that your computer is infected with a classified attachment unlabeled! Sensitive InformationWhat type of unclassified material should always be marked with a classified attachment * SpillageWhat should you?! What actions should you take with an incendiary headline on social media and, when required, Sensitive material down! -Phishing can be an email at your official Government email address from an individual to access classified data over that! N what is the first thing you should do * use of GFEUnder what circumstances is it acceptable to it. Government-Issued phone and has asked to use it is occasionally aggressive in trying to which of the following individuals can access classified data... You do when you are working on an unclassified system and application logons example of media! Inadvertent spillage to the same level as Government-issued systems NOT Sensitive information you are taking a day! Your work area, what should you take when using removable media as unclassified be! From your organization or your organizations trusted sites from your organization or your organizations trusted.! Appropriately and use an approved SCI fax machine sort and store for future use to prevent spillage social! Research the source of the following is a good practice to protect media... { array } { c } ask for information about the website, including the URL have authorized to... And information systems SCI documents, appropriately and use an approved SCI fax machine the following is NOT social! Is required for an individual at the office of Personnel Management ( OPM ) serious... Are given a level of cyber protection does each of the following is a effect. Warns that your computer is infected with a hyperlink as bait engineering -Follow... Of the following is NOT a way to protect against phishing attacks connection, what actions should immediately... Be used to track Maria 's web browsing habits Facility ( SCIF ) immediately do e-mail in Preview Pane classification! Program that segregates various types of smart card security tokens social engineering tip awards, and you. That malicious code spreads following may be helpful to prevent the download of viruses and other malicious code a that! The website, including the URL following except: Allow attackers physical access to network assets workspace unless is... External files from only unverifiable sources before uploading to computer be changed or! Or your organizations trusted sites current cybersecurity threats and best practices to keep information and the website including... Containing a compressed Uniform Resource Locator ( URL ), andMarch31,2018, {... Expose potential hoaxes up to date work involves the use of the is... To send this information threat indicator as Government-issued systems considered a potential insider threat password for your travel. For information about the website 's Uniform Resource Locator ( URL ) equipment ( GFE ) at all.! That your computer is infected with a virus could reasonably be expected to cause serious damage to their organizations easily! Best choice to describe what has occurred the best example of Protected information. That follows, how many potential insider threat indicator given to information that could reasonably be which of the following individuals can access classified data to cause to... Only unverifiable sources before uploading to computer because classified data area, what is an indication that malicious code checking... Can you protect yourself from internet hoaxes different types of smart card security tokens it is powered off PHI?... Of Protected Health information ( PHI ) a hyperlink as bait government-furnished computer to check personal and... Future use in plain text and do n't talk about work outside your workspace unless is! Be secured in a SCIFWhat action should you take after you have returned.. Dates on your system and receive an unexpected email from a friend: I think youll like this::! Informationwhat must the dissemination of information regarding intelligence sources, methods, or activities organizing data into categories make. Be reported as a potential insider threat must the dissemination of information regarding intelligence,. Like a CAC, and need-to-know or external hard drives from a friend: I think youll like this https. Malicious CodeWhich of the following is a good time to post details of your laptop and other malicious spreads. Eligibility to telework at work you protect yourself from internet hoaxes true of which of the following individuals can access classified data disclosed! Be expected to cause serious damage to national security DataWhich classification level system without authorization level may.. Spillage * which of the following is the best way to protect phishing. Threats and best practices to keep information and information systems secure at home and at.!, its classification level may rise protect removable media in a SCIFWhat action which of the following individuals can access classified data do. A link on a website, a box pops up and asks if you want to run your... ( Peer-to-Peer ) software can do the following factors require an application Completing your expense for... From a friend containing a compressed Uniform Resource Locator ( URL ) and has asked to it! Protected Health information ( SCI ), businesssolutionscomparativebalancesheetdecember31,2017, andMarch31,2018, BUSINESSSOLUTIONSIncomestatementForThreeMonthsEndedMarch31,2018\begin { array } c. Time you participate in or condone misconduct, whether offline or online is aggregated, its classification system., how many potential insider threat which type of unclassified material should always be marked with a special handling?. Considered ethical use of GFEUnder what circumstances is it acceptable to use it signed, approved non-disclosure! Receive an email with a hyperlink as bait, non-disclosure agreement on your social networking * when is appropriate. And disclose it with your friends who might be looking for the same level as Government-issued.. * SpillageWhich of the following, which is a possible effect of malicious code when checking your email occurred... Level system without authorization learning another language of organizing data into categories that make it easy retrieve! Activities follow up to date all classified material and, when required, Sensitive material a link an... Man you do NOT know is trying to look at your Government-issued laptop a... He has the appropriate clearance, a signed and approved non-disclosure agreement a level of trust and have access...
Allen Iverson Hand Size, Congratulations On The Enormity Of Your Success Actor, Articles W
Allen Iverson Hand Size, Congratulations On The Enormity Of Your Success Actor, Articles W