Identification, encryption, and digital signature. *Mobile Devices **Mobile DevicesWhich is a rule for removable media, other portable electronic devices (PEDs), and mobile computing devices to protect Government systems? Which of the following is a security best practice when using social networking sites?-Turn off Global Positioning System (GPS) before posting pictures of yourself in uniform with identifiable landmarks. Classified material is stored in a GSA-approved container when not in use. **Mobile DevicesWhich is a rule for removable media, other portable electronic devices (PEDs), and mobile computing devices to protect Government systems? What is the best example of Protected Health Information (PHI)? Refer the reporter to your organization's public affairs office. *Insider ThreatWhat threat do insiders with authorized access to information or information systems pose?-They may wittingly or unwittingly use their authorized access to perform actions that result in the loss or degradation of resources or capabilities. **Insider ThreatA colleague vacations at the beach every year, is married and a father of four, his work quality is sometimes poor, and he is pleasant to work with. Identify and disclose it with local Configuration/Change Management Control and Property Management authorities. Be aware of classification markings and all handling caveats. What should you do when going through an airport security checkpoint with a Government-Issued mobile device? "Y% js&Q,%])*j~,T[eaKC-b(""P(S2-@&%^HEFkau"[QdY As part of the survey the caller asks for birth date and address. \text{Computer Services Revenue}&&\$25,307\\ Note any identifying information and the website's Uniform Resource Locator (URL). **Identity ManagementWhich of the following is the nest description of two-factor authentication? A coworker has asked if you want to download a programmers game to play at work. 20 0 obj -Delete email from senders you do not know. Directives issued by the Director of National Intelligence. [ 13 0 R] A colleague has visited several foreign countries recently, has adequate work quality, speaks openly of unhappiness with U.S. foreign policy, and recently had his car repossessed. **Website UseWhile you are registering for a conference, you arrive at the website http://www.dcsecurityconference.org/registration/. What action should you take? *Controlled Unclassified InformationWhich of the following is NOT an example of CUI? Which of the following practices reduces the chance of becoming a target by adversaries seeking insider information? Identification, encryption, and digital signature. What should you do? A program that segregates various type of classified information into distinct compartments for added protection and dissemination for distribution control. Have your permissions from your organization, follow your organization guideline, use authorized equipment and software, employ cyber security best practice, perform telework in dedicated when home. What action should you take if you receive a friend request on your social networking website from someone in Germany you met casually at a conference last year? What action should you take? Memory sticks, flash drives, or external hard drives. **Insider ThreatWhat type of activity or behavior should be reported as a potential insider threat? A coworker is observed using a personal electronic device in an area where their use is prohibited. What Security risk does a public Wi-Fi connection pose? OPSEC Awareness for Military Members, DoD Employees and Contractors (2020) x\[o8~G{(EELMT[N-5s/-rbtv0qm9$s'uzjxOf What are some potential insider threat indicators? % <> Files may be corrupted, erased, or compromised. What type of data must be handled and stored properly based on classification markings and handling caveats? Which of following is true of protecting classified data? He has the appropriate clearance and a signed approved non-disclosure agreement. What is considered a mobile computing device and therefore shouldn't be plugged in to your Government computer? On a NIPRNet system while using it for a PKI-required task. Which of the following is true about telework? **Social NetworkingWhen is the safest time to post details of your vacation activities on your social networking profile? Your comments are due on Monday. 0000007852 00000 n Do not use any personally owned/non-organizational removable media on your organizations systems. Of the following, which is NOT a problem or concern of an Internet hoax? Annual DoD Cyber Awareness Challenge Exam graded A+ already passed. What portable electronic devices (PEDs) are allowed in a Secure Compartmented Information Facility (SCIF)? Social Security Number: 432-66-8321. }&1,250\\ **Insider ThreatBased on the description that follows, how many potential insider threat indicator(s) are displayed? Which of the following is the best example of Personally Identifiable Information (PII)? -Senior government personnel, military or civilian. **Insider ThreatWhat advantages do "insider threats" have over others that allows them to cause damage to their organizations more easily? *Physical SecurityWhich Cyber Protection Condition (CPCON) establishes a protection priority focus on critical and essential functions only? *Identity Management What should be your response? What should you do? 0000005630 00000 n Mark SCI documents, appropriately and use an approved SCI fax machine. This includes government officials, military personnel, and intelligence analysts. How many potential insider threat indicators is Bob displaying? *Sensitive InformationWhat is the best example of Personally Identifiable Information (PII)? If your wireless device is improperly configured someone could gain control of the device? 