A coworker uses a personal electronic device in a secure area where their use is prohibited. Which of the following makes Alexs personal information vulnerable to attacks by identity thieves? What should you do if someone asks to use your government issued mobile device (phone/laptop..etc)? **Identity management Which of the following is an example of two-factor authentication? (Malicious Code) Which of the following is NOT a way that malicious code spreads? Which of the following is an example of malicious code? Which of the following can an unauthorized disclosure of information classified as Confidential reasonably be expected to cause? Which Of The Following Is Not A Correct Way To Protect CUI. Briefly describe what you have learned. It contains certificates for identification, encryption, and digital signature. correct. What is an individual's Personally Identifiable Information (PII) or Protected Health Information (PHI) considered? When using a public device with a card reader, only use your DoD CAC to access unclassified information, is only allowed if the organization permits it. -It must be released to the public immediately. (Wrong). Asked 8/5/2020 6:29:36 PM. On September 14, 2016, NARA issued a final rule amending 32 CFR Part 2002 to establish a uniform policy for all Federal agencies and prescribe Government-wide program implementation standards, including designating, safeguarding, disseminating, marking, decontrolling, and disposing of CUI; self-inspection and oversight requirements; and other facets of the CUI Program. John submits CUI to his organizations security office to transmit it on his behalf. Quizzma is a free online database of educational quizzes and test answers. Updated 8/5/2020 8:06:16 PM. If possible, set your browser preferences to prompt you each time a website wants to store a cookie. **Social Engineering How can you protect yourself from internet hoaxes? For programmatic questions regarding Controlled Unclassified Information (CUI), including any challenges to CUI marked by EPA, pleasecontact EPA's CUI Program Office. Controlled unclassified information. What type of security is part of your responsibility and placed above all else?, If your wireless device is improperly configured someone could gain control of the device? What information relates to the physical or mental health of an individual? Which of the following is true about unclassified data? What information most likely presents a security risk on your personal social networking profile? Maybe (Identity Management) Which of the following is an example of two-factor authentication? Which of the following statements is TRUE about the use of DoD Public Key Infrastructure (PKI) tokens? correct. the following is true about unclassified data fy23 controlled unclassified information cui quizlet what is true of controlled unclassified information What. Call your security point of contact immediately. UNCLASSIFIED - CLASSIFICATION MARKINGS FOR TRAINING PURPOSES ONLY Marking in the Electronic Environment Short Student Guide Center for Development of Security Excellence Page 4 UNCLASSIFIED - CLASSIFICATION MARKINGS FOR TRAINING PURPOSES ONLY IM and Chat Instant messages and chats are brief, text-based message exchanges and conversations. Secure personal mobile devices to the same level as Government-issued systems. (1) A strategic plan documenting the overall conduct of a war. Which of the following is a potential insider threat indicator? Government-owned PEDs, if expressly authorized by your agency. (social networking) When may you be subjected to criminal, disciplinary, and/or administrative action due to online misconduct? **Insider Threat What do insiders with authorized access to information or information systems pose? When checking in at the airline counter for a business trip, you are asked if you would like to check your laptop bag. Changes to various data systems that store and sometimes share sensitive information outside EPA. **Identity management Which is NOT a sufficient way to protect your identity? *Sensitive Information What type of unclassified material should always be marked with a special handling caveat? correct. Under What Circumstances Could Unclassified? **Social Networking As someone who works with classified information, what should you do if you are contacted by a foreign national seeking information on a research project? Which of the following statements is NOT true about protecting your virtual identity? Use online sites to confirm or expose potential hoaxes, Follow instructions given only by verified personnel, Investigate the links actual destination using the preview feature, Determine if the software or service is authorized. (Answer) CPCON 2 (High: Critical and Essential Functions) CPCON 1 (Very High: Critical Functions) CPCON 3 (Medium: Critical, Essential, and Support Functions) CPCON 4 (Low: All Functions) CPCON 5 (Very Low: All Functions). What is a rule for removable media, other portable electronic devices (PEDs), and mobile computing devices to protect Government systems? *Controlled Unclassified Information Which is a best practice for protecting Controlled Unclassified Information (CUI)? CUI may be stored on any password-protected system. Which of the following is NOT a DoD special requirement for tokens? All data transfers via the internet are not 100% secure and there might be some security vulnerabilities. Matt Monroe, a 20-year U. S. Air Force veteran and current operations manager at Omnistruct, explains the breakdown, "There are four classified information categories in the military based on the severity of damage that the information's release would cause. not correct The CUIProgramisan unprecedented initiative to standardize practices across more than 100 separate departments and agencies, as well asstate, local,tribal and, private sector entities; academia; and industry. It displays a label showing maximum classification, date of creation, point of contact, and Change Management 9CM) Control Number. Classified information that should be unclassified and is downgraded. The following practices help prevent viruses and the downloading of malicious code except. If authorized, what can be done on a work computer? Since the URL does not start with https, do not provide your credit card