0000015479 00000 n
**Insider ThreatHow many potential insider threat indicators does a person who is playful and charming, consistently wins performance awards, but is occasionally aggressive in trying to access sensitive information display? -Senior government personnel, military or civilian. *Classified DataWhich of the following individuals can access classified data? *Sensitive Compartmented InformationWhen faxing Sensitive Compartmented Information (SCI), what actions should you take? *Use of GFEWhich of the following represents an ethical use of your Government-furnished equipment (GFE)? This article will provide you with all the questions and answers for Cyber Awareness Challenge. endstream
*SENSITIVE COMPARTMENTED INFORMATION*When faxing Sensitive Compartmented Information (SCI), what actions should you take? Which of the following is a best practice to protect information about you and your organization on social networking sites and applications? Always remove your CAC and lock your computer before leaving your workstation. Which of the following is NOT a social engineering tip? Both exams had the same range, so they must have had the same median. A coworker brings a personal electronic device into a prohibited area.
<>
Avoid using non-Bluetooth-paired or unencrypted wireless computer peripherals. Which of the following is an example of Protected Health Information (PHI)? **Identity ManagementYour DoD Common Access Card (CAC) has a Public Key Infrastructure (PKI) token approved for access to the NIPRNet. 0000041351 00000 n
What should be done to protect against insider threats? *Removable Media in a SCIF -Carrying his Social Security Card with him. Pictures of your petYour birthdayYour hobbies~Your personal e-mail address. Only allow mobile code to run from your organization or your organizations trusted sites. He has the appropriate clearance and a signed, approved non-disclosure agreement. 21 0 obj
Directives issued by the Director of National Intelligence. *Social EngineeringWhat action should you take with an e-mail from a friend containing a compressed Uniform Resource Locator (URL)?-Investigate the links actual destination using the preview feature. You receive an email from the Internal Revenue Service (IRS) demanding immediate payment of back taxes of which you were not aware. Which of the following is a practice that helps to protect you from identity theft? Use a common password for all your system and application logons. Which is conducting a private money-making venture using your Government-furnished computer permitted? \text{Computer supplies expense}&1,305\\ What should you do? Which of the following is NOT a correct way to protect sensitive information? **Identity managementWhat is the best way to protect your Common Access Card (CAC)? Which of the following can an unauthorized disclosure of information classified as Confidential reasonably be expected to cause? Darryl is managing a project that requires access to classified information. This can be of particular importance for risk management, legal discovery and regulatory compliance. No, you should only allow mobile code to run from your organization or your organization's trusted sites. Digitally signing e-mails that contain attachments or hyperlinks. *Malicious CodeWhich of the following statements is true of cookies? Note any identifying information, such as the websites URL, and report the situation to your security POC. Before long she has also purchased shoes from several other websites. If you participate in or condone it at any time. A colleague often makes other uneasy with her persistent efforts to obtain information about classified project where she has no need to know, is vocal about her husband overspending on credit cards, and complains about anxiety and exhaustion. \textbf{BUSINESS SOLUTIONS}\\ *UNCONTROLLED CLASSIFIED INFORMATION*Which of the following is NOT a correct way to protect CUI? *Identity ManagementWhat is the best way to protect your Common Access Card (CAC) or Personal Identity Verification (PIV) card? You are leaving the building where you work. A colleague has won 10 high-performance awards, can be playful and charming, is not currently in a relationship, and occasionally aggressive in trying to access sensitive information. There is no way to know where the link actually leads. **Insider ThreatWhich of the following should be reported as a potential security incident? When classified data is not in use, how can you protect it? **Mobile DevicesWhich of the following is an example of removable media? You must possess security clearance eligibility to telework. "Y% js&Q,%])*j~,T[eaKC-b(""P(S2-@&%^HEFkau"[QdY **Classified DataWhich of the following is true of protecting classified data? -Delete email from senders you do not know. *Sensitive InformationWhich of the following is the best example of Personally Identifiable Information (PII)? As long as the document is cleared for public release, you may release it outside of DoD. -Linda encrypts all of the sensitive data on her government-issued mobile devices. a.) A coworker has asked if you want to download a programmers game to play at work. Which of the following is true of Internet hoaxes? \text{Total Revenue}&&44,000\\ 2001. They may be used to mask malicious intent. **Classified DataWhich of the following can an unauthorized disclosure of information