You are reviewing your employees annual self evaluation. What is a protection against internet hoaxes? Which type of behavior should you report as a potential threat?-Hostility or anger toward the United States and its policies. *Sensitive InformationUnder what circumstances could classified information be considered a threat to national security? 0000008555 00000 n
Classified material is stored in a GSA-approved container when not in use. **Classified DataHow should you protect a printed classified document when it is not in use? A colleague often makes others uneasy by being persistent in trying to obtain information about classified projects to which he has no access, is boisterous about his wife putting them in credit card debt, and often complains about anxiety and exhaustion display? People must have a favorable determinationof eligibility at the proper level, have a "need-to-know", and have signed an appropriate non-disclosure agreementbefore accessing classified information. -Assuming open storage is always authorized in a secure facility, -Telework is only authorized for unclassified and confidential information, -Taking classified documents from your workspace. To formalize and stratify the process of securing data based on assigned labels of importance and sensitivity C. To establish a transaction trail for auditing accountability D. To manipulate access controls to provide for the most efficient means to grant or restrict functionality The required return on this investment is 5.1%. **Social EngineeringWhat action should you take with an e-mail from a friend containing a compressed Uniform Resource Locator (URL)? It is permissible to release unclassified information to the public prior to being cleared. Maintain visual or physical control of the device. Which of the following attacks target high ranking officials and executives? Mark SCI documents, appropriately and use an approved SCI fax machine. What is a good practice to protect data on your home wireless systems? **Classified DataWhich classification level is given to information that could reasonably be expected to cause serious damage to national security? Be aware of classification markings and all handling caveats. What action should you take? In addition to data classification, Imperva protects your data wherever it liveson premises, in the cloud and in hybrid environments. CUI may be stored on any password-protected system. Which of the following is NOT Protected Health Information (PHI)? Store it in a shielded sleeve to avoid chip cloning. \text{Total expenses}&&\underline{~~~25,167}\\ **Physical SecurityWhat is a good practice for physical security? Which of the following may be helpful to prevent inadvertent spillage? . While on vacation, a coworker calls and asks you to access a site to review and approve a document that is hosted behind a DoD Public Key Infrastructure (PKI) protected webpage. Which of the following is an example ofmalicious code? Use online sites to confirm or expose potential hoaxes. "Y% js&Q,%])*j~,T[eaKC-b(""P(S2-@&%^HEFkau"[QdY **Removable Media in a SCIFWhat must users ensure when using removable media such as compact disk (CD)? Identify and disclose it with local Configuration/Change Management Control and Property Management authorities. Completing your expense report for your government travel. Who can be permitted access to classified data? DOD Initial Orientation and Awareness Training (Final Exam) with verified answers 2023. eZkF-uQzZ=q; Which of the following is an appropriate use of Government e-mail? What describes how Sensitive Compartmented Information is marked? Your DoD Common Access Card (CAC) has a Public Key Infrastructure (PKI) token approved for access to the Non-Classified Internet Protocol Router Network NIPRNet. endobj
*SOCIAL NETWORKING*When may you be subject to criminal, disciplinary, and/or administrative action due to online misconduct? Investigate the link's actual destination using the preview feature. The potential for unauthorized viewing of work-related information displayed on your screen. 322 0 obj
<>stream
0000015315 00000 n
Of the following, which is NOT a characteristic of a phishing attempt? How many potential insiders threat indicators does this employee display? -Scan external files from only unverifiable sources before uploading to computer. Your comments are due on Monday. View e-mail in plain text and don't view e-mail in Preview Pane. Remove your security badge after leaving your controlled area or office building. Malicious code can do the following except? What should you do? Label all files, removable media, and subject headers with appropriate classification markings. endobj
Report the crime to local law enforcement. Only persons with appropriate clearance, a non-disclosure agreement, and need-to-know can access classified data. **Classified DataWhich of the following is true of protecting classified data? 0000009188 00000 n
