You should only accept cookies from reputable, trusted websites. Set hasDigit to true if the 3-character passCode contains a digit, Critical, Essential, and Support Functions. Which of the following best describes good physical security? Infographic - Text version Infographic [PDF - 594 KB] Report a problem or mistake on this page Date modified: 2020-12-14 Carrying his Social Security Card with him, DoD employees are prohibited from using a DoD CAC in card-reader-enabled public device, Assigned a classification level by a supervisor. asked in Internet by voice (265k points) Question : Which of the following is true about unclassified data? The EPAs Controlled Unclassified Information (CUI) Program issued its Interim CUI Policy in December 2020. What should the participants in this conversation involving SCI do differently? data. When traveling or working away from your main location, what steps should you take to protect your devices and data? A colleague is playful and charming, consistently wins performance awards, and is occasionally aggressive in trying to access classified information. Ask them to verify their name and office number. a. Which of the following statements is NOT true about protecting your virtual identity? correct. A coworker uses a personal electronic device in a secure area where their use is prohibited. You receive an email from a company you have an account with. Cyber Awareness Challenge Knowledge Check 2023 Answers, Cyber Awareness Challenge 2022 Knowledge Check Answers. The email provides a website and a toll-free number where you can make payment. (Malicious Code) What are some examples of malicious code? Physically assess that everyone within listening distance is cleared and has a need-to-know for the information being discussed. Its classification level may rise when aggregated. A colleague complains about anxiety and exhaustion, makes coworkers uncomfortable by asking excessive questions about classified projects, and complain about the credit card bills that his wife runs up. How many potential insiders threat indicators does this employee display? Amendments to a variety of policy documents as well as others referencing Confidential Business Information (CBI) submissions or handling, Changes to paper and e-forms and instructions for their submission to EPA. You may use your personal computer as long as it is in a secure area in your home b. Be aware of classification markings and all handling caveats. Only expressly authorized government-owned PEDs. Classified material must be appropriately marked. Physical security of mobile phones carried overseas is not a major issue. Which of the following is true of traveling overseas with a mobile phone. Teams. **Mobile Devices Which is a rule for removable media, other portable electronic devices (PEDs), and mobile computing devices to protect Government systems? Which is a best practice that can prevent viruses and other malicious code from being downloaded when checking your e-mail? Don't talk about work outside your workspace unless it is a specifically designated public meeting environment and is controlled by the event planners. How many potential insider threat indicators does this employee display? (Malicious Code) What are some examples of removable media? **Social Engineering How can you protect yourself from internet hoaxes? It is not corporate intellectual property unless created for or included in requirements related to a government contract. which of the following is true about unclassified data - Weegy On a NIPRNet system while using it for a PKI-required task, Something you possess, like a CAC, and something you know, like a PIN or password. EPAs CUI Program is responsible for issuing CUI policy, procedures, training, and guidance to program offices and regions, along with providing oversight and reporting on the Agencys progress on meeting NARAs CUI deadlines. Spillage because classified data was moved to a lower classification level system without authorization. A smartphone that transmits credit card payment information when held in proximity to a credit card reader. New interest in learning another language, Which of the following is a good practice to protect classified information. Which of the following is NOT a criterion used to grant an individual access to classified data? Unclassified Information Student Guide . What should you do? **Social Networking What should you do if you receive a game application request that includes permission to access your friends, profile information, cookies, and sires visited? *Spillage Which of the following may help to prevent spillage? No. In setting up your personal social networking service account, what email address should you use? Proactively identify potential threats and formulate holistic mitigation responses. After you have returned home following the vacation. This lets the service person know when the tank is "full." A. What actions should you take with a compressed Uniform Resource Locator (URL) on a website known to you? Which of the following is NOT Protected Health Information (PHI)? ! (A type of phishing targeted at senior officials) Which is still your FAT A$$ MOTHER! What action should you take? ~All documents should be appropriately marked, regardless of format, sensitivity, or classification. Which of the following is NOT a typical result from running malicious code? Which is it appropriate to have your security badge visible within a Sensitive Compartmented Information Facility (SCIF). Filter by: All $ Off % Off Free Online Offline. You know this project is classified. correct. A colleague complains about anxiety and exhaustion, makes