which of the following is true about unclassified data

Which of the following statements is TRUE about the use of DoD Public Key Infrastructure (PKI) tokens? Have your permissions from your organization, follow your organization guideline, use authorized equipment and software, employ cyber security best practice, perform telework in dedicated when home. Others may be able to view your screen. What is the best example of Protected Health Information (PHI)? Who can be permitted access to classified data? Her badge is not visible to you. ! (A type of phishing targeted at senior officials) Which is still your FAT A$$ MOTHER! Store classified data appropriately in a GSA-approved vault/container when not in use. Classified information that should be unclassified and is downgraded. Rating. Unclassified documents do not need to be marked as a SCIF. Correct. Antihistamines are used to treat the symptoms, such as sneezing, that are due to inflammation caused by irritants in the airways. Original classification authority Correct. (Identity Management) What certificates are contained on the Common Access Card (CAC)? #1) Open WEKA and select "Explorer" under 'Applications'. Search Which of the following is true of Controlled Unclassified information (CUI)? Spear Phishing attacks commonly attempt to impersonate email from trusted entities. Malicious code can include viruses, worms, and macros. Which of the following is a concern when using your Government-issued laptop in public? Which of the following is NOT an example of Personally Identifiable Information (PII)? What action is recommended when somebody calls you to inquire about your work environment or specific account information? Your comments are due on Monday. Of the following, which is NOT a security awareness tip? correct. **Physical Security What is a good practice for physical security? What type of activity or behavior should be reported as a potential insider threat? Never allow sensitive data on non-Government-issued mobile devices. correct. Classified DVD distribution should be controlled just like any other classified media. Always take your CAC when you leave your workstation. -Classified information that should be unclassified and is downgraded. correct. Which of the following should be done to keep your home computer secure? Which of the following is NOT a type of malicious code? The email provides a link to a personnel portal where you must enter your personal information as part of an effort to standardize recordkeeping. Being cognizant of classification markings and labeling practices are good strategies to avoid inadvertent spillage. Which of the following is an example of a strong password? Which is it appropriate to have your security badge visible within a Sensitive Compartmented Information Facility (SCIF). It is getting late on Friday. Which Cyber Protection Condition (CPCON) establishes a protection priority focus on critical functions only? What should be done if you find classified Government Data/Information Not Cleared for Public Release on the Internet? What is the best response if you find classified government data on the internet? Which of the following is a practice that helps to prevent the download of viruses and other malicious code when checking your email? Which of the following is a practice that helps to protect you from identity theft? Use the classified network for all work, including unclassified work. How many indicators does this employee display? (Sensitive Information) What certificates are contained on the Common Access Card (CAC)? Verify the identity of all individuals.??? correct. Taking classified documents from your workspace. It contains certificates for identification, encryption, and digital signature. internet-quiz. A colleague asks to leave a report containing protected health information (PHI) on his desk overnight so he can continue working on it the next day. Write your password down on a device that only you access. Mark SCI documents appropriately and use an approved SCI fax machine. How many potential insider threat indicators does this employee display? Which of the following is NOT Protected Health Information (PHI)? What should be your response? A lock (LockA locked padlock) or https:// means youve safely connected to the .gov website. What is considered a mobile computing device and therefore shouldnt be plugged in to your Government computer? 4. Telework is only authorized for unclassified and confidential information. What should you do? Unusual interest in classified information. **Insider Threat What is an insider threat? What should be your response? Correct cyber-awareness. *Spillage. Use TinyURLs preview feature to investigate where the link leads. Directing you to a website that looks real. Which of the following is a good practice to avoid email viruses? Your password and a code you receive via text message. Use a common password for all your system and application logons. Let us know if this was helpful. THIS IS THE BEST ANSWER . PII, PHI, and financial information is classified as what type of information? A colleague is playful and charming, consistently wins performance awards, and is occasionally aggressive in trying to access classified information. Right-click the link and select the option to preview??? Assuming open storage is always authorized in a secure facility. Which of the following demonstrates proper protection of mobile devices? **Physical Security Within a secure area, you see an individual who you do not know and is not wearing a visible badge. **Social Engineering Which is a best practice that can prevent viruses and other malicious code from being downloaded when