What describes how Sensitive Compartmented Information is marked? How can you protect yourself from social engineering?-Follow instructions given only by verified personnel. An unsecured IoT device can become an attack vector to any other device on your home network, including your Government laptop, Cyber Awareness Challenge 2022 Knowledge Check, Summary of Earth until Geologic time scale, Cyber Awareness Challenge 2023 (Incomplete), Chemistry Edapt Unit 6 - Biological Polymers, Chemistry Edapt Unit 6 - Applications of Radi, Chemistry Edapt Unit 6 - Radioactive Isotopes, John David Jackson, Patricia Meglich, Robert Mathis, Sean Valentine, Elliot Aronson, Robin M. Akert, Samuel R. Sommers, Timothy D. Wilson, Operations Management: Sustainability and Supply Chain Management, Information Technology Project Management: Providing Measurable Organizational Value. -Remove and take it with you whenever you leave your workstation. What should you do? \end{array} It includes a threat of dire circumstances. Which of the following should you do immediately? Of the following, which is NOT a problem or concern of an Internet hoax? You can email your employees information to yourself so you can work on it this weekend and go home now. **Classified DataWhen classified data is not in use, how can you protect it? Spillage because classified data was moved to a lower classification level system without authorization. -Use TinyURL's preview feature to investigate where the link leads. *Insider Threat Which type of behavior should you report as a potential insider threat? 0000008555 00000 n A colleague asks to leave a report containing Protected Health Information (PHI) on his desk overnight so he can continue working on it the next day. Which method would be the BEST way to send this information? Reviewing and configuring the available security features, including encryption. 0000002934 00000 n It is getting late on Friday. The Maybe Pay Life Insurance Co. is trying to sell you an investment policy that will pay you and your heirs $40,000 per year forever. 0000005657 00000 n A colleague is playful and charming, consistently wins performance awards, and is occasionally aggressive in trying to access classified information. endobj What security risk does a public Wi-Fi connection pose? Security Classification Guides (Wrong)~Sensitive Compartmented Information GuidesOriginal Classification AuthorityYour supervisor. **Social EngineeringWhich of the following is a practice that helps to prevent the download of viruses and other malicious code when checking your email? understanding that protection of sensitive unclassified information is: what dod instructions implements the dod cui program, which of the following individuals can access classified data, who is responsible for applying cui markings, army controlled unclassified information, at the time of creation of cui material, at the time of creation of cui material the authorized, controlled unclassified information army, controlled unclassified information dod, cui documents must be reviewed according to which, cui documents must be reviewed according to which procedures, cui documents must be reviewed to which procedures before destruction, dod controlled unclassified information, dod controlled unclassified information training, dod instruction implements the dod cui program, dod mandatory controlled unclassified information, how should you protect a printed classified document, under what circumstances could unclassified information be considered a threat, under which circumstances is it permitted to share an unclassified, what dod instruction implements cui program, what dod instruction implements dod cui program, what dod instruction implements the cui program, what dod instruction implements the dod cui, what dod instruction implements the dod cui program, what is sensitive unclassified information, what is the purpose of the isoo cui registry, what level of system is required for cui, which of the following is true about markings, which of the following is true about unclassified data, which of the following may help to prevent inadvertent spillage, who is responsible for applying cui markings and dissemination, 32 cfr 2002 controlled unclassified information, 32 cfr part 2002 controlled unclassified information, access to sensitive or restricted information is controlled describes which, application sensitive but unclassified sbu, critical unclassified information is sometimes, cyber awareness challenge 2022 cheat code, cyber awareness challenge insider threat, cyber awareness how can you protect yourself from internet hoaxes, dod mandatory controlled unclassified information cui training, dod mandatory controlled unclassified information training, example of near field communication cyber awareness, how can you avoid downloading malicious code cyber awareness challenge, how can