coworkers uncomfortable by asking excessive questions about classified projects, and complains about the credit card bills that his wife runs up. Which of the following statements is TRUE about the use of DoD Public Key Infrastructure (PKI) tokens? A colleague is playful and charming, consistently wins performance awards, and is occasionally aggressive in trying to access classified information. Search Right-click the link and select the option to preview??? Use your own security badge, key code, or Common Access Card (CAC)/Personal Identity Verification (PIV) card. **Insider Threat How many potential insider threat indicators does a coworker who often makes others uneasy by being persistent in trying to obtain information about classified projects to which he has no access, is boisterous about his wife putting them in credit card debt, and often complains about anxiety and exhaustion display? JavaScript appears to be disabled on this computer. Which of the following is true about unclassified data? - Getvoice.org (Sensitive Compartmented Information) Which of the following best describes the compromise of Sensitive Compartmented Information (SCI)? Government-owned PEDs, if expressly authorized by your agency. Back up your data: This will help you recover your data if it's lost or corrupted. Managing government information when working remotely What should be your response? What can you do to protect yourself against phishing? You know this project is classified. This is information that, if released to the public, carries no injury to personal, industry, or government interests. Spillage occurs when information is spilled from a higher classification or protection level to a lower classification or protection level. Which of the following actions can help to protect your identity? **Removable Media in a SCIF What action should you take when using removable media in a Sensitive Compartmented Information Facility (SCIF)? Use TinyURLs preview feature to investigate where the link leads. A colleague asks to leave a report containing protected health information (PHI) on his desk overnight so he can continue working on it the next day. PDF Cyber Awareness Challenge 2022 Information Security Which of the following is true of protecting classified data? Understanding and using the available privacy settings. Cyber Awareness Challenge Complete Questions and Answers As a security best practice, what should you do before exiting? Prudence faxes CUI using an Unclassified cover sheet via a Secret fax machine. Remove your security badge after leaving your controlled area or office building. Under what circumstances could unclassified information be considered a threat to national security? **Social Engineering What is TRUE of a phishing attack? Preventing an authorized reader of an object from deleting that object B. Use online sites to confirm or expose potential hoaxes, Follow instructions given only by verified personnel, Investigate the links actual destination using the preview feature, Determine if the software or service is authorized. A person who does not have the required clearance or assess caveats comes into possession of SCI in any manner. How can you avoid downloading malicious code? Alexa May, director of accounts, received a bill for $648\$648$648, dated April 666, with sales terms 2/10,1/15,n/302/10, 1/15, n/302/10,1/15,n/30. Which of these is true of unclassified data? cyber. Which of the following is an example of malicious code? A coworker wants to send you a sensitive document to review while you are at lunch and you only have your personal tablet. P2P (Peer-to-Peer) software can do the following except: Allow attackers physical access to network assets. T/F. (Spillage) When is the safest time to post details of your vacation activities on your social networking website? Added 8/5/2020 8:06:16 PM. Phishing can be an email with a hyperlink as bait. Let us have a look at your work and suggest how to improve it! How Do I Answer The CISSP Exam Questions? What level of damage to national security could reasonably be expected if unauthorized disclosure of Top Secret information occurred? You have reached the office door to exit your controlled area. After clicking on a link on a website, a box pops up and asks if you want to run an application. What is considered a mobile computing device and therefore shouldnt be plugged in to your Government computer? **Classified Data Which of the following can an unauthorized disclosure of information classified as Confidential reasonably be expected to cause? PDF IFS0026 Student Guide - CDSE (Malicious Code) While you are registering for a conference, you arrive at the website http://www.dcsecurityconference.org/registration/. What should you do? (Spillage) Which of the following is a best practice to protect information about you and your organization on social networking sites and applications? Which of these are true of unclassified data? - Answers correct. **Travel What security risk does a public Wi-Fi connection pose? (removable media) If an incident occurs involving removable media in a Sensitive Compartmented Information Facility (SCIF), what action should you take? Who is responsible for information/data security? internet-quiz. Validate all friend requests through another source before confirming them. You must have your organization's permission to telework. Try this test to determine if it's considered unclassified, classified or protected, and check out tips on what to do and what not to do when working with sensitive information. Neither confirm or deny the information is classified. Your password and a code you receive