Coworker making consistent statements indicative of hostility or anger toward the United States and its policies. A colleague is playful and charming, consistently wins performance awards, and is occasionally aggressive in trying to access classified information. Asked 8/5/2020 6:29:36 PM. Coworker making consistent statements indicative of hostility or anger toward the United States in its policies. Photos of your pet Correct. How can you protect yourself from social engineering? You know this project is classified. As part of the survey the caller asks for birth date and address. A pop-up window that flashes and warns that your computer is infected with a virus. Which of the following is a concern when using your Government-issued laptop in public? You should remove and take your CAC/PIV card whenever you leave your workstation. You are working at your unclassified system and receive an email from a coworker containing a classified attachment. (Sensitive Information) What should you do if a commercial entity, such as a hotel reception desk, asks to make a photocopy of your Common Access Card (CAC) for proof of Federal Government employment? Which of the following is NOT a correct way to protect sensitive information? A colleague has visited several foreign countries recently, has adequate work quality, speaks openly of unhappiness with U.S. foreign policy, and recently had his car repossessed. A coworker has asked if you want to download a programmers game to play at work. When classified data is not in use, how can you protect it? Exceptionally grave damage. When vacation is over, after you have returned home. Maria is at home shopping for shoes on Amazon.com. *Malicious Code Which of the following is NOT a way that malicious code spreads? What should be your response? You receive an email from a company you have an account with. What should you do? Unclassified Information Student Guide . Is this safe? At all times while in the facility. A headset with a microphone through a Universal Serial Bus (USB) port. Classified data: (Scene) Which of the following is true about telework? Personal information is inadvertently posted at a website. Which is NOT a wireless security practice? What is a rule for removable media, other portable electronic devices (PEDs), and mobile computing devices to protect Government systems? Maintain visual or physical control of the device. General Services Administration (GSA) approval. He has the appropriate clearance and a signed, approved, non-disclosure agreement. A colleague has won 10 high-performance awards, can be playful and charming, is not currently in a relationship, and is occasionally aggressive in trying to access sensitive information. which of the following is true about unclassified Courses 442 View detail Preview site What should be your response? What should the participants in this conversation involving SCI do differently? data. *Sensitive Information Under which circumstances is it permitted to share an unclassified draft document with a non-DoD professional discussion group? After reading an online story about a new security project being developed on the military installation where you work, your neighbor asks you to comment about the article. Delete email from senders you do not know. What is the best response if you find classified government data on the internet? When traveling or working away from your main location, what steps should you take to protect your devices and data? **Social Networking Which of the following information is a security risk when posted publicly on your social networking profile? What should you do? Ensure proper labeling by appropriately marking all classified material. What should be your response? **Mobile Devices What should you do when going through an airport security checkpoint with a Government-issued mobile device? Never write down the PIN for your CAC. Which of the following is a reportable insider threat activity? A type of phishing targeted at high-level personnel such as senior officials. Use only your personal contact information when establishing your account. **Classified Data What is a good practice to protect classified information? What is best practice while traveling with mobile computing devices? Report the crime to local law enforcement. Filter by: All $ Off % Off Free Online Offline. Unclassified documents do not need to be marked as a SCIF. *Spillage Which of the following may help to prevent spillage? Understanding and using the available privacy settings. Which of the following is true of transmitting Sensitive Compartmented Information (SCI)? A. (Sensitive Information) What guidance is available from marking Sensitive Information information (SCI)? Note the websites URL and report the situation to your security point of contact. The age of the driver may top the list of variables. It is not corporate intellectual property unless created for or included in requirements related to a government contract. February 8, 2022. When your vacation is over, and you have returned home. Use only personal contact information when establishing your personal account. When using a fax machine to send sensitive information, the sender should do which of the following? What should you do? **Social Networking When is the safest time to post details of your vacation activities on your social networking website? (Spillage) Which type of information could reasonably be expected to cause serious damage to national security if disclosed without authorization? What level of damage to national security could reasonably be expected if unauthorized disclosure of Top Secret information occurred? correct. Which of the following is NOT a correct way to protect CUI? CUI must be handled using safeguarding or dissemination controls. Looking for https in the URL. Here you can find answers to the DoD Cyber Awareness Challenge. Media containing