Linda encrypts all of the sensitive data on her government-issued mobile devices. **Social Engineering What action should you take with an e-mail from a friend containing a compressed Uniform Resource Locator (URL)? cyber. **Removable Media in a SCIF What must users ensure when using removable media such as compact disk (CD)? correct. As a security best practice, what should you do before exiting? What is NOT Personally Identifiable Information (PII)? correct. Controlled Unclassified Information (CUI): Controlled Unclassified information was defined in the Executive Order 13556 as information held by or generated for the Federal Government that requires safeguarding or dissemination controls pursuant to and consistent with applicable law, regulations and government-wide policies that isn't classified Information improperly moved from a higher protection level to a lower protection level. How should you securely transport company information on a removable media? Aggregating it does not affect its sensitivyty level. Organizational Policy Not correct Attempt to change the subject to something non-work related, but neither confirm nor deny the articles authenticity. *Spillage After reading an online story about a new security project being developed on the military installation where you work, your neighbor asks you to comment about the article. Which of the following statements is TRUE about the use of DoD Public Key Infrastructure (PKI) tokens? b. How should you respond? The CUI Registry is the Government-wide online repository for Federal-level guidance regarding CUI policy and practice. a. Which of the following represents a good physical security practice? When may you be subject to criminal, disciplinary, and/or administrative action due to online harassment, bullying, stalking, hazing, discrimination, or retaliation? Use personal information to help create strong passwords. Access requires a formal need-to-know determination issued by the Director of National Intelligence.? Which of the following must you do before using an unclassified laptop and peripherals in a collateral classified environment? You find information that you know to be classified on the Internet. The email states your account has been compromised and you are invited to click on the link in order to reset your password. An official website of the United States government. Darryl is managing a project that requires access to classified information. (controlled unclassified information) Which of the following is NOT correct way to protect CUI? (Sensitive Compartmented Information) Which of the following best describes the compromise of Sensitive Compartmented Information (SCI)? *Spillage Which of the following is a good practice to aid in preventing spillage? What should be your response? -It must be released to the public immediately. Individuals must avoid referencing derivatively classified reports classified higher than the recipient.??? (Correct) -It does not affect the safety of Government missions. *Sensitive Compartmented Information What should the owner of this printed SCI do differently? Which of the following is NOT a typical result from running malicious code? Which of following is true of protecting classified data? Retrieve classified documents promptly from printers. -It never requires classification markings. Proactively identify potential threats and formulate holistic mitigation responses. **Mobile Devices Which is a rule for removable media, other portable electronic devices (PEDs), and mobile computing devices to protect Government systems? Which scenario might indicate a reportable insider threat security incident? Looking at your MOTHER, and screaming THERE SHE BLOWS! **Insider Threat A colleague vacations at the beach every year, is married and a father of four, his work quality is sometimes poor, and he is pleasant to work with. Who can be permitted access to classified data? Phishing can be an email with a hyperlink as bait. A colleague is playful and charming, consistently wins performance awards, and is occasionally aggressive in trying to access classified information. **Social Networking As someone who works with classified information, what should you do if you are contacted by a foreign national seeking information on a research project? This lets the service person know when the tank is "full." A coworker is observed using a personal electronic device in an area where their use is prohibited. Ask the individual to see an identification badge. You receive an inquiry from a reporter about potentially classified information on the internet. Don't talk about work outside your workspace unless it is a specifically designated public meeting environment and is controlled by the event planners. Preventing an authorized reader of an object from deleting that object B. Found a mistake? not correct **Social Networking Which piece if information is safest to include on your social media profile? Never write down the PIN for your CAC. (Sensitive Information) Which of the following is true about unclassified data? **Classified Data What is a good practice to protect classified information? **Classified Data When classified data is not in use, how can you protect it? A person who does not have the required clearance or assess caveats comes into possession of SCI in any manner. Note That The Integers Should Be Type Cast To Doubles. Updated 8/5/2020 8:06:16 PM. What certificates are contained on the Common Access Card (CAC)? *Spillage What should you do if a reporter asks you about potentially classified information on the web? **Identity management Which of the following is NOT a best practice to preserve the authenticity of your identity? Which Cyber Protection Condition (CPCON) establishes a protection priority focus on critical functions only? Amendments to a variety of policy documents as well as others referencing Confidential Business Information (CBI) submissions or handling, Changes to paper and e-forms and instructions for their submission to EPA. You must have your organizations permission to telework. Which of the following is a good practice to protect classified information? (Mobile Devices) Which of the following statements is true? Attempting to access sensitive information without need-to-know. Maybe not correct. Approved Security Classification Guide (SCG). *Spillage What should you do when you are working on an unclassified system and receive an email with a classified attachment? Which of the following is an example of two-factor authentication? What should you do? After you have returned home following the vacation. **Classified Data Which of the following is a good practice to protect classified information? (Travel) Which of the following is a concern when using your Government-issued laptop in public? Follow the steps enlisted below to use WEKA for identifying real values and nominal attributes in the dataset. Which of the following is true of telework? Search by Location. Connect to the Government Virtual Private Network (VPN).?? 