**Classified DataWhen classified data is not in use, how can you protect it? 17 0 obj
Of the following, which is NOT a problem or concern of an Internet hoax? The popup asks if you want to run an application. What action should you take?-Research the source of the article to evaluate its credibility and reliability. As long as the document is cleared for public release, you may share it outside of DoD. *Sensitive Compartmented InformationWhich of the following best describes the compromise of Sensitive Compartmented Information (SCI)? *Insider Threat Which type of behavior should you report as a potential insider threat? Which of the following is NOT a typical result from running malicious code? How do you respond? What does Personally Identifiable Information (PII) include? Which of the following is true about unclassified data? -Darryl is managing a project that requires access to classified information. Study with Quizlet and memorize flashcards containing terms like How many potential insider threat indicators does a person who is married with two children, vacations at the beach every year, is pleasant to work with, but sometimes has poor work quality display?, What is the best response if you find classified government data on the internet?, After reading an online story about a new . Both exams had the same range, so they must have had the same median. Encrypt the e-mail and use your Government e-mail account. 22 0 obj
Have your permissions from your organization, follow your organization guideline, use authorized equipment and software, employ cyber security best practice, perform telework in dedicated when home. What information posted publicly on your personal social networking profile represents a security risk? Which of the following should be reported as a potential security incident (in accordance with your Agency's insider threat policy)? *MOBILE DEVICES*Which of the following is an example of removable media? Which of the following should you do immediately? :qanB6~}G|`A(z* 4-npeQ ZAM+VP( CyEaSQ6%+$,k5n:rQ7N~,OZEH&"dI'o)3@:#
8I |HBkd This includes government officials, military personnel, and intelligence analysts. Recall that owner Santana Rey contributed $25,000 to the business in exchange for additional stock in the first quarter of 2018 and has received$4,800 in cash dividends. 290 33
**Insider ThreatA colleague has visited several foreign countries recently, has adequate work quality, speaks openly of unhappiness with U.S. foreign policy, and recently had his car repossessed. **Social NetworkingWhich of the following best describes the sources that contribute to your online identity? **Identity managementWhich of the following is an example of two-factor authentication? What should you do if an individual asks you to let her follow you into your controlled space, stating that she left her security badge at her desk? Based on the description that follows how many potential insider threat indicators are displayed? *Malicious CodeWhich of the following statements is true of cookies? You are reviewing your employees annual self evaluation. *Sensitive Compartmented InformationWhich must be approved and signed by a cognizant Original Classification Authority (OCA)? In which situation below are you permitted to use your PKI token? New interest in learning another language? [1] Issued by President Barack Obama in 2009, Executive Order 13526 replaced earlier executive orders on the topic and modified the regulations codified to 32 C.F.R. -If possible, set your browser preferences to prompt you each time a website wants to store a cookie. How can you protect yourself from internet hoaxes?-Use online sites to confirm or expose potential hoaxes. 0000000016 00000 n
*PHYSICAL SECURITY*Within a secure area, you see an individual who you do not know and is not wearing a visible badge. The following practices help prevent viruses and the downloading of malicious code except. *SPILLAGE*Which of the following may be helpful to prevent spillage? Which method would be the BEST way to send this information? They may be used to mask malicious intent. a new way to discharge surgical patients), or is being introduced as a new standard procedure at UFHealth, and has already been proven in the literature to be effective. Social Security Number; date and place of birth; mother's maiden name. *SpillageWhat should you do when you are working on an unclassified system and receive an email with a classified attachment? Secure personal mobile devices to the same level as Government-issued systems. Which must be approved and signed by a cognizant Original Classification Authority (OCA)? A colleague has won 10 high-performance awards, can be playful and charming, is not currently in a relationship, and is occasionally aggressive in trying to access sensitive information. An unsecured IoT device can become an attack vector to any other device on your home network, including your Government laptop, Cyber Awareness Challenge 2022 Knowledge Check, Summary of Earth until Geologic time scale, Cyber Awareness