Sunday Parade Magazine, Articles W

-TRUE The use of webmail is -is only allowed if the organization permits it Using webmail may bypass built in security features. Which Of The Following Is Not A Correct Way To Protect CUI. Keep your operating system and software up to date: This will help patch any security vulnerabilities in your software. **Use of GFE When can you check personal e-mail on your Government-furnished equipment (GFE)? -It never requires classification markings. Note any identifying information and the websites Uniform Resource Locator (URL). -It must be released to the public immediately. *Spillage Which of the following is a good practice to aid in preventing spillage? Do not forward, read further, or manipulate the file; Do not give out computer or network information, Do not follow instructions from unverified personnel. not correct. Always use DoD PKI tokens within their designated classification level. **Social Networking Which of the following is a security best practice when using social networking sites? Use your own security badge, key code, or Common Access Card (CAC)/Personal Identity Verification (PIC) card. Physically assess that everyone within listening distance is cleared and has a need-to-know for the information being discussed. CUI is government created or owned information that requires safeguarding or dissemination controls consistent with applicable laws, regulations and government wide policies. How many potential insider threat indicators does this employee display? Using NIPRNet tokens on systems of higher classification level. **Website Use Which of the following statements is true of cookies? They may wittingly or unwittingly use their authorized access to perform actions that result in the loss or degradation of resources or capabilities. **Travel What security risk does a public Wi-Fi connection pose? Which of the following is a reportable insider threat activity? Retrieve classified documents promptly from printers. A type of phishing targeted at high-level personnel such as senior officials. (Spillage) When is the safest time to post details of your vacation activities on your social networking website? Not correct. **Social Engineering What action should you take with an e-mail from a friend containing a compressed Uniform Resource Locator (URL)? Which of the following is true of sharing information in a Sensitive Compartmented Information Facility (SCIF)? Compute The Average Kids Per Family. Click the card to flip Flashcards Learn Test Match Created by Jamie_Lancaster Terms in this set (24) Thiswill enabletimely and consistent informationsharing andincreasetransparency throughout the Federal government and with non-Federal stakeholders. **Social Networking Your cousin posted a link to an article with an incendiary headline on social media. true-statement. Maybe. correct. Which of the following is NOT a criterion used to grant an individual access to classified data? which of the following is true about unclassified data. A lock (LockA locked padlock) or https:// means youve safely connected to the .gov website. Which designation marks information that does not have potential to damage national security? Remove your security badge, common access card (CAC), or personal identity verification (PIV) card. **Mobile Devices Which is a rule for removable media, other portable electronic devices (PEDs), and mobile computing devices to protect Government systems? (Sensitive Information) Which of the following is true about unclassified data? true-statement. **Identity Management Your DoD Common Access Card (CAC) has a Public Key Infrastructure (PKI) token approved for access to the NIPRNet. Course Introduction Introduction . Examples are: Patient names, Social Security numbers, Drivers license numbers, insurance details, and birth dates. *Insider Threat Which of the following is a potential insider threat indicator? EPAs CUI Program is responsible for issuing CUI policy, procedures, training, and guidance to program offices and regions, along with providing oversight and reporting on the Agencys progress on meeting NARAs CUI deadlines. What information posted publicly on your personal social networking profile represents a security risk? Right-click the link and select the option to preview??? (Malicious Code) Upon connecting your Government-issued laptop to a public wireless connection, what should you immediately do? You know this project is classified. View email in plain text and dont view email in Preview Pane. Which of the following is a potential insider threat indicator? What can help to protect the data on your personal mobile device. Use the classified network for all work, including unclassified work. Which of the following demonstrates proper protection of mobile devices? 1).Compared with CK, straw addition treatments (S and SG) significantly (P < 0.01) increased the emission rate and cumulative emission of CO 2 and the cumulative CO 2 . Decline So That You Maintain Physical Control of Your Government-Issued Laptop. (Spillage) What is required for an individual to access classified data? Research the source of the article to evaluate its credibility and reliability. A coworker wants to send you a sensitive document to review while you are at lunch and you only have your personal tablet. CUI is an umbrella term that encompasses many different markings toidentifyinformationthat is not classified but which should be protected. You must have your organizations permission to telework. (Sensitive Information) Which of the following represents a good physical security practice? I may decide not to consent to these terms, but, if I do not consent to all of these terms, then I agree not to proceed with creating an account or moving forward with filling out the application, and I understand that I will not be . What Are Some Examples Of Malicious Code Cyber Awareness? You can email your employees information to yourself so you can work on it this weekend and go home now. ~All documents should be appropriately marked, regardless of format, sensitivity, or classification. Keeping a database from being accessed by unauthorized visitors C. Restricting a subject at a lower classification level from accessing data at a higher classification level D. Preventing an . Your health insurance explanation of benefits (EOB). Ensure proper labeling by appropriately marking all classified material and, when required, sensitive material. DOD Cyber Awareness 2021 (DOD-IAA-V18.0) Know, RT202: Ch. What is a possible indication of a malicious code attack in progress? Infographic - Text version Infographic [PDF - 594 KB] Report a problem or mistake on this page Date modified: 2020-12-14 What action should you take? Log in for more information. Which of the following is NOT one? (social networking) When