which of the following is true about unclassified data

When would be a good time to post your vacation location and dates on your social networking website? You must have your organizations permission to telework. Which is an untrue statement about unclassified data? They may be used to mask malicious intent. Which type of information includes personal, payroll, medical, and operational information? Which of the following is not Controlled Unclassified Information (CUI)? Which of the following is NOT a correct way to protect sensitive information? Ensure that the wireless security features are properly configured. It is releasable to the public without clearance. Not correct Use only personal contact information when establishing your personal account. Secure it to the same level as Government-issued systems. Who designates whether information is classified and its classification level? You many only transmit SCI via certified mail. Like the number of people in a class, the number of fingers on your hands, or the number of children someone has. Use online sites to confirm or expose potential hoaxes, Follow instructions given only by verified personnel, Investigate the links actual destination using the preview feature, Determine if the software or service is authorized. Keep your operating system and software up to date: This will help patch any security vulnerabilities in your software. Store it in a shielded sleeve to avoid chip cloning. Which of the following may be helpful to prevent inadvertent spillage? **Identity management Which of the following is an example of a strong password? Unusual interest in classified information. **Social Engineering Which of the following is a practice that helps to prevent the download of viruses and other malicious code when checking your email? Mark SCI documents appropriately and use an approved SCI fax machine. Changes to various data systems that store and sometimes share sensitive information outside EPA. Learn more about Teams Added 8/5/2020 8:06:16 PM. What is best practice while traveling with mobile computing devices? You are reviewing your employees annual self evaluation. What should you do to protect classified data? Report the crime to local law enforcement. **Mobile Devices What should you do when going through an airport security checkpoint with a Government-issued mobile device? What should be done to protect against insider threats? What does Personally Identifiable Information (PII) include? cyber-awareness. Which of the following is not considered a potential insider threat indicator? What would you do if you receive a game application request on your government computer that includes permission to access your friends, profile information, cookies, and sites visited? A program that segregates various types of classified information into distinct compartments for added protection and dissemination or distribution control. The attributes of identified ground seeds are modified to ground points. What should be your response? A lock (LockA locked padlock) or https:// means youve safely connected to the .gov website. Use your own security badge, key code, or Common Access Card (CAC)/Personal Identity Verification (PIV) card. How should you protect a printed classified document when it is not in use? Based on the description that follows, how many potential insider threat indicator (s) are displayed? Download the information. How can you protect yourself on social networking sites? What should be done to sensitive data on laptops and other mobile computing devices? The physical security of the device. Verify the identity of all individuals.??? Maria is at home shopping for shoes on Amazon.com. There are many travel tips for mobile computing. You receive an unexpected email from a friend: "I think you'll like this: (URL)" What action should you take? Store it in a shielded sleeve to avoid chip cloning. A coworker has left an unknown CD on your desk. Be aware of classification markings and all handling caveats. Which of the following is a clue to recognizing a phishing email? Note any identifying information and the websites Uniform Resource Locator (URL). Under what circumstances could unclassified information be considered a threat to national security? Q&A for work. When can you check personal email on your government furnished equipment? Enable automatic screen locking after a period of inactivity. Scan external files from only unverifiable sources before uploading to computer. You should remove and take your CAC/PIV card whenever you leave your workstation. Correct. CPCON 4 (Low: All Functions) If you participate in or condone it at any time. 4. What is considered ethical use of the Government email system? **Classified Data Which of the following can an unauthorized disclosure of information classified as Confidential reasonably be expected to cause? How should you respond? Refer the reporter to your organizations public affairs office. Using webmail may bypass built in security features. Thiswill enabletimely and consistent informationsharing andincreasetransparency throughout the Federal government and with non-Federal stakeholders. Remove your security badge, common access card (CAC), or personal identity verification (PIV) card. What should be done if you find classified Government Data/Information Not Cleared for Public Release on the Internet? *Sensitive Information What is the best example of Personally Identifiable Information (PII)? **Classified Data Which of the following is true of protecting classified data? You must possess security clearance eligibility to telework. Question. **Identity management Which of the following is an example of two-factor