A colleague complains about anxiety and exhaustion, makes coworkers uncomfortable by asking excessive questions about classified projects, and complains about the credit card bills that his wife runs up. What should you do? Never allow sensitive data on non-Government-issued mobile devices. What action should you take first? correct. **Insider Threat A colleague has visited several foreign countries recently, has adequate work quality, speaks openly of unhappiness with U.S. foreign policy, and recently had his car repossessed. *Sensitive Compartmented Information What is a Sensitive Compartmented Information (SCI) program? Lock your device screen when not in use and require a password to reactivate. Position your monitor so that it is not facing others or easily observed by others when in use Correct. Paul verifies that the information is CUI, includes a CUI marking in the subject header, and digitally signs an e-mail containing CUI. *Spillage Which of the following may help to prevent spillage? Click the card to flip Flashcards Learn Test Match Created by Jamie_Lancaster Terms in this set (24) Ask them to verify their name and office number. Upon connecting your Government- issued laptop to a public wireless connection, what should you immediately do? Unusual interest in classified information. Physically assess that everyone within listening distance is cleared and has a need-to-know for the information being discussed. Which Cyber Protection Condition (CPCON) establishes a protection priority focus on critical functions only? (Correct)-It does not affect the safety of Government missions.-It never requires classification markings. How should you respond? A man you do not know is trying to look at your Government-issued phone and has asked to use it. **Social Engineering Which may be a security issue with compressed Uniform Resource Locators (URLs)? There is no way to know where the link actually leads. Public service, notably service in the United States Department of Defense or DoD, is a public trust. Immediately notify your security point of contact. A program that segregates various type of classified information into distinct compartments for added protection and dissemination for distribution control. **Use of GFE What is a critical consideration on using cloud-based file sharing and storage applications on your Government-furnished equipment (GFE)? All of these. *Insider Threat Which of the following is a potential insider threat indicator? Use your own security badge, key code, or Common Access Card (CAC)/Personal Identity Verification (PIC) card. What should be your response? Data about you collected from all sites, apps, and devices that you use can be aggregated to form a profile of you. Alexa May, director of accounts, received a bill for $648\$648$648, dated April 666, with sales terms 2/10,1/15,n/302/10, 1/15, n/302/10,1/15,n/30. (Malicious Code) Upon connecting your Government-issued laptop to a public wireless connection, what should you immediately do? Monitor credit card statements for unauthorized purchases, Thumb drives, memory sticks, and flash drives are examples of. Which is a good practice to protect classified information? Be aware of classification markings and all handling caveats. Linda encrypts all of the sensitive data on her government-issued mobile devices. Which of the following is NOT sensitive information? Which of the following is true of using DoD Public key Infrastructure (PKI) token? Which of the following is not Controlled Unclassified Information (CUI)? A colleague complains about anxiety and exhaustion, makes coworkers uncomfortable by asking excessive questions about classified projects, and complains about the credit card bills that his wife runs up. Click on "Open File". **Insider Threat What do insiders with authorized access to information or information systems pose? They may be used to mask malicious intent. A colleague is playful and charming, consistently wins performance awards, and is occasionally aggressive in trying to access classified information. Adversaries exploit social networking sites to disseminate fake news. You receive an inquiry from a reporter about government information not cleared for public release. Ensure proper labeling by appropriately marking all classified material and, when required, sensitive material. Classified information is defined in PL 96-456, the Classified Information Procedures Act: Keep your operating system and software up to date: This will help patch any security vulnerabilities in your software. Discuss why gases, such as barbecue propane gas, are sold by mass and not by volume. If classified information were released, which classification level would result in Exceptionally grave damage to national security? Correct. Unclassified Information Student Guide . (Sensitive Information) What type of unclassified material should always be marked with a special handling caveat? Label all files, removable media, and subject headers with appropriate classification markings. (1) A strategic plan documenting the overall conduct of a war. The answer has been confirmed to be correct. How many potential insiders threat indicators does this employee display? Updated 8/5/2020 8:06:16 PM. Added 8/5/2020 8:06:16 PM. Which is a risk associated with removable media? **Insider Threat Which type of behavior should you report as a potential insider threat? The National Archives and Records Administration (NARA) serves as the Controlled Unclassified Information (CUI) Executive Agent (EA). You know this project is classified. Correct. *Sensitive Information Which of the following is the best example of Personally Identifiable Information (PII)? A user writes down details from a report stored on a classified system marked as Secret and uses those details to draft an unclassified briefing on an unclassified system without authorization. Accepting the default privacy settings. What must authorized personnel do before permitting another individual to enter a Sensitive Compartmented Information Facility (SCIF)? Which of the following best describes wireless technology? When your vacation is over, after you have returned home. Which of the following can an unauthorized disclosure of information classified as Confidential reasonably be expected to cause? Protection may be required for privacy, law enforcement, contractual protections, or other reasons. Try this test to determine if it's considered unclassified, classified or protected, and check out tips on what to do and what not to do when working with sensitive information. **Insider Threat How many potential insider threat indicators does a person who is playful and charming, consistently wins performance awards, but is occasionally aggressive in trying to access sensitive information display? What does Personally Identifiable information (PII) include? What is the best response if you find classified government data on the internet? Keeping a database from being accessed by unauthorized visitors C. Restricting a subject at a lower classification level from accessing data at a higher classification level D. Preventing an . internet. (Malicious Code) Which of the following is NOT a way that malicious code spreads? Follow instructions given only by verified personnel. Which of the following is true of internet hoaxes? Which Of The Following Statements About Adding Social Networks To Hootsuite Is False? Remove your security badge after leaving your controlled area or office building. The age of the driver may top the list of variables. **Classified Data Which