Completing your expense report for your government travel. -If aggregated, the classification of the information may not be changed. What action should you take? **Classified DataWhich of the following is true of telework? @870zpVxh%X'pxI[r{+i#F1F3020d`_ if>}xp20Nj9: bL *Physical SecurityWhich Cyber Protection Condition (CPCON) establishes a protection priority focus on critical and essential functions only? The potential for unauthorized viewing of work-related information displayed on your screen. 0000005321 00000 n Which of the following is NOT a DoD special requirement for tokens? Wait until you have access to your government-issued laptop. Only persons with appropriate clearance, a non-disclosure agreement, and need-to-know can access classified data. What should you do? You have reached the office door to exit your controlled area. **Physical SecurityWhat is a good practice for physical security? Tell your colleague that it needs to be secured in a cabinet or container. An individual can be granted access to classified information provided the following criteria are satisfied? Upon connecting your Government-issued laptop to a public wireless connection, what should you immediately do? Upon connecting your Government- issued laptop to a public wireless connection, what should you immediately do? **Social EngineeringWhich is a best practice that can prevent viruses and other malicious code from being downloaded when checking your e-mail? Select the information on the data sheet that is personally identifiable information (PII) but not protected health information (PHI). Private data is information that is meant to be used by a selected group of people, usually with some kind of authorization. What action should you take if you receive a friend request on your social networking website from someone in Germany you met casually at a conference last year? Mark SCI documents, appropriately and use an approved SCI fax machine. Darryl is managing a project that requires access to classified information. *Sensitive Compartmented InformationWhat is a Sensitive Compartmented Information (SCI) program? Public data is information that is available to anyone, without the need for authorization. -Ask them to verify their name and office number. A. While on vacation, a coworker calls and asks you to access a site to review and approve a document that is hosted behind a DoD Public Key Infrastructure (PKI) protected webpage. Identify and disclose it with local Configuration/Change Management Control and Property Management authorities. **Mobile DevicesWhich is a rule for removable media, other portable electronic devices (PEDs), and mobile computing devices to protect Government systems? 0 **Use of GFEWhat is a critical consideration on using cloud-based file sharing and storage applications on your Government-furnished equipment (GFE)? What is Sensitive Compartment Information (SCI)? Use a digital signature when sending attachments or hyperlinks. The email states your account has been compromised and you are invited to click on the link in order to reset your password. *Social EngineeringWhat action should you take with an e-mail from a friend containing a compressed Uniform Resource Locator (URL)?-Investigate the links actual destination using the preview feature. Both exams had the same range, so they must have had the same median. *SpillageA user writes down details marked as Secret from a report stored on a classified system and uses those details to draft a briefing on an unclassified system without authorization. Approved Security Classification Guide (SCG). Dr. Baker reports that the sessions addressed Ms. Jones's depression, which poses no national security risk. **Removable Media in a SCIFWhat portable electronic devices (PEDs) are allowed in a Sensitive Compartmented Information Facility (SCIF)? \text{Total Revenue}&&44,000\\ What can be used to track Maria's web browsing habits? -Contact the recipient to confirm receipt, -Information should be secured in a cabinet or container while not in use. \textbf{Income statement}\\ How many potential insider threat indicators does this employee display? Attempting to access sensitive information without a need-to-know. SSN, date and place of birth, mothers maiden name, biometric records, PHI, passport number, Subset of PII, health information that identifies the individual, relates to physical or mental health of an individual, provision of health care to an individual, or payment of healthcare for individual. When using your government-issued laptop in public environments, with which of the following should you be concerned? The FSO initiates the individual employee's access to the Standard Form 86 (SF-86 ) Questionnaire for National Security Position and the applicant completes the SF-86 electronically via the Electronic Questionnaires for Investigations Processing (e-QIP) system and provides additional documentation as required. If your wireless device is improperly configured someone could gain control of the device? You know this project is classified. You are logged on to your unclassified computer and just received an encrypted email from a co-worker. **Insider ThreatWhat do insiders with authorized access to information or information systems pose? endobj Maintain possession of your laptop and other government-furnished equipment (GFE) at all times. Which of the following is NOT an example of sensitive information? *Insider ThreatWhich type of behavior should