*Spillage What should you do if you suspect spillage has occurred? A coworker wants to send you a sensitive document to review while you are at lunch and you only have your personal tablet. Maintain visual or physical control of the device. What should you do? Malicious code can do the following except? Using webmail may bypass built in security features. Permitted Uses of Government-Furnished Equipment (GFE). Do not access website links in e-mail messages. Use the classified network for all work, including unclassified work. **Identity management Which of the following is NOT a best practice to preserve the authenticity of your identity? The Chinese Spy Balloon Showdown The discovery of a Chinese surveillance balloon floating over the United States has added to the rising tensions between the two superpowers. Not correct Approved Security Classification Guide (SCG). Explain. Use TinyURLs preview feature to investigate where the link leads. What should be your response? Which of the following does NOT constitute spillage? Leaked classified or controlled information is still classified/controlled even if it has already been compromised. Which of the following is NOT an example of CUI? A colleague enjoys playing video games online, regularly use social media, and frequently forgets to secure her smartphone elsewhere before entering areas where it is prohibited. A 3%3\%3% penalty is charged for payment after 303030 days. How should you securely transport company information on a removable media? A coworker is observed using a personal electronic device in an area where their use is prohibited. Security Classification of Information, volume 2 (Quist), Chapter Seven Sanitized information gathered from personnel records. Log in for more information. Which of the following is true of protecting classified data? What certificates are contained on the Common Access Card (CAC)? Immediately notify your security point of contact. correct. Which of the following is a good practice for telework? What type of activity or behavior should be reported as a potential insider threat? Individuals must avoid referencing derivatively classified reports classified higher than the recipient.??? When unclassified data is aggregated, its classification level may rise. *Insider Threat Which of the following is a reportable insider threat activity? Always check to make sure you are using the correct network for the level of data. Do not use any personally owned/non-organizational removable media on your organizations systems. **Social Networking When may you be subject to criminal, disciplinary, and/or administrative action due to online misconduct? Course Introduction Introduction . What should the participants in this conversation involving SCI do differently? A person who does not have the required clearance or assess caveats comes into possession of SCI in any manner. Unauthorized Disclosure of Classified Information for DoD, Security Awareness: Derivative Classification Answers, CITI Ethics, Responsible Conduct, RCR, Law, HTH And IRB Answers, EVERFI Achieve Consumer Financial Education Answers, Security Pro: Chapter 3 (3.1.8) & 4.1 Security Policies Answers, CITI Module #3 Research in Public Elementary and Secondary Schools, Answers to CTS Unit 7 Lab 7-2: Protocols and Services SNMP, Google Analytics Individual Qualification Exam Answers, Everfi Module 4 Credit Scores Quiz Answers, Which Of The Following Is Not Considered A Potential Insider Threat Indicator. Memory sticks, flash drives, or external hard drives. Spillage can be either inadvertent or intentional. If possible, set your browser preferences to prompt you each time a website wants to store a cookie. What is a rule for removable media, other portable electronic devices (PEDs), and mobile computing devices to protect Government systems? Remove your security badge, common access card (CAC), or personal identity verification (PIV) card. Ensure proper labeling by appropriately marking all classified material and, when required, sensitive material. **Social Networking Which of the following best describes the sources that contribute to your online identity? not correct. How should you respond? *Spillage Which of the following actions is appropriate after finding classified information on the Internet? Which of the following is a best practice for handling cookies? A colleague removes sensitive information without seeking authorization in order to perform authorized telework. Which of the following is true of transmitting Sensitive Compartmented Information (SCI)? Secure .gov websites use HTTPS When unclassified data is aggregated, its classification level may rise. Federal agencies routinely generate, use, store, and share information that, while not meeting the threshold for classification as national security or atomic energy information, requires some level of protection from unauthorized access and release. A colleague has visited several foreign countries recently, has adequate work quality, speaks openly of unhappiness with U.S. foreign policy, and recently had his car repossessed. You many only transmit SCI via certified mail. Personal information is inadvertently posted at a website. When your vacation is over, after you have returned home. Which of the following best describes wireless technology? Which designation includes Personally Identifiable Information (PII) and Protected Health Information (PHI)? 4. You have reached the office door to exit your controlled area. *Sensitive Compartmented Information What should the owner of this printed SCI do differently? We recommend Norton Security or McAfee Total Protection. Before long she has also purchased shoes from several other websites. A coworker has asked if you want to download a programmers game to play at work. While it may seem safer, you should NOT use a classified network for unclassified work. Which of the following is a good practice to protect classified information? Where. Filter by: All $ Off % Off Free Online Offline. (Malicious Code) What is a common indicator of a phishing attempt? Please click here to see any active alerts. Store classified data appropriately in a GSA-approved vault/container when not in use. PII, PHI, and financial information is classified as what type of information? Which of these is true of unclassified data? Reviewing and configuring the available security features, including encryption. Correct. Which of the following information is a security risk when posted publicly on your social networking profile? (Insider Threat) Based on the description that follows, how many potential insider threat indicator(s) are displayed? It is created or received by a healthcare provider, health plan, or employer. New interest in learning another language? -Its classification level may rise when aggregated. Which is NOT a way to protect removable media? **Insider