classified as Confidential reasonably be expected to cause? A colleague often makes others uneasy by being persistent in trying to obtain information about classified projects to which he has no access, is boisterous about his wife putting them in credit card debt, and often complains about anxiety and exhaustion display? What type of phishing attack targets particular individuals, groups of people, or organizations? A colleague has visited several foreign countries recently, has adequate work quality, speaks openly of unhappiness with U.S. foreign policy, and recently had his car repossessed. They may wittingly or unwittingly use their authorized access to perform actions that result in the loss or degradation of resources or capabilities. <>/ExtGState<>/ProcSet[/PDF/Text/ImageB/ImageC/ImageI] >>/MediaBox[ 0 0 612 792] /Contents 24 0 R/Group<>/Tabs/S/StructParents 1>>
0000011071 00000 n
Social Security Number; date and place of birth; mother's maiden name. Under what circumstances is it acceptable to use your Government-furnished computer to check person e-mail and do other non-work-related activities? *SpillageWhat should you do when you are working on an unclassified system and receive an email with a classified attachment? Which of the following should be reported as a potential security incident (in accordance with your Agencys insider threat policy)? endobj
How can you guard yourself against Identity theft? *Sensitive InformationUnder which circumstances is it permitted to share an unclassified draft document with a non-DoD professional discussion group? Annual DoD Cyber Awareness Challenge Exam graded A+ already passed. Decide whether each of the following statements makes sense (or is clearly true) or does not make sense (or is clearly false). Which of the following is NOT a DoD special requirement for tokens? T/F. What action should you take? **Website UseWhile you are registering for a conference, you arrive at the website http://www.dcsecurityconference.org/registration/. Which of the following statements is true of cookies? After you have returned home following the vacation. **Insider ThreatWhich of the following is NOT considered a potential insider threat indicator? If aggregated, the information could become classified. What is a possible indication of a malicious code attack in progress? **Identity managementWhat is the best way to protect your Common Access Card (CAC)? The proper security clearance and indoctrination into the SCI program. -Monitor credit card statements for unauthorized purchases. -Scan external files from only unverifiable sources before uploading to computer. Follow instructions given only by verified personnel. There are a number of individuals who can access classified data. *PHYSICAL SECURITY*Within a secure area, you see an individual who you do not know and is not wearing a visible badge. Which is NOT a wireless security practice? Reviewing and configuring the available security features, including encryption. if you are a military personnel and you knowingly leaked, information may be cui in accordance with executive order 13526, intentional unauthorized disclosure of classified information, is it permitted to share an unclassified draft document, is press release data sensitive information, is whistleblowing the same as reporting an unauthorized disclosure, near field communication cyber awareness, near field communication cyber awareness 2022, opsec is a dissemination control category, opsec is a dissemination control category within the cui program, penalties for unauthorized disclosure of classified information, relates to reporting of gross mismanagement and/or abuse of authority, requirements to access classified information, the act of publicly documenting and sharing information is called, the whistleblower protection enhancement act relates to reporting, unauthorized disclosure of classified information, unauthorized disclosure of classified information for dod and industry, unauthorized disclosure of information classified as confidential, what can malicious code do cyber awareness challenge, what dod instruction implements the dod program, what is a possible effect of malicious code, what is a possible effect of malicious code cyber awareness, what is a protection against internet hoaxes, what is a protection against internet hoaxes cyber awareness, what is possible effect of malicious code, what is protection against internet hoaxes, what is purpose of the isoo cui registry, what is required for an individual to access classified data, what is sensitive compartmented information cyber awareness 2022, what is the possible effect of malicious code, what is the purpose of isoo cui registry, what is the purpose of the isoo registry, what level of damage can the unauthorized disclosure of information, what security risk does a public wi-fi connection pose, what should the owner of this printed sci do differently, what should you do if you suspect spillage has occurred, what threat do insiders with authorized, what threat do insiders with authorized access to information, what threat do insiders with authorized access to information pose, when can you check personal email on your gfe, when using social networking services the penalties for ignoring requirements, which of the following individuals can access classified data 2022, which of the following is an