you report as a potential insider threat? When is conducting a private money-making venture using your Government-furnished computer permitted? @uP"szf3(`}>5k\r/[QbGle/+*LwzJ*zVHa`i&A%h5hy[XR'sDbirE^n They may wittingly or unwittingly use their authorized access to perform actions that result in the loss or degradation of resources or capabilities. **Insider ThreatBased on the description that follows, how many potential insider threat indicator(s) are displayed? New interest in learning another language? \textbf{BUSINESS SOLUTIONS}\\ How many indicators does this employee display? What should you consider when using a wireless keyboard with your home computer? Appropriate clearance; signed and approved non-disclosure agreement; and need-to-know. Mark SCI documents appropriately and use an approved SCI fax machine. *Identity ManagementWhat is the best way to protect your Common Access Card (CAC) or Personal Identity Verification (PIV) card? You must possess security clearance eligibility to telework. On a NIPRNET system while using it for a PKI-required task. Which of the following is a best practice for handling cookies? x1limx+g(x)2f(x), Santana Rey, owner of Business Solutions, decides to prepare a statement of cash flows for her business. Classified data: Must be handled and stored properly based on classification markings and handling caveats Can only be accessed by individuals with all of the following: o Appropriate clearance o Signed and approved non-disclosure agreement o Need-to-know Protecting Sensitive Information To protect sensitive information: Which of the following is NOT a correct way to protect CUI? How many potential insiders threat indicators does this employee display? A colleague complains about anxiety and exhaustion, makes coworkers uncomfortable by asking excessive questions about classified projects, and complain about the credit card bills that his wife runs up. - Complete the blank What should you do if someone forgets their access badge (physical access)? Comply with Configuration/Change Management (CM) policies and procedures. -Directing you to a website that looks real. Spear Phishing attacks commonly attempt to impersonate email from trusted entities. Use online sites to confirm or expose potential hoaxes. The email has an attachment whose name contains the word "secret". It is permissible to release unclassified information to the public prior to being cleared. endobj Ensure proper labeling by appropriately marking all classified material and, when required, sensitive material. When should documents be marked within a Sensitive Compartmented Information Facility (SCIF)? -Look for a digital signature on the email. Which of the following is a good practice to avoid email viruses? The following practices help prevent viruses and the downloading of malicious code except. Which is an appropriate use of government e-mail? The Maybe Pay Life Insurance Co. is trying to sell you an investment policy that will pay you and your heirs $40,000 per year forever. When using your Government-issued laptop in public environments, with which of the following should you be concerned? 0000000016 00000 n Which of the following is NOT a potential insider threat? What should you do? Jane Jones It may be compromised as soon as you exit the plane. *Sensitive Compartmented InformationWhich must be approved and signed by a cognizant Original Classification Authority (OCA)? Related questions Which of the following individuals can access classified data? What is the best description of two-factor authentication? Label all files, removable media, and subject headers with appropriate classification markings. Lock your device screen when not in use and require a password to reactivate. Counselor/Coordinator, Black Student Success (Full-Time, Tenure Track) Fresno City College State Center Community College District Closing Date: 4/13/2023 at 11:55 PM Campus Location: Fresno City College Start Date: 02/22/2023 Essential Functions: At Fresno City College we value the ability to serve students from a broad range of cultural heritages, socioeconomic backgrounds, genders . -Make note of any identifying information and the website URL and report it to your security office. Only allow mobile code to run from your organization or your organizations trusted sites. You should only accept cookies from reputable, trusted websites. Your cousin posted a link to an article with an incendiary headline on social media. Have your permissions from your organization, follow your organization guideline, use authorized equipment and software, employ cyber security best practice, perform telework in dedicated when home. No. What is the best example of Personally Identifiable Information (PII)? Identification, encryption, digital signature. *Website Use *Sensitive InformationUnder which circumstances is it permitted to share an unclassified draft document with a non-DoD professional discussion group? You believe that you are a victim of identity theft. 4 0 obj -Classified material must be appropriately marked. Be aware of classification markings and all handling caveats. Appropriate clearance; signed and approved non-disclosure agreement; and need-to-know. A coworker wants to send you a sensitive document to review while you are at lunch and you only have your personal tablet. CUI may be stored on any password-protected system. What is a proper response if spillage occurs? trailer Which of the following is the best example of Personally Identifiable Information (PII)? What are some actions you can take to try to protect your identity? Malicious code can do the following except? BUSINESSSOLUTIONSComparativeBalanceSheetDecember31,2017,andMarch31,2018, BUSINESSSOLUTIONSIncomestatementForThreeMonthsEndedMarch31,2018\begin{array}{c} **Social EngineeringWhat is TRUE of a phishing attack? What type of unclassified material should always be marked with a special handling caveat? 