Which Of The Following Statements About Adding Social Networks To Hootsuite Is False? true-statement. Which of the following is true of the Common Access Card (CAC)? NARA has the authority and responsibility to manage the CUI Program across the Federal government. Refer the reporter to your organizations public affairs office. Antihistamines are used to treat the symptoms, such as sneezing, that are due to inflammation caused by irritants in the airways. **Classified Data How should you protect a printed classified document when it is not in use? Retrieve classified documents promptly from printers. Three or more. You must have your organization's permission to telework. What is required for an individual to access classified data? You know that this project is classified. Correct Not correct. (Insider Threat) Based on the description that follows, how many potential insider threat indicator(s) are displayed? What level of damage to national security can you reasonably expect Top Secret information to cause if disclosed? What should you do? What level of damage can the unauthorized disclosure of information classified as Top Secret reasonably be expected to cause? (Malicious Code) What is a common indicator of a phishing attempt? (social networking) When may you be subjected to criminal, disciplinary, and/or administrative action due to online misconduct? The email provides a website and a toll-free number where you can make payment. Leaked classified or controlled information is still classified/controlled even if it has already been compromised. **Insider Threat Which type of behavior should you report as a potential insider threat? A coworker has left an unknown CD on your desk. CPCON 4 (Low: All Functions) Unclassified information is a threat to national security. In addition to avoiding the temptation of greed to betray his country, what should Alex do differently? Alexa May, director of accounts, received a bill for $648\$648$648, dated April 666, with sales terms 2/10,1/15,n/302/10, 1/15, n/302/10,1/15,n/30. what should you do? CUI is not classified information. What is a best practice for protecting controlled unclassified information (CUI)? **Classified Data Which classification level is given to information that could reasonably be expected to cause serious damage to national security? Which of the following is NOT a correct way to protect sensitive information? Of the following, which is NOT a problem or concern of an Internet hoax? -It must be released to the public immediately. You receive an unexpected email from a friend: "I think you'll like this: (URL)" What action should you take? The following table lists the number of drivers in the United States, the number of fatal accidents, and the number of total accidents in each age group in 2002. Third, the neighbor ground points of an unclassified point are searched from multiple subspaces. (controlled unclassified information) Which of the following is NOT an example of CUI? correct. **Identity Management Your DoD Common Access Card (CAC) has a Public Key Infrastructure (PKI) token approved for access to the NIPRNet. Remove and take it with you whenever you leave your workstation. What function do Insider Threat Programs aim to fulfill? a. Which of the following is a good practice to prevent spillage? This answer has been confirmed as correct and helpful. **Insider Threat What type of activity or behavior should be reported as a potential insider threat? What should be your response? What type of data must be handled and stored properly based on classification markings and handling caveats? CUI was established to standardize the way the Executive branch handles sensitive information that requires dissemination controls. Reviewing and configuring the available security features, including encryption. Controlled unclassified information. Which of the following is true about unclassified data? Which of the following should you do immediately? **Social Networking Which of the following information is a security risk when posted publicly on your social networking profile? What certificates are contained on the DoD Public Key Infrastructure (PKI) implemented by the Common Access Card (CAC)/Personal Identity Verification (PIV) card? You are working at your unclassified system and receive an email from a coworker containing a classified attachment. Jozeal. Individuals must avoid referencing derivatively classified reports classified higher than the recipient.??? Correct Hostility or anger toward the United States and its policies. Tell us about it through the REPORT button at the bottom of the page. A coworker removes sensitive information without authorization. When leaving your work area, what is the first thing you should do? What action should you take? Since the URL does not start with https, do not provide your credit card information. A smartphone that transmits credit card payment information when held in proximity to a credit card reader. You receive a call on your work phone and youre asked to participate in a phone survey. *Sensitive Compartmented Information What is a Sensitive Compartmented Information (SCI) program? Which of the following is NOT a typical means for spreading malicious code? 5. b. Matt Monroe, a 20-year U. S. Air Force veteran and current operations manager at Omnistruct, explains the breakdown, "There are four classified information categories in the military based on the severity of damage that the information's release would cause. (Sensitive Compartmented Information) What describes how Sensitive Compartmented Information is marked? Only persons with appropriate clearance, a non-disclosure agreement, and need-to-know can access classified data. Keeping a database from being accessed by unauthorized visitors C. Restricting a subject at a lower classification level from accessing data at a higher classification level D. Preventing an . Not correct Which of the following is a reportable insider threat activity? Which of the following actions is appropriate after finding classified Government information on the internet? **Travel What security risk does a public Wi-Fi connection pose? Which of the following is NOT a home security best practice? correct. Which of the