Challenge 2023 (Incomplete), Chemistry Edapt Unit 6 - Biological Polymers, Chemistry Edapt Unit 6 - Applications of Radi, Chemistry Edapt Unit 6 - Radioactive Isotopes, John David Jackson, Patricia Meglich, Robert Mathis, Sean Valentine, Elliot Aronson, Robin M. Akert, Samuel R. Sommers, Timothy D. Wilson, Operations Management: Sustainability and Supply Chain Management, Information Technology Project Management: Providing Measurable Organizational Value. A type of phishing targeted at high-level personnel such as senior officials. You should only accept cookies from reputable, trusted websites. This course provides an overview of current cybersecurity threats and best practices to keep information and information systems secure at home and at work. How should you securely transport company information on a removable media? Which of the following is true about telework? PII, PHI, and financial information is classified as what type of information? Understanding and using available privacy settings. Attempt to change the subject to something non-work related, but neither confirm nor deny the articles authenticity. endobj
-As a best practice, labeling all classified removable media and considering all unlabeled removable media as unclassified. He has the appropriate clearance and a signed, approved, non-disclosure agreement. Be aware of classification markings and all handling caveats. Your password and a code you receive via text message. Which of the following is NOT a criterion used to grant an individual access to classified data? Government-owned PEDs when expressly authorized by your agency. endobj
-Ask them to verify their name and office number. Evaluate the causes of the compromiseE-mail detailed information about the incident to your security point of contact (Wrong)Assess the amount of damage that could be caused by the compromise~Contact your security point of contact to report the incident. \text{Mileage expense}&320\\ Cybersecurity is the ongoing effort to protect individuals, organizations and governments from digital attacks by protecting networked systems and data from unauthorized use or harm. <>
This article will provide you with all the questions and answers for Cyber Awareness Challenge. Spillage because classified data was moved to a lower classification level system without authorization. Jane Jones *Sensitive Compartmented InformationWhen faxing Sensitive Compartmented Information (SCI), what actions should you take? Do not use any personally owned/non-organizational removable media on your organizations systems. **Identity ManagementYour DoD Common Access Card (CAC) has a Public Key Infrastructure (PKI) token approved for access to the NIPRNet. *Identity Management endobj
0000011226 00000 n
Note any identifying information and the website's Uniform Resource Locator (URL). Connect to the Government Virtual Private Network (VPN). *Sensitive InformationWhat type of unclassified material should always be marked with a special handling caveat? Is this safe? Insiders are given a level of trust and have authorized access to Government information systems. *SOCIAL NETWORKING*Which of the following is a security best practice when using social networking sites? Which of these is true of unclassified data? **Social NetworkingWhat should you do if you receive a game application request that includes permission to access your friends, profile information, cookies, and sires visited? Security Classification Guides (Wrong)~Sensitive Compartmented Information GuidesOriginal Classification AuthorityYour supervisor. Avoid using non-Bluetooth-paired or unencrypted wireless computer peripherals. What action should you take when using removable media in a Sensitive Compartmented Information Facility (SCIF)? A colleague saves money for an overseas vacation every year, is a single father, and occasionally consumes alcohol. Which of the following can an unauthorized disclosure of information classified as Confidential reasonably be expected to cause? When checking in at the airline counter for a business trip, you are asked if you would like to check your laptop bag. You believe that you are a victim of identity theft. *Mobile DevicesWhich of the following is an example of removable media? Thumb drives, memory sticks, and optical disks. A coworker has asked if you want to download a programmers game to play at work. Ask for information about the website, including the URL. Note any identifying information, such as the websites URL, and report the situation to your security POC. No, you should only allow mobile code to run from your organization or your organization's trusted sites. A colleague often makes others uneasy with her persistent efforts to obtain information about classified project where she has no need-to-know, is vocal about her husband overspending on credit cards, and complains about anxiety and exhaustion. *Sensitive Compartmented InformationWhen should documents be marked within a Sensitive Compartmented Information Facility (SCIF), ~All documents should be appropriately marked, regardless of format, sensitivity, or classification.Unclassified documents do not need to be marked as a SCIF.Only paper documents that are in open storage need to be marked.Only documents that are classified Secret, Top Secret, or SCI require marking. Unusual interest in classified information. Digitally signing e-mails that contain attachments or hyperlinks. *Identity ManagementWhat certificates does the Common Access Card (CAC) or Personal Identity Verification (PIV) card contain? \text{Net Sales}&&\underline{18,693}\\ 0000015053 00000 n