via text message. Which of the following is NOT a good way to protect your identity? Discrete data involves whole numbers (integers - like 1, 356, or 9) that can't be divided based on the nature of what they are. Photos of your pet Correct. Log in for more information. Avoid using non-Bluetooth-paired or unencrypted wireless computer peripherals. (Spillage) Which of the following practices may reduce your appeal as a target for adversaries seeking to exploit your insider status? Controlled Unclassified Information (CUI) is information that requires safeguarding or dissemination controls consistent with applicable laws, regulations, and Government-wide policies, but is not classified under Executive Order 13526 "Classified National Security Informat What are examples of CUI? which of the following is true about unclassified data. How many potential insider threat indicators does this employee display? (Malicious Code) Upon connecting your Government-issued laptop to a public wireless connection, what should you immediately do? Power off any mobile devices when entering a secure area. *Sensitive Compartmented Information What is a Sensitive Compartmented Information (SCI) program? a. putting a child in time-out (Identity Management) Which of the following is an example of two-factor authentication? Remove security badge as you enter a restaurant or retail establishment. 1.1.3 Insider Threat. Note the websites URL and report the situation to your security point of contact. On a NIPRNET system while using it for a PKI-required task. Correct. What is the best response if you find classified government data on the internet? Which of the following is true of the Common Access Card (CAC) or Personal Identity Verification (PIV) card? The emission rate of CO 2 from the soils reached the maximum on the 1st day of incubation and the sequence of CO 2 emission rate and cumulative emission under different amendment treatments was as SG > S > G > CK > N (Fig. Which is NOT a method of protecting classified data? Individuals must avoid referencing derivatively classified reports classified higher than the recipient.??? Which of the following actions is appropriate after finding classified Government information on the internet? Approved Security Classification Guide (SCG). (Malicious Code) A coworker has asked if you want to download a programmers game to play at work. What amount is due if Alexa pays on or betwee n April 222222 and May 666? Which of the following is NOT a requirement for telework? CPCON 3 (Medium: Critical, Essential, and Support Functions) Spear Phishing attacks commonly attempt to impersonate email from trusted entities. How many potential insider threat indicators does this employee display? The website requires a credit card for registration. A colleague abruptly becomes hostile and unpleasant after previously enjoying positive working relationships with peers, purchases an unusually expensive car, and has unexplained absences from work. *Sensitive Information Which of the following is the best example of Personally Identifiable Information (PII)? Someone who uses authorized access, wittingly or unwittingly, to harm national security through unauthorized disclosure or other actions that may cause the loss or degradation of resources or capabilities. Linda encrypts all of the sensitive data on her government issued mobile devices. . Digitally signed e-mails are more secure. **Classified Data What is a good practice to protect classified information? Secure .gov websites use HTTPS ALways mark classified information appropriately and retrieve classified documents promptly from the printer. Which piece of information is safest to include on your social media profile? Cyber Awareness 2022. Use only personal contact information when establishing your personal account. Click on "Open File". Which of the following is an example of removable media? What should you do? The Following Is True About Unclassified Data - faqcourse.com Which of the following should be reported as a potential security incident (in accordance with your Agencys insider threat policy)? Which of these is true of unclassified data? Use only personal contact information when establishing personal social networking accounts, never use Government contact information. Classified information is defined in PL 96-456, the Classified Information Procedures Act: Which of the following is NOT sensitive information? Download the information. A coworker brings a personal electronic device into prohibited areas. What should you do if a reporter asks you about potentially classified information on the web? Understanding and using the available privacy settings. **Social Engineering Which may be a security issue with compressed Uniform Resource Locators (URLs)? A type of phishing targeted at high-level personnel such as senior officials. (Mobile Devices) When can you use removable media on a Government system? **Physical Security What is a good practice for physical security? In addition to avoiding the temptation of greed to betray his country, what should Alex do differently? *Sensitive Information Which of the following is an example of Protected Health Information (PHI)? This task is performed with the aim of finding similarities in data points and grouping similar data points together. Store it in a GSA approved vault or container. The website requires a credit card for registration. 