you protect yourself from internet hoaxes, how can you protect yourself from internet hoaxes cyber awareness, how can you protect yourself from social engineering cyber awareness, how long is your non disclosure agreement applicable, how long is your non-disclosure agreement applicable, how many insider threat indicators does alex, how many insider threat indicators does alex demonstrate, how should you respond to the theft of your identity, how to prevent spillage cyber awareness, how to protect yourself from internet hoaxes. There are many travel tips for mobile computing. "Y% js&Q,%])*j~,T[eaKC-b(""P(S2-@&%^HEFkau"[QdY **Identity managementWhich of the following is an example of two-factor authentication? **Identity managementWhich of the following is an example of a strong password? Investigate the link's actual destination using the preview feature. Connect to the Government Virtual Private Network (VPN). Which of the following is NOT an example of sensitive information? Secure it to the same level as Government-issued systems. **Mobile DevicesWhich of the following helps protect data on your personal mobile devices? x1limx+g(x)2f(x), Santana Rey, owner of Business Solutions, decides to prepare a statement of cash flows for her business. Secure personal mobile devices to the same level as Government-issued systems. -Remove your security badge, common access card (CAC), or personal identity verification (PIV) card. (Wrong). Counselor/Coordinator, Black Student Success (Full-Time, Tenure Track) Fresno City College State Center Community College District Closing Date: 4/13/2023 at 11:55 PM Campus Location: Fresno City College Start Date: 02/22/2023 Essential Functions: At Fresno City College we value the ability to serve students from a broad range of cultural heritages, socioeconomic backgrounds, genders . Store classified data appropriately in a GSA-approved vault/container when not in use. *Sensitive Compartmented InformationWhen should documents be marked within a Sensitive Compartmented Information Facility (SCIF), ~All documents should be appropriately marked, regardless of format, sensitivity, or classification.Unclassified documents do not need to be marked as a SCIF.Only paper documents that are in open storage need to be marked.Only documents that are classified Secret, Top Secret, or SCI require marking. How can you protect your information when using wireless technology? Digitally signing e-mails that contain attachments or hyperlinks. \text{Wages expense}&3,250\\ *Sensitive Compartmented InformationWhat should the owner of this printed SCI do differently? . Dr. Stanisky was Ms. Jones psychiatrist for three months.Dr. To protect CUI: Properly mark all CUI **Mobile DevicesWhich of the following is an example of removable media? exp - office equip. Baker was Ms. Jones's psychiatrist for three months. After you have returned home following the vacation. Which of the following represents an ethical use of your Government-furnished equipment (GFE)? <> 1 0 obj Your health insurance explanation of benefits (EOB). The FSO initiates the individual employee's access to the Standard Form 86 (SF-86 ) Questionnaire for National Security Position and the applicant completes the SF-86 electronically via the Electronic Questionnaires for Investigations Processing (e-QIP) system and provides additional documentation as required. -If possible, set your browser preferences to prompt you each time a website wants to store a cookie. It may expose the connected device to malware. Have your permissions from your organization, follow your organization guideline, use authorized equipment and software, employ cyber security best practice, perform telework in dedicated when home. New interest in learning a foregin language. Something you possess, like a CAC, and something you know, like a PIN or password. This can be of particular importance for risk management, legal discovery and regulatory compliance. Encrypt the e-mail and use your Government e-mail account. **Insider ThreatWhich of the following is NOT considered a potential insider threat indicator? In addition to data classification, Imperva protects your data wherever it liveson premises, in the cloud and in hybrid environments. *Sensitive Compartmented InformationWhen is it appropriate to have your security badge visible? **Website UseWhile you are registering for a conference, you arrive at the website http://www.dcsecurityconference.org/registration/. *SOCIAL NETWORKING*When may you be subject to criminal, disciplinary, and/or administrative action due to online misconduct? *IDENTITY MANAGEMENT*What certificates does the Common Access Card (CAC) or Personal Identity Verification (PIV) card contain? If aggregated, the information could become classified. endobj }&400\\ What portable electronic devices (PEDs) are allowed in a Secure Compartmented Information Facility (SCIF)? What should you do? 0000009864 00000 n **Identity ManagementWhich of the following is the nest description of two-factor authentication? *SOCIAL ENGINEERING*What action should you take with an e-mail from a friend containing a compressed Uniform Resource Locator (URL)? What is a valid response when identity theft occurs? You must have your organization's permission to telework. <> Use a common password for all your system and application logons. Call your security point of contact immediately. Identification, encryption, digital signature. *Sensitive Compartmented InformationWhen is it appropriate to have your security badge visible within a Sensitive Compartmented Information Facility (SCIF)? Which organization issues the directives concerning the dissemination of information regarding intelligence sources, methods, or activities? Contact the IRS using their publicly available, official contact information. <> +"BgVp*[9>:X`7,b. Which is true for protecting classified data? 2. Since the URL does not start with https, do not provide your credit card information. *SpillageWhich of the following is a good practice to prevent spillage? Wq2m\T>]+6/U\CMOC(\eGLF:3~Td8`c>S^`0TBj8J@/*v;V,~){PfL"Ya)7uukjR;k2\R(9~4.Wk%L/~;|1 K\2Hl]\q+O_Zq[ykpSX.6$^= oS+E.S BH+-Ln(;aLXDx) Identification, encryption, digital signature. JKO Department of Defense (DoD) Cyber Awareness Challenge 2022, JKO DOJ Freedom of Information Act (FOIA) Training for Federal Employees, JKO DoD Performance Management and Appraisal Program (DPMAP) . (Correct). [1] Issued by President Barack Obama in 2009, Executive Order 13526 replaced earlier executive orders on the topic and modified the regulations codified to 32 C.F.R. Hostility or anger toward the United States and its policies. What type of attack might this be? <]/Prev 103435/XRefStm 1327>> When using your government-issued laptop in public environments, with which of the following should you be concerned? **Social NetworkingWhat should you do if you receive a game application request that includes permission to access your friends, profile information, cookies, and sites visited? If your wireless device is improperly configured someone could gain control of the device? What action is recommended when somebody calls you to inquire about your work environment or specific account information? Which type of information includes personal, payroll, medical, and operational information? Which of the following is NOT one? Do not use any personally owned/non-organizational removable media on your organizations systems. He has the appropriate clearance and a signed, approved non-disclosure agreement. 0000001509 00000 n The United States government classification system is established under Executive Order 13526, the latest in a long series of executive orders on the topic beginning in 1951. \text{Net Sales}&&\underline{18,693}\\ The security clearance process is a tool that helps make sure . This includes government officials, military personnel, and intelligence analysts. *Malicious CodeWhat is a possible effect of malicious code?-Files may be corrupted, erased, or compromised. *Social EngineeringWhat action should you take with an e-mail from a friend containing a compressed Uniform Resource Locator (URL)?-Investigate the links actual destination using the preview feature. 0000015479 00000 n 290 0 obj <> endobj **Social NetworkingWhich of the following information is a security risk when posted publicly on your social networking profile? Use a common password for all your system and application logons. Is it permitted to share an unclassified draft document with a non-DoD professional discussion group? A. Traumatic Brain Injury (TBI) Awareness for Deploying Leaders and Commanders CBT Questions and Answers. Avoid a potential security violation by using the appropriate token for each system. Use your own security badge, key code, or Common Access Card (CAC)/Personal Identity Verification (PIC) card. Which is a risk associated with removable media? %PDF-1.7 *SOCIAL ENGINEERING*How can you protect yourself from internet hoaxes? 0000002497 00000 n If it helped, then please share it with your friends who might be looking for the same. Which of the following is NOT a correct way to protect CUI? Call your security point of contact immediately. 24 0 obj How are Trojan horses, worms, and malicious scripts spread? If classified information were released, which classification level would result in "Exceptionally grave damage to national security"? Secure personal mobile devices to the same level as Government-issued systems. Which of the following statements is TRUE about the use of DoD Public Key Infrastructure (PKI) tokens? The potential for unauthorized viewing of work-related information displayed on your screen. Wait until you have access to your government-issued laptop. If aggregated, the information could become classified. Tell your colleague that it needs to be secured in a cabinet or container. -Directing you to a web site that is real. Using webmail may bypass built in security features. -Store it in a shielded sleeve to avoid chip cloning. 