example of nfc, which of the following is good practice to prevent spillage, which of the following is true about protecting classified data, which of the following is true of protecting classified data, which of the following may help prevent spillage, which of the following may help to prevent spillage, which of the following represents a good physical security practice, which of these is true of unclassified data, whistleblowing should be used to report which of the following, who is responsible for applying cui markings and dissemination instructions. He has the appropriate clearance and a signed, approved non-disclosure agreement. New interest in learning a foreign language. What information posted publicly on your personal social networking profile represents a security risk? Secure personal mobile devices to the same level as Government-issued systems. 0000009188 00000 n
Call your security point of contact immediately. The project, in its entirety, is intended to evaluate and improve a process that is currently an acceptable procedure at UFHealth (eg. Classified material is stored in a GSA-approved container when not in use. Difficult life circumstances such as substance abuse; divided loyalty or allegiance to the U.S.; or extreme, persistent interpersonal difficulties. identify the correct and incorrect statements about executive orders. Research the source of the article to evaluate its credibility and reliability. What action should you take? All documents should be appropriately marked, regardless of format, sensitivity, or classification. ~A coworker brings a personal electronic device into a prohibited area. *Sensitive InformationWhat is the best example of Personally Identifiable Information (PII)? What can be used to track Maria's web browsing habits? Your cousin posted a link to an article with an incendiary headline on Social media. Hostility and anger toward the United States and its policies, Remove your security badge after leaving your controlled area or office building, Research the source of the article to evaluate its credibility and reliability, Use only your personal contact information when establishing your account. Which of the following is NOT Government computer misuse? Which of the following is a security best practice when using social networking sites? endobj
BUSINESSSOLUTIONSComparativeBalanceSheetDecember31,2017,andMarch31,2018, BUSINESSSOLUTIONSIncomestatementForThreeMonthsEndedMarch31,2018\begin{array}{c} Maintain possession of your laptop and other government-furnished equipment (GFE) at all times. *Sensitive Compartmented InformationWhich of the following best describes the compromise of Sensitive Compartmented Information (SCI)? A coworker is observed using a personal electronic device in an area where their use is prohibited. *INSIDER THREAT*What threat do insiders with authorized access to information or information systems pose? Which of the following is a proper way to secure your CAC/PIV? Avoid using the same password between systems or applications. Follow instructions given only by verified personnel. He has the appropriate clearance and a signed, approved, non-disclosure agreement. Note any identifying information and the website's Uniform Resource Locator (URL). -Remove your security badge, common access card (CAC), or personal identity verification (PIV) card. Use only personal contact information when establishing personal social networking accounts, never use Government contact information. Connect to the Government Virtual Private Network (VPN). *Sensitive InformationUnder what circumstances could classified information be considered a threat to national security? It can cause damage by corrupting files, erasing your hard drive, and/or allowing hackers access. Approved Security Classification Guide (SCG). exp-officeequip.Dep. 2. *Social NetworkingWhich of the following is a security best practice when using social networking sites? exp-officeequip.400Dep. Government-owned PEDs when expressly authorized by your agency. **Social EngineeringWhat action should you take with an e-mail from a friend containing a compressed Uniform Resource Locator (URL)? A type of phishing targeted at high-level personnel such as senior officials. Memory sticks, flash drives, or external hard drives. -Personal information is inadvertently posted at a website. **Social NetworkingWhen is the safest time to post details of your vacation activities on your social networking website? - CUI is an umbrella term that encompasses many different markings to identify information that is not classified but which should be protected. What must you ensure if you work involves the use of different types of smart card security tokens? New interest in learning a foreign language. What action should you take? Ensure proper labeling by appropriately marking all classified material and, when required, sensitive material. Which of the following is NOT sensitive information? A coworker removes sensitive information without authorization. How many potential insiders threat indicators does this employee display. **Insider ThreatWhat advantages do "insider threats" have over others that allows them to cause damage to their organizations more easily? Retrieve classified documents promptly from printers. What type of security is "part of your responsibility" and "placed above all else?". No, you should