Identification, encryption, and digital signature. What should you do if a reporter asks you about potentially classified information on the web? They may be used to mask malicious intent. you don't need to do anything special to protect this information How should you protect your Common Access Card (CAC) or Personal Identity Verification (PIV) card? How many potential insider threat indicators does this employee display? *Sensitive Compartmented Information When faxing Sensitive Compartmented Information (SCI), what actions should you take? What are some potential insider threat indicators? Three or more. Use only your personal contact information when establishing your account. 1).Compared with CK, straw addition treatments (S and SG) significantly (P < 0.01) increased the emission rate and cumulative emission of CO 2 and the cumulative CO 2 . #1) Open WEKA and select "Explorer" under 'Applications'. Phishing can be an email with a hyperlink as bait. Which of the following is a good practice to prevent spillage. Unusual interest in classified information. A 3%3\%3% penalty is charged for payment after 303030 days. What type of activity or behavior should be reported as a potential insider threat? Sanitized information gathered from personnel records. How many insider threat indicators does Alex demonstrate? Where. Coworker making consistent statements indicative of hostility or anger toward the United States and its policies. Of the following, which is NOT a characteristic of a phishing attempt? What should you do? What is the best way to protect your Common Access Card (CAC) or Personal Identity Verification (PIV) card? This task is performed with the aim of finding similarities in data points and grouping similar data points together. As a security best practice, what should you do before exiting? *Spillage You find information that you know to be classified on the Internet. What action should you take? For Government-owned devices, use approved and authorized applications only. (Spillage) When is the safest time to post details of your vacation activities on your social networking website? *Malicious Code Which of the following is NOT a way that malicious code spreads? Research the source to evaluate its credibility and reliability. After you have returned home following the vacation. **Identity management Which of the following is an example of two-factor authentication? The challenges goal is simple: To change user behavior to reduce the risks and vulnerabilities DoD Information Systems face. JavaScript appears to be disabled on this computer. Note any identifying information, such as the websites URL, and report the situation to your security POC. What information most likely presents a security risk on your personal social networking profile? Which of the following is true of protecting classified data? Store classified data appropriately in a GSA-approved vault/container when not in use. Exceptionally grave damage. We recommend Norton Security or McAfee Total Protection. It includes a threat of dire circumstances. **Insider Threat What type of activity or behavior should be reported as a potential insider threat? When can you check personal email on your government furnished equipment? Neither confirm or deny the information is classified. ~All documents should be appropriately marked, regardless of format, sensitivity, or classification. Note the websites URL and report the situation to your security point of contact. Which of the following personally-owned computer peripherals is permitted for use with Government-furnished equipment? The website requires a credit card for registration. How many potential insider threat indicators does this employee display? **Identity Management Which of the following is the nest description of two-factor authentication? (social networking) When may you be subjected to criminal, disciplinary, and/or administrative action due to online misconduct? **Travel What is a best practice while traveling with mobile computing devices? Only allow mobile code to run from your organization or your organizations trusted sites. 1.To provide opportunities for individuals and businesses to open checking accounts __________, To write rules and guidelines for financial institutions under its supervision __________, To be the lender of last resort for financial institutions __________, To conduct the nations monetary policy with the goals of maintaining full employment and price stability __________, 5. You must have your organization's permission to telework c. You may use unauthorized software as long as your computer's antivirus software is up to date. New answers. Correct. A. If possible, set your browser preferences to prompt you each time a website wants to store a cookie. Which is NOT a way to protect removable media? Federal agencies routinely generate, use, store, and share information that, while not meeting the threshold for classification as national security or atomic energy information, requires some level of protection from unauthorized access and release. Filter by: All $ Off % Off Free Online Offline. A colleague has won 10 high-performance awards, can be playful and charming, is not currently in a relationship, and occasionally aggressive in trying to access sensitive information. When is the best time to post details of your vacation activities on your social networking website? Matt Monroe, a 20-year U. S. Air Force veteran and current operations manager at Omnistruct, explains the breakdown, "There are four classified information categories in the military based on the severity of damage that the information's release would cause. Correct. **Mobile Devices What should you do when going through an airport security checkpoint with a Government-issued mobile device? Ask the individual to see an identification badge. A pop-up window that flashes and warns that your computer is infected with a virus. How can you protect data on your mobile computing and portable electronic devices (PEDs)? (Sensitive Information) What should you do if a commercial entity, such as a hotel reception desk, asks to make a photocopy of your Common Access Card (CAC) for proof of Federal Government employment? A type of phishing targeted at high-level personnel such as senior