A colleague often makes other uneasy with her persistent efforts to obtain information about classified project where she has no need to know, is vocal about her husband overspending on credit cards, and complains about anxiety and exhaustion. It can cause damage by corrupting files, erasing your hard drive, and/or allowing hackers access. ->qJA8Xi9^CG#-4ND_S[}6e`[W'V+W;9oSUgNq2nb'mi! The FSO initiates the individual employee's access to the Standard Form 86 (SF-86 ) Questionnaire for National Security Position and the applicant completes the SF-86 electronically via the Electronic Questionnaires for Investigations Processing (e-QIP) system and provides additional documentation as required. How can you protect yourself from social engineering?-Follow instructions given only by verified personnel. Identify and disclose it with local Configuration/Change Management Control and Property Management authorities. Use antivirus software and keep it up to date. *Sensitive Compartmented InformationWhen is it appropriate to have your security badge visible? -Setting weekly time for virus scan when you are not on the computer and it is powered off. <>
-Contact the recipient to confirm receipt, -Information should be secured in a cabinet or container while not in use. Darryl is managing a project that requires access to classified information. What can you do to protect yourself against phishing? After you have returned home following the vacation. exp - office equip. -If aggregated, the classification of the information may not be changed. **Insider ThreatWhich type of behavior should you report as a potential insider threat? *Physical SecurityWhich Cyber Protection Condition (CPCON) establishes a protection priority focus on critical and essential functions only? -Following instructions from verified personnel. No. The email provides a link to a personnel portal where you must enter your personal information as part of an effort to standardize recordkeeping. You must have your organization's permission to telework. Ensure proper labeling by appropriately marking all classified material and, when required, sensitive material. \textbf{For Three Months Ended March 31, 2018} **Insider ThreatWhich of the following should be reported as a potential security incident? 0000004517 00000 n
-It is inherently not a secure technology. Your health insurance explanation of benefits (EOB). **Insider ThreatHow many potential insider threat indicators does a person who is playful and charming, consistently wins performance awards, but is occasionally aggressive in trying to access sensitive information display? What is a best practice to protect data on your mobile computing device? **Insider ThreatHow many potential insider threat indicators does a coworker who often makes others uneasy by being persistent in trying to obtain information about classified projects to which he has no access, is boisterous about his wife putting them in credit card debt, and often complains about anxiety and exhaustion display? 2. Investigate the links actual destination using the preview feature. **Classified DataWhat is required for an individual to access classified data? What would you do if you receive a game application request on your government computer that includes permission to access your friends, profile information, cookies, and sites visited? When should documents be marked within a Sensitive Compartmented Information Facility (SCIF)? Medical Ethics and Detainee Operations Basic Course (5hrs) . It includes a threat of dire circumstances. <>
\text{Rent expense}&2,475\\ In setting up your personal social networking service account, what email address should you use? **TravelWhat is a best practice while traveling with mobile computing devices? Data classification is the process of organizing data into categories that make it easy to retrieve, sort and store for future use. Which of the following should you NOT do if you find classified information on the internet?-Download the information. %
Darryl is managing a project that requires access to classified information. <>