8. Use the classified network for all work, including unclassified work. You are leaving the building where you work. Maria is at home shopping for shoes on Amazon.com. laptops, fitness bands, tablets, smartphones, electric readers, and Bluetooth devices. Store it in a shielded sleeve to avoid chip cloning. It never requires classification markings, is true about unclassified data. Only documents that are classified Secret, Top Secret, or SCI require marking. ~All documents should be appropriately marked, regardless of format, sensitivity, or classification. **Insider Threat Which of the following is NOT considered a potential insider threat indicator? You receive an email from the Internal Revenue Service (IRS) demanding immediate payment of back taxes of which you were not aware. If you receive a phone call from a stranger asking for information about your invoice payment process, you should: Crucial information about a user or organization can be gained through. Found a mistake? Physically assess that everyone within listening distance is cleared and has a need-to-know for the information being discussed. Correct. *Sensitive Compartmented Information When should documents be marked within a Sensitive Compartmented Information Facility (SCIF). Which of the following is an example of a strong password? (Spillage) What should you do when you are working on an unclassified system and receive an email with a classified attachment? You check your bank statement and see several debits you did not authorize. When using a public device with a card reader, only use your DoD CAC to access unclassified information, is only allowed if the organization permits it. New answers. How should you protect your Common Access Card (CAC) or Personal Identity Verification (PIV) card? You are having lunch at a local restaurant outside the installation, and you find a cd labeled favorite song. When using your government-issued laptop in public environments, with which of the following should you be concerned? Before long she has also purchased shoes from several other websites. Which of the following is not considered a potential insider threat indicator? Maybe Which of the following is true about unclassified data? Which of the following includes Personally Identifiable Information (PII) and Protected Health Information (PHI)? Decline So That You Maintain Physical Control of Your Government-Issued Laptop. CUI may be stored on any password-protected system. Which of the following is true of Sensitive Compartmented Information (SCI)? *Classified Data A lock (LockA locked padlock) or https:// means youve safely connected to the .gov website. You know that this project is classified. What is required for an individual to access classified data? We recommend Norton Security or McAfee Total Protection. Which is an untrue statement about unclassified data? Remove your security badge, common access card (CAC), or personal identity verification (PIV) card. The email provides a link to a personnel portal where you must enter your personal information as part of an effort to standardize recordkeeping. Which may be a security issue with compressed urls? At all times while in the facility. Which of the following is not a best practice to preserve the authenticity of your identity? It is created or received by a healthcare provider, health plan, or employer. They provide guidance on reasons for and duration of classification of information. Which of the following is an example of two-factor authentication? When expanded it provides a list of search options that will switch the search inputs to match the current selection. Even within a secure facility, dont assume open storage is permitted. Unclassified documents do not need to be marked as a SCIF. What should you do to protect yourself while on social networks? When unclassified data is aggregated, its classification level may rise. Of the following, which is NOT a characteristic of a phishing attempt? Which type of information includes personal, payroll, medical, and operational information? Do not forward, read further, or manipulate the file; Do not give out computer or network information, Do not follow instructions from unverified personnel. PII includes, but is not limited to, social security numbers, date and places of birth, mothers maiden names, biometric records, and PHI. Only friends should see all biographical data such as where Alex lives and works. a. Like the number of people in a class, the number of fingers on your hands, or the number of children someone has. It may be compromised as soon as you exit the plane. Your password and the second commonly includes a text with a code sent to your phone. Data about you collected from all sites, apps, and devices that you use can be aggregated to form a profile of you. Controlled Unclassified Information (CUI) and Covered Defense Correct. A colleague often makes others uneasy with her persistent efforts to obtain information about classified project where she has no need-to-know, is vocal about her husband overspending on credit cards, and complains about anxiety and exhaustion. *Malicious Code What are some examples of malicious code? (Answer) CPCON 2 (High: Critical and Essential Functions) CPCON 1 (Very High: Critical Functions) CPCON 3 (Medium: Critical, Essential, and Support Functions) CPCON 4 (Low: All Functions) CPCON 5 (Very Low: All Functions). What should you do? Executive Order 13556, Controlled Unclassified Information, requires the Executive Branch to establish an open and uniform program for managing [unclassified] information that requires safeguarding or dissemination controls pursuant to and consistent with laws, regulations, and Government-wide policies. The National Archives and Records Administration (NARA) was named the Executive Agent (EA) responsible for overseeing the CUI Program.
Beaumont, Texas Warrant Search, Articles W