officials. This answer has been confirmed as correct and helpful. When teleworking, you should always use authorized and software. not correct Always use DoD PKI tokens within their designated classification level. Of the following, which is NOT a security awareness tip? Note That The Integers Should Be Type Cast To Doubles. What is best practice while traveling with mobile computing devices? Which of the following is true of sharing information in a Sensitive Compartmented Information Facility (SCIF)? Insiders are given a level of trust and have authorized access to Government information systems. February 8, 2022. **Use of GFE Under what circumstances is it acceptable to use your Government-furnished computer to check personal e-mail and do other non-work-related activities? What type of social engineering targets particular individuals, groups of people, or organizations? Enable automatic screen locking after a period of inactivity. **Insider Threat A colleague has visited several foreign countries recently, has adequate work quality, speaks openly of unhappiness with U.S. foreign policy, and recently had his car repossessed. **Social Networking What should you do if you receive a game application request that includes permission to access your friends, profile information, cookies, and sires visited? Which of the following is true of Unclassified information? Found a mistake? **Insider Threat Based on the description that follows, how many potential insider threat indicator(s) are displayed? General Services Administration (GSA) approval. Correct. Unclassified is a security classification assigned to official information that does not warrant the assignment of Confidential, Secret, or Top Secret markings but which is not publicly-releasable without authorization. Which Cyber Protection Condition (CPCON) establishes a protection priority focus on critical functions only? Dont assume open storage in a secure facility is authorized Maybe. Looking for https in the URL. **Classified Data When classified data is not in use, how can you protect it? **Insider Threat Which of the following should be reported as a potential security incident? **Insider Threat How many potential insider threat indicators does a coworker who often makes others uneasy by being persistent in trying to obtain information about classified projects to which he has no access, is boisterous about his wife putting them in credit card debt, and often complains about anxiety and exhaustion display? (removable media) If an incident occurs involving removable media in a Sensitive Compartmented Information Facility (SCIF), what action should you take? Scan external files from only unverifiable sources before uploading to computer. Of the following, which is NOT a problem or concern of an Internet hoax? What action should you take? What should you do? A program that segregates various type of classified information into distinct compartments for added protection and dissemination for distribution control. Which of the following should you do immediately? **Classified Data How should you protect a printed classified document when it is not in use? Understanding and using the available privacy settings. which of the following is true about unclassified data. When operationally necessary, owned by your organization, and approved by the appropriate authority. What should Sara do when publicly available Internet, such as hotel Wi-Fi? In unsupervised machine learning, clustering is the most common process used to identify and group similar entities or items together. Based on the description that follows, how many potential insider threat indicator (s) are displayed? Photos of your pet Correct. Remove and take it with you whenever you leave your workstation. Which of the following is true of Unclassified Information? b. Classified material must be appropriately marked. Which of the following is NOT a best practice to protect data on your mobile computing device? Which is a good practice to protect classified information? How many potential insider threat indicators does this employee display? Memory sticks, flash drives, or external hard drives. Retrieve classified documents promptly from printers. Secure personal mobile devices to the same level as Government-issued systems. You know this project is classified. Official websites use .gov Which of the following is NOT an example of CUI? Attachments contained in a digitally signed email from someone known. Which of the following actions can help to protect your identity? correct. Attempting to access sensitive information without need-to-know, Avoid talking about work outside of the workplace or with people without a need-to-know, Report the suspicious behavior in accordance with their organizations insider threat policy. Use your own security badge, key code, or Common Access Card (CAC)/Personal Identity Verification (PIV) card. Immediately notify your security point of contact. DoD Unclassified data: Must be cleared before being released to the public May require applci aton i of Controled l Uncasl sed Iifi nformaton i (CU)I access and distribution controls Must be clearly marked as Unclassified or CUI if included in a classified document or classified storage area What should be your response? How many potential insider threat indicators does this employee display? Which of the following is NOT one? Phishing can be an email with a hyperlink as bait. Looking at your MOTHER, and screaming THERE SHE BLOWS! How can you avoid downloading malicious code? **Social Networking Which piece if information is safest to include on your social media profile? (Sensitive Information) What guidance is available from marking Sensitive Information information (SCI)? -TRUE What action is recommended when somebody calls you to inquire about your work environment or specific account information? Cyber Awareness 2022. Do not download it. How can you protect your organization on social networking sites? not correct. (controlled unclassified information) Which of the following is NOT correct way to protect CUI? You know this project is classified. As a best practice, labeling all classified removable media and considering all unlabeled removable media as unclassified. Which of the following is NOT a typical means for spreading