Not correct Unclassified documents do not need to be marked as a SCIF. Which is NOT a way to protect removable media? Controlled Unclassified Information (CUI) Purpose of the CUI Program. Always take your CAC when you leave your workstation. (Mobile Devices) Which of the following statements is true? Which of the following attacks target high ranking officials and executives? **Social Engineering What is TRUE of a phishing attack? Never allow sensitive data on non-Government-issued mobile devices. Which of the following information is a security risk when posted publicly on your social networking profile? Classified material must be appropriately marked. As part of the survey the caller asks for birth date and address. Should you always label your removable media? PDF IFS0026 Student Guide - CDSE Based on the description that follows, how many potential insider threat indicator(s) are displayed? Do not forward, read further, or manipulate the file; Do not give out computer or network information, Do not follow instructions from unverified personnel. correct. Immediately notify your security point of contact. (Sensitive Information) What guidance is available from marking Sensitive Information information (SCI)? CUI may be stored only on authorized systems or approved devices. Remove your security badge, common access card (CAC), or personal identity verification (PIV) card. Note the websites URL and report the situation to your security point of contact. Effects of different carbon substrates on PAHs fractions and microbial **Identity management Which of the following is an example of two-factor authentication? which of the following is true about unclassified data - Soetrust Telework is only authorized for unclassified and confidential information. Connect to the Government Virtual Private Network (VPN). (Spillage) What advantages do insider threats have over others that allows them to cause damage to their organizations more easily? Maria is at home shopping for shoes on Amazon.com. When using a fax machine to send sensitive information, the sender should do which of the following? Asked 8/5/2020 6:29:36 PM. It is permissible to release unclassified information to the public prior to being cleared. You must have your organizations permission to telework. For example, when you buy propane for your barbecue, your tank is placed on a scale while it is filled under high pressure (Figure 7). (Sensitive Information) What certificates are contained on the Common Access Card (CAC)? What function do Insider Threat Programs aim to fulfill? It includes a threat of dire circumstances. This is information that, if released to the public, carries no injury to personal, industry, or government interests. What level of damage to national security could reasonably be expected if unauthorized disclosure of Top Secret information occurred? Original classification authority Correct. What should you do if someone forgets their access badge (physical access)? A 3%3\%3% penalty is charged for payment after 303030 days. In setting up your personal social networking service account, what email address should you use? What should be done if you find classified Government Data/Information Not Cleared for Public Release on the Internet? What is a rule for removable media, other portable electronic devices (PEDs), and mobile computing devices to protect Government systems? A colleague abruptly becomes hostile and unpleasant after previously enjoying positive working relationships with peers, purchases an unusually expensive new car, and has unexplained absences from work. (1) A strategic plan documenting the overall conduct of a war. Which is a risk associated with removable media? Remove security badge as you enter a restaurant or retail establishment. What is the best course of action? ~All documents should be appropriately marked, regardless of format, sensitivity, or classification. What is a security best practice to employ on your home computer? Ensure proper labeling by appropriately marking all classified material and, when required, sensitive material. Unauthorized Disclosure of Classified Information for DoD, Security Awareness: Derivative Classification Answers, CITI Ethics, Responsible Conduct, RCR, Law, HTH And IRB Answers, EVERFI Achieve Consumer Financial Education Answers, Security Pro: Chapter 3 (3.1.8) & 4.1 Security Policies Answers, CITI Module #3 Research in Public Elementary and Secondary Schools, Answers to CTS Unit 7 Lab 7-2: Protocols and Services SNMP, Google Analytics Individual Qualification Exam Answers, Everfi Module 4 Credit Scores Quiz Answers, Which Of The Following Is Not Considered A Potential Insider Threat Indicator. Log in for more information. Store it in a locked desk drawer after working hours. Only use Government-furnished or Government-approved equipment to process PII. What should you do after you have ended a call from a reporter asking you to confirm potentially classified info found on the web? The answer has been confirmed to be correct. Store classified data appropriately in a GSA-approved vault/container. Which scenario might indicate a reportable insider threat security incident? Which is a way to protect against phishing attacks? Note the websites URL and report the situation to your security point of contact. 1 Answer/Comment. Which of the following is true about unclassified data? Lock your device screen when not in use and require a password to reactivate. Access requires a formal need-to-know determination issued by the Director of National Intelligence.? Of the following, which is NOT a security awareness tip? A .gov website belongs to an official government organization in the United States. Which is NOT a method of protecting classified data? A lock (LockA locked padlock) or https:// means youve safely connected to the .gov website. You are reviewing your employees annual self evaluation. Of the following, which is NOT a characteristic of a phishing attempt? Which may be a security issue with compressed urls? It displays a label showing maximum classification, date of creation, point of contact, and Change Management 9CM) Control Number. Secure it to the same level as Government-issued systems. *Sensitive Compartmented Information What must the dissemination of information regarding intelligence sources, methods, or activities follow? Correct. How many potential insiders threat indicators does this employee display? **Classified Data What is required for an individual to access classified data? Senior government personnel, military or civilian. The email states your account has been compromised and you are invited to click on the link in order to reset your password. Discuss why gases, such as barbecue propane gas, are sold by mass and not by volume. Which of the following is NOT a DoD special requirement for tokens? Do not access website links, buttons, or graphics in e-mail. correct. What amount is due if Alexa pays on or betwee n April 222222 and May 666? Which of the following statements is TRUE about the use of DoD Public Key Infrastructure (PKI) tokens? Which of the following is NOT a criterion used to grant an individual access to classified data? *Spillage Which of the