1.1.4 Social Networking. Maintain visual or physical control of the device. Prudence faxes CUI using an Unclassified cover sheet via a Secret fax machine. What does Personally Identifiable information (PII) include? correct. **Social Networking Which of the following information is a security risk when posted publicly on your social networking profile? Retrieve classified documents promptly from printers. *Spillage What is a proper response if spillage occurs? See the discussed example before. Unclassified is a security classification assigned to official information that does not warrant the assignment of Confidential, Secret, or Top Secret markings but which is not publicly-releasable without authorization. Make note of any identifying information and the website URL and report it to your security office. What actions should you take prior to leaving the work environment and going to lunch? What action should you take? Store it in a GSA approved vault or container. (Sensitive Information) What guidance is available from marking Sensitive Information information (SCI)? What is required for an individual to access classified data? Tell us about it through the REPORT button at the bottom of the page. You receive an email at your official Government email address from an individual at the Office of Personnel Management (OPM). What should the owner of this printed SCI do differently? A colleague has won 10 high-performance awards, can be playful and charming, is not currently in a relationship, and occasionally aggressive in trying to access sensitive information. Maintain possession of your laptop and other government-furnished equipment (GFE) at all times. Memory sticks, flash drives, or external hard drives. What information should you avoid posting on social networking sites? Research the source to evaluate its credibility and reliability. What are some potential insider threat indicators? (Malicious Code) A coworker has asked if you want to download a programmers game to play at work. Hostility or anger toward the United States and its policies. Refer the reporter to your organizations public affairs office. *Controlled Unclassified Information Which of the following is NOT an example of CUI? What is the best response if you find classified government data on the internet? (Spillage) What type of activity or behavior should be reported as a potential insider threat? (Sensitive Information) What type of unclassified material should always be marked with a special handling caveat? Not correct. Validate friend requests through another source before confirming them. Understanding and using the available privacy settings. #2) Select the "Pre-Process" tab. **Use of GFE What is a critical consideration on using cloud-based file sharing and storage applications on your Government-furnished equipment (GFE)? Briefly describe what you have learned. (Malicious Code) What is a common indicator of a phishing attempt? CUI was established to standardize the way the Executive branch handles sensitive information that requires dissemination controls. **Insider Threat Based on the description that follows, how many potential insider threat indicator(s) are displayed? Be aware of classification markings and all handling caveats. Upon connecting your Government-issued laptop to a public wireless connection, what should you immediately do? No. Matt Monroe, a 20-year U. S. Air Force veteran and current operations manager at Omnistruct, explains the breakdown, "There are four classified information categories in the military based on the severity of damage that the information's release would cause. Infographic - Text version Infographic [PDF - 594 KB] Report a problem or mistake on this page Date modified: 2020-12-14 Where. What security device is used in email to verify the identity of sender? (Spillage) What level of damage can the unauthorized disclosure of information classified as confidential reasonably be expected to cause? *Controlled Unclassified Information Which of the following best describes a way to safely transmit Controlled Unclassified Information (CUI)? *Sensitive Information What is the best example of Personally Identifiable Information (PII)? **Website Use While you are registering for a conference, you arrive at the website http://www.dcsecurityconference.org/registration/. Download the information. When unclassified data is aggregated, its classification level may rise. Which of the following is a concern when using your Government-issued laptop in public? Report the suspicious behavior in accordance with their organizations insider threat policy. How many insider threat indicators does Alex demonstrate? Immediately notify your security point of contact. A coworker brings a personal electronic device into prohibited areas. Use only personal contact information when establishing your personal account. Which of the following is NOT a good way to protect your identity? How can you protect data on your mobile computing and portable electronic devices (PEDs)? There are many travel tips for mobile computing. *Sensitive Information Under which circumstances is it permitted to share an unclassified draft document with a non-DoD professional discussion group? That trust is bounded by the Oath of Office we took willingly. **Mobile Devices What should you do when going through an airport security checkpoint with a Government-issued mobile device? What level of damage can the unauthorized disclosure of information classified as Top Secret reasonably be expected to cause? Which of the following is true of Controlled Unclassified information (CUI)? A smartphone that transmits credit card payment information when held in proximity to a credit card reader. It contains certificates for identification, encryption, and digital signature. Taking classified documents from your workspace. (Spillage) When is the safest time to post details of your vacation activities on your social networking website? **Use of GFE When can you check personal e-mail on your Government-furnished equipment (GFE)? Which of the following is NOT a correct way to protect sensitive information? internet. Delete email from senders you do not know. THIS IS THE BEST ANSWER . In addition to offering an overview of cybersecurity best practices, the challenge also provides awareness of potential and common cyber threats. What should you do? (Spillage) When classified data is not in use, how can you protect it? Executive Order 13556, Controlled Unclassified Information, requires the Executive Branch to establish an open and uniform program for managing [unclassified] information that requires safeguarding or dissemination controls pursuant to and consistent with laws, regulations, and Government-wide policies. The National Archives and Records Administration (NARA) was named the Executive Agent (EA) responsible for overseeing the CUI Program. Keep your operating system and software up to date: This will help patch any security vulnerabilities in your software. What should you do after you have ended a call from a reporter asking you to confirm potentially classified information found on the web?
Why Are Tamales Wrapped In Corn Husks,
Lincoln City Police Reports,
Articles W