authentication? Which of the following includes Personally Identifiable Information (PII) and Protected Health Information (PHI)? (Insider Threat) Based on the description that follows, how many potential insider threat indicator(s) are displayed? Use a single, complex password for your system and application logons. Cyber Awareness 2022. **Home Computer Security What should you consider when using a wireless keyboard with your home computer? How Do I Answer The CISSP Exam Questions? Which is it appropriate to have your security badge visible within a Sensitive Compartmented Information Facility (SCIF). *Sensitive Information Which of the following is the best example of Personally Identifiable Information (PII)? Remove your security badge after leaving your controlled area or office building. Darryl is managing a project that requires access to classified information. What should be your response? What is an indication that malicious code is running on your system? **Insider Threat How many potential insider threat indicators does a person who is playful and charming, consistently wins performance awards, but is occasionally aggressive in trying to access sensitive information display? Your password and the second commonly includes a text with a code sent to your phone. A colleague complains about anxiety and exhaustion, makes coworkers uncomfortable by asking excessive questions about classified projects, and complains about the credit card bills that his wife runs up. Someone who uses authorized access, wittingly or unwittingly, to harm national security through unauthorized disclosure or other actions that may cause the loss or degradation of resources or capabilities. Maybe Sensitive information may be stored on any password-protected system. Controlled Unclassified Information (CUI): Controlled Unclassified information was defined in the Executive Order 13556 as information held by or generated for the Federal Government that requires safeguarding or dissemination controls pursuant to and consistent with applicable law, regulations and government-wide policies that isn't classified Which of the following makes Alexs personal information vulnerable to attacks by identity thieves? Which of the following does NOT constitute spillage? If aggregated, the classification of the information may not be changed. Research the source to evaluate its credibility and reliability. What is required for an individual to access classified data? Exceptionally grave damage. How many indicators does this employee display? Attachments contained in a digitally signed email from someone known. Which of the following definitions is true about disclosure of confidential information? You must have permission from your organization. Use TinyURLs preview feature to investigate where the link leads. Appropriate clearance; signed and approved non-disclosure agreement; and need-to-know. Reviewing and configuring the available security features, including encryption. What actions should you take with a compressed Uniform Resource Locator (URL) on a website known to you? JavaScript appears to be disabled on this computer. As long as the document is cleared for public release, you may release it outside of DoD. (social networking) When may you be subjected to criminal, disciplinary, and/or administrative action due to online misconduct? (social networking) Which of the following is a security best practice when using social networking sites? Your cousin posted a link to an article with an incendiary headline on social media. **Insider Threat Which scenario might indicate a reportable insider threat? A compromise of Sensitive Compartmented Information (SCI) occurs when a person who does not have the required clearance or access caveats comes into possession of SCI_________.??? **Social Engineering Which is a best practice that can prevent viruses and other malicious code from being downloaded when checking your e-mail? **Identity Management Which of the following is the nest description of two-factor authentication? If authorized, what can be done on a work computer? How should you respond? You must have your organization's permission to telework c. You may use unauthorized software as long as your computer's antivirus software is up to date. Correct. Ensure proper labeling by appropriately marking all classified material and, when required, sensitive material. The popup asks if you want to run an application. Which of the following is NOT Government computer misuse? (Sensitive Information) What guidance is available from marking Sensitive Information information (SCI)? They can be part of a distributed denial-of-service (DDoS) attack. **Social Networking When is the safest time to post details of your vacation activities on your social networking website? Always check to make sure you are using the correct network for the level of data. Let us have a look at your work and suggest how to improve it! 1 Cyber Awareness Challenge 2023 Answers. Which of the following is a practice that helps to prevent the download of viruses and other malicious code when checking your email? CUI may be stored only on authorized systems or approved devices. What level of damage to national security can you reasonably expect Top Secret information to cause if disclosed? 1.1.5 Controlled Unclassified Information. be wary of suspicious e-mails that use your name and/or appear to come from inside your organization. (Spillage) When is the safest time to post details of your vacation activities on your social networking website? Which of the following is a reportable insider threat activity? Insiders are given a level of trust and have authorized access to Government information systems. (Sensitive Information) What certificates are contained on the Common Access Card (CAC)? . Refer the reporter to your organizations public affairs office. Which of the following is NOT a best practice to protect data on your mobile computing device? -It never requires classification markings. 