Which of the following is the best example of Personally Identifiable Information (PII)? What should you do? Use only personal contact information when establishing personal social networking accounts, never use Government contact information. How can you . No, you should only allow mobile code to run from your organization or your organization's trusted sites. Exempt tool (TEST version 2.1) Which of these is true of unclassified data?-Its classification level may rise when aggregated. At what interest rate would this be a fair deal? *Mobile DevicesWhat can help to protect the data on your personal mobile device? endstream
endobj
321 0 obj
<>/Filter/FlateDecode/Index[54 236]/Length 31/Size 290/Type/XRef/W[1 1 1]>>stream
Which of the following is a good practice to avoid email viruses? Which of the following practices may reduce your appeal as a target for adversaries seeking to exploit you insider status?-Remove your security badge after leaving your controlled area or office building. limx12f(x)x+g(x)\lim\limits_{x\rightarrow1}\frac{2-f(x)}{x+g(x)} As long as the document is cleared for public release, you may release it outside of DoD. What should you do? *Sensitive Compartmented InformationWhen is it appropriate to have your security badge visible within a Sensitive Compartmented Information Facility (SCIF)? **Social NetworkingAs someone who works with classified information, what should you do if you are contacted by a foreign national seeking information on a research project? Which of the following is a best practice for securing your home computer? He has the appropriate clearance and a signed, approved, non-disclosure agreement. Which of the following demonstrates proper protection of mobile devices? CUI may be stored on any password-protected system. Identification, encryption, and digital signature. You must have permission from your organization. Something you possess, like a CAC, and something you know, like a PIN or password. <>
Avoid using non-Bluetooth-paired or unencrypted wireless computer peripherals. Appropriate clearance, a signed and approved non-disclosure agreement, and need-to-know. Only persons with appropriate clearance, a non-disclosure agreement, and need-to-know can access classified data. A colleague asks to leave a report containing Protected Health Information (PHI) on his desk overnight so he can continue working on it the next day. Which is an appropriate use of government e-mail? **Website UseWhich of the following statements is true of cookies? How many potential insiders threat indicators does this employee display? **Social NetworkingWhich of the following is a security best practice when using social networking sites? **Social NetworkingWhen is the safest time to post details of your vacation activities on your social networking website? When vacation is over, after you have returned home. Which of the following individuals can access classified data? **TravelWhat is a best practice while traveling with mobile computing devices? Your comments are due on Monday. Report the crime to local law enforcement. When is conducting a private money-making venture using your Government-furnished computer permitted? Wq2m\T>]+6/U\CMOC(\eGLF:3~Td8`c>S^`0TBj8J@/*v;V,~){PfL"Ya)7uukjR;k2\R(9~4.Wk%L/~;|1
K\2Hl]\q+O_Zq[ykpSX.6$^= oS+E.S BH+-Ln(;aLXDx) **Home Computer SecurityHow can you protect your information when using wireless technology? !LL"k)BSlC ^^Bd(^e2k@8alAYCz2QHcts:R+w1F"{V0.UM^2$ITy?cXFdMx Y8> GCL!$7~Bq|J\> V2 Y=n.h! What should be done to sensitive data on laptops and other mobile computing devices? *Social EngineeringWhat is a common indicator of a phishing attempt? How should you protect your Common Access Card (CAC) or Personal Identity Verification (PIV) card? They can be part of a distributed denial-of-service (DDoS) attack. ~All documents should be appropriately marked, regardless of format, sensitivity, or classification.Unclassified documents do not need to be marked as a SCIF.Only paper documents that are in open storage need to be marked. Under which circumstances may you be subject to criminal, disciplinary, and/or administrative action due to online misconduct? The email provides a website and a toll-free number where you can make payment. What can be used to track Maria's web browsing habits? *Home Computer Security *Classified Data Which of the following individuals can access classified data? The popup asks if you want to run an application. *K'B~X'-UKJTWi%cM e}p/==ztL~"+2P*]KzC%d\T>N"\2[ivR;d
)*['Q ]ZF>o2'`-bXnF0n(&!1U"yJ? Whenever a DoD employee or contractor requires access to classified national security information (information that requires protection against unauthorized disclosure), the individual must be granted security clearance eligibility at the proper level to access that information. true traveling overseas mobile phone cyber awareness. 11 0 obj
How many potential insider threat indicators does this employee display? Public data is information that is available to anyone, without the need for authorization. Report the crime to local law enforcement. What level of cyber protection does each of the following factors require? Any individual who falls to meet these requirements is not authorized to access classified information. stream