classification level is given to information that could reasonably be expected to cause serious damage to national security? Validate friend requests through another source before confirming them. Where. What is considered ethical use of the Government email system? what should be your response be? What is a security best practice to employ on your home computer? Correct. When may you be subject to criminal, disciplinary, and/or administrative action due to online harassment, bullying, stalking, hazing, discrimination, or retaliation? Use a common password for all your system and application logons. Log in for more information. When operationally necessary, owned by your organization, and approved by the appropriate authority. NARA has the authority and responsibility to manage the CUI Program across the Federal government. Maybe. ~All documents should be appropriately marked, regardless of format, sensitivity, or classification. Which is an untrue statement about unclassified data? Proactively identify potential threats and formulate holistic mitigation responses. Which of the following is a best practice for physical security? How are Trojan horses, worms, and malicious scripts spread? Which of the following personally-owned computer peripherals is permitted for use with Government-furnished equipment? What actions should you take with a compressed Uniform Resource Locator (URL) on a website known to you? Attempt to change the subject to something non-work related, but neither confirm nor deny the articles authenticity. A colleague has won 10 high-performance awards, can be playful and charming, is not currently in a relationship, and is occasionally aggressive in trying to access sensitive information. **Insider Threat Based on the description that follows, how many potential insider threat indicator(s) are displayed? Which of the following actions can help to protect your identity? Decline to let the person in and redirect her to security. After you have returned home following the vacation. Maintain possession of your laptop and other government-furnished equipment (GFE) at all times. Your password and a code you receive via text message. A coworker removes sensitive information without approval. **Social Networking Which of the following is a security best practice when using social networking sites? A .gov website belongs to an official government organization in the United States. Insiders are given a level of trust and have authorized access to Government information systems. A colleague has won 10 high-performance awards, can be playful and charming, is not currently in a relationship, and occasionally aggressive in trying to access sensitive information. The email states your account has been compromised and you are invited to click on the link in order to reset your password. Use only personal contact information when establishing personal social networking accounts, never use Government contact information. You must have permission from your organization. Aggregating it does not affect its sensitivyty level. Based on the description that follows, how many potential insider threat indicator(s) are displayed? You many only transmit SCI via certified mail. New answers. Which of the following is true of traveling overseas with a mobile phone. What should be your response? Have your permissions from your organization, follow your organization guideline, use authorized equipment and software, employ cyber security best practice, perform telework in dedicated when home. true-statement. What level of damage to national security can you reasonably expect Top Secret information to cause if disclosed? *Sensitive Compartmented Information What must the dissemination of information regarding intelligence sources, methods, or activities follow? -TRUE What action is recommended when somebody calls you to inquire about your work environment or specific account information? By Quizzma Team / Technology. Who designates whether information is classified and its classification level? Examples are: Patient names, Social Security numbers, Drivers license numbers, insurance details, and birth dates. Which of the following is true of sharing information in a Sensitive Compartmented Information Facility (SCIF)? A smartphone that transmits credit card payment information when held in proximity to a credit card reader. **Identity management What is the best way to protect your Common Access Card (CAC)? Use the classified network for all work, including unclassified work. What is the basis for the handling and storage of classified data? This answer has been confirmed as correct and helpful. Physical security of mobile phones carried overseas is not a major issue. Which of the following is NOT a social engineering tip? While it may seem safer, you should NOT use a classified network for unclassified work. Which of the following is true about unclassified data? Which of the following is true of Controlled Unclassified information (CUI)? Sensitive information may be stored on any password-protected system. What should you do? What is a way to prevent the download of viruses and other malicious code when checking your e-mail? (Mobile Devices) When can you use removable media on a Government system? Carrying his Social Security Card with him, DoD employees are prohibited from using a DoD CAC in card-reader-enabled public device, Assigned a classification level by a supervisor. Only expressly authorized government-owned PEDs. (Correct) -It does not affect the safety of Government missions. When is it appropriate to have your security badge visible? Some examplesyou may be familiar with: TheFederalCUI Registry,shows authorized categoriesandassociated markings, as well as applicable safeguarding, dissemination, and decontrol procedures. What should the owner of this printed SCI do differently? *Sensitive Compartmented Information Which must be approved and signed by a cognizant Original Classification Authority (OCA)? Only use Government-furnished or Government-approved equipment to process PII. Only paper documents that are in open storage need to be marked. Under which circumstances may you be subject to criminal, disciplinary, and/or administrative action due to online misconduct? JavaScript appears to be disabled on this computer. The Registry is updated as agencies continue to submit governing authorities that authorize the protection and safeguarding of sensitive information. Report the crime to local law enforcement. **Classified Data What is a good practice to protect classified information? In which situation below are you permitted to use your PKI token? Government-owned PEDs when expressly authorized by your agency. Use TinyURL's preview feature to investigate where the link leads. Why might "insiders" be able to cause damage to their organizations more easily than others? *Spillage .What should you do if a reporter asks you about potentially classified information on the web? In setting up your personal social networking service account, what email address should you use? A coworker uses a personal electronic device in a secure area where their use is prohibited. *Sensitive Information Under what circumstances could classified information be considered a threat to national security? Correct, Someone who uses authorized access, wittingly or unwittingly, to harm national security through unauthorized disclosure or other actions that may cause the loss or degradation of resources or capabilities.
Angela Ruggiero Wife Sarah, Urine 5 Panel Pre 2018 Hhs Levels, Loyola High School Rugby, Articles W