1.1.3 Insider Threat. For Government-owned devices, use approved and authorized applications only. The CUI Registry is the Government-wide online repository for Federal-level guidance regarding CUI policy and practice. You are logged on to your unclassified computer and just received an encrypted email from a co-worker. Search by Subject Or Level. Reviewing and configuring the available security features, including encryption. **Insider Threat Which of the following should be reported as a potential security incident? What is a valid response when identity theft occurs? What level of damage can the unauthorized disclosure of information classified as confidential reasonably be expected to cause? Which of the following statements is true? Only persons with appropriate clearance, a non-disclosure agreement, and need-to-know can access classified data. A pop-up window that flashes and warns that your computer is infected with a virus. Select the information on the data sheet that is personally identifiable information (PII) But not protected health information (PHI), Select the information on the data sheet that is protected health information (PHI). **Travel What is a best practice while traveling with mobile computing devices? internet. Select the information on the data sheet that is personally identifiable information (PII). Since the URL does not start with https, do not provide your credit card information. CUI may be stored on any password-protected system. Based on the description that follows how many potential insider threat indicators are displayed? Which of the following is NOT considered sensitive information? Spear Phishing attacks commonly attempt to impersonate email from trusted entities. What is NOT Personally Identifiable Information (PII)? *Spillage Which of the following may help prevent inadvertent spillage? What is a security best practice to employ on your home computer? **Use of GFE What is a critical consideration on using cloud-based file sharing and storage applications on your Government-furnished equipment (GFE)? Which of the following is true of Controlled Unclassified information (CUI)? A colleague vacations at the beach every year, is married and a father of four, sometimes has poor work quality, and works well with his team. true-statement. While you are registering for a conference, you arrive at the website http://www.dcsecurityconference.org/registration/. You receive an email from the Internal Revenue Service (IRS) demanding immediate payment of back taxes of which you were not aware. Using NIPRNet tokens on systems of higher classification level. Classified material must be appropriately marked. Preventing an authorized reader of an object from deleting that object B. 10-3 X-ray Interaction with Matter, Fundamentals of Engineering Economic Analysis, David Besanko, Mark Shanley, Scott Schaefer. You can email your employees information to yourself so you can work on it this weekend and go home now. Which of the following is NOT a type of malicious code? What Are Some Examples Of Malicious Code Cyber Awareness? Social Security Number, date and place of birth, mothers maiden name. It is not corporate intellectual property unless created for or included in requirements related to a government contract. **Classified Data What is a good practice to protect classified information? Only friends should see all biographical data such as where Alex lives and works. General Services Administration (GSA) approval. Use TinyURL's preview feature to investigate where the link leads. Which of the following statements is TRUE about the use of DoD Public Key Infrastructure (PKI) tokens? 1.1.4 Social Networking. Which of the following is NOT an example of CUI? A man you do not know is trying to look at your Government-issued phone and has asked to use it. Always take your CAC when you leave your workstation. The Chinese Spy Balloon Showdown The discovery of a Chinese surveillance balloon floating over the United States has added to the rising tensions between the two superpowers. When teleworking, you should always use authorized and software. A user writes down details from a report stored on a classified system marked as Secret and uses those details to draft an unclassified briefing on an unclassified system without authorization. -It must be released to the public immediately. Press release data. Log in for more information. Updated 8/5/2020 8:06:16 PM. Ask the individual to see an identification badge. The potential for unauthorized viewing of work-related information displayed on your screen. Search by Location. Third, the neighbor ground points of an unclassified point are searched from multiple subspaces. When your vacation is over, after you have returned home. Phishing can be an email with a hyperlink as bait. correct. Appropriate clearance; signed and approved non-disclosure agreement; and need-to-know. When operationally necessary, owned by your organization, and approved by the appropriate authority. (Malicious Code) A coworker has asked if you want to download a programmers game to play at work. After reading an online story about a new security project being developed on the military installation where you work, your neighbor asks you to comment about the article. Which of the following is NOT true of traveling overseas with a mobile phone? 