information. Unclassified documents do not need to be marked as a SCIF. Attempt to change the subject to something non-work related, but neither confirm nor deny the articles authenticity. **Classified Data Which of the following is true of telework? **Insider Threat How many potential insider threat indicators does a coworker who often makes others uneasy by being persistent in trying to obtain information about classified projects to which he has no access, is boisterous about his wife putting them in credit card debt, and often complains about anxiety and exhaustion display? Darryl is managing a project that requires access to classified information. **Social Networking When is the safest time to post details of your vacation activities on your social networking profile? Which of the following is not considered an example of data hiding? Original classification authority Correct. Amendments to a variety of policy documents as well as others referencing Confidential Business Information (CBI) submissions or handling, Changes to paper and e-forms and instructions for their submission to EPA. What action should you take? Which of the following is NOT a typical result from running malicious code? You know this project is classified. Use only personal contact information when establishing personal social networking accounts, never use Government contact information. Which of the following is true of Internet of Things (IoT) devices? Scan external files from only unverifiable sources before uploading to computer. It may be compromised as soon as you exit the plane. Ive tried all the answers and it still tells me off. Research the source to evaluate its credibility and reliability. (Spillage) What is required for an individual to access classified data? What structures visible in the stained preparation were invisible in the unstained preparation? asked in Internet by voice (265k points) internet. A coworker wants to send you a sensitive document to review while you are at lunch and you only have your personal tablet. *Insider Threat Which of the following is a reportable insider threat activity? **Identity management Which of the following is NOT a best practice to preserve the authenticity of your identity? Sensitive information. (Physical Security) which Cyberspace Protection Condition (CPCON) establishes a protection priority focus on critical and essential functions only? What level of damage can the unauthorized disclosure of information classified as Top Secret reasonably be expected to cause? How Do I Answer The CISSP Exam Questions? Official websites use .gov Set hasDigit to true if the 3-character passCode contains a digit, Critical, Essential, and Support Functions. What Are Some Examples Of Malicious Code Cyber Awareness? Do not use any personally owned/non-organizational removable media on your organizations systems. (Spillage) What level of damage can the unauthorized disclosure of information classified as confidential reasonably be expected to cause? Report the suspicious behavior in accordance with their organizations insider threat policy. You are having lunch at a local restaurant outside the installation, and you find a cd labeled favorite song. Which is an untrue statement about unclassified data? Which of the following is NOT considered sensitive information? You have reached the office door to exit your controlled area. **Physical Security Within a secure area, you see an individual who you do not know and is not wearing a visible badge. Which of the following is a reportable insider threat activity? **Social Networking Which of the following is a security best practice when using social networking sites? In which situation below are you permitted to use your PKI token? T/F. Use only personal contact information when establishing your personal account. Insiders are given a level of trust and have authorized access to Government information systems. -Classified information that should be unclassified and is downgraded. (Spillage) After reading an online story about a new security project being developed on the military installation where you work, your neighbor asks you to comment about the article. Which of the following is NOT a type of malicious code? **Insider Threat Based on the description that follows, how many potential insider threat indicator(s) are displayed? What is a security best practice to employ on your home computer? The popup asks if you want to run an application. Which is a risk associated with removable media? *Sensitive Compartmented Information When should documents be marked within a Sensitive Compartmented Information Facility (SCIF). What actions should you take prior to leaving the work environment and going to lunch? Its classification level may rise when aggregated. Not correct (controlled unclassified information) Which of the following is NOT correct way to protect CUI? Which of the following is true of using DoD Public key Infrastructure (PKI) token? Remove your security badge, common access card (CAC), or personal identity verification (PIV) card. Which of the following is true of sharing information in a Sensitive Compartmented Information Facility (SCIF)? Your DoD Common Access Card (CAC) has a Public Key Infrastructure (PKI) token approves for access to the NIPRNET. Your health insurance explanation of benefits (EOB). A lock (LockA locked padlock) or https:// means youve safely connected to the .gov website. Were mitochondria as abundant in human epithelial cells as in onion epidermal cells (procedure 4.6)? Which of the following is NOT an appropriate way to protect against inadvertent spillage? When is it appropriate to have your security badge visible? Label all files, removable media, and subject headers with appropriate classification markings. Which of the following is an example of removable media? Position your monitor so that it is not facing others or easily observed by others when in use Correct. This task is performed with the aim of finding similarities in data points and grouping similar data points together. (Sensitive Information) What guidance is available from marking Sensitive Information information (SCI)? **Classified Data When classified data is not in use, how can you protect it? After clicking on a link on a website, a box pops up and asks if you want