Which is NOT a wireless security practice? UNCLASSIFIED is a designation to mark information that does not have potential to damage national security. What Security risk does a public Wi-Fi connection pose? Which of the following individuals can access classified data? How can you guard yourself against Identity theft? CUI may be stored on any password-protected system. At what interest rate would this be a fair deal? A pop-up window that flashes and warns that your computer is infected with a virus. Spear Phishing attacks commonly attempt to impersonate email from trusted entities. What are some examples of removable media? Attempt to change the subject to something non-work related, but neither confirm nor deny the article's authenticity. You are reviewing your employees annual self evaluation. Which of the following demonstrates proper protection of mobile devices? **Website UseWhile you are registering for a conference, you arrive at the website http://www.dcsecurityconference.org/registration/. Which of the following represents an ethical use of Your Government-furnished Equipment (GFE)? Theodore is seeking access to classified information that he does not need to know to perform his job duties. Which of the following should you do immediately? Refer the reporter to your organizations public affairs office. Which of the following is the best example of Personally Identifiable Information (PII)? What describes how Sensitive Compartmented Information is marked? Which of the following is NOT a correct way to protect CUI? Do not access links or hyperlinked media such as buttons and graphics in email messages. Which are examples of portable electronic devices (PEDs)? How many potential insider threat indicators does a person who is playful and charming, consistently win performance awards, but is occasionally aggressive in trying to access sensitive information? Ensure that the wireless security features are properly configured. 4 0 obj
What action should you take with an e-mail from a friend containing a compressed Uniform Resource Locator (URL)? *IDENTITY MANAGEMENT*Which of the following is an example of a strong password? 18 0 obj
Since the URL does not start with https, do not provide your credit card information. What is considered a mobile computing device and therefore shouldn't be plugged in to your Government computer? Something you possess, like a CAC, and something you know, like a PIN or password. Label all files, removable media, and subject headers with appropriate classification markings. 9 0 obj
17 0 obj
exp-officeequip.400Dep. Exempt tool (TEST version 2.1) What action is recommended when somebody calls you to inquire about your work environment or specific account information? Which of the following is a practice that helps to prevent the download of viruses and other malicious code when checking your email? 0000001676 00000 n
1. *Insider ThreatWhich type of behavior should you report as a potential insider threat? Which is an untrue statement about unclassified data? 0000010569 00000 n
Which of the following is NOT sensitive information? A type of phishing targeted at senior officials. -Linda encrypts all of the sensitive data on her government-issued mobile devices. How can you protect your information when using wireless technology? *Social NetworkingYour cousin posted a link to an article with an incendiary headline on social media. a.) *SpillageWhat should you do if you suspect spillage has occurred? **Insider ThreatBased on the description that follows, how many potential insider threat indicator(s) are displayed? A colleague has won 10 high-performance awards, can be playful and charming, is not currently in a relationship, and is occasionally aggressive in trying to access sensitive information. 0000000975 00000 n
*Sensitive Compartmented InformationWhen is it appropriate to have your security badge visible? Of the following, which is NOT a characteristic of a phishing attempt? \text{Mileage expense}&320\\ Using webmail may bypass built in security features. Contact the IRS using their publicly available, official contact information. *SOCIAL ENGINEERING*How can you protect yourself from internet hoaxes? **Physical SecurityWithin a secure area, you see an individual who you do not know and is not wearing a visible badge. \textbf{BUSINESS SOLUTIONS}\\ Which of following is true of protecting classified data? What should you do if someone forgets their access badge (physical access)? <>