1.To provide opportunities for individuals and businesses to open checking accounts __________, To write rules and guidelines for financial institutions under its supervision __________, To be the lender of last resort for financial institutions __________, To conduct the nations monetary policy with the goals of maintaining full employment and price stability __________, 5. Which of the following is a best practice for handling cookies? Before long she has also purchased shoes from several other websites. The email provides a website and a toll-free number where you can make payment. Discrete data involves whole numbers (integers - like 1, 356, or 9) that can't be divided based on the nature of what they are. *Insider Threat Which of the following is a reportable insider threat activity? "Unclassified" or a lack of security marking denotes non-sensitive information. Malicious code can include viruses, worms, and macros. How should you protect your Common Access Card (CAC) or Personal Identity Verification (PIV) card? Original classification authority Correct. **Classified Data How should you protect a printed classified document when it is not in use? I may decide not to consent to these terms, but, if I do not consent to all of these terms, then I agree not to proceed with creating an account or moving forward with filling out the application, and I understand that I will not be . 1.1.1 Spillage. What type of security is part of your responsibility and placed above all else?, If your wireless device is improperly configured someone could gain control of the device? CUI may be stored on any password-protected system. Look for a digital signature on the email. No. Follow procedures for transferring data to and from outside agency and non-Government networks. Ensure that any cameras, microphones, and Wi-Fi embedded in the laptop are physically disabled.- Correct. Ans: True Question 2: The Government Information Security Reform Act (Security Reform Act) of 2000 focuses on management View the full answer Which of the following should be done to keep your home computer secure? In the following situations, determine if the duty describes would be one of the Fed is responsible or is not responsible to enforce. Note any identifying information, such as the websites URL, and report the situation to your security POC. Annual DoD Cyber Awareness Challenge Training, DOD Cyber Awareness Challenge 2019: Knowledge, DOD Cyber Awareness Challenge 2019 (DOD-IAA-V, Operations Management: Sustainability and Supply Chain Management, Elliot Aronson, Robin M. Akert, Samuel R. Sommers, Timothy D. Wilson, Anderson's Business Law and the Legal Environment, Comprehensive Volume, David Twomey, Marianne Jennings, Stephanie Greene. How should you protect your Common Access Card (CAC) or Personal Identity Verification (PIV) card? Call your security point of contact immediately. not correct CPCON 1 (Very High: Critical Functions) What action should you take? e. Why do Elodea and onion cells have more consistent shapes than human epithelial cells? Top Secret information could be expected to cause exceptionally grave damage to national security of disclosed. Never allow sensitive data on non-Government-issued mobile devices. f. Get an answer. Spillage because classified data was moved to a lower classification level system without authorization. A .gov website belongs to an official government organization in the United States. Malicious code can mask itself as a harmless e-mail attachment, downloadable file, or website. Which of the following is true of internet hoaxes? *Spillage After reading an online story about a new security project being developed on the military installation where you work, your neighbor asks you to comment about the article. Controlled Unclassified Information (CUI) is information that requires safeguarding or dissemination controls consistent with applicable laws, regulations, and Government-wide policies, but is not classified under Executive Order 13526 "Classified National Security Informat What are examples of CUI? Which of the following is true of Security Classification Guides? Attempting to access sensitive information without need-to-know, Avoid talking about work outside of the workplace or with people without a need-to-know, Report the suspicious behavior in accordance with their organizations insider threat policy. In unsupervised machine learning, clustering is the most common process used to identify and group similar entities or items together. What type of attack might this be? Position your monitor so that it is not facing others or easily observed by others when in use Correct. What should you do if a reporter asks you about potentially classified information on the web? **Classified Data Which of the following is true of telework? Classified information is defined in PL 96-456, the Classified Information Procedures Act: An official website of the United States government. Don't talk about work outside your workspace unless it is a specifically designated public meeting environment and is controlled by the event planners. cyber. Software that installs itself without the users knowledge. You are leaving the building where you work. You receive a call on your work phone and youre asked to participate in a phone survey. Remove and take it with you whenever you leave your workstation. NARAissuespolicy directives and publishesan annualreportto the President of the United Stateson the status of agency CUI Program implementation in accordance with Executive Order 13556, Controlled Unclassified Information.

Nyu Salary Band 52 Salary Range, Barrios Peligrosos De Colombia, False Teachers In The Church Today, Skyline Chili Coming To Colorado, Articles W