to run an application. Since the URL does not start with https, do not provide you credit card information. Correct. Lionel stops an individual in his secure area who is not wearing a badge. Others may be able to view your screen. You are working at your unclassified system and receive an email from a coworker containing a classified attachment. In setting up your personal social networking service account, what email address should you use? Correct. How many potential insiders threat indicators does this employee display? Ensure there are no identifiable landmarks visible in any photos taken in a work setting that you post. *Insider Threat Which of the following is a potential insider threat indicator? He has the appropriate clearance and a signed, approved, non-disclosure agreement. Always use DoD PKI tokens within their designated classification level. If classified information were released, which classification level would result in Exceptionally grave damage to national security? A coworker has asked if you want to download a programmers game to play at work. *Malicious Code After visiting a website on your Government device, a popup appears on your screen. Attempting to access sensitive information without need-to-know, Avoid talking about work outside of the workplace or with people without a need-to-know, Report the suspicious behavior in accordance with their organizations insider threat policy. Linda encrypts all of the sensitive data on her government-issued mobile devices. You are logged on to your unclassified computer and just received an encrypted email from a co-worker. Annual DoD Cyber Awareness Challenge Training, DOD Cyber Awareness Challenge 2019: Knowledge, DOD Cyber Awareness Challenge 2019 (DOD-IAA-V, Operations Management: Sustainability and Supply Chain Management, Elliot Aronson, Robin M. Akert, Samuel R. Sommers, Timothy D. Wilson, Anderson's Business Law and the Legal Environment, Comprehensive Volume, David Twomey, Marianne Jennings, Stephanie Greene. View email in plain text and dont view email in Preview Pane. When unclassified data is aggregated, its classification level may rise. **Social Networking Which of the following statements is true? *Spillage A user writes down details marked as Secret from a report stored on a classified system and uses those details to draft a briefing on an unclassified system without authorization. What should you do? Which may be a security issue with compressed urls? You should remove and take your CAC/PIV card whenever you leave your workstation. 1.1 Standard Challenge Answers. How can you protect yourself from social engineering? After reading an online story about a new security project being developed on the military installation where you work, your neighbor asks you to comment about the article. Here you can find answers to the DoD Cyber Awareness Challenge. Store it in a locked desk drawer after working hours. **Insider Threat A colleague has visited several foreign countries recently, has adequate work quality, speaks openly of unhappiness with U.S. foreign policy, and recently had his car repossessed. What certificates are contained on the Common Access Card (CAC)? There are many travel tips for mobile computing. Like the number of people in a class, the number of fingers on your hands, or the number of children someone has. **Mobile Devices What can help to protect the data on your personal mobile device? *Spillage After reading an online story about a new security project being developed on the military installation where you work, your neighbor asks you to comment about the article. Looking at your MOTHER, and screaming THERE SHE BLOWS! tell your colleague that it needs to be secured in a cabinet or container. Unauthorized Disclosure of Classified Information and Controlled Unclassified Information . CPCON 2 (High: Critical and Essential Functions) Keeping a database from being accessed by unauthorized visitors C. Restricting a subject at a lower classification level from accessing data at a higher classification level D. Preventing an . Controlled Unclassified Information (CUI) is informationthat requires safeguarding or dissemination controls consistent with applicable laws, regulations, and Government-wide policies, but is not classified under Executive Order 13526 "Classified National Security Informat What are examples of CUI? Store it in a shielded sleeve to avoid chip cloning. Where. cyber-awareness. Power off any mobile devices when entering a secure area. The physical security of the device. Based on the description that follows, how many potential insider threat indicator(s) are displayed? Top Secret information could be expected to cause exceptionally grave damage to national security of disclosed. (social networking) When is the safest time to post details of your vacation activities on your social networking profile? Right-click the link and select the option to preview??? Which of the following should you do immediately? Which of the following best describes a way to safely transmit Controlled Unclassified Information (CUI)? As part of the survey the caller asks for birth date and address. Correct. Which of the following is a security best practice for protecting Personally Identifiable Information (PII)? 870 Summit Park Avenue Auburn Hills, MI 48057. Verify the identity of all individuals.??? Search the Registry: Categories, Markings and Controls: Category list CUI markings **Social Networking Which of the following information is a security risk when posted publicly on your social networking profile? *Sensitive Compartmented Information Which of the following best describes the compromise of Sensitive Compartmented Information (SCI)? How many potential insider threat indicators does this employee display? Refer the reporter to your organizations public affairs office. Carrying his Social Security Card with him, DoD employees are prohibited from using a DoD CAC in card-reader-enabled public device, Assigned a classification level by a supervisor. Which of the following is a concern when using your Government-issued laptop in public? d. How do the size and shape of a human epithelial cell differ from those of the Elodea and onion cells that you examined earlier?
Snowmobile Accident Michigan, Peter Haskell Cbs Radio Age, Articles W