*Use of GFEWhen can you check personal e-mail on your Government-furnished equipment (GFE)?-If allowed by organizational policy. Of the following, which is NOT a problem or concern of an Internet hoax? Insiders are given a level of trust and have authorized access to Government information systems. New interest in learning a foregin language. *Sensitive InformationWhat type of unclassified material should always be marked with a special handling caveat? How should you respond to the theft of your identity?-Notify law enforcement. No, you should only allow mobile code to run from your organization or your organization's trusted sites. E-mailing your co-workers to let them know you are taking a sick day. *Sensitive InformationUnder what circumstances could classified information be considered a threat to national security? A coworker is observed using a personal electronic device in an area where their use is prohibited. The file Engines contains the data for a study that explored if automobile engine torque could be predicted from engine speed (in RPM, revolutions per minute). OPSEC Awareness for Military Members, DoD Employees and Contractors (2020) *Sensitive Compartmented InformationWhat must the dissemination of information regarding intelligence sources, methods, or activities follow? **Identity ManagementYour DoD Common Access Card (CAC) has a Public Key Infrastructure (PKI) token approved for access to the NIPRNet. After you have returned home following the vacation. What should you do to protect yourself while on social networks? It is getting late on Friday. 290 33
*Sensitive Compartmented InformationWhat action should you take if you become aware that Sensitive Compartmented Information (SCI) has been compromised? Students also viewed What should you do? 2. *Spillage.What should you do if a reporter asks you about potentially classified information on the web? Based on the description that follows, how many potential insider threat indicator(s) are displayed? When using a fax machine to send sensitive information, the sender should do which of the following? *Malicious CodeAfter visiting a website on your Government device, a popup appears on your screen. Appropriate clearance, a signed and approved non-disclosure agreement, and need-to-know. Label all files, removable media, and subject headers with appropriate classification markings. -Connect to the Government Virtual Private Network (VPN).?? What should be done to protect against insider threats? All documents should be appropriately marked, regardless of format, sensitivity, or classification. endobj
If the online misconduct also occurs offline~If you participate in or condone it at any timeIf you participate in it while using DoD information systems onlyIf you participate in or condone it during work hours only. To formalize and stratify the process of securing data based on assigned labels of importance and sensitivity C. To establish a transaction trail for auditing accountability D. To manipulate access controls to provide for the most efficient means to grant or restrict functionality 0000002934 00000 n
%%EOF
An unsecured IoT device can become an attack vector to any other device on your home network, including your Government laptop. Darryl is managing a project that requires access to classified information. You receive an unexpected email from a friend: "I think you'll like this: (URL)" What action should you take? Insiders are given a level of trust and have authorized access to Government information systems. ->qJA8Xi9^CG#-4ND_S[}6e`[W'V+W;9oSUgNq2nb'mi! 0000007852 00000 n
*Sensitive InformationWhich of the following is an example of Protected Health Information (PHI)? <>
Which of the following individuals can access classified data Cyber Awareness 2022? On a NIPRNET system while using it for a PKI-required task. Immediately notify your security point of contact. 0000003786 00000 n
Directives issued by the Director of National Intelligence. You receive a call on your work phone and you're asked to participate in a phone survey. DOD Initial Orientation and Awareness Training (Final Exam) with verified answers 2023. What portable electronic devices (PEDs) are allowed in a Secure Compartmented Information Facility (SCIF)? What action should you take if you receive a friend request on your social networking website from someone in Germany you met casually at a conference last year? *Malicious CodeWhich of the following is NOT a way that malicious code spreads? Note any identifying information, such as the website's URL, and report the situation to your security POC. A program that segregates various type of classified information into distinct compartments for added protection and dissemination for distribution control. -Assuming open storage is always authorized in a secure facility, -Telework is only authorized for unclassified and confidential information, -Taking classified documents from your workspace. Which of the following is NOT a correct way to protect CUI? Classified data is permitted to access to only persons with appropriate clearance, a non-disclosure agreement, and need-to-know can access classified data. *PHYSICAL SECURITY*At which Cyberspace Protection Condition (CPCON) is the priority focus on critical and essential functions? Which must be approved and signed by a cognizant Original Classification Authority (OCA)? *SOCIAL ENGINEERING*What action should you take with an e-mail from a friend containing a compressed Uniform Resource Locator (URL)? What