checking your e-mail? The CUI Registry is the Government-wide online repository for Federal-level guidance regarding CUI policy and practice. How are Trojan horses, worms, and malicious scripts spread? **Home Computer Security What should you consider when using a wireless keyboard with your home computer? How many potential insider threat indicators does this employee display? *Spillage What is a proper response if spillage occurs? **Social Networking What should you do if you receive a game application request that includes permission to access your friends, profile information, cookies, and sires visited? **Insider Threat Based on the description that follows, how many potential insider threat indicator(s) are displayed? Physically assess that everyone within listening distance is cleared and has a need-to-know for the information being discussed. Organizational Policy Not correct You believe that you are a victim of identity theft. What should you do after you have ended a call from a reporter asking you to confirm potentially classified information found on the web? It is permissible to release unclassified information to the public prior to being cleared. Remove security badge as you enter a restaurant or retail establishment. Which of the following is NOT one? After work hours, storing sensitive information in unlocked containers, desks, or cabinets if security is not present. **Classified Data Which of the following is true of protecting classified data? **Home Computer Security Which of the following is a best practice for securing your home computer? You check your bank statement and see several debits you did not authorize. *Sensitive Information Which of the following is an example of Protected Health Information (PHI)? Linda encrypts all of the sensitive data on her government issued mobile devices. **Classified Data Which of the following can an unauthorized disclosure of information classified as Confidential reasonably be expected to cause? This lets the service person know when the tank is "full." Classified information that should be unclassified and is downgraded. While it may seem safer, you should NOT use a classified network for unclassified work. Security Classification Guides (SCGs).??? **Mobile Devices Which is a rule for removable media, other portable electronic devices (PEDs), and mobile computing devices to protect Government systems? When using a fax machine to send sensitive information, the sender should do which of the following? Unclassified information cleared for public release. Position your monitor so that it is not facing others or easily observed by others when in use Correct. Controlled Unclassified Information (CUI) Purpose of the CUI Program. After you have returned home following the vacation. (Spillage) Which of the following is a best practice to protect information about you and your organization on social networking sites and applications? (Malicious Code) What is a common indicator of a phishing attempt? If classified information were released, which classification level would result in Exceptionally grave damage to national security? What should be your response? A program that segregates various types of classified information into distinct compartments for added protection and dissemination or distribution control. A colleague is playful and charming, consistently wins performance awards, and is occasionally aggressive in trying to access classified information. A person who does not have the required clearance or assess caveats comes into possession of SCI in any manner. JavaScript appears to be disabled on this computer. NARA has the authority and responsibility to manage the CUI Program across the Federal government. Press release data. What is an individual's Personally Identifiable Information (PII) or Protected Health Information (PHI) considered? What is a rule for removable media, other portable electronic devices (PEDs), and mobile computing devices to protect Government systems? The email has an attachment whose name contains the word secret. Which method would be the BEST way to send this information? It includes a threat of dire circumstances. not correct Refer the reporter to your organizations public affairs office. Attachments contained in a digitally signed email from someone known. How many potential insider threat indicators does this employee display? You many only transmit SCI via certified mail. The following practices help prevent viruses and the downloading of malicious code except. **Social Networking When is the safest time to post details of your vacation activities on your social networking profile? Q&A for work. T/F. Try this test to determine if it's considered unclassified, classified or protected, and check out tips on what to do and what not to do when working with sensitive information. (Mobile Devices) When can you use removable media on a Government system? -Its classification level may rise when aggregated. What is a valid response when identity theft occurs? What certificates are contained on the DoD Public Key Infrastructure (PKI) implemented by the Common Access Card (CAC)/Personal Identity Verification (PIV) card? Directives issued by the Director of National Intelligence. There is no way to know where the link actually leads. (Malicious Code) A coworker has asked if you want to download a programmers game to play at work. Filter by: All $ Off % Off Free Online Offline. When unclassified data is aggregated, its classification level may rise. *Controlled Unclassified Information Which of the following is NOT a correct way to protect CUI? *Sensitive Compartmented Information Which must be approved and signed by a