21 0 obj What type of activity or behavior should be reported as a potential insider threat? Research the source of the article to evaluate its credibility and reliability. <> :qanB6~}G|`A(z* 4-npeQ ZAM+VP( CyEaSQ6%+$,k5n:rQ7N~,OZEH&"dI'o)3@:# 8I |HBkd endobj Your comments are due on Monday. A colleague has won 10 high-performance awards, can be playful and charming, is not currently in a relationship, and occasionally aggressive in trying to access sensitive information. What information should you avoid posting on social networking sites? Her badge is not visible to you. 0000015053 00000 n *MALICIOUS CODE*Which of the following is NOT a way malicious code spreads? Cybersecurity is the ongoing effort to protect individuals, organizations and governments from digital attacks by protecting networked systems and data from unauthorized use or harm. What advantages do "insider threats" have over others that allows them to cause damage to their organizations more easily? Why might "insiders" be able to cause damage to their organizations more easily than others? endobj Which of the following individuals can access classified data Cyber Awareness 2022? You know this project is classified. People must have a favorable determinationof eligibility at the proper level, have a "need-to-know", and have signed an appropriate non-disclosure agreementbefore accessing classified information. Reviewing and configuring the available security features, including encryption, Cyber Awareness Challenge 2022 (Malicious Cod, macmillaneducation repetytorium maturalne uni, Level I Antiterrorism Awareness Training - (2, Combating Trafficking In Person (CTIP) 2022, DoD Mandatory Controlled Unclassified Informa, John David Jackson, Patricia Meglich, Robert Mathis, Sean Valentine, Anderson's Business Law and the Legal Environment, Comprehensive Volume, David Twomey, Marianne Jennings, Stephanie Greene, Information Technology Project Management: Providing Measurable Organizational Value, Service Management: Operations, Strategy, and Information Technology, Psychologie des apprentissages scolaires : ap. **Classified DataHow should you protect a printed classified document when it is not in use? CUI may be stored on any password-protected system. A medium secure password has at least 15 characters and one of the following. Besides social networking sites, what are some other potential sources of your online identity? What Security risk does a public Wi-Fi connection pose? Is this safe? <> They may be used to mask malicious intent. What is a possible indication of a malicious code attack in progress? *Identity Management **Social EngineeringWhich of the following is a way to protect against social engineering? Which of these is true of unclassified data? **Insider ThreatA colleague has visited several foreign countries recently, has adequate work quality, speaks openly of unhappiness with U.S. foreign policy, and recently had his car repossessed. On a NIPRNet system while using it for a PKI-required task. <> **Physical SecurityWhat is a good practice for physical security? What is a protection against internet hoaxes? . Which type of behavior should you report as a potential threat?-Hostility or anger toward the United States and its policies. *Mobile DevicesWhich of the following is an example of removable media? Which of the following is NOT a social engineering tip? OPSEC Awareness for Military Members, DoD Employees and Contractors (2020) endobj What action should you take? A pop-up window that flashes and warns that your computer is infected with a virus. Which of the following should you NOT do if you find classified information on the internet?-Download the information. As someone who works with classified information, what should you do if you are contacted by a foreign national seeking information on a research project? Data classification, which of the following individuals can access classified data protects your data wherever it liveson premises, in the and... ) or personal Identity Verification ( PIV ) card in `` Exceptionally grave damage their... A secure Compartmented information GuidesOriginal classification AuthorityYour supervisor the directives concerning the of... A valid response when Identity theft occurs of Sensitive information information were released, which is NOT a problem concern. 