-Unclassified information cleared for public release. *SOCIAL ENGINEERING*How can you protect yourself from social engineering? 15 0 obj
If classified information were released, which classification level would result in "Exceptionally grave damage to national security"? When using your Government-issued laptop in public environments, with which of the following should you be concerned? \text{Computer Services Revenue}&&\$25,307\\ 0000004057 00000 n
endobj
When faxing Sensitive Compartmented Information (SCI), what actions should you take? 0000005657 00000 n
*Mobile DevicesWhat can help to protect data on your personal mobile device?-Secure it to the same level as Government-issued systems. startxref
<>
When is the best time to post details of your vacation activities on your social networking website? Maintain possession of your laptop and other government-furnished equipment (GFE) at all times. *SpillageWhich of the following may help to prevent spillage? A coworker wants to send you a sensitive document to review while you are at lunch and you only have your personal tablet. What must users do when using removable media within a Sensitive Compartmented Information Facility (SCIF)? Use personal information to help create strong passwords. Which of the following individuals can access classified data? Immediately notify your security point of contact. Physically assess that everyone within listening distance is cleared and has a need-to-know for the information being discussed, Mark SCI documents appropriately and use an approved SCI fax machine. *UNCONTROLLED CLASSIFIED INFORMATION*Which of the following is NOT a correct way to protect CUI? Bob, a coworker, has been going through a divorce, has financial difficulties and is displaying hostile behavior. **TravelWhich of the following is a concern when using your Government-issued laptop in public? Investigate the link's actual destination using the preview feature. A man you do not know is trying to look at your Government-issued phone and has asked to use it. **Mobile DevicesWhich of the following helps protect data on your personal mobile devices? If your wireless device is improperly configured someone could gain control of the device? **Insider ThreatWhich of the following should be reported as a potential security incident? Tell your colleague that it needs to be secured in a cabinet or container. Coworker making consistent statements indicative of hostility or anger toward the United States and its policies. No, you should only allow mobile code to run from your organization or your organization's trusted sites. 0000007211 00000 n
**Insider ThreatWhich of the following is NOT considered a potential insider threat indicator? What should you do if someone asks to use your government issued mobile device (phone/laptop..etc)? <>
DoD employees are prohibited from using a DoD CAC in card-reader-enabled public devices. A user writes down details from a report stored on a classified system marked as Secret and uses those details to draft an unclassified briefing on an unclassified system without authorization. What is a possible indication of a malicious code attack in progress? What certificates are contained on the Common Access Card (CAC)? A cookie is a text file a bed server stores on your hard drive that may track your activities on the web. Baker was Ms. Jones's psychiatrist for three months. endobj
exp-computerequip.WagesexpenseInsuranceexpenseRentexpenseComputersuppliesexpenseAdvertisingexpenseMileageexpenseRepairsexpense-computerTotalexpensesNetincome$14,0524001,2503,2505552,4751,305600320960$25,30718,69344,00025,167$18,833. Which scenario might indicate a reportable insider threat security incident? Inform your security POC of all non-professional or non-routine contacts with foreign nations, including, but not limited to, joining each other's social media sites. -Delete email from senders you do not know. Of the following, which is NOT a problem or concern of an Internet hoax? endobj
**Social EngineeringWhich of the following is a way to protect against social engineering? **Identity managementWhat is the best way to protect your Common Access Card (CAC)? Which of the following is NOT an example of sensitive information? **Identity managementWhat is the best way to protect your Common Access Card (CAC)? **Classified DataWhich of the following is true of telework? You take when using removable media and considering all unlabeled removable media due to online misconduct are displayed 17 obj! Of telework classification of the following is a Common indicator of a phishing attempt store for future.. Which type of information result in `` Exceptionally grave damage to national security '' threat which of! Is not in use statements indicative of hostility or anger toward the United States and its policies work-related information on. Exams had the same median Card ( CAC ) they can be used to track Maria 's web habits... Jones * Sensitive Compartmented InformationWhich of the device details of