idletyme reservations
 

How many potential insider threat indicators is Bob displaying? A Coworker has asked if you want to download a programmers game to play at work. (2) War planning documents which contain worldwide -- (a) Planning data and assumptions, (b) Wartime planning factors for the use of nuclear weapons, (c) Intelligence estimates of enemy capabilities, (d) Force composition and development, and Changes to various data systems that store and sometimes share sensitive information outside EPA. **Social Engineering Which of the following is a way to protect against social engineering? A coworker has left an unknown CD on your desk. correct. Which of the following personally-owned computer peripherals is permitted for use with Government-furnished equipment? It displays a label showing maximum classification, date of creation, point of contact, and Change Management 9CM) Control Number. Which of the following is true of protecting classified data Select the information on the data sheet that is personally identifiable information (PII). A colleague complains about anxiety and exhaustion, makes coworkers uncomfortable by asking excessive questions about classified projects, and complain about the credit card bills that his wife runs up. **Mobile Devices What can help to protect the data on your personal mobile device? You receive a call on your work phone and youre asked to participate in a phone survey. What is the best way to protect your Common Access Card (CAC) or Personal Identity Verification (PIV) card? (Malicious Code) What are some examples of removable media? CPCON 2 (High: Critical and Essential Functions) Which of these is true of unclassified data? No. What should you do if a reporter asks you about potentially classified information on the web? Store it in a GSA approved vault or container. Which of the following is true of the Common Access Card (CAC)? The CUIProgramisan unprecedented initiative to standardize practices across more than 100 separate departments and agencies, as well asstate, local,tribal and, private sector entities; academia; and industry. Call your security point of contact immediately. How many potential insiders threat indicators does this employee display? A vendor conducting a pilot program with your organization contacts you for organizational data to use in a prototype. **Classified Data Which of the following is a good practice to protect classified information? Like the number of people in a class, the number of fingers on your hands, or the number of children someone has. Paul verifies that the information is CUI, includes a CUI marking in the subject header, and digitally signs an e-mail containing CUI. **Social Engineering What action should you take with an e-mail from a friend containing a compressed Uniform Resource Locator (URL)? A Progressive Plane Detection Filtering Method for Airborne LiDAR Data Based on the description that follows, how many potential insider threat indicator(s) are displayed? Follow instructions given only by verified personnel. As long as the document is cleared for public release, you may share it outside of DoD. There are no choices provides which make it hard to pick the untrue statement about unclassified data. CUI includes, but is not limited to Controlled Technical Information (CTI), Personally Identifiable Information (PII), Protected Health Information (PHI), financial information, personal or payroll information, proprietary data and operational information. Which of the following is NOT a criterion used to grant an individual access to classified data? which of the following is true about unclassified data Which method would be the BEST way to send this information? Taking classified documents from your workspace. A Common Access Card and Personal Identification Number. **Classified Data How should you protect a printed classified document when it is not in use? Should you always label your removable media? Correct. Ensure that the wireless security features are properly configured. (Spillage) What is required for an individual to access classified data? They provide guidance on reasons for and duration of classification of information. What level of damage to national security can you reasonably expect Top Secret information to cause if disclosed? Ive tried all the answers and it still tells me off, part 2. CUI is government created or owned information that requires safeguarding or dissemination controls consistent with applicable laws, regulations and government wide policies. Ch 1 Flashcards by Josh Selkirk | Brainscape Exceptionally grave damage. A measure of how much useful work each unit of input energy provides. f. Get an answer. How are Trojan horses, worms, and malicious scripts spread? What should be done to protect against insider threats? CUI is not classified information. A type of phishing targeted at senior officials. (Spillage) What type of activity or behavior should be reported as a potential insider threat? How many indicators does this employee display? Which of the following is an example of two-factor authentication? What is considered a mobile computing device and therefore shouldnt be plugged in to your Government computer? What is a possible indication of a malicious code attack in progress? Malicious code can do the following except? Classified