malicious code? Your password and the second commonly includes a text with a code sent to your phone. What should you do? A headset with a microphone through a Universal Serial Bus (USB) port. For example, when you buy propane for your barbecue, your tank is placed on a scale while it is filled under high pressure (Figure 7). Malicious code can mask itself as a harmless e-mail attachment, downloadable file, or website. Which of the following is a security best practice when using social networking sites? **Social Networking Which of the following is a security best practice when using social networking sites? How are Trojan horses, worms, and malicious scripts spread? Which of the following is true about telework? Unclassified documents do not need to be marked as a SCIF. Which of the following is true of Protected Health Information (PHI)? **Identity management Which of the following is an example of a strong password? CPCON 5 (Very Low: All Functions). Correct. In addition to avoiding the temptation of greed to betray his country, what should Alex do differently? *Spillage Which of the following is a good practice to aid in preventing spillage? Correct, Someone who uses authorized access, wittingly or unwittingly, to harm national security through unauthorized disclosure or other actions that may cause the loss or degradation of resources or capabilities. What should be your response? What is the best response if you find classified government data on the internet? An official website of the United States government. Which of the following is true of Controlled Unclassified information (CUI)? Upon connecting your Government-issued laptop to a public wireless connection, what should you immediately do? Which of the following is NOT sensitive information? Which of the following is not considered a potential insider threat indicator? Let us know if this was helpful. (Malicious Code) Which of the following is true of Internet hoaxes? The website requires a credit card for registration. What must authorized personnel do before permitting another individual to enter a Sensitive Compartmented Information Facility (SCIF)? (Sensitive Information) Which of the following is NOT an example of sensitive information? Setting weekly time for virus scan when you are not on the computer and it is powered off. (1) A strategic plan documenting the overall conduct of a war. What is a best practice for protecting controlled unclassified information (CUI)? What is a best practice to protect data on your mobile computing device? data. At EPA, the CUI Program is housed in the Libraries and Accessibility Division (LAD) within the Office of Mission Supports (OMS), Office of Enterprise Information Programs (OEIP). Everything you need to know aboutControlled UnclassifiedInformation(CUI). PII includes, but is not limited to, social security numbers, date and places of birth, mothers maiden names, biometric records, and PHI. What should you do if someone forgets their access badge (physical access)? Its classification level may rise when aggregated. **Website Use Which of the following statements is true of cookies? **Physical Security Within a secure area, you see an individual who you do not know and is not wearing a visible badge. Immediately notify your security point of contact. Mark SCI documents appropriately and use an approved SCI fax machine. Correct. Log in for more information. Alex demonstrates a lot of potential insider threat indicators. Under what circumstances could unclassified information be considered a threat to national security? What level of damage to national security can you reasonably expect Top Secret information to cause if disclosed? Which Of The Following Statements About Adding Social Networks To Hootsuite Is False? *Controlled Unclassified Information Which of the following is NOT an example of CUI? **Insider Threat How many potential insider threat indicators does a person who is playful and charming, consistently wins performance awards, but is occasionally aggressive in trying to access sensitive information display? A coworker removes sensitive information without approval. A coworker wants to send you a sensitive document to review while you are at lunch and you only have your personal tablet. (Spillage) What should you do when you are working on an unclassified system and receive an email with a classified attachment? What kind of information could reasonably be expected to cause serious damage to national security in the event of unauthorized disclosure? In setting up your personal social networking service account, what email address should you use? Which of the following best describes a way to safely transmit Controlled Unclassified Information (CUI)? Correct. Sensitive information may be stored on any password-protected system. You receive an unexpected email from a friend: I think youll like this: https://tinyurl.com/2fcbvy. What action should you take? Adversaries exploit social networking sites to disseminate fake news Correct. Which of the following is not Controlled Unclassified Information (CUI)? Which of the following is NOT a type of malicious code? (Spillage) What is required for an individual to access classified data? What is a proper response if spillage occurs? CUI includes, but is not limited to Controlled Technical Information (CTI), Personally Identifiable Information (PII), Protected Health Information (PHI), financial information, personal or payroll information, proprietary data and operational information. 1.1.1 Spillage. correct. Decline So That You Maintain Physical Control of Your Government-Issued Laptop. **Physical Security At which Cyberspace Protection Condition (CPCON) is the priority focus on critical functions only? Ensure proper labeling by appropriately marking all classified material. Which of the following practices reduces the chance of becoming a target by adversaries seeking insider information? A colleague is playful and charming, consistently wins performance awards, and is occasionally aggressive in trying to access classified information. You must have your organizations permission to telework. Correct. 