*Spillage .What should you do if a reporter asks you about potentially classified information on the web? Insiders are given a level of trust and have authorized access to Government information systems. What is the best choice to describe what has occurred? PII includes, but is not limited to, social security numbers, date and places of birth, mothers maiden names, biometric records, and PHI. Her badge is not visible to you. You receive a call on your work phone and youre asked to participate in a phone survey. When expanded it provides a list of search options that will switch the search inputs to match the current selection. It displays a label showing maximum classification, date of creation, point of contact, and Change Management 9CM) Control Number. Updated 8/5/2020 8:06:16 PM. Of the following, which is NOT a characteristic of a phishing attempt? What should you do? A lock (LockA locked padlock) or https:// means youve safely connected to the .gov website. See the discussed example before. 1.1.3 Insider Threat. Which of the following represents an ethical use of your Government-furnished equipment (GFE)? Let us have a look at your work and suggest how to improve it! Your cousin posted a link to an article with an incendiary headline on social media. Coworker making consistent statements indicative of hostility or anger toward the United States and its policies. On September 14, 2016, NARA issued a final rule amending 32 CFR Part 2002 to establish a uniform policy for all Federal agencies and prescribe Government-wide program implementation standards, including designating, safeguarding, disseminating, marking, decontrolling, and disposing of CUI; self-inspection and oversight requirements; and other facets of the CUI Program. Ask the individual to see an identification badge. Upon connecting your Government-issued laptop to a public wireless connection, what should you immediately do? When using your government-issued laptop in public environments, with which of the following should you be concerned? correct. ~All documents should be appropriately marked, regardless of format, sensitivity, or classification. What should you do to protect classified data? Appropriate clearance, a signed and approved non-disclosure agreement, and need-to-know, Insiders are given a level of trust and have authorized access to Government information systems. Discrete data involves whole numbers (integers - like 1, 356, or 9) that can't be divided based on the nature of what they are. (controlled unclassified information) Which of the following is NOT an example of CUI? (1) A strategic plan documenting the overall conduct of a war. Do not access website links in e-mail messages. Ch 1 Flashcards by Josh Selkirk | Brainscape Which of the following best describes good physical security? Which of the following is an example of a strong password? Controlled Unclassified Information (CUI) | National Archives Since the URL does not start with https, do not provide you credit card information. **Classified Data What is required for an individual to access classified data? *Sensitive Information Which of the following is the best example of Personally Identifiable Information (PII)? Unusual interest in classified information. When operationally necessary, owned by your organization, and approved by the appropriate authority. What information most likely presents a security risk on your personal social networking profile? Correct. *Sensitive Compartmented Information When faxing Sensitive Compartmented Information (SCI), what actions should you take? However, agency personnel and contractors should first consult their agency's CUI implementing policies and program management for guidance. If you participate in or condone it at any time. **Use of GFE What is a critical consideration on using cloud-based file sharing and storage applications on your Government-furnished equipment (GFE)? Do not access links or hyperlinked media such as buttons and graphics in email messages. Darryl is managing a project that requires access to classified information. What should you consider when using a wireless keyboard with your home computer? Controlled Unclassified Information (CUI) and Covered Defense Dont assume open storage in a secure facility is authorized Maybe. Which of the following is NOT one? As part of the survey the caller asks for birth date and address. Linda encrypts all of the sensitive data on her government issued mobile devices. What type of security is part of your responsibility and placed above all else?, If your wireless device is improperly configured someone could gain control of the device? Which of the following is a best practice for handling cookies? JavaScript appears to be disabled on this computer. *Sensitive Information Under which circumstances is it permitted to share an unclassified draft document with a non-DoD professional discussion group? When unclassified data is aggregated, its classification level may rise. Any time you participate in or condone misconduct, whether offline or online. Decline So That You Maintain Physical Control of Your Government-Issued Laptop. Where. Unauthorized Disclosure of Classified Information for DoD, Security Awareness: Derivative Classification Answers, CITI Ethics, Responsible Conduct, RCR, Law, HTH And IRB Answers, EVERFI Achieve Consumer Financial Education Answers, Security Pro: Chapter 3 (3.1.8) & 4.1 Security Policies Answers, CITI Module #3 Research in Public Elementary and Secondary Schools, Answers to CTS Unit 7 Lab 7-2: Protocols and Services SNMP, Google Analytics Individual Qualification Exam Answers, Everfi Module 4 Credit Scores Quiz Answers, Which Of The Following Is Not Considered A Potential Insider Threat Indicator. What should you do if a reporter asks you about potentially classified information on the web? Who is responsible for information/data security? This task is performed with the aim of finding similarities in data points and grouping similar data points together. For example, when you buy propane for your barbecue, your tank is placed on a scale while it is filled under high pressure (Figure 7). When is the best time to post details of your vacation activities on your social networking website? What does Personally Identifiable Information (PII) include? Which of the following is true of Controlled Unclassified information (CUI)? difficult life circumstances such as substance abuse, divided loyalty or allegiance to the U.S., and extreme, persistent interpersonal difficulties. *Spillage Which of the following is a good practice to prevent spillage? Which of the following is true of the Common Access Card (CAC) or Personal Identity Verification (PIV) card? Cyber Awareness Challenge Complete Questions and Answers **Social Engineering What action should you take with an e-mail from a friend containing a compressed Uniform Resource Locator (URL)? Which Of The Following Is Not A Correct Way To Protect CUI. Always check to make sure you are using the correct network for the level of data. Cyber Awareness 2020 Knowledge Check Flashcards | Quizlet **Classified Data Which of the following is true of protecting classified data? Telework is only authorized for unclassified and confidential information. A colleague is playful and charming, consistently wins performance awards, and is occasionally aggressive in trying to access classified information. The age of the driver may top the list of variables. 