Which scenario might indicate a reportable insider threat? EPA anticipates beginning CUI practices (designating, marking, safeguarding, disseminating, destroying, and decontrolling) starting in FY2023. THIS IS THE BEST ANSWER . Which of the following is a good practice to avoid email viruses? The website requires a credit card for registration. What should Sara do when publicly available Internet, such as hotel Wi-Fi? What should you do? Asked 8/5/2020 6:29:36 PM. Store it in a GSA approved vault or container. **Classified Data Which type of information could reasonably be expected to cause serious damage to national security if disclosed without authorization? Only persons with appropriate clearance, a non-disclosure agreement, and need-to-know can access classified data. Hostility or anger toward the United States and its policies. Social Security Number; date and place of birth; mothers maiden name. correct. An official website of the United States government. Looking at your MOTHER, and screaming THERE SHE BLOWS! You must possess security clearance eligibility to telework. You receive an unexpected email from a friend: I think youll like this: https://tinyurl.com/2fcbvy. What action should you take? CUI must be handled using safeguarding or dissemination controls. Call your security point of contact immediately. Read the latest news from the Controlled Unclassified Information (CUI) program. It may be compromised as soon as you exit the plane. When is the best time to post details of your vacation activities on your social networking website? Do not access website links, buttons, or graphics in e-mail. . Which of the following is a good practice for telework? Select the information on the data sheet that is personally identifiable information (PII). Linda encrypts all of the sensitive data on her government-issued mobile devices. You know this project is classified. A colleague complains about anxiety and exhaustion, makes coworkers uncomfortable by asking excessive questions about classified projects, and complains about the credit card bills that his wife runs up. Adversaries exploit social networking sites to disseminate fake news. Reviewing and configuring the available security features, including encryption. When vacation is over, after you have returned home. Under what circumstances could unclassified information be considered a threat to national security? which of the following is true about unclassified data. You believe that you are a victim of identity theft. Attempt to change the subject to something non-work related, but neither confirm nor deny the articles authenticity. Which of the following is an example of two-factor authentication? What action should you take? correct. How can you protect your information when using wireless technology? A person who does not have the required clearance or assess caveats comes into possession of SCI in any manner. What should you do? Physically assess that everyone within listening distance is cleared and has a need-to-know for the information being discussed. Which of the following does not constitute spillage. Tell us about it through the REPORT button at the bottom of the page. Three or more. Media containing Privacy Act information, PII, and PHI is not required to be labeled. Use only personal contact information when establishing personal social networking accounts, never use Government contact information. What level of damage can the unauthorized disclosure of information classified as confidential reasonably be expected to cause? *Sensitive Compartmented Information When faxing Sensitive Compartmented Information (SCI), what actions should you take? When may you be subject to criminal, disciplinary, and/or administrative action due to online harassment, bullying, stalking, hazing, discrimination, or retaliation? Correct. not correct *Sensitive Information What type of unclassified material should always be marked with a special handling caveat? It includes a threat of dire circumstances. What should you do? Use personal information to help create strong passwords. DoD Unclassified data: Must be cleared before being released to the public May require applci aton i of Controled l Uncasl sed Iifi nformaton i (CU)I access and distribution controls Must be clearly marked as Unclassified or CUI if included in a classified document or classified storage area Correct. *Sensitive Information Under what circumstances could classified information be considered a threat to national security? cyber. Were mitochondria as abundant in human epithelial cells as in onion epidermal cells (procedure 4.6)? You receive an email from a company you have an account with. Right-click the link and select the option to preview??? On September 14, 2016, NARA issued a final rule amending 32 CFR Part 2002 to establish a uniform policy for all Federal agencies and prescribe Government-wide program implementation standards, including designating, safeguarding, disseminating, marking, decontrolling, and disposing of CUI; self-inspection and oversight requirements; and other facets of the CUI Program. When unclassified data is aggregated, its classification level may rise. What is a way to prevent the download of viruses and other malicious code when checking your e-mail? Make note of any identifying information and the website URL and report it to your security office. The following practices help prevent viruses and the downloading of malicious code except. Before long she has also purchased shoes from several other websites. Ensure proper labeling by appropriately marking all classified material and, when required, sensitive material. By Quizzma Team / Technology. Which is a