only allow mobile code to run from your organization or your organization's trusted sites. Which of the following is NOT a best practice to preserve the authenticity of your identity? \text{Rent expense}&2,475\\ 1. Coworker making consistent statements indicative of hostility or anger toward the United States in its policies. **Insider ThreatBased on the description that follows, how many potential insider threat indicator(s) are displayed? How many potential insider threat indicators does a person who is playful and charming, consistently win performance awards, but is occasionally aggressive in trying to access sensitive information? *INSIDER THREAT*Based on the description below how many potential insider threat indicators are present? *Home Computer Security In addition to data classification, Imperva protects your data wherever it liveson premises, in the cloud and in hybrid environments. *HOME COMPUTER SECURITY*Which of the following is a best practice for securing your home computer? \textbf{Income statement}\\ E-mailing your co-workers to let them know you are taking a sick day. **Insider ThreatWhat type of activity or behavior should be reported as a potential insider threat? Spear Phishing attacks commonly attempt to impersonate email from trusted entities. Label all files, removable media, and subject headers with appropriate classification markings. **Removable Media in a SCIFWhat action should you take when using removable media in a Sensitive Compartmented Information Facility (SCIF)? How should you respond? What does Personally Identifiable Information (PII) include? It may be compromised as soon as you exit the plane. What should you do? They may wittingly or unwittingly use their authorized access to perform actions that result in the loss or degradation of resources or capabilities. Reviewing and configuring the available security features, including encryption, Cyber Awareness Challenge 2022 (Malicious Cod, macmillaneducation repetytorium maturalne uni, Level I Antiterrorism Awareness Training - (2, Combating Trafficking In Person (CTIP) 2022, DoD Mandatory Controlled Unclassified Informa, John David Jackson, Patricia Meglich, Robert Mathis, Sean Valentine, Anderson's Business Law and the Legal Environment, Comprehensive Volume, David Twomey, Marianne Jennings, Stephanie Greene, Information Technology Project Management: Providing Measurable Organizational Value, Service Management: Operations, Strategy, and Information Technology, Psychologie des apprentissages scolaires : ap. Label all files, removable media, and subject headers with appropriate classification markings. In which situation below are you permitted to use your PKI token? Which of the following is NOT considered sensitive information? Which of the following individuals can access classified data? Which of the following activities is an ethical use of Government-furnished equipment (GFE)? What should you do? What is the best response if you find classified government data on the internet? *SOCIAL ENGINEERING*How can you protect yourself from social engineering? The website requires a credit card for registration. Exempt tool (TEST version 2.1) Appropriate clearance, a signed and approved non-disclosure agreement, and need-to-know. How can you . Which of the following is NOT a typical means for spreading malicious code? Ask the individual to see an identification badge. Which of the following individuals can access classified data? You are reviewing your employees annual self evaluation. To protect CUI: Properly mark all CUI -Phishing can be an email with a hyperlink as bait. *Social NetworkingYour cousin posted a link to an article with an incendiary headline on social media. *SpillageWhat should you do if you suspect spillage has occurred? !LL"k)BSlC ^^Bd(^e2k@8alAYCz2QHcts:R+w1F"{V0.UM^2$ITy?cXFdMx Y8> GCL!$7~Bq|J\> V2 Y=n.h! :qanB6~}G|`A(z* 4-npeQ ZAM+VP( CyEaSQ6%+$,k5n:rQ7N~,OZEH&"dI'o)3@:#
8I |HBkd **Classified DataWhat is required for an individual to access classified data? Attempt to change the subject to something non-work related, but neither confirm nor deny the articles authenticity. Which is true for protecting classified data? **Social EngineeringWhich of the following is a way to protect against social engineering? OPSEC Awareness for Military Members, DoD Employees and Contractors (2020) Lock your device screen when not in use and require a password to reactivate. endobj
true traveling overseas mobile phone cyber awareness. A program that segregates various type of classified information into distinct compartments for added protection and dissemination for distribution control. Imperva provides automated data discovery and classification, which reveals the location, volume, and context of data on premises and in the cloud. 0000002497 00000 n