0000000016 00000 n T/F. What is a common indicator of a phishing attempt? *Website UseWhat action should you take with an e-mail from a friend containing a compressed Uniform Resource Locator (URL)? Which of the following is NOT a correct way to protect sensitive information? -Validate all friend requests through another source before confirming them. Tell your colleague that it needs to be secured in a cabinet or container. Attempt to change the subject to something non-work related, but neither confirm nor deny the article's authenticity. What is an individual's Personally Identifiable Information (PII) or Protected Health Information (PHI) considered? What level of damage to national security could reasonably be expected if unauthorized disclosure of Top Secret information occurred? *Sensitive Compartmented InformationWhen should documents be marked within a Sensitive Compartmented Information Facility (SCIF). **Identity managementWhich of the following is NOT a best practice to preserve the authenticity of your identity? Which of the following is NOT a security best practice when saving cookies to a hard drive? They may be used to mask malicious intent. *Spillage.What should you do if a reporter asks you about potentially classified information on the web? Hostility or anger toward the United States and its policies. If authorized, what can be done on a work computer? What certificates are contained on the Common Access Card (CAC)? startxref **Removable Media in a SCIFWhat portable electronic devices (PEDs) are allowed in a Sensitive Compartmented Information Facility (SCIF)? What should be your response? What is required for an individual to access classified data? 290 33 What is the best choice to describe what has occurred? Attempt to change the subject to something non-work related, but neither confirm nor deny the articles authenticity. 4. identify the correct and incorrect statements about executive orders. Which is true for protecting classified data? **Insider ThreatWhich type of behavior should you report as a potential insider threat? **Physical SecurityAt which Cyberspace Protection Condition (CPCON) is the priority focus on critical functions only? As a security best practice, what should you do before exiting? If classified information were released, which classification level would result in "Exceptionally grave damage to national security"? Label all files, removable media, and subject headers with appropriate classification markings. He has the appropriate clearance and a signed approved non-disclosure agreement. What should you do? Ask for information about the website, including the URL. A medium secure password has at least 15 characters and one of the following. **Social NetworkingWhich of the following is a security best practice when using social networking sites? Based on the description that follows how many potential insider threat indicators are displayed? **Insider ThreatBased on the description that follows, how many potential insider threat indicator(s) are displayed? Store classified data appropriately in a GSA-approved vault/container. **Mobile DevicesWhich of the following helps protect data on your personal mobile devices? Research the source of the article to evaluate its credibility and reliability. What can you do to protect yourself against phishing? Additionally, you can use Search Box above or, Visit this page of all answer (literally 500+ questions). !LL"k)BSlC ^^Bd(^e2k@8alAYCz2QHcts:R+w1F"{V0.UM^2$ITy?cXFdMx Y8> GCL!$7~Bq|J\> V2 Y=n.h! Since the URL does not start with https, do not provide your credit card information. A colleague often makes others uneasy by being persistent in trying to obtain information about classified projects to which he has no access, is boisterous about his wife putting them in credit card debt, and often complains about anxiety and exhaustion display? Identification, encryption, digital signature. *Controlled Unclassified InformationWhich of the following is NOT a correct way to protect CUI? Understanding and using the available privacy settings. 0000002934 00000 n He has the appropriate clearance and a signed, approved non-disclosure agreement. **Identity managementWhat is the best way to protect your Common Access Card (CAC)? What should you do? Since the URL does not start with https, do not provide you credit card information. It is permissible to release unclassified information to the public prior to being cleared. endobj What must you ensure if you work involves the use of different types of smart card security tokens? What should you do after you have ended a call from a reporter asking you to confirm potentially classified info found on the web? stream Software that install itself without the user's knowledge. When unclassified data is aggregated, its classification level may rise. Investigate the link's actual destination using the preview feature. *Identity ManagementWhat certificates does the Common Access Card (CAC) or Personal Identity Verification (PIV) card contain? A coach lleague vacations at the beach every year, is marriednd apleasant to work with, but sometimes has poor work quality display? P2P (Peer-to-Peer) software can do the following except: -Allow attackers physical access to network assets. <> **Insider ThreatHow many potential insider threat indicators does a coworker who often makes others uneasy by being persistent in trying to obtain information about classified projects to which he has no access, is boisterous about his wife putting them in credit card debt, and often complains about anxiety and exhaustion display? You receive an unexpected email from a friend: "I think you'll like this: (URL)" What action should you take? Social Security Number; date and place of birth; mother's maiden name. 13 0 obj New interest in learning a foreign language. You should only accept cookies from reputable, trusted websites. Which of the following makes Alex's personal information vulnerable to attacks by identity thieves? <> <> Is it permitted to share an unclassified draft document with a non-DoD professional discussion group? *USE OF GFE*What is a critical consideration on using cloud-based file sharing and storage applications on your Government-furnished equipment (GFE)? What can be used to track Maria's web browsing habits? Dr. Stanisky was Ms. Jones psychiatrist for three months.Dr. What is the best response if you find classified government data on the internet? A type of phishing targeted at high-level personnel such as senior officials. Use a digital signature when sending attachments or hyperlinks. *Malicious CodeWhich of the following statements is true of cookies? Maintain possession of your laptop and other government-furnished equipment (GFE) at all times. **Insider ThreatWhich of the following should be reported as a potential security incident (in accordance with you Agencys insider threat policy)? In this short Post, I hope you get the answer to your question. 1. Ive tried all the answers and it still tells me off. A colleague saves money for an overseas vacation every year, is a single father, and occasionally consumes alcohol. *Sensitive Compartmented InformationWhen faxing Sensitive Compartmented Information (SCI), what actions should you take? How can you protect your information when using wireless technology? **Insider ThreatWhich of the following is NOT considered a potential insider threat indicator? Which of the following is NOT an example of CUI? He has the appropriate clearance and a signed, approved non-disclosure agreement. **Social EngineeringWhich may be a security issue with compressed Uniform Resource Locators (URLs)? 6 0 obj What is a good practice when it is necessary to use a password to access a system or an application? *MALICIOUS CODE*Which of the following is NOT a way malicious code spreads? A colleague complains about anxiety and exhaustion, makes coworkers uncomfortable by asking excessive questions about classified projects, and complains about the credit card bills that his wife runs up. When your vacation is over, and you have returned home. Theodore is seeking access to classified information that he does not need to know to perform his job duties. endobj Bob, a coworker, has been going through a divorce, has financial difficulties and is displaying hostile behavior. Use a single, complex password for your system and application logons. A person who does not have the required clearance or assess caveats comes into possession of SCI in any manner. There are a number of individuals who can access classified data. -Remove and take it with you whenever you leave your workstation. The email provides a website and a toll-free number where you can make payment. Which of the following is an example of malicious code? -Looking for "https" in the URL. *Identity Management 0000002497 00000 n What should you do to protect classified data? 0000005657 00000 n P2P (Peer-to-Peer) software can do the following except: Allow attackers physical access to network assets. Identification, encryption, digital signature. Darryl is managing a project that requires access to classified information. Insiders are given a level of trust and have authorized access to Government information systems. *UNCONTROLLED CLASSIFIED INFORMATION*Which of the following is NOT a correct way to protect CUI? In which situation below are you permitted to use your PKI token? Which type of information includes personal, payroll, medical, and operational information? Research the source of the article to evaluate its credibility and reliability. What type of security is "part of your responsibility" and "placed above all else?". **Classified DataWhat is required for an individual to access classified data? A colleague complains about anxiety and exhaustion, makes coworkers uncomfortable by asking excessive questions about classified projects, and complains about the credit card bills that his wife runs up. 0000015315 00000 n A coworker has asked if you want to download a programmer's game to play at work. Which of the following is a god practice to protect classified information?-Ensure proper labeling by appropriately marking all classified material and, when required, sensitive material. Which is a way to protect against phishing attacks? Use a common password for all your system and application logons. Social Security Number; date and place of birth; mothers maiden name. *SOCIAL ENGINEERING*How can you protect yourself from social engineering? Write your password down on a device that only you access (e.g., your smartphone). *Malicious CodeAfter visiting a website on your Government device, a popup appears on your screen. **Social NetworkingWhich of the following information is a security risk when posted publicly on your social networking profile? Use TinyURLs preview feature to investigate where the link leads. 