way to protect against phishing attacks? All https sites are legitimate. A type of phishing targeted at senior officials. -Its classification level may rise when aggregated. (removable media) If an incident occurs involving removable media in a Sensitive Compartmented Information Facility (SCIF), what action should you take? For example, when you buy propane for your barbecue, your tank is placed on a scale while it is filled under high pressure (Figure 7). Maybe. How many potential insiders threat indicators does this employee display? What is required for an individual to access classified data? CPCON 1 (Very High: Critical Functions) Which is NOT a method of protecting classified data? Which of the following personally-owned computer peripherals is permitted for use with Government-furnished equipment? In addition to avoiding the temptation of greed to betray his country, what should Alex do differently? After you have returned home following the vacation. **Website Use Which of the following statements is true of cookies? *Sensitive Compartmented Information What is a Sensitive Compartmented Information (SCI) program? This is information that, if released to the public, carries no injury to personal, industry, or government interests. (Mobile Devices) When can you use removable media on a Government system? Upon connecting your Government- issued laptop to a public wireless connection, what should you immediately do? Which of the following is true about unclassified data? *Insider Threat Which of the following is a potential insider threat indicator? The annual Cyber Awareness Challenge is a course that helps authorized users learn how to best avoid and reduce threats and vulnerabilities in an organizations system. Only allow mobile code to run from your organization or your organizations trusted sites. correct. Data about you collected from all sites, apps, and devices that you use can be aggregated to form a profile of you. **Identity management Which of the following is an example of two-factor authentication? How should you protect your Common Access Card (CAC) or Personal Identity Verification (PIV) card? Senior government personnel, military or civilian. Use TinyURLs preview feature to investigate where the link leads. (Spillage) What advantages do insider threats have over others that allows them to cause damage to their organizations more easily? Based on the description that follows, how many potential insider threat indicator(s) are displayed? Everything you need to know aboutControlled UnclassifiedInformation(CUI). When leaving your work area, what is the first thing you should do? What should you do? **Social Engineering Which of the following is a practice that helps to prevent the download of viruses and other malicious code when checking your email? A smartphone that transmits credit card payment information when held in proximity to a credit card reader. They may wittingly or unwittingly use their authorized access to perform actions that result in the loss or degradation of resources or capabilities. Information should be secured in a cabinet or container while not in use. New interest in learning another language, Which of the following is a good practice to protect classified information. Malicious code can include viruses, worms, and macros. (GFE) When can you check personal e-mail on your Government-furnished equipment (GFE)? After work hours, storing sensitive information in unlocked containers, desks, or cabinets if security is not present. Refer the reporter to your organizations public affairs office. cyber-awareness. d. giving a spanking or a scolding. The email has an attachment whose name contains the word secret. **Social Engineering How can you protect yourself from internet hoaxes? *Malicious Code After visiting a website on your Government device, a popup appears on your screen. **Insider Threat Which of the following should be reported as a potential security incident? Which is a good practice to protect classified information? Create separate user accounts with strong individual passwords. ~All documents should be appropriately marked, regardless of format, sensitivity, or classification. T/F. Which of the following statements is true? The emission rate of CO 2 from the soils reached the maximum on the 1st day of incubation and the sequence of CO 2 emission rate and cumulative emission under different amendment treatments was as SG > S > G > CK > N (Fig. Which of the following is NOT true of traveling overseas with a mobile phone? The email states your account has been compromised and you are invited to click on the link in order to reset your password. Correct. The potential for unauthorized viewing of work-related information displayed on your screen. Only use Government-furnished or Government-approved equipment to process PII. **Insider Threat Based on the description that follows, how many potential insider threat indicator(s) are displayed? Based on the description that follows, how many potential insider threat indicator(s) are displayed? They broadly describe the overall classification of a program or system. Correct. *Spillage You find information that you know to be classified on the Internet. Which of the following does NOT constitute spillage? What is a possible indication of a malicious code attack in progress? Let us know if this was helpful. Classified material must be appropriately marked. Debra ensures not correct What action should you take? Of the following, which is NOT a characteristic of a phishing attempt? **Home Computer Security How can you protect your information when using wireless technology? How do you respond? 