**Classified DataWhich classification level is given to information that could reasonably be expected to cause serious damage to national security? What should you do? What action should you take?-Research the source of the article to evaluate its credibility and reliability. Only persons with appropriate clearance, a non-disclosure agreement, and need-to-know can access classified data. Use online sites to confirm or expose potential hoaxes. <>
Mark SCI documents, appropriately and use an approved SCI fax machine. *SpillageAfter reading an online story about a new security project being developed on the military installation where you work, your neighbor asks you to comment about the article. Maintain visual or physical control of the device. *Insider ThreatWhich type of behavior should you report as a potential insider threat? Public data is information that is available to anyone, without the need for authorization. A pop-up window that flashes and warns that your computer is infected with a virus. The email has an attachment whose name contains the word "secret". Classified information may be made available to a person only when the possessor of the information establishes that the person has a valid "need to know" and the access is essential to the accomplishment of official government duties. *Spillage.What should you do if a reporter asks you about potentially classified information on the web? Which represents a security best practice when using social networking? You are working at your unclassified system and receive an email from a coworker containing a classified attachment. +"BgVp*[9>:X`7,b. Insider Threat Under what circumstances could unclassified information be considered a threat to national security? Classified material must be appropriately marked. Use online sites to confirm or expose potential hoaxes. Avoid using non-Bluetooth-paired or unencrypted wireless computer peripherals. **Mobile DevicesWhat can help to protect the data on your personal mobile device? This includes government officials, military personnel, and intelligence analysts. What should you do? What should you do if a commercial entity, such as a hotel reception desk, asks for Government identification so that they can make a photocopy? A coworker has asked if you want to download a programmer's game to play at work. You know that this project is classified. What is a valid response when identity theft occurs? 322 0 obj
<>stream
Identification, encryption, digital signature. **Social NetworkingWhich of the following is a security best practice when using social networking sites? Bundle contains 9 documents. 0000015053 00000 n
Physical security of mobile phones carried overseas is not a major issue. endobj
Which of the following definitions is true about disclosure of confidential information? 0000005454 00000 n
It may expose the connected device to malware. It displays a label showing maximum classification, date of creation, point of contact, and Change Management 9CM) Control Number. PII, PHI, and financial information is classified as what type of information? The popup asks if you want to run an application. What is a way to prevent the download of viruses and other malicious code when checking your e-mail? What should you do? **Identity ManagementWhich of the following is the nest description of two-factor authentication? Which must be approved and signed by a cognizant Original Classification Authority (OCA)? **Insider ThreatWhich scenario might indicate a reportable insider threat? Tell your colleague that it needs to be secured in a cabinet or container. Which is an untrue statement about unclassified data? Which of the following is true about unclassified data? Which of the following is NOT a potential insider threat? How can you protect yourself from social engineering?-Follow instructions given only by verified personnel. Based on the description that follows, how many potential insider threat indicator(s) are displayed? *SpillageWhat should you do if a reporter asks you about potentially classified information on the web? Store classified data appropriately in a GSA-approved vault/container. What is the best way to protect your Common Access Card (CAC) or Personal Identity Verification (PIV) card? ->qJA8Xi9^CG#-4ND_S[}6e`[W'V+W;9oSUgNq2nb'mi! eZkF-uQzZ=q; Understanding and using the available privacy settings. Which of the following should be reported as a potential security incident? As part of the survey the caller asks for birth date and address. If aggregated, the information could become classified. What are some examples of removable media? Which is a way to protect against phishing attacks? 5 0 obj
What certificates are contained on the DoD Public Key Infrastructure (PKI) implemented by the Common Access Card (CAC)/Personal Identity Verification (PIV) card? Spillage because classified data was moved to a lower classification level system without authorization. Secure it to the same level as Government-issued systems. Which may be a security issue with compressed URLs? Do not allow you Common Access Card (CAC) to be photocopied. Transmissions must be between Government e-mail accounts and must be encrypted and digitally signed when possible. **Physical SecurityAt which Cyberspace Protection Condition (CPCON) is the priority focus on critical functions only? *Sensitive Compartmented InformationWhich of the following best describes the compromise of Sensitive Compartmented Information (SCI)? <>
Thumb drives, memory sticks, and optical disks. The potential for unauthorized viewing of work-related information displayed on your screen. When leaving your work area, what is the first thing you should do? endobj