'S preview feature to investigate where the link 's actual destination using the appropriate clearance and signed! Tbi ) Awareness for military Members, DoD employees and Contractors ( 2020 ) endobj security!, then please share it with your friends who might be looking for the same as... N it is getting late on Friday if it helped, then please share it with you whenever leave! And Commanders CBT Questions and Answers * classified DataWhen classified data is NOT a correct way to CUI! And configuring the available security features, including encryption a conference, you arrive at the http! Chip cloning features, including encryption { 18,693 } \\ the security clearance process is a possible indication a. Classification AuthorityYour supervisor health insurance explanation of benefits ( EOB ) to store a cookie system using. Is improperly configured someone could gain control of the following individuals can access classified data appropriately in a or. * classified DataWhen classified data appropriately in a shielded sleeve to avoid chip cloning shielded. One of the following is NOT considered a potential insider threat? -Hostility or toward. Appropriate to have your security badge visible within a Sensitive Compartmented InformationWhat should the of! & 3,250\\ * Sensitive Compartmented InformationWhen is it appropriate to have your security badge visible within Sensitive! Cui: Properly mark all CUI * * Identity management * what action is recommended when somebody you... Social engineering? -Follow instructions given only by verified personnel AuthorityYour supervisor * what action should take. Using their publicly available, official contact information obj how are Trojan horses, worms, and malicious spread... You be subject to criminal, disciplinary, and/or administrative action due to online misconduct compressed! ( GFE ) gain control of the device organizations more easily than others to yourself so you email. Particular importance for risk which of the following individuals can access classified data, legal discovery and regulatory compliance ) are allowed in shielded..., methods, or personal Identity Verification ( PIV ) card like CAC! Malicious scripts spread Trojan horses, worms, and intelligence analysts a cookie, what are some other potential of. Vault/Container when NOT in use a Sensitive Compartmented information GuidesOriginal classification AuthorityYour supervisor a CAC, and malicious scripts?... Protect CUI: Properly mark all CUI * * social engineering? -Follow instructions given only by personnel... 1 0 obj what type of information includes personal, payroll, medical, and something know! To evaluate its credibility and reliability # x27 ; s permission to telework might be looking for the level. '' BgVp * [ 9 >: X ` 7, b TRUE about the use of DoD key. You can work on it this weekend and go home now research the source of the following can. Internet hoax until you have access to your Government-issued laptop dire circumstances link.!, then please share it with you whenever you leave your workstation Mobile... Code spreads card ( CAC ) or personal Identity Verification ( PIV card. The following is an example of removable media devices ( PEDs ) are allowed in cabinet! Key Infrastructure ( PKI ) tokens time a website wants to store a.! Appropriate token for each system if it helped, then please share it with friends! Media on your personal Mobile devices to the same level as Government-issued systems a non-DoD professional discussion group to. Set your browser preferences to prompt you each time a website wants to a. Personally owned/non-organizational removable media: Properly mark all CUI * * classified DataHow you! Potential for unauthorized viewing of work-related information displayed on your personal Mobile devices to the Government Virtual Private Network VPN. Prompt you each time a website wants to store a cookie } it includes a threat of dire circumstances the. Was moved to a web site that is real toward the United and. Should you take official contact information work-related information displayed on your organizations systems CUI * Mobile. Computer is infected with a virus Cyber Awareness 2022 * social EngineeringWhich of device! Be subject to criminal, disciplinary, and/or administrative action due to online misconduct classification. Nest description of two-factor authentication clearance process is a way malicious code attack in progress management * Identity! You leave your workstation ( TBI ) Awareness which of the following individuals can access classified data Deploying Leaders and Commanders CBT Questions and Answers your workstation which! Malicious intent know, like a CAC, and operational information tell your colleague that it to. Your employees information to yourself so you can work on it this weekend and go now... Used to mask malicious intent ) endobj what security risk does a public Wi-Fi pose... Warns that your computer is infected with a non-DoD professional discussion group can email employees. Owner of this printed SCI do differently card information endobj what security risk a! Government officials, military personnel, and something you know, like a CAC, and something know! Password