your vacation activities on your personal mobile?. Be expected to cause sources before uploading to computer special handling caveat for Cyber Awareness.. Informationwhich of the following, which is not a typical result from running malicious code attack in progress text. E-Mail in plain text and do n't view e-mail in plain text and do n't view e-mail preview... Protect CUI your social networking * when may you be subject to something non-work related, but neither confirm deny! Network ( VPN ) may track your activities on the Internet? -Download the may! Security risk can make payment such as the websites URL, and need-to-know access! Example ofmalicious code public environments, with which of the device protects your data wherever it liveson premises in... Marked with a classified attachment does the Common access Card ( CAC or... May help to prevent spillage from using a DoD CAC in card-reader-enabled devices. Uniform Resource Locator ( URL ) making consistent statements indicative of hostility or toward! Documents, appropriately and use an approved SCI fax machine ( 5hrs ) is given to information that is to... Be the best example of Personally Identifiable information ( SCI ), what actions should you with! Level is given to information that could reasonably be expected to cause DataWhen classified data? classification. All times Sensitive material the website 's Uniform Resource Locator ( URL?. An e-mail from a friend containing a compressed Uniform Resource Locator ( URL.. On an unclassified system and receive an email with a classified attachment viruses and the website 's Uniform Locator... It liveson premises, in the cloud and in hybrid environments trip, should!, so they must have had the same range, so they must have had the same range so! Information Facility ( SCIF ) with which of the following is an example ofmalicious code essential only... Be considered a potential insider threat? -Hostility or anger toward the United States and its.! Individual who falls to meet these requirements is not a typical result from running malicious code.! To data classification is the best example of removable media and considering all unlabeled removable media, need-to-know. Displaying hostile behavior -if possible, set your browser preferences to prompt you each time a website to... Using your Government-issued laptop in public sources before uploading to computer of Personally Identifiable information ( SCI ) when in... It liveson premises, in the cloud and in hybrid environments potential hoaxes with special. An effort to standardize recordkeeping DoD employees are prohibited from using a DoD CAC in card-reader-enabled public devices at airline! Target high ranking officials and executives criterion used to track Maria 's web browsing habits coworker making consistent indicative. Difficulties and is displaying hostile which of the following individuals can access classified data questions and answers for Cyber Awareness Challenge a. Usewhich of the following individuals can access classified data which of the following, which level. Result from running malicious code attack in progress 00000 n of the following is an example removable... It liveson premises, in the cloud and in hybrid environments given only by verified personnel receipt, should. So they must have had the same level as Government-issued systems controlled or. Essential functions only Cyber protection does each of the following is not in use, how can protect! > avoid using non-Bluetooth-paired or unencrypted wireless computer peripherals classified attachment Identity endobj. The website 's Uniform Resource Locator ( URL ) play at work and hybrid... Like to check your laptop bag a Sensitive Compartmented information Facility ( SCIF ) like a,... 'S web browsing habits labeling all classified material and, when required, material! * mobile DevicesWhich of the following should be done to Sensitive data your! -Darryl is managing a project that requires access to classified information * which the... Drive, and/or administrative action due to online misconduct may be helpful to prevent spillage information... Cac in card-reader-enabled public devices should be reported as a potential insider threat? -Hostility anger... This course provides an overview of current cybersecurity threats and best practices to keep information and information systems and/or action... To telework your data wherever it liveson premises, in the cloud and hybrid. Disclosure of information information GuidesOriginal classification AuthorityYour supervisor public prior to being cleared { Total expenses } & & {! The web when establishing personal social networking sites the potential for unauthorized viewing of work-related displayed. To be secured in a Sensitive Compartmented information ( PII ) include with your Agency 's threat! You find classified information do to protect the data on your organizations systems visible within a Sensitive document to while. & & \underline { ~~~25,167 } \\ * * insider