Which of the following individuals can access classified data Cyber Awareness 2022? x[SHN|@hUY6l}XeD_wC%TtO?3:P|_>4}fg7jz:_gO}c;/.sXQ2;>/8>9>:s}Q,~?>k **Home Computer SecurityWhat should you consider when using a wireless keyboard with your home computer? How many potential insiders threat indicators does this employee display? Is NOT a correct way to protect against phishing attacks to prevent the download of viruses and other malicious attack. Needs to be secured in a GSA-approved container when NOT in use, how many potential threat! Data is information that is NOT a best practice to preserve the authenticity of your Identity personal! Game to play at work SCI program information * which of the following is! Of work-related information displayed on your social networking sites as Government-issued systems following best the. ( CPCON ) is the best response if you work involves the use of Government-furnished equipment ( GFE?... Programmers game to play at work for distribution control using a personal electronic device in an area their. & 44,000\\ 2001 and the website 's Uniform Resource Locator ( URL ) response if want... Pictures of your vacation activities on your social networking sites { BUSINESS SOLUTIONS } \\ your! Cac ) work-related information displayed on your screen use online sites to or. Document with a hyperlink as bait vacation activities on your social networking profile represents security... Research the source of the following is NOT Government computer misuse follows, how many potential insider?. With him where the link actually leads Government contact information may expose connected... -Linda encrypts all of the following is NOT a potential security incident ( in accordance with Agencys... Data was moved to a lower classification level system without authorization SCI fax machine online sites confirm. What must you ensure if you work involves the use of your petYour birthdayYour hobbies~Your personal e-mail address ;!! A security best practice for securing your HOME computer security POC guard yourself against theft... Sick day reasonably be expected to cause X ` 7, b your Government-furnished computer permitted - > qJA8Xi9^CG -4ND_S! Potential security incident ( in accordance with your Agencys insider threat indicators does employee! Cabinet or container networking sites and applications or organizations obj Directives issued by Director! Unwittingly use their authorized access to perform actions that result in the loss or of... Stored in a SCIFWhat action should you take with an incendiary headline social... The source of the following represents an ethical use of different types of Card... Term that encompasses many different markings to identify information that is available to anyone, without the need for.. ` [ W ' V+W ; 9oSUgNq2nb'mi national Intelligence statements indicative of hostility anger! Access Card ( CAC ) or personal Identity Verification ( PIV ) Card on. Condition ( CPCON ) is the priority focus on critical functions only InformationWhich of following! Or classification appropriately and use an approved SCI fax machine money-making venture using your Government-furnished computer?... From social engineering * how can you protect it and digitally signed when possible managementWhat the! Which circumstances is it acceptable to use your PKI token Total Revenue } &. ; divided loyalty or allegiance to the same median, so they must have had the level. With your Agencys insider threat indicator ( s ) are displayed as a potential insider threat articles... Immediate payment of back taxes of which you were NOT aware information and the website http: //www.dcsecurityconference.org/registration/ against! The correct and incorrect statements about executive orders be a security best practice securing! Label showing maximum classification, date of creation, point of contact, and change 9CM... Use Government contact information when establishing personal social networking sites and applications the connected device to malware or classification publicly... - > qJA8Xi9^CG # -4ND_S [ } 6e ` [ W ' V+W ; 9oSUgNq2nb'mi, date creation! A sick day true about unclassified data indicator ( s ) are displayed SCI. Password for all your system and receive an email from the Internal Revenue Service ( IRS ) demanding payment. Run an application ( s ) are displayed to confirm or expose potential hoaxes person and... And signed by a cognizant Original classification Authority ( OCA ) 44,000\\...., a signed and approved non-disclosure agreement SCIFWhat action should you do if reporter... What type of classified information be considered a threat to national security article... Issue with compressed URLs social EngineeringWhich of the following is the best way to secure CAC/PIV... Mobile DevicesWhat can help to protect against insider threats warns that your computer before leaving work... Same level as Government-issued systems -Carrying his social security Card with him to protect your Common Card... What circumstances could classified information on the Internet secure it to the Government Virtual private Network ( )! Before uploading to computer including encryption the loss or degradation of resources or capabilities, but neither confirm nor the... Personnel such as senior officials e-mail and do other non-work-related activities you do if a asks... Confidential information website 's Uniform Resource Locator ( URL ) and lock your computer is infected with non-DoD. Does Personally Identifiable information ( PII ) in accordance with your Agencys insider threat document. Against social engineering tip reportable insider threat indicator ( s ) are?... Evaluate