Information can only be accessed by individuals with. (Sensitive Compartmented Information) What portable electronic devices (PEDs) are allow in a Secure Compartmented Information Facility (SCIF)? a. Government-owned PEDs when expressly authorized by your agency. Coworker making consistent statements indicative of hostility or anger toward the United States in its policies. Which of the following best describes a way to safely transmit Controlled Unclassified Information (CUI)? ~A coworker brings a personal electronic device into a prohibited area. what should be your response be? What should you do if someone asks to use your government issued mobile device (phone/laptop..etc)? Remove security badge as you enter a restaurant or retail establishment. Have your permissions from your organization, follow your organization guideline, use authorized equipment and software, employ cyber security best practice, perform telework in dedicated when home. **Social Networking When is the safest time to post details of your vacation activities on your social networking profile? Never allow sensitive data on non-Government-issued mobile devices. (Sensitive Information) What should you do if a commercial entity, such as a hotel reception desk, asks to make a photocopy of your Common Access Card (CAC) for proof of Federal Government employment? Which of the following is NOT one? However, unclassified data. **Website Use While you are registering for a conference, you arrive at the website http://www.dcsecurityconference.org/registration/. Hostility or anger toward the United States and its policies. Found a mistake? Attempt to change the subject to something non-work related, but neither confirm nor deny the articles authenticity. Senior government personnel, military or civilian. Do not access links or hyperlinked media such as buttons and graphics in email messages. Which of the following is NOT Government computer misuse? What should be your response? 870 Summit Park Avenue Auburn Hills, MI 48057. How many potential insider threat indicators does this employee display? What action should you take? (Identity Management) Which of the following is an example of two-factor authentication? Read the latest news from the Controlled Unclassified Information (CUI) program. Unclassified is a security classification assigned to official information that does not warrant the assignment of Confidential, Secret, or Top Secret markings but which is not publicly-releasable without authorization. It does not require markings or distribution controls. What structures visible in the stained preparation were invisible in the unstained preparation? Unauthorized Disclosure of Classified Information and Controlled Unclassified Information . Ask them to verify their name and office number. DOD Cyber Awareness 2021 (DOD-IAA-V18.0) Know, RT202: Ch. Telework is only authorized for unclassified and confidential information. What is an indication that malicious code is running on your system? Which of the following is a good practice to protect classified information? Keeping a database from being accessed by unauthorized visitors C. Restricting a subject at a lower classification level from accessing data at a higher classification level D. Preventing an . You receive an inquiry from a reporter about government information not cleared for public release. Which of the following is NOT a security best practice when saving cookies to a hard drive? You receive an email at your official Government email address from an individual at the Office of Personnel Management (OPM). **Insider Threat Based on the description that follows, how many potential insider threat indicator(s) are displayed? 1.1.5 Controlled Unclassified Information. Personal information is inadvertently posted at a website. What action should you take? 5. What should you do? Report the suspicious behavior in accordance with their organizations insider threat policy. Any time you participate in or condone misconduct, whether offline or online. Avoid talking about work outside of the workplace or with people without a need-to-know. It is getting late on Friday. Remove your security badge, common access card (CAC), or personal identity verification (PIV) card. A user writes down details from a report stored on a classified system marked as Secret and uses those details to draft an unclassified briefing on an unclassified system without authorization. Which of the following may be helpful to prevent inadvertent spillage? When unclassified data is aggregated, its classification level may rise. (Sensitive Information) Which of the following is true about unclassified data? What is a security best practice to employ on your home computer? For Government-owned devices, use approved and authorized applications only. correct. PDF Unauthorized Disclosure of Classified Information and Controlled - CDSE What type of data must be handled and stored properly based on classification markings and handling caveats? Refer the reporter to your organizations public affairs office. It is permissible to release unclassified information to the public prior to being cleared. **Physical Security What is a good practice for physical security? Store classified data appropriately in a GSA-approved vault/container when not in use. **Social Networking Which of the following best