following is a good practice to protect classified information? What actions should you take with a compressed Uniform Resource Locator (URL) on a website known to you? After work hours, storing sensitive information in unlocked containers, desks, or cabinets if security is not present. Ive tried all the answers and it still tells me off, part 2. Security Classification Guides (SCGs).??? ALways mark classified information appropriately and retrieve classified documents promptly from the printer. The Registry is updated as agencies continue to submit governing authorities that authorize the protection and safeguarding of sensitive information. Dofficult life circumstances, such as death of spouse. a. putting a child in time-out Click on "Open File". correct. correct. How are Trojan horses, worms, and malicious scripts spread? *Spillage Which of the following is a good practice to aid in preventing spillage? Hostility or anger toward the United States and its policies. It includes a threat of dire circumstances. Correct. How many potential insiders threat indicators does this employee display. *Malicious Code After visiting a website on your Government device, a popup appears on your screen. Which of the following is NOT an example of CUI? Malicious code can include viruses, worms, and macros. Read the latest news from the Controlled Unclassified Information (CUI) program. What is an indication that malicious code is running on your system? What is the best way to protect your Common Access Card (CAC) or Personal Identity Verification (PIV) card? A pop-up window that flashes and warns that your computer is infected with a virus. Aggregating it does not affect its sensitivyty level. Reviewing and configuring the available security features, including encryption. Unclassified documents do not need to be marked as a SCIF. Store it in a General Services Administration (GSA)-approved vault or container. Search by Subject Or Level. *Controlled Unclassified Information Which of the following best describes a way to safely transmit Controlled Unclassified Information (CUI)? At EPA, the CUI Program is housed in the Libraries and Accessibility Division (LAD) within the Office of Mission Supports (OMS), Office of Enterprise Information Programs (OEIP). Telework is only authorized for unclassified and confidential information. Dont assume open storage in a secure facility is authorized Maybe. It displays a label showing maximum classification, date of creation, point of contact, and Change Management 9CM) Control Number. *Spillage You find information that you know to be classified on the Internet. What is the danger of using public Wi-Fi connections? Which of the following is NOT a potential insider threat? How many insider threat indicators does Alex demonstrate? Don't talk about work outside your workspace unless it is a specifically designated public meeting environment and is controlled by the event planners. That trust is bounded by the Oath of Office we took willingly. Remove security badge as you enter a restaurant or retail establishment. Attempting to access sensitive information without need-to-know. Retrieve classified documents promptly from printers. Which of the following is true of Internet of Things (IoT) devices? A measure of how much useful work each unit of input energy provides. A coworker wants to send you a sensitive document to review while you are at lunch and you only have your personal tablet. What is considered ethical use of the Government email system? Appropriate clearance, a signed and approved non-disclosure agreement, and need-to-know, Insiders are given a level of trust and have authorized access to Government information systems. Which of the following statements is NOT true about protecting your virtual identity? Which of the following is a good practice for telework? Note the websites URL and report the situation to your security point of contact. Which of the following is NOT sensitive information? *Sensitive Compartmented Information Which of the following best describes the compromise of Sensitive Compartmented Information (SCI)? Classified DVD distribution should be controlled just like any other classified media. Updated 8/5/2020 8:06:16 PM. *Insider Threat Which of the following is a potential insider threat indicator? Even within a secure facility, dont assume open storage is permitted. Quizzma is a free online database of educational quizzes and test answers. How can you protect yourself on social networking sites? *Controlled Unclassified Information Which of the following is NOT a correct way to protect CUI? ~All documents should be appropriately marked, regardless of format, sensitivity, or classification. **Insider Threat Which of the following is NOT considered a potential insider threat indicator? Federal agencies routinely generate, use, store, and share information that, while not meeting the threshold for classification as national security or atomic energy information, requires some level of protection from unauthorized access and release. Press release data. On a NIPRNet system while using it for a PKI-required task, Something you possess, like a CAC, and something you know, like a PIN or password. **Mobile Devices Which is a rule for removable media, other portable electronic devices (PEDs), and mobile computing devices to protect Government systems? What should you do? Attempt to change the subject to something non-work related, but neither confirm nor deny the article's authenticity. (Sensitive Information) What must the dissemination of information regarding intelligence sources, methods, or activities follow? Which of the following is NOT a typical result from running malicious code? **Identity management Which of the following is an example of a strong password? cyber-awareness. Asked 8/5/2020 6:29:36 PM. *Spillage. (Malicious Code) Which email attachments are generally SAFE to open? In which situation below are you permitted to use your PKI token? You must possess security clearance eligibility to telework. What should you do? A .gov website belongs to an official government organization in the United States. At all times while in the facility. Ask for information about the website, including the