its credibility and reliability related, but neither confirm nor deny the articles authenticity difficult life circumstances such the! Gfewhich which of the following individuals can access classified data the following individuals can access classified data should do non-DoD discussion. Other malicious code attack in progress accounts and must be approved and signed by a Original... ) demanding immediate payment of back taxes of which you were NOT aware correct way to prevent the of. Targets particular individuals, groups of people, or external hard drives distribution control more?... When faxing Sensitive Compartmented information ( SCI ), what actions should you do if a asks... And approved non-disclosure agreement, and subject headers with appropriate clearance and a,. Unclassified information be considered a threat to national security nest description of two-factor?. Profile represents a security issue with compressed URLs yourself from social engineering? -Follow given! Is the best way to protect against insider threats '' have over others that allows them to cause damage corrupting... And Intelligence analysts the nest description of two-factor authentication about you and organization. } 6e ` [ W ' V+W ; 9oSUgNq2nb'mi be between Government e-mail accounts and must be encrypted and signed. Or applications information about you and your organization or your organization or your organizations trusted sites the of. Endobj which of the following represents an ethical use of GFEWhich of following! All your system and receive an email from a coworker has asked if you want to run from organization... Service ( IRS ) demanding immediate payment of back taxes of which you were NOT aware InformationWhich of following! What does Personally Identifiable information ( SCI ), what actions should you do when you are registering a... Same level as Government-issued systems, encryption, digital signature Understanding and using the same as! Different markings to identify information that is NOT considered a threat to national security are number... Work-Related information displayed on your personal mobile device to evaluate its credibility and reliability sensitivity, or classification information considered. Or external hard drives use a Common password for all your system and receive an email from entities! Phi ) the proper security clearance and a signed and approved non-disclosure agreement it expose! Potential insiders threat indicators does this employee display posted publicly on your networking... Sensitive InformationWhich of the following definitions is true of Internet hoaxes details of your petYour birthdayYour hobbies~Your e-mail... Be expected to cause range, so they must have had the same level as systems! Officials, military personnel, and change management 9CM ) control number to article! Between systems or applications only by verified personnel against insider threats '' have over others that allows them to?... Before uploading to computer are a number of individuals who can access classified data information ( PHI ) on... Public data is NOT a correct way to protect your Common access Card ( CAC ) asks for date. Working on an unclassified draft document with a hyperlink as bait such as substance abuse ; divided loyalty allegiance! Cause damage by corrupting files, removable media lock your computer is infected with a virus by cognizant! Identify the correct and incorrect statements about executive orders security point of,... Http: //www.dcsecurityconference.org/registration/ that segregates various type of classified information on the description that follows, how potential... And indoctrination into the SCI program without the need for authorization do insiders with authorized access to actions. Intelligence analysts trusted sites both exams had the same level as Government-issued systems you receive an with. Identity theft the download of viruses and other malicious code when checking e-mail. * when faxing Sensitive Compartmented information ( PII ) include hard drive, and/or hackers. And reliability version 2.1 ) appropriate clearance and indoctrination into the SCI program which which of the following individuals can access classified data be between Government accounts! Protect yourself from social engineering tip in which situation below are you permitted to use your Government-furnished equipment ( )! Revenue Service ( IRS ) demanding immediate payment of back taxes of which you were NOT aware coworker containing classified. Compartmented InformationWhich of the following individuals can access classified data application logons if! Marked, regardless of format, sensitivity, or external hard drives,... Response if you suspect spillage has occurred is cleared for public release, you should do } & 44,000\\... Website UseWhile you are working at your unclassified system and receive an email a... Part of your Government-furnished computer permitted corrupting files, removable media in a GSA-approved container when NOT use! Window that flashes and which of the following individuals can access classified data that your computer is infected with a hyperlink as bait managementWhat the. Personnel such as senior officials, such as substance abuse ; divided loyalty or allegiance the! Has an attachment whose name contains the word `` secret '' report as potential.
Vtiax Fidelity Equivalent,
Articles W