following may help to prevent spillage? Leaked classified or controlled information is still classified/controlled even if it has already been compromised. Malicious code can mask itself as a harmless e-mail attachment, downloadable file, or website. You many only transmit SCI via certified mail. *Spillage After reading an online story about a new security project being developed on the military installation where you work, your neighbor asks you to comment about the article. Controlled Unclassified Information (CUI) | GSA Unclassified Information Student Guide . What is the best way to protect your Common Access Card (CAC) or Personal Identity Verification (PIV) card? **Insider Threat Based on the description that follows, how many potential insider threat indicator(s) are displayed? Call your security point of contact immediately. a. Memory sticks, flash drives, or external hard drives. The CAC/PIV is a controlled item and contains certificates for: An individual who has attempted to access sensitive information without need-to-know and has made unusual requests for sensitive information is displaying indicators of what? What should you do? **Social Networking When may you be subject to criminal, disciplinary, and/or administrative action due to online misconduct? When is it appropriate to have your security badge visible? CUI is government created or owned information that requires safeguarding or dissemination controls consistent with applicable laws, regulations and government wide policies. Carrying his Social Security Card with him, DoD employees are prohibited from using a DoD CAC in card-reader-enabled public device, Assigned a classification level by a supervisor. *Spillage After reading an online story about a new security project being developed on the military installation where you work, your neighbor asks you to comment about the article. Sensitive information may be stored on any password-protected system. correct. When your vacation is over, and you have returned home. What type of attack might this be? (Answer) CPCON 2 (High: Critical and Essential Functions) CPCON 1 (Very High: Critical Functions) CPCON 3 (Medium: Critical, Essential, and Support Functions) CPCON 4 (Low: All Functions) CPCON 5 (Very Low: All Functions). (Spillage) Which of the following is a best practice to protect information about you and your organization on social networking sites and applications? (Malicious Code) What is a common indicator of a phishing attempt? Which of the following best describes the sources that contribute to your online identity. You receive an unexpected email from a friend: I think youll like this: https://tinyurl.com/2fcbvy. What action should you take? How do you respond? Debra ensures not correct The Following Is True About Unclassified Data - faqcourse.com Correct. View email in plain text and dont view email in Preview Pane. Which of following is true of protecting classified data? How do you respond? *Sensitive Information Which of the following is the best example of Personally Identifiable Information (PII)? Position your monitor so that it is not facing others or easily observed by others when in use Correct. (Malicious Code) What is a good practice to protect data on your home wireless systems? Follow instructions given only by verified personnel. Set hasDigit to true if the 3-character passCode contains a digit, Critical, Essential, and Support Functions. Seeker - Vacancy - Detail Overview Which of the following is not a best practice to preserve the authenticity of your identity? Keeping a database from being accessed by unauthorized visitors C. Restricting a subject at a lower classification level from accessing data at a higher classification level D. Preventing an . What should you do? Always use DoD PKI tokens within their designated classification level. Report the suspicious behavior in accordance with their organizations insider threat policy. It never requires classified markings, it is true about unclassified data. *Spillage. Store classified data appropriately in a GSA-approved vault/container when not in use. (Wrong). A compromise of Sensitive Compartmented Information (SCI) occurs when a person who does not have the required clearance or access caveats comes into possession of SCI_________.??? Which of the following is a best practice to protect information about you and your organization on social networking sites and applications? Correct. That trust is bounded by the Oath of Office we took willingly. The potential for unauthorized viewing of work-related information displayed on your screen. Controlled Unclassified Information (CUI) - National Archives Press release data. **Social Networking When is the safest time to post details of your vacation activities on your social networking profile? Store it in a shielded sleeve to avoid chip cloning. Which of the following is true of sharing information in a Sensitive Compartmented Information Facility (SCIF)? Remove your security badge, common access card (CAC), or personal identity verification (PIV) card. When is it okay to charge a personal mobile device using government-furnished equipment (GFE)? Replace data starts with '' with np.NaN - Stack Overflow Of the following, which is NOT a method to protect sensitive information? (Correct) -It does not affect the safety of Government missions. **Physical Security What is a good practice for physical security? A colleague abruptly becomes hostile and unpleasant after previously enjoying positive working relationships with peers, purchases an unusually expensive car, and has unexplained absences from work. **Social Engineering What action should you take with an e-mail from a friend containing a compressed Uniform Resource Locator (URL)? Connect and share knowledge within a single location that is structured and easy to search. What should Sara do when publicly available Internet, such as hotel Wi-Fi? Use TinyURL's preview feature to investigate where the link leads. What information most likely presents a security risk on your personal social networking profile? DoD Cyber Awareness 2019 - Subjecto.com **Insider Threat Which scenario might indicate a reportable insider threat? (Spillage) After reading an online story about a new security project being developed on the military installation where you work, your neighbor asks you to comment about the article. A man you do not know is trying to look at your Government-issued phone and has asked to use it. How should you securely transport company information on a removable media? *Spillage What should you do if a reporter asks you about potentially classified information on the web? You are working at your unclassified system and receive an email from a coworker containing a classified attachment. Always use DoD PKI tokens within their designated classification level. (Malicious Code) A coworker has asked if you want to download a programmers game to play at work. ~All documents should be appropriately marked, regardless of format, sensitivity, or classification. A Progressive Plane Detection Filtering Method for Airborne LiDAR Data **Insider Threat What type of activity or behavior should be reported as a potential insider threat?