1.1.4 Social Networking. **Removable Media in a SCIF What portable electronic devices (PEDs) are allowed in a Sensitive Compartmented Information Facility (SCIF)? Unauthorized Disclosure of Classified Information and Controlled Unclassified Information . A coworker removes sensitive information without authorization. When unclassified data is aggregated, its classification level may rise. *Controlled Unclassified Information Which of the following is NOT a correct way to protect CUI? Verify the identity of all individuals.??? When would be a good time to post your vacation location and dates on your social networking website? 4. Which of the following statements is NOT true about protecting your virtual identity? A lock (LockA locked padlock) or https:// means youve safely connected to the .gov website. Always check to make sure you are using the correct network for the level of data. Transmit classified information via fax machine only Not correct (Identity Management) Which of the following is an example of two-factor authentication? Linda encrypts all of the sensitive data on her government-issued mobile devices. What does Personally Identifiable information (PII) include? That trust is bounded by the Oath of Office we took willingly. Which may be a security issue with compressed Uniform Resource Locators (URLs)? If you participate in or condone it at any time. What certificates are contained on the DoD Public Key Infrastructure (PKI) implemented by the Common Access Card (CAC)/Personal Identity Verification (PIV) card? *Sensitive Compartmented Information What must the dissemination of information regarding intelligence sources, methods, or activities follow? Digitally signed e-mails are more secure. Which of the following is true of telework? As part of the survey the caller asks for birth date and address. You must have your organization's permission to telework. Create separate user accounts with strong individual passwords. A trusted friend in your social network posts a link to vaccine information on a website unknown to you. Discuss why gases, such as barbecue propane gas, are sold by mass and not by volume. What should you do to protect yourself while on social networks? What should you do? Avoid using non-Bluetooth-paired or unencrypted wireless computer peripherals. Which of following is true of protecting classified data? Which of the following must you do before using an unclassified laptop and peripherals in a collateral classified environment? An investment in knowledge pays the best interest.. (Spillage) Which type of information could reasonably be expected to cause serious damage to national security if disclosed without authorization? What information relates to the physical or mental health of an individual? Spear Phishing attacks commonly attempt to impersonate email from trusted entities. How many potential insider threat indicators is Bob displaying? Adversaries exploit social networking sites to disseminate fake news. Call your security point of contact immediately. Dofficult life circumstances, such as death of spouse. Paul verifies that the information is CUI, includes a CUI marking in the subject header, and digitally signs an e-mail containing CUI. (Spillage) After reading an online story about a new security project being developed on the military installation where you work, your neighbor asks you to comment about the article. Which of the following is true about unclassified data? What should you do? 8. Ensure that the wireless security features are properly configured. correct. (Physical Security) which Cyberspace Protection Condition (CPCON) establishes a protection priority focus on critical and essential functions only? What information most likely presents a security risk on your personal social networking profile? 1 Answer/Comment. Which of the following attacks target high ranking officials and executives? Thats the only way we can improve. Which of the following is a practice that helps to protect you from identity theft? A colleague abruptly becomes hostile and unpleasant after previously enjoying positive working relationships with peers, purchases an unusually expensive car, and has unexplained absences from work. Personal information is inadvertently posted at a website. (2) War planning documents which contain worldwide -- (a) Planning data and assumptions, (b) Wartime planning factors for the use of nuclear weapons, (c) Intelligence estimates of enemy capabilities, (d) Force composition and development, and You receive an email from the Internal Revenue Service (IRS) demanding immediate payment of back taxes of which you were not aware. You should only accept cookies from reputable, trusted websites. Government-owned PEDs when expressly authorized by your agency. What certificates are contained on the Common Access Card (CAC)? Only use Government-furnished or Government-approved equipment to process PII. You receive a call on your work phone and youre asked to participate in a phone survey. **Website Use How should you respond to the theft of your identity? Which of the following statements is TRUE about the use of DoD Public Key Infrastructure (PKI) tokens? Use only personal contact information when establishing personal social networking accounts, never use Government contact information. classified-document. Learn more about Teams Validate friend requests through another source before confirming them. You are working at your unclassified system and receive an email from a coworker containing a classified attachment. A colleague complains about anxiety and exhaustion, makes coworkers uncomfortable by asking excessive questions about classified projects, and complains about the credit card bills that his wife runs up. Decline to let the person in and redirect her to security. Which of the following is true of Internet of Things (IoT) devices? How many potential insiders threat indicators does this employee display. A coworker has asked if you want to download a programmers game to play at work. What is the response to an incident such as opening an uncontrolled DVD on a computer in a SCIF. **Social Networking When may you be subject to criminal, disciplinary, and/or administrative action due to online misconduct? *Spillage After reading an online story about a new security project being developed on the military installation where you work, your neighbor asks you to comment about the article.