Privacy Act information, PII, and PHI is not required to be labeled. How do you respond? The CUI Registry is the Government-wide online repository for Federal-level guidance regarding CUI policy and practice. What information most likely presents a security risk on your personal social networking profile? Use the classified network for all work, including unclassified work. *Spillage What should you do when you are working on an unclassified system and receive an email with a classified attachment? (social networking) Which of the following is a security best practice when using social networking sites? Always check to make sure you are using the correct network for the level of data. No, you should only allow mobile code to run from your organization or your organizations trusted sites. (Spillage) Which of the following is a best practice to protect information about you and your organization on social networking sites and applications? How should you protect your Common Access Card (CAC) or Personal Identity Verification (PIV) card? Darryl is managing a project that requires access to classified information. Which of the following statements is TRUE about the use of DoD Public Key Infrastructure (PKI) tokens? d. giving a spanking or a scolding. What level of damage to national security can you reasonably expect Top Secret information to cause if disclosed? Which of the following is an example of a strong password? Mobile devices and applications can track your location without your knowledge or consent. A Coworker has asked if you want to download a programmers game to play at work. Which of the following is true about unclassified data? Federal agencies routinely generate, use, store, and share information that, while not classified, still requires some level of protection from unauthorized access and release. Store classified data appropriately in a GSA-approved vault/container when not in use. To transmit large payments through Fedwire __________, To regulate and supervise the stock market to provide stability and security to individual investors. *Malicious Code After visiting a website on your Government device, a popup appears on your screen. **Insider Threat Based on the description that follows, how many potential insider threat indicator(s) are displayed? A passenger in the Land Rover Freelander that T-boned the hatchback said the BMW had been driven out of the unclassified road towards Shipton-under-Wychwood 'like a bat out of hell' - giving . However, agency personnel and contractors should first consult their agency's CUI implementing policies and program management for guidance. Which is an untrue statement about unclassified data? The questions are broken into the following sections: Controlled Unclassified Information (CUI) isinformation that requires safeguarding or dissemination controls consistent with applicable laws, regulations, and Government-wide policies,but is not classified underExecutive Order 13526 Classified National Security Informationorthe Atomic Energy Act, as amended. Correct **Social Engineering What action should you take with an e-mail from a friend containing a compressed Uniform Resource Locator (URL)? Do not access links or hyperlinked media such as buttons and graphics in email messages. (Spillage) What advantages do insider threats have over others that allows them to cause damage to their organizations more easily? A vendor conducting a pilot program with your organization contacts you for organizational data to use in a prototype. **Insider Threat A colleague vacations at the beach every year, is married and a father of four, his work quality is sometimes poor, and he is pleasant to work with. *Sensitive Compartmented Information When is it appropriate to have your security badge visible? 8. Updated 8/5/2020 8:06:16 PM. On a NIPRNET system while using it for a PKI-required task. An investment in knowledge pays the best interest.. What is the best example of Protected Health Information (PHI)? How do you respond? What should you do? Which of the following is NOT a type of malicious code? Which of the following is NOT a typical result from running malicious code? Which of the following includes Personally Identifiable Information (PII) and Protected Health Information (PHI)? Is it permitted to share an unclassified draft document with a non-DoD professional discussion group? Note any identifying information, such as the website's URL, and report the situation to your security POC. Social Security Number; date and place of birth; mothers maiden name. internet. Which of the following is true of the Common Access Card (CAC)? Which of the following is NOT a home security best practice? 1).Compared with CK, straw addition treatments (S and SG) significantly (P < 0.01) increased the emission rate and cumulative emission of CO 2 and the cumulative CO 2 . **Classified Data Which of the following is true of telework? you don't need to do anything special to protect this information Which of the following is NOT an example of Personally Identifiable Information (PII)? What should be done to sensitive data on laptops and other mobile computing devices? Label all files, removable media, and subject headers with appropriate classification markings. Using NIPRNet tokens on systems of higher classification level. a. At EPA, the CUI Program is housed in the Libraries and Accessibility Division (LAD) within the Office of Mission Supports (OMS), Office of Enterprise Information Programs (OEIP). Only documents that are classified Secret, Top Secret, or SCI require marking. A colleague complains about anxiety and exhaustion, makes coworkers uncomfortable by asking excessive questions about classified projects, and complain about the credit card bills that his wife runs up.
St Peter's Hospital Gastroenterology Department, How Many Eggs Do I Have Left Calculator, Atlanta Hawks Coach Wife, Articles W