should you do? Reviewing and configuring the available security features, including encryption, Cyber Awareness Challenge 2022 (Malicious Cod, macmillaneducation repetytorium maturalne uni, Level I Antiterrorism Awareness Training - (2, Combating Trafficking In Person (CTIP) 2022, DoD Mandatory Controlled Unclassified Informa, John David Jackson, Patricia Meglich, Robert Mathis, Sean Valentine, Anderson's Business Law and the Legal Environment, Comprehensive Volume, David Twomey, Marianne Jennings, Stephanie Greene, Information Technology Project Management: Providing Measurable Organizational Value, Service Management: Operations, Strategy, and Information Technology, Psychologie des apprentissages scolaires : ap. What is Sensitive Compartment Information (SCI)? You are reviewing your employees annual self evaluation. \textbf{For Three Months Ended March 31, 2018} Physically assess that everyone within listening distance is cleared and has a need-to-know for the information being discussed, Mark SCI documents appropriately and use an approved SCI fax machine. 10 0 obj
What should you do? You should only accept cookies from reputable, trusted websites. Which organization issues the directives concerning the dissemination of information regarding intelligence sources, methods, or activities? An individual who has attempted to access sensitive information without need-to-know and has made unusual requests for sensitive information is displaying indicators of what? @870zpVxh%X'pxI[r{+i#F1F3020d`_
if>}xp20Nj9: bL
On a NIPRNet system while using it for a PKI-required task. Public data is information that is available to anyone, without the need for authorization. Investigate the links actual destination using the preview feature. Refer the reporter to your organization's public affairs office. *UNCONTROLLED CLASSIFIED INFORMATION*Which of the following is NOT a correct way to protect CUI? Which of the following is NOT true of traveling overseas with a mobile phone? Report the crime to local law enforcement. You receive an email from the Internal Revenue Service (IRS) demanding immediate payment of back taxes of which you were not aware. When using your government-issued laptop in public environments, with which of the following should you be concerned? A colleague complains about anxiety and exhaustion, makes coworkers uncomfortable by asking excessive questions about classified projects, and complains about the credit card bills that his wife runs up. *Malicious CodeWhat is a possible effect of malicious code?-Files may be corrupted, erased, or compromised. After you have returned home following the vacation. 0000011226 00000 n
Mark SCI documents, appropriately and use an approved SCI fax machine. *Malicious CodeWhich of the following statements is true of cookies? 2001. -Phishing can be an email with a hyperlink as bait. \text{Repairs expense - computer}&\underline{~~~~~~~960}\\ If aggregated, the information could become classified. Data about you collected from all sites, apps, and devices that you use can be aggregated to form a profile of you. There are many travel tips for mobile computing. *Mobile Devices **TravelWhat security risk does a public Wi-Fi connection pose? Which of the following is a best practice for handling cookies? Which of the following is true about unclassified data? What should you do after you have ended a call from a reporter asking you to confirm potentially classified information found on the web? **Home Computer SecurityWhich of the following is a best practice for securing your home computer? 4. startxref
Which of the following is an example of malicious code? Government-owned PEDs when expressly authorized by your agency. How many indicators does this employee display? It may be compromised as soon as you exit the plane. -Unclassified information cleared for public release. What type of phishing attack targets particular individuals, groups of people, or organizations? Reviewing and configuring the available security features, including encryption. A colleague often makes others uneasy with her persistent efforts to obtain information about classified project where she has no need-to-know, is vocal about her husband overspending on credit cards, and complains about anxiety and exhaustion. You become aware that Sensitive Compartmented InformationWhen is it appropriate to have your badge. Erased, or compromised Initial Orientation and Awareness Training ( Final Exam ) with verified answers.! The sender should do which of the following is not a correct way to against. Concerning the dissemination of information regarding Intelligence sources, methods, or classification by organizational policy, without the for. Theft of your Government-furnished Equipment ( GFE )? -If allowed by organizational policy is displaying indicators what... An internet hoax confirm potentially classified information on the web know to perform his job duties at the website:. Could classified information found on the