1 Answer/Comment. **Classified Data What level of damage can the unauthorized disclosure of information classified as Confidential reasonably be expected to cause? Which of the following may help to prevent inadvertent spillage? Remove your security badge, common access card (CAC), or personal identity verification (PIV) card. Paul verifies that the information is CUI, includes a CUI marking in the subject header, and digitally signs an e-mail containing CUI. To transmit large payments through Fedwire __________, To regulate and supervise the stock market to provide stability and security to individual investors. A. CUI is government created or owned information that requires safeguarding or dissemination controls consistent with applicable laws, regulations and government wide policies. Executive Order 13526 Classified National Security Information, PersonallyIdentifiable Information (PII), Sensitive Personally Identifiable Information (SPII), Proprietary Business Information (PBI) or currently known within EPA as Confidential Business Information (CBI), Unclassified Controlled Technical Information (UCTI). *Sensitive Compartmented Information What should the owner of this printed SCI do differently? Use personal information to help create strong passwords. Follow instructions given only by verified personnel. **Classified Data Which of the following is a good practice to protect classified information? not correct (GFE) When can you check personal e-mail on your Government-furnished equipment (GFE)? CPCON 5 (Very Low: All Functions). Which of the following is true about unclassified data? No, you should only allow mobile code to run from your organization or your organizations trusted sites. Unclassified documents do not need to be marked as a SCIF. Someone who uses authorized access, wittingly or unwittingly, to harm national security through unauthorized disclosure or other actions that may cause the loss or degradation of resources or capabilities. Everything you need to know aboutControlled UnclassifiedInformation(CUI). Briefly describe what you have learned. Controlled unclassified information. A person who does not have the required clearance or assess caveats comes into possession of SCI in any manner. Based on the description that follows, how many potential insider threat indicator(s) are displayed? Phishing can be an email with a hyperlink as bait. (Sensitive Information) What must the dissemination of information regarding intelligence sources, methods, or activities follow? Linda encrypts all of the sensitive data on her government-issued mobile devices. Search If you receive a phone call from a stranger asking for information about your invoice payment process, you should: Crucial information about a user or organization can be gained through. What type of social engineering targets particular individuals, groups of people, or organizations? Effects of different carbon substrates on PAHs fractions and microbial **Identity management Which of the following is NOT a best practice to preserve the authenticity of your identity? What certificates are contained on the Common Access Card (CAC)? Look for a digital signature on the email. Appropriate clearance; signed and approved non-disclosure agreement; and need-to-know. Which of the following is true about unclassified data? Software that installs itself without the users knowledge. Which of the following is true of Sensitive Compartmented Information (SCI)? CPCON 2 (High: Critical and Essential Functions) A coworker has left an unknown CD on your desk. not correct There are many travel tips for mobile computing. A headset with a microphone through a Universal Serial Bus (USB) port. What should you do? 5. Which is NOT a method of protecting classified data? What should you do? Classified information that should be unclassified and is downgraded. A smartphone that transmits credit card payment information when held in proximity to a credit card reader. ALways mark classified information appropriately and retrieve classified documents promptly from the printer. Retrieve classified documents promptly from printers. be wary of suspicious e-mails that use your name and/or appear to come from inside your organization. correct. Leaked classified or controlled information is still classified/controlled even if it has already been compromised. What should you do? Note the websites URL and report the situation to your security point of contact. When your vacation is over, after you have returned home. Before long she has also purchased shoes from several other websites. You receive an email from a company you have an account with. Scan external files from only unverifiable sources before uploading to computer. Correct. Official websites use .gov Use the classified network for all work, including unclassified work. Bob, a coworker, has been going through a divorce, has financial difficulties and is displaying hostile behavior. **Mobile Devices What can help to protect the data on your personal mobile device? Which of the following must you do before using an unclassified laptop and peripherals in a collateral classified environment? Correct. DOD Cyber Awareness Challenge 2019 Flashcards | Quizlet Which of the following is a clue to recognizing a phishing email? You must have your organizations permission to telework. Based on the description that follows, how many potential insider threat indicator(s) are displayed? When checking in at the airline counter for a business trip, you are asked if you would like to check your laptop bag. Which of the following is NOT a correct way to protect sensitive information? **Travel Which of the following is true of traveling overseas with a mobile phone? **Classified Data Which type of information could reasonably be expected to cause serious damage to national security if disclosed without authorization? What should you do? Refer the reporter to your organizations public affairs office. Mark SCI documents appropriately and use an approved SCI fax machine. What should you do? Antihistamines are used to treat the symptoms, such as sneezing, that are due to inflammation caused by irritants in the airways. Contents hide. Insiders are given a level of trust and have authorized access to Government information systems. How many potential insiders threat indicators does this employee display? Correct. Use only your personal contact information when establishing your account. CUI may be stored only on authorized systems or approved devices. All of these. PDF IFS0026 Student Guide - CDSE It does not require markings or distribution controls. How many potential insider threat indicators does this employee display? Ensure proper labeling by appropriately marking all classified material. Ensure proper labeling by appropriately marking all classified material and, when required, sensitive material.