cognizant Original Classification Authority (OCA)? You know this project is classified. The Registry is updated as agencies continue to submit governing authorities that authorize the protection and safeguarding of sensitive information. Which of the following is NOT an appropriate way to protect against inadvertent spillage? Retrieve classified documents promptly from printers. You must have your organization's permission to telework. (Spillage) When is the safest time to post details of your vacation activities on your social networking website? **Travel What security risk does a public Wi-Fi connection pose? Mark SCI documents appropriately and use an approved SCI fax machine. correct. Store your Common Access Card (CAC) or Personal Identity Verification (PIV) card in a shielded sleeve ~Write your password down on a device that only you access (e.g., your smartphone) Change your password at least every 3 months Enable two-factor authentication whenever available, even for personal accounts. How should you protect a printed classified document when it is not in use? a. What type of security is part of your responsibility and placed above all else?, If your wireless device is improperly configured someone could gain control of the device? *Insider Threat Which of the following is a reportable insider threat activity? Which of the following is an example of Protected Health Information (PHI)? Ensure proper labeling by appropriately marking all classified material and, when required, sensitive material. You receive an unexpected email from a friend: I think youll like this: https://tinyurl.com/2fcbvy. What action should you take? (Sensitive Compartmented Information) What describes how Sensitive Compartmented Information is marked? CPCON 3 (Medium: Critical, Essential, and Support Functions) Which of the following is a reportable insider threat activity? Which of the following is true of protecting classified data? What information most likely presents a security risk on your personal social networking profile? They can become an attack vector to other devices on your home network. They may be used to mask malicious intent. Upon connecting your Government-issued laptop to a public wireless connection, what should you immediately do? *Malicious Code Which of the following is NOT a way that malicious code spreads? How many potential insiders threat indicators does this employee display. Call your security point of contact immediately. Your password and the second commonly includes a text with a code sent to your phone. What action should you take? *Sensitive Compartmented Information What is a Sensitive Compartmented Information (SCI) program? Annual DoD Cyber Awareness Challenge Training, DOD Cyber Awareness Challenge 2019: Knowledge, DOD Cyber Awareness Challenge 2019 (DOD-IAA-V, Operations Management: Sustainability and Supply Chain Management, Elliot Aronson, Robin M. Akert, Samuel R. Sommers, Timothy D. Wilson, Anderson's Business Law and the Legal Environment, Comprehensive Volume, David Twomey, Marianne Jennings, Stephanie Greene. Which of the following practices reduces the chance of becoming a target by adversaries seeking insider information? What should you do? However, agency personnel and contractors should first consult their agency's CUI implementing policies and program management for guidance. Which of the following best describes a way to safely transmit Controlled Unclassified Information (CUI)? Which of the following can an unauthorized disclosure of information classified as Confidential reasonably be expected to cause? What security device is used in email to verify the identity of sender? Which of the following is a best practice to protect information about you and your organization on social networking sites and applications? A colleague complains about anxiety and exhaustion, makes coworkers uncomfortable by asking excessive questions about classified projects, and complain about the credit card bills that his wife runs up. If you receive a phone call from a stranger asking for information about your invoice payment process, you should: Crucial information about a user or organization can be gained through. Question 1: The business impact analysis (BIA) identifies the resources for which a business continuity plan (BCP) is necessary. *Malicious Code After visiting a website on your Government device, a popup appears on your screen. Discuss why gases, such as barbecue propane gas, are sold by mass and not by volume. Share sensitive information only on official, secure websites. (Spillage) What level of damage can the unauthorized disclosure of information classified as confidential reasonably be expected to cause? Ensure that the wireless security features are properly configured. (Sensitive Compartmented Information) Which of the following best describes the compromise of Sensitive Compartmented Information (SCI)? Ctrl+F (Cmd+F) will help you a lot when searching through such a large set of questions. Remove your security badge after leaving your controlled area or office building. **Classified Data Which of the following is a good practice to protect classified information? Bob, a coworker, has been going through a divorce, has financial difficulties and is displaying hostile behavior. correct. Appropriate clearance; signed and approved non-disclosure agreement; and need-to-know. Which designation marks information that does not have potential to damage national security? Always use DoD PKI tokens within their designated classification level.

Fatal Car Accident In California Recently, First Aid Beauty Expiration Date, Articles W

which of the following is true about unclassified data