is the safest time to post details of your vacation activities on your social networking profile? What is the basis for the handling and storage of classified data? A colleague vacations at the beach every year, is married and a father of four, sometimes has poor work quality, and works well with his team. The website requires a credit card for registration. Correct Which of the following is a security best practice for protecting Personally Identifiable Information (PII)? In the following situations, determine if the duty describes would be one of the Fed is responsible or is not responsible to enforce. *Spillage Which of the following may help to prevent spillage? Make note of any identifying information and the website URL and report it to your security office. When unclassified data is aggregated, its classification level may rise. It may be compromised as soon as you exit the plane. internet-quiz. Which of the following should be reported as a potential security incident (in accordance with your Agencys insider threat policy)? The potential for unauthorized viewing of work-related information displayed on your screen. The attributes of identified ground seeds are modified to ground points. Which of the following should you NOT do if you find classified information on the internet? This task is performed with the aim of finding similarities in data points and grouping similar data points together. correct. What should you do to protect yourself while on social networks? Connect and share knowledge within a single location that is structured and easy to search. Which of the following information is a security risk when posted publicly on your social networking profile? Everything you need to know aboutControlled UnclassifiedInformation(CUI). A Read the latest news from the Controlled Unclassified Information (CUI) program. *Sensitive Compartmented Information What must the dissemination of information regarding intelligence sources, methods, or activities follow? **Social Networking What should you do if you receive a game application request that includes permission to access your friends, profile information, cookies, and sites visited? What is required for an individual to access classified data? Position your monitor so that it is not facing others or easily observed by others when in use Correct. Confirm the individuals need-to-know and access. (removable media) If an incident occurs involving removable media in a Sensitive Compartmented Information Facility (SCIF), what action should you take? Which of the following is true of the Common Access Card (CAC) or Personal Identity Verification (PIV) card? (Malicious Code) Which email attachments are generally SAFE to open? Which of the following is a good practice to prevent spillage? Dofficult life circumstances, such as death of spouse. That trust is bounded by the Oath of Office we took willingly. What action should you take? 1.1.5 Controlled Unclassified Information. Cyber Awareness 2022. On September 14, 2016, NARA issued a final rule amending 32 CFR Part 2002 to establish a uniform policy for all Federal agencies and prescribe Government-wide program implementation standards, including designating, safeguarding, disseminating, marking, decontrolling, and disposing of CUI; self-inspection and oversight requirements; and other facets of the CUI Program. A colleague is playful and charming, consistently wins performance awards, and is occasionally aggressive in trying to access classified information. Which of the following represents a good physical security practice? You find information that you know to be classified on the Internet. (Sensitive Compartmented Information) What portable electronic devices (PEDs) are allow in a Secure Compartmented Information Facility (SCIF)? -Classified information that should be unclassified and is downgraded. It does not require markings or distribution controls. Of the following, which is NOT a method to protect sensitive information? Follow instructions given only by verified personnel. *Spillage A user writes down details marked as Secret from a report stored on a classified system and uses those details to draft a briefing on an unclassified system without authorization. CUI may be stored on any password-protected system. Classification markings and handling caveats. The Registry is updated as agencies continue to submit governing authorities that authorize the protection and safeguarding of sensitive information. Exceptionally grave damage. Classified material must be appropriately marked. *Controlled Unclassified Information Which is a best practice for protecting Controlled Unclassified Information (CUI)? What amount is due if Alexa pays on or betwee n April 222222 and May 666? Only persons with appropriate clearance, a non-disclosure agreement, and need-to-know can access classified data. This is information that, if released to the public, carries no injury to personal, industry, or government interests. 1.1.2 Classified Data. Attempting to access sensitive information without need-to-know. Aggregating it does not affect its sensitivyty level. **Classified Data Which of the following is true of telework? How can you protect data on your mobile computing and portable electronic devices (PEDs)? For programmatic questions regarding Controlled Unclassified Information (CUI), including any challenges to CUI marked by EPA, pleasecontact EPA's CUI Program Office. correct. 1.1.4 Social Networking. Cyber Awareness Challenge Knowledge Check 2023 Answers, Cyber Awareness Challenge 2022 Knowledge Check Answers. Which of the following is NOT a typical result from running malicious code? Protection may be required for privacy, law enforcement, contractual protections, or other reasons. A coworker brings a personal electronic device into prohibited areas. Since the URL does not start with https, do not provide you credit card information. Which of the following statements is NOT true about protecting your virtual identity? When unclassified data is aggregated, its classification level may rise. Which of the following is a practice that helps to prevent the download of viruses and other malicious code when checking your email? How should you respond? Maintain visual or physical control of the device. Physical security of mobile phones carried overseas is not a major issue. Remove your security badge after leaving your controlled area or office building. a. What action should you take? A .gov website belongs to an official government organization in the United States. What should be done to protect against insider threats? Monitor credit card statements for unauthorized purchases, Thumb drives, memory sticks, and flash drives are examples of. (controlled unclassified information) Which of the following is NOT an example of CUI?