20 0 obj Upon connecting your Government-issued laptop to a public wireless connection, what should you immediately do? Based on the description that follows how many potential insider threat indicators are displayed? <>/ExtGState<>/ProcSet[/PDF/Text/ImageB/ImageC/ImageI] >>/MediaBox[ 0 0 612 792] /Contents 24 0 R/Group<>/Tabs/S/StructParents 1>> Classified material is stored in a GSA-approved container when not in use. Your health insurance explanation of benefits (EOB). When unclassified data is aggregated, its classification level may rise. What is the best response if you find classified government data on the internet? You receive a call on your work phone and you're asked to participate in a phone survey. Understanding and using the available privacy settings. [1] Issued by President Barack Obama in 2009, Executive Order 13526 replaced earlier executive orders on the topic and modified the regulations codified to 32 C.F.R. What is a best practice to protect data on your mobile computing device? Maintain visual or physical control of the device. *Classified Data Which of the following individuals can access classified data? Which of the following is NOT considered a potential insider threat indicator? 3. *Use of GFE It may expose the connected device to malware. [ 20 0 R] Government-owned PEDs when expressly authorized by your agency. *Mobile DevicesWhich of the following is an example of removable media? 0000006504 00000 n *SpillageWhat should you do when you are working on an unclassified system and receive an email with a classified attachment? A colleague has visited several foreign countries recently, has adequate work quality, speaks openly of unhappiness with U.S. foreign policy, and recently had his car repossessed. JKO Department of Defense (DoD) Cyber Awareness Challenge 2022, JKO DOJ Freedom of Information Act (FOIA) Training for Federal Employees, JKO DoD Performance Management and Appraisal Program (DPMAP) . After reading an online story about a new security project being developed on the military installation where you work, your neighbor asks you to comment about the article. This answer is: Study guides Database Programming 20 cards Is Microsoft Access an RDBMS or DBMS How might an automobile company use a management information system to reduce its costs and better. *WEBSITE USE*Which of the following statements is true of cookies? What should you do if a reporter asks you about potentially classified information on the web? What is an indication that malicious code is running on your system? Note any identifying information and the website's Uniform Resource Locator (URL). UNCLASSIFIED is a designation to mark information that does not have potential to damage national security. *Sensitive InformationWhich of the following is an example of Protected Health Information (PHI)? **Mobile DevicesWhich of the following helps protect data on your personal mobile devices? Which type of information includes personal, payroll, medical, and operational information? *Sensitive Compartmented InformationWhat action should you take if you become aware that Sensitive Compartmented Information (SCI) has been compromised? How do you respond? No, you should only allow mobile code to run from your organization or your organization's trusted sites. Difficult life circumstances such as substance abuse; divided loyalty or allegiance to the U.S.; or extreme, persistent interpersonal difficulties. What should you do after you have ended a call from a reporter asking you to confirm potentially classified info found on the web? On a NIPRNet system while using it for a PKI-required task. \end{array} It includes a threat of dire circumstances. At what interest rate would this be a fair deal? **Social NetworkingWhich of the following best describes the sources that contribute to your online identity? **Social NetworkingWhen is the safest time to post details of your vacation activities on your social networking profile? *Classified DataWhich of the following individuals can access classified data? An unsecured IoT device can become an attack vector to any other device on your home network, including your Government laptop, Cyber Awareness Challenge 2022 Knowledge Check, Summary of Earth until Geologic time scale, Cyber Awareness Challenge 2023 (Incomplete), Chemistry Edapt Unit 6 - Biological Polymers, Chemistry Edapt Unit 6 - Applications of Radi, Chemistry Edapt Unit 6 - Radioactive Isotopes, John David Jackson, Patricia Meglich, Robert Mathis, Sean Valentine, Elliot Aronson, Robin M. Akert, Samuel R. Sommers, Timothy D. Wilson, Operations Management: Sustainability and Supply Chain Management, Information Technology Project Management: Providing Measurable Organizational Value. xref Which of the following is NOT a best practice to protect data on your mobile computing device? Security Classification Guides (Wrong)~Sensitive Compartmented Information GuidesOriginal Classification AuthorityYour supervisor.

James Richmond Taylor, Jeep Quick Order Package 28g, Articles W