URL. If you participate in or condone it at any time. Which of the following should you NOT do if you find classified information on the internet? -It must be released to the public immediately. What should be done to sensitive data on laptops and other mobile computing devices? What is a rule for removable media, other portable electronic devices (PEDs), and mobile computing devices to protect Government systems? Coworker making consistent statements indicative of hostility or anger toward the United States and its policies. They provide guidance on reasons for and duration of classification of information. It never requires classification markings, is true about unclassified data. Which of the following is NOT Government computer misuse? Only friends should see all biographical data such as where Alex lives and works. Back up your data: This will help you recover your data if it's lost or corrupted. When operationally necessary, owned by your organization, and approved by the appropriate authority. cyber. Social Security Number, date and place of birth, mothers maiden name. Maintain visual or physical control of the device. Neither confirm or deny the information is classified. How can you avoid downloading malicious code? Bob, a coworker, has been going through a divorce, has financial difficulties and is displaying hostile behavior. Which type of information includes personal, payroll, medical, and operational information? The potential for unauthorized viewing of work-related information displayed on your screen. After you have returned home following the vacation. 870 Summit Park Avenue Auburn Hills, MI 48057. EPA anticipates beginning CUI practices (designating, marking, safeguarding, disseminating, destroying, and decontrolling) starting in FY2023. Darryl is managing a project that requires access to classified information. **Social Networking What should you do if you receive a game application request that includes permission to access your friends, profile information, cookies, and sires visited? Which Of The Following Is Not A Correct Way To Protect CUI. (Mobile Devices) Which of the following statements is true? (Sensitive Information) What type of unclassified material should always be marked with a special handling caveat? What type of social engineering targets senior officials? Ensure proper labeling by appropriately marking all classified material and, when required, sensitive material. For example, when you buy propane for your barbecue, your tank is placed on a scale while it is filled under high pressure (Figure 7). Your DoD Common Access Card (CAC) has a Public Key Infrastructure (PKI) token approves for access to the NIPRNET. Amendments to a variety of policy documents as well as others referencing Confidential Business Information (CBI) submissions or handling, Changes to paper and e-forms and instructions for their submission to EPA. If authorized, what can be done on a work computer? Classified information is defined in PL 96-456, the Classified Information Procedures Act: Which scenario might indicate a reportable insider threat? How many potential insider threat indicators does this employee display? **Social Networking When may you be subject to criminal, disciplinary, and/or administrative action due to online misconduct? **Identity management Which is NOT a sufficient way to protect your identity? 1.To provide opportunities for individuals and businesses to open checking accounts __________, To write rules and guidelines for financial institutions under its supervision __________, To be the lender of last resort for financial institutions __________, To conduct the nations monetary policy with the goals of maintaining full employment and price stability __________, 5. The website requires a credit card for registration. Which is a risk associated with removable media? Second, unclassified points are regarded as ground seeds if the distances between the points and the detected planes are less than a buffer difference threshold. **Travel What is a best practice while traveling with mobile computing devices? A coworker has asked if you want to download a programmers game to play at work. As a security best practice, what should you do before exiting? (social networking) Which of the following is a security best practice when using social networking sites? Use only your personal contact information when establishing your account. What information most likely presents a security risk on your personal social networking profile? A colleague often makes others uneasy with her persistent efforts to obtain information about classified project where she has no need-to-know, is vocal about her husband overspending on credit cards, and complains about anxiety and exhaustion. Which of the following is NOT true of traveling overseas with a mobile phone? All https sites are legitimate. Course Introduction Introduction . Your comments are due on Monday. Cyber Awareness 2022. *Spillage What should you do if you suspect spillage has occurred? *Sensitive Compartmented Information When faxing Sensitive Compartmented Information (SCI), what actions should you take? -TRUE What action is recommended when somebody calls you to inquire about your work environment or specific account information? Always use DoD PKI tokens within their designated classification level. When unclassified data is aggregated, its classification level may rise. be wary of suspicious e-mails that use your name and/or appear to come from inside your organization. A colleague saves money for an overseas vacation every year, is a . We recommend Norton Security or McAfee Total Protection. How should you protect a printed classified document when it is not in use? Power off any mobile devices when entering a secure area. When is the best time to post details of your vacation activities on your social networking website? Keep your operating system and software up to date: This will help patch any security vulnerabilities in your software. CPCON 2 (High: Critical and Essential Functions) **Website Use How should you respond to the theft of your identity?
When Was The Last Tornado In Springfield, Mo,
Long Island High School Colors And Mascots,
Ritz Charles Wedding Cost,
Articles W