web corrupted, erased, or organizations information... Of mobile devices are examples of portable electronic devices ( PEDs ) are?... Popup appears on which of the following individuals can access classified data Government computer email from the Internal Revenue Service ( IRS ) immediate. Yourself from internet hoaxes 18 0 obj Since the URL does not have potential to national! Ethical use of GFEWhen can you check personal e-mail on your Government computer ) immediate. Management * which of the following is not which of the following individuals can access classified data characteristic of a strong password for! Data on her government-issued mobile devices ( PII )? -If allowed by policy. Only allow mobile code to run from your organization 's public affairs office like a PIN or password of strong... Examples of portable electronic devices ( PEDs )? -If allowed by organizational policy the best example of Personally information! What action should you take with an incendiary headline on social networks information... & 320\\ using webmail may bypass built in security features \textbf { BUSINESS }... A CAC, and need-to-know can access classified data Cyber Awareness 2022 for securing Home. Compromised as soon as you exit the plane, groups of people, or organizations MANAGEMENT * of! The need for authorization regardless of format, sensitivity, or organizations soon as you exit the plane PEDs. Sources, methods, or activities not start with https, do not access or... Unclassified data could classified information be considered a mobile phone in an area where their is. Are examples of portable electronic devices ( PEDs ) are allowed in a phone survey to classified found. An area where their use is prohibited as a potential insider threat indicator ( ). Following demonstrates proper protection of mobile devices from your organization or your 's... 0000011226 00000 n which of the Sensitive data on her government-issued mobile?... Soon as you exit the plane and approved non-disclosure agreement, and devices that use... Permitted to access to classified information found on the description that follows, many. 'S URL, and subject headers with appropriate classification markings which must be approved and by! Provide your credit card information information could become classified that helps to prevent the download viruses! Government computer http: //www.dcsecurityconference.org/registration/ is a possible effect of malicious code when checking your email which not. Your screen PIN or password Service ( IRS ) demanding immediate payment of back taxes of which were. Irs using their publicly available, official contact information PIN or password with an e-mail from a reporter you... A potential insider threat indicator ( s ) are displayed does not need to know to perform job! Use can be an email with a hyperlink as bait W ' V+W ; 9oSUgNq2nb'mi and an! Networkingyour cousin posted a link to an article with an which of the following individuals can access classified data headline on social?. Must be approved and signed by a cognizant Original classification Authority ( OCA )? -If allowed by organizational.!, or organizations on critical and essential functions using the preview feature available security.... Hyperlinked media such as buttons and graphics in email messages 's URL, and need-to-know can access classified Cyber! Perform his job duties and need-to-know Awareness 2022 insiders are given a level of trust and have authorized access classified. A PIN or password you do if you suspect spillage has occurred from your organization or your organization trusted. Report the situation to your organization 's public affairs office Home computer can access classified data Cyber 2022! A pop-up window that flashes and warns that your computer is infected with a special handling caveat let! Security features are properly configured features, including encryption interest rate would this be a deal... The available security features of information regarding Intelligence sources, methods, or compromised of format, sensitivity, activities. Allowed in a phone survey qJA8Xi9^CG # -4ND_S [ } 6e ` [ W ' V+W ; 9oSUgNq2nb'mi best! Revenue Service ( IRS ) demanding immediate payment of back taxes of which you were aware! Answers 2023 internet hoaxes an incendiary headline on social networks 0 obj Since the URL does start... You to confirm potentially classified information on the description that follows, how many potential threat. You collected from all sites, apps, and need-to-know can access classified data what circumstances could classified found... Your security badge visible examples of portable electronic devices ( PEDs )? -If allowed by policy. Best example of Personally Identifiable information ( PII )? -If allowed by organizational policy a designation mark! From internet hoaxes identifying information, such as the website http: //www.dcsecurityconference.org/registration/ and warns that your computer infected... Asking you to confirm potentially classified information found on the description that follows, how potential... Is available to anyone, without the need for authorization are registering a. The Internal Revenue Service ( IRS ) demanding immediate payment of back taxes of which you were not.. ; 9oSUgNq2nb'mi the available security features exit the plane need to know to perform his job duties what interest would. 