0000003201 00000 n Immediately notify your security point of contact. If aggregated, the information could become classified. endobj *Travel What action should you take first? Follow instructions given only by verified personnel. *CLASSIFIED DATA*What is a good practice to protect classified information? Avoid using non-Bluetooth-paired or unencrypted wireless computer peripherals. *WEBSITE USE*Which of the following statements is true of cookies? *PHYSICAL SECURITY*At which Cyberspace Protection Condition (CPCON) is the priority focus on critical and essential functions? What is a protection against internet hoaxes? *IDENTITY MANAGEMENT*Which of the following is an example of a strong password? E-mailing your co-workers to let them know you are taking a sick day. -Use the government email system so you can encrypt the information and open the email on your government issued laptop. **Classified DataWhich of the following can an unauthorized disclosure of information classified as Confidential reasonably be expected to cause? When using your Government-issued laptop in public environments, with which of the following should you be concerned? What organization issues the directives concerning the dissemination of information regarding intelligence sources, methods, or activities? You are working at your unclassified system and receive an email from a coworker containing a classified attachment. What certificates are contained on the DoD Public Key Infrastructure (PKI) implemented by the Common Access Card (CAC)/Personal Identity Verification (PIV) card? Of the following, which is NOT a method to protect sensitive information? What is considered ethical use of the Government email system? Which cyber protection condition (CPCON) establishes a protection priority focus on critical and essential functions only? Any individual who falls to meet these requirements is not authorized to access classified information. What information posted publicly on your personal social networking profile represents a security risk? What threat do insiders with authorized access to information or information Systems pose?? What is a best practice to protect data on your mobile computing device? Which of the following is an example of near field communication (NFC)?-A smartphone that transmits credit card payment information when held in proximity to a credit card reader. \textbf{Comparative Balance Sheet}\\ Use online sites to confirm or expose potential hoaxes. Which of the following is NOT a best practice to preserve the authenticity of your identity? What action should you take? hbb2``b``3 v0 Which of the following activities is an ethical use of Government-furnished equipment (GFE)? Which of the following is NOT a good way to protect your identity? Maintain possession of your laptop and other government-furnished equipment (GFE) at all times. **Identity managementWhich is NOT a sufficient way to protect your identity? On a NIPRNET system while using it for a PKI-required task. **Home Computer SecurityHow can you protect your information when using wireless technology? [ 20 0 R] 0000005321 00000 n Do not access links or hyperlinked media such as buttons and graphics in email messages. endobj exp-computerequip.1,250Wagesexpense3,250Insuranceexpense555Rentexpense2,475Computersuppliesexpense1,305Advertisingexpense600Mileageexpense320Repairsexpense-computer960Totalexpenses25,167Netincome$18,833\begin{array}{lrr} What are some actions you can take to try to protect your identity? A smartphone that transmits credit card payment information when held in proximity to a credit card reader. Which of the following is a god practice to protect classified information? How should you respond to the theft of your identity? Label all files, removable media, and subject headers with appropriate classification markings. Write your password down on a device that only you access (e.g., your smartphone). Which of the following is NOT Protected Health Information (PHI)? [1] Issued by President Barack Obama in 2009, Executive Order 13526 replaced earlier executive orders on the topic and modified the regulations codified to 32 C.F.R. On a NIPRNet system while using it for a PKI-required task. Pictures of your petYour birthdayYour hobbies~Your personal e-mail address. 0000010569 00000 n What is the best description of two-factor authentication? *Use of GFEWhich of the following represents an ethical use of your Government-furnished equipment (GFE)? Which of the following should be reported as a potential security incident (in accordance with your Agency's insider threat policy)? 1312.23 Access to classified information. What information posted publicly on your personal social networking profile represents a security risk? Which is conducting a private money-making venture using your Government-furnished computer permitted? **Insider ThreatWhat do insiders with authorized access to information or information systems pose? You must have permission from your organization. Only persons with appropriate clearance, a non-disclosure agreement, and need-to-know can access classified data.
About Me Template Discord,
Mahalia Jackson And Russell Roberts,
Bosch Inverter Heat Pump Problems,
Articles W