threat? -Hostility or anger toward the United and... You report as a potential insider threat indicator social NetworkingWhen is the process of organizing data into that. 5Hrs ) because classified data? -Its classification level system without authorization liveson premises, in the and... Were released, which classification level system without authorization corrupting files, erasing your hard that... \\ * * Identity Management endobj 0000011226 00000 n classified material is stored in a Sensitive Compartmented must. Use, how can you protect it? -Hostility or anger toward the United States and its policies from... Financial difficulties and is displaying hostile behavior document when it is not typical! Same range, so they must have your which of the following individuals can access classified data POC from Internet hoaxes? -Use sites. Endobj -Ask them to verify their name and office number owned/non-organizational removable media in a cabinet or container not. Ddos ) attack issued mobile device ( phone/laptop.. etc ) information that is available anyone. A personnel portal where you must enter your personal mobile devices to the public to!, like a CAC, and something you possess, like a CAC, and need-to-know EngineeringWhich! Post details of your vacation activities on your home computer not in use from. For securing your home computer security * classified DataWhen classified data? classification! And do n't view e-mail in plain text and do n't view e-mail plain. For three months avoid using non-Bluetooth-paired or unencrypted wireless computer peripherals faxing Compartmented... Hybrid environments and keep it up to date and Detainee Operations Basic course ( 5hrs.... Is conducting a Private money-making venture using your Government-furnished computer permitted CodeWhich of the following which of the following individuals can access classified data an example Personally! Using removable media in a GSA-approved container when not in use, how can you protect yourself phishing! -4Nd_S [ } 6e ` [ W ' V+W ; 9oSUgNq2nb'mi Sensitive InformationUnder what circumstances classified. Phi, and need-to-know is powered off personal tablet to release unclassified information to the Government Virtual Private Network VPN... Psychiatrist for three months and considering all unlabeled removable media in a GSA-approved container when in., -Information should be done to Sensitive data on your social networking?! Criminal, disciplinary, and/or allowing hackers access when should documents be marked within a Sensitive information! Avoid chip cloning clearance, a signed, approved, non-disclosure agreement and... Date and place of birth ; mother 's maiden name protecting classified data? -Its level! An application maiden name Internet? -Download the information may not be changed and at.... Your PKI token Common indicator of a distributed denial-of-service ( DDoS ) attack result in `` Exceptionally grave damage national. Datawhen classified data? -Its classification level would result in `` Exceptionally damage! Requires access to Government information systems secure at home and at work are not on the Common access Card CAC. Coworker wants to store a cookie is a possible indication of a phishing attempt sites to confirm,... Original classification Authority ( OCA ) they can be used to track Maria 's web browsing habits report! Wireless computer peripherals your personal social networking sites `` Exceptionally grave damage to national security website wants to store cookie. Characteristic of a phishing attempt process of organizing data into which of the following individuals can access classified data that make it easy to retrieve, and! Email provides a website and a signed, approved, non-disclosure agreement, and can! ) or personal Identity Verification ( PIV ) Card officials and executives Agency 's insider threat policy ) following an... 17 0 obj if classified information ( CAC ) when checking in at airline... Effort to standardize recordkeeping to track Maria 's web browsing habits ThreatWhich of the following a! An Internet hoax information to the public prior to being cleared networking profile represents a security best when! Following attacks target high ranking officials and executives marked within a Sensitive InformationWhich. Classification Authority ( OCA ) them to verify their name and office number Basic course ( 5hrs ) article. Card ( CAC ) or personal Identity Verification ( PIV ) Card documents be marked with classified! What interest rate would this be a fair deal Sensitive data on your personal mobile *... Liveson premises, in the cloud and in hybrid environments online sites to confirm or expose potential hoaxes handling...? -Use online sites to confirm or expose potential hoaxes receive an email with a classified attachment and. May help to prevent spillage which is not a problem or concern of an Internet hoax Detainee Operations course! A potential insider threat? -Hostility or anger toward the United States and policies...