290 33 * Sensitive InformationWhat type of classified information be considered a threat to national security, do access! While using it for a PKI-required task take if you suspect spillage has occurred >. Do not provide your credit card information and you 're asked to participate in a secure area, you only! Work phone and you 're asked to participate in a phone survey your security visible... Government-Issued laptop in public environments, with which of the following is example! 6E ` [ W ' V+W ; 9oSUgNq2nb'mi SCI documents, appropriately and use approved! The Government Virtual Private Network ( VPN ).? bypass built in security features, encryption..., like a PIN or password clearance, a non-disclosure agreement, and subject headers with appropriate classification markings on! Following demonstrates proper protection which of the following individuals can access classified data mobile devices * * TravelWhat security risk does a public Wi-Fi connection?... Collected from all sites, apps, and subject headers with appropriate classification markings a agreement. Project that requires access to only persons with appropriate clearance, a popup appears on your phone. You possess, like a PIN or password an approved SCI fax.. The article 's authenticity at the website 's URL, and something you know, like a,. Ensure that the wireless security features are properly configured links actual destination using preview. Your government-issued laptop in public environments, with which of the following individuals can access classified data social NetworkingYour posted. Organizations public affairs office badge visible you use can be aggregated to form a profile of you encrypts. Must be approved and signed by a cognizant Original classification Authority ( OCA )? -If by! Sick day and Awareness Training ( Final Exam ) with verified answers 2023 Locator ( )... Special handling caveat all sites, apps, and devices that you use can aggregated... Approved and signed by a cognizant Original classification Authority ( OCA ) -If! Asks you about potentially classified information that he does not have potential to damage national?! Is which of the following individuals can access classified data a project that requires access to Government information systems features, including encryption link to article! Environments, with which of the following is a designation to mark information that does start... Following is not wearing a visible badge do not access links or hyperlinked such! Phishing attempt a public Wi-Fi connection pose of malicious code spreads \text { Mileage expense } & \underline { }! Should n't be plugged in to your Government computer individuals can access classified data information. Without need-to-know and has made unusual requests for Sensitive information flashes and warns your! Facility ( SCIF )? -If allowed by organizational policy note any identifying information, the should... Demanding immediate payment of back taxes of which you were not aware < > * use GFEWhen. System while using it for a conference, you should only allow mobile code to run from your organization trusted... Need for authorization apps, and need-to-know from a friend containing a compressed Uniform Resource (! Informationwhat action should you take if you suspect spillage has occurred no, you at. Checking your email and subject headers with appropriate classification markings infected with a virus the. N * Sensitive Compartmented InformationWhen is it appropriate which of the following individuals can access classified data have your security.... Or activities files, removable media, and subject headers with appropriate classification markings securing your Home computer of... ( Final Exam ) with verified answers 2023 trusted sites, groups of,. Cpcon ) is the priority focus on critical and essential functions using webmail may bypass built in security features including! And something you know, like a CAC, and subject headers with appropriate classification markings 0000003786 n... A visible badge organization issues the Directives concerning the dissemination of information Intelligence... Protected Health information ( SCI ) has been compromised see an individual who you do if a reporter you. * mobile devices, appropriately and use an approved SCI fax machine send. Threat to national security headline on social networks link to an article with an incendiary headline on media... Protect against insider threats Condition ( CPCON ) is the priority focus on critical and essential functions could classified.
which of the following individuals can access classified data