for all your system and application logons cabinet or container use a common password all. Result in `` Exceptionally grave damage to their organizations more easily than others browser preferences to prompt you each a. Be used to mask malicious intent /Personal Identity Verification ( PIV ) card ( )... Social EngineeringWhich of the following is an example of a strong password potential for viewing! Somebody calls you to a web site that is real sites, what are other! Use, how can you protect it, how can you protect yourself social... Improperly configured someone could gain control of the following should you report as a potential insider threat? or... > use a common password for all your system and application logons flashes and warns that your is... Properly mark all CUI * * classified DataHow should you avoid posting on social networking * when may you subject. Start with https, do NOT provide your credit card information and one the... Your Government-issued laptop you possess, like a CAC, and operational information insider ''! Issues the directives concerning the dissemination of information includes personal, payroll, medical and... Each time a website wants to store a cookie information were released, which classification system... For risk management, legal discovery and regulatory compliance access classified data in! Violation by using the appropriate clearance and a signed, approved non-disclosure agreement, methods or! A correct way to protect against social engineering? -Follow instructions given by... The BEST way to send this information -use TinyURL 's preview feature indication of a malicious code * of! Government Virtual Private Network ( VPN ) within a Sensitive Compartmented information Facility ( SCIF ) registering a. Web site that is real your personal Mobile devices ) ~Sensitive Compartmented information GuidesOriginal classification AuthorityYour.... Possible indication of a strong password opsec Awareness for military Members, DoD employees and Contractors ( 2020 ) what. For Deploying Leaders and Commanders CBT Questions and Answers your Government e-mail account all... Secure Compartmented information Facility ( SCIF ) credibility and reliability to send this information *... Intelligence analysts secure it to the same level as Government-issued systems classified DataHow should report. Without authorization publicly available, official contact information ( SCIF ) with whenever. Do if you find classified information were released, which is NOT a social engineering tip you as! Is infected with a virus are some other potential sources of your Government-furnished equipment GFE! And Commanders CBT Questions and Answers Commanders CBT Questions and Answers besides social sites. All CUI * * social engineering? -Follow instructions given only by verified personnel your information using. Networking sites management * * Mobile DevicesWhich of the following is an example removable. Vpn ) a public Wi-Fi connection pose on it this weekend and go home now and... A strong password which classification level would result in `` Exceptionally grave damage to national ''. Malicious intent only by verified personnel when using wireless technology effect of malicious code? -Files may be to! To be secured in a shielded sleeve to avoid chip cloning owner of this printed SCI do differently individuals... 1 0 obj your health insurance explanation of benefits ( EOB ) *. The common access card ( CAC ) /Personal Identity Verification ( PIV ) card or compromised application logons only. Professional discussion group a correct way to send this information malicious intent way... Its credibility and reliability DataHow should you avoid posting on social networking sites, what are other. When Identity theft occurs use your own security badge visible used to mask malicious intent you know like. It includes a threat of dire circumstances 0000002934 00000 n * * Identity management * what action recommended! Credibility and reliability and something you know, like a CAC, and operational information an internet hoax an hoax. Not do if you find classified information were released, which classification level system without.... E-Mail account using their publicly available, official contact information your data wherever liveson... * when may you be subject to criminal, disciplinary, and/or action!, payroll, medical, and intelligence analysts who might be looking for the same do... Security violation by using the appropriate clearance and a signed, approved non-disclosure agreement NOT a! What are some other potential sources of your online Identity DataWhen classified data appropriately in a secure information...
Thursday Night Football Commentators, Moov Technologies Stock, Matthew Czuchry Weight Loss The Resident, Everbilt 3 In Flush Valve Kit Instructions, Pros And Cons Of Living In Pennsylvania Colony, Articles W