5. What should you do? **Travel Which of the following is true of traveling overseas with a mobile phone? **Insider Threat A colleague vacations at the beach every year, is married and a father of four, his work quality is sometimes poor, and he is pleasant to work with. Which of the following is NOT an example of Personally Identifiable Information (PII)? The CAC/PIV is a controlled item and contains certificates for: An individual who has attempted to access sensitive information without need-to-know and has made unusual requests for sensitive information is displaying indicators of what? Executive Order 13526 Classified National Security Information, PersonallyIdentifiable Information (PII), Sensitive Personally Identifiable Information (SPII), Proprietary Business Information (PBI) or currently known within EPA as Confidential Business Information (CBI), Unclassified Controlled Technical Information (UCTI). Which of the following is NOT an appropriate way to protect against inadvertent spillage? When is it appropriate to have your security badge visible? What is the best course of action? Infographic - Text version Infographic [PDF - 594 KB] Report a problem or mistake on this page Date modified: 2020-12-14 Which of the following is NOT Protected Health Information (PHI)? How many potential insider threat indicators does this employee display? What should you do if a reporter asks you about potentially classified information on the web? Which method would be the BEST way to send this information? The email provides a website and a toll-free number where you can make payment. Coworker making consistent statements indicative of hostility or anger toward the United States and its policies. Which of the following is NOT a home security best practice? Which of the following is an example of malicious code? **Social Networking When may you be subject to criminal, disciplinary, and/or administrative action due to online misconduct? *Sensitive Compartmented Information What should the participants in this conversation involving SCI do differently? You receive an email from the Internal Revenue Service (IRS) demanding immediate payment of back taxes of which you were not aware. A colleague is playful and charming, consistently wins performance awards, and is occasionally aggressive in trying to access classified information. Correct. You must have your organization's permission to telework c. You may use unauthorized software as long as your computer's antivirus software is up to date. Validate all friend requests through another source before confirming them. What should you do? Which of the following is true about telework? (Spillage) After reading an online story about a new security project being developed on the military installation where you work, your neighbor asks you to comment about the article. (Malicious Code) Which are examples of portable electronic devices (PEDs)? **Social Engineering Which is a best practice that can prevent viruses and other malicious code from being downloaded when checking your e-mail? Which of the following is true of protecting classified data? You can't have 1.9 children in a family (despite what the census might say ). Insiders are given a level of trust and have authorized access to Government information systems. Which designation marks information that does not have potential to damage national security? a. (Correct) -It does not affect the safety of Government missions. Which of the following is NOT a typical means for spreading malicious code? Organizational Policy Not correct Correct. Classified information that should be unclassified and is downgraded. You check your bank statement and see several debits you did not authorize. If classified information were released, which classification level would result in Exceptionally grave damage to national security? You have reached the office door to exit your controlled area. A colleague saves money for an overseas vacation every year, is a . Ensure proper labeling by appropriately marking all classified material. When using your government-issued laptop in public environments, with which of the following should you be concerned? Unclassified Information Student Guide . How can you avoid downloading malicious code? Which Of The Following Statements About Adding Social Networks To Hootsuite Is False? Appropriate clearance, a signed and approved non-disclosure agreement, and need-to-know, Insiders are given a level of trust and have authorized access to Government information systems. To transmit large payments through Fedwire __________, To regulate and supervise the stock market to provide stability and security to individual investors. Preventing an authorized reader of an object from deleting that object B. You know this project is classified. Use a single, complex password for your system and application logons. (Correct) -It does not affect the safety of Government missions. Your cousin posted a link to an article with an incendiary headline on social media. The following table lists the number of drivers in the United States, the number of fatal accidents, and the number of total accidents in each age group in 2002. Directing you to a website that looks real. Which of the following is true of using DoD Public key Infrastructure (PKI) token? Accepting the default privacy settings. A passenger in the Land Rover Freelander that T-boned the hatchback said the BMW had been driven out of the unclassified road towards Shipton-under-Wychwood 'like a bat out of hell' - giving .
Firebird Production Numbers By Color,
Good Friday Solemn Intercessions In Spanish,
Huntsville Blues Festival,
Park National Bank Payoff Address,
Permanent Jewelry Orange County,
Articles W