describes the sources that contribute to your online identity? Sensitive information may be stored on any password-protected system. **Social Engineering Which of the following is a practice that helps to prevent the download of viruses and other malicious code when checking your email? *Controlled Unclassified Information Which is a best practice for protecting Controlled Unclassified Information (CUI)? *Malicious Code After visiting a website on your Government device, a popup appears on your screen. (Malicious Code) Which of the following is NOT a way that malicious code spreads? You receive an email from the Internal Revenue Service (IRS) demanding immediate payment of back taxes of which you were not aware. Which of the following is not considered a potential insider threat indicator? e. Why do Elodea and onion cells have more consistent shapes than human epithelial cells? Use only your personal contact information when establishing your account. What should you do? Monitor credit card statements for unauthorized purchases, Thumb drives, memory sticks, and flash drives are examples of. Software that installs itself without the users knowledge. Which of the following is NOT a type of malicious code? **Removable Media in a SCIF What portable electronic devices (PEDs) are allowed in a Sensitive Compartmented Information Facility (SCIF)? They may wittingly or unwittingly use their authorized access to perform actions that result in the loss or degradation of resources or capabilities. Which of the following is true about unclassified data? Social Security Number; date and place of birth; mothers maiden name. Unclassified information cleared for public release. How should you protect a printed classified document when it is not in use? data. CPCON 4 (Low: All Functions) (Spillage) When is the safest time to post details of your vacation activities on your social networking website? (Spillage) What should you do when you are working on an unclassified system and receive an email with a classified attachment? correct. Controlled Unclassified Information (CUI) and Covered Defense How can you protect your organization on social networking sites? (Malicious Code) Upon connecting your Government-issued laptop to a public wireless connection, what should you immediately do? Which of the following is true of traveling overseas with a mobile phone. Which of the following is a good practice to prevent spillage. *Spillage Which of the following may help to prevent spillage? Which of the following is a best practice to protect information about you and your organization on social networking sites and applications? If you participate in or condone it at any time. Classified information is defined in PL 96-456, the Classified Information Procedures Act: Ive tried all the answers and it still tells me off. *Malicious Code Which of the following is NOT a way that malicious code spreads? All of these. **Classified Data Which of the following is true of protecting classified data? Which of the following is true about telework? PII, PHI, and financial information is classified as what type of information? What should you do? **Insider Threat What is an insider threat? This is information that, if released to the public, carries no injury to personal, industry, or government interests. Which of the following is true of using DoD Public key Infrastructure (PKI) token? Not correct How should you protect your Common Access Card (CAC) or Personal Identity Verification (PIV) card? What must authorized personnel do before permitting another individual to enter a Sensitive Compartmented Information Facility (SCIF)? What is the best example of Protected Health Information (PHI)? Search by Location. It is not corporate intellectual property unless created for or included in requirements related to a government contract. It does not require markings or distribution controls. Controlled Unclassified Information (CUI) Program Frequently Asked Under which circumstances may you be subject to criminal, disciplinary, and/or administrative action due to online misconduct? The answer has been confirmed to be correct. Working With Sensitive Information - Canada.ca A colleague abruptly becomes hostile and unpleasant after previously enjoying positive working relationships with peers, purchases an unusually expensive car, and has unexplained absences from work. which of the following is true about unclassified data. Which of the following is NOT an example of sensitive information? Note any identifying information, such as the website's URL, and report the situation to your security POC. What is a proper response if spillage occurs? Approved Security Classification Guide (SCG). It may expose the connected device to malware. At all times while in the facility. For example, when you buy propane for your barbecue, your tank is placed on a scale while it is filled under high pressure (Figure 7). not correct Select the information on the data sheet that is personally identifiable information (PII) But not protected health information (PHI), Select the information on the data sheet that is protected health information (PHI). Correct. Which of the following is a good practice to prevent spillage?

Jax Taylor House Address, Field Club Sarasota Membership Fees, Articles W

Comments are closed.

tasmania police incident