Threat What is an insider threat? *Sensitive Information What is the best example of Personally Identifiable Information (PII)? You know this project is classified. Seeker - Vacancy - Detail Overview Log in for more information. cyber. Which type of information includes personal, payroll, medical, and operational information? Decline to let the person in and redirect her to security. Report the crime to local law enforcement. -TRUE What action is recommended when somebody calls you to inquire about your work environment or specific account information? Carrying his Social Security Card with him, DoD employees are prohibited from using a DoD CAC in card-reader-enabled public device, Assigned a classification level by a supervisor. Unclassified information cleared for public release. Attempt to change the subject to something non-work related, but neither confirm nor deny the article's authenticity. Secure it to the same level as Government-issued systems. Which of the following statements is true? Attempting to access sensitive information without need-to-know, Avoid talking about work outside of the workplace or with people without a need-to-know, Report the suspicious behavior in accordance with their organizations insider threat policy. T/F. Which of the following is NOT true concerning a computer labeled SECRET? Controlled Unclassified Information (CUI) is informationthat requires safeguarding or dissemination controls consistent with applicable laws, regulations, and Government-wide policies, but is not classified under Executive Order 13526 "Classified National Security Informat What are examples of CUI? What information most likely presents a security risk on your personal social networking profile? The CAC/PIV is a controlled item and contains certificates for: An individual who has attempted to access sensitive information without need-to-know and has made unusual requests for sensitive information is displaying indicators of what? **Insider Threat Which of the following is NOT considered a potential insider threat indicator? Which scenario might indicate a reportable insider threat security incident? Discuss why gases, such as barbecue propane gas, are sold by mass and not by volume. (Malicious Code) What are some examples of malicious code? Hostility or anger toward the United States and its policies. An official website of the United States government. That trust is bounded by the Oath of Office we took willingly. Use TinyURL's preview feature to investigate where the link leads. **Mobile Devices Which of the following helps protect data on your personal mobile devices? Based on the description that follows, how many potential insider threat indicator (s) are displayed? Which of the following is true about unclassified data? Immediately notify your security point of contact. Click the card to flip Flashcards Learn Test Match Created by Jamie_Lancaster Terms in this set (24) Your password and a code you receive via text message. -TRUE The use of webmail is -is only allowed if the organization permits it Using webmail may bypass built in security features. (Spillage) What should you do if a reporter asks you about potentially classified information on the web? DOD Cyber Awareness Challenge 2019 Flashcards | Quizlet (Spillage) Which of the following is a good practice to aid in preventing spillage? Security Classification Guides (SCGs).??? Which of the following is a clue to recognizing a phishing email? Store your Common Access Card (CAC) or Personal Identity Verification (PIV) card in a shielded sleeve ~Write your password down on a device that only you access (e.g., your smartphone) Change your password at least every 3 months Enable two-factor authentication whenever available, even for personal accounts. How can you guard yourself against Identity theft? Which of the following is NOT one? If you participate in or condone it at any time. Attempt to change the subject to something non-work related, but neither confirm nor deny the articles authenticity. (Spillage) Which of the following practices may reduce your appeal as a target for adversaries seeking to exploit your insider status? (Spillage) What should you do when you are working on an unclassified system and receive an email with a classified attachment? Appropriate clearance, a signed and approved non-disclosure agreement, and need-to-know, Insiders are given a level of trust and have authorized access to Government information systems. A coworker removes sensitive information without approval. Back To Business I.T. on LinkedIn: #mfa #2fa #multifactorauthentication 1.1.1 Spillage. you don't need to do anything special to protect this information Correct. *Spillage What should you do if a reporter asks you about potentially classified information on the web? Which method would be the BEST way to send this information? PDF IFS0026 Student Guide - CDSE Solved QUESTION 1 The business impact analysis (BIA) - Chegg Which of the following is NOT considered sensitive information? Which of these is true of unclassified data?-It must be released to the public immediately.-Its classification level may rise when aggregated. When using your government-issued laptop in public environments, with which of the following should you be concerned? Alexa May, director of accounts, received a bill for $648\$648$648, dated April 666, with sales terms 2/10,1/15,n/302/10, 1/15, n/302/10,1/15,n/30. Which of the following does NOT constitute spillage? Attempting to access sensitive information without need-to-know. Search for an answer or ask Weegy. What action should you take? Which of the following can an unauthorized disclosure of information classified as Confidential reasonably be expected to cause? A Coworker has asked if you want to download a programmers game to play at work. What is a best practice to protect data on your mobile computing device? **Travel Which of the following is true of traveling overseas with a mobile phone? Unclassified is a security classification assigned to official information that does not warrant the assignment of Confidential, Secret, or Top Secret markings but which is not publicly-releasable without authorization. Controlled Unclassified Information (CUI) Purpose of the CUI Program. It displays a label showing maximum classification, date of creation, point of contact, and Change Management 9CM) Control Number. Which is it appropriate to have your security badge visible within a Sensitive Compartmented Information Facility (SCIF). A lock (LockA locked padlock) or https:// means youve safely connected to the .gov website. Avoid using non-Bluetooth-paired or unencrypted wireless computer peripherals. Sensitive information may be stored on any password-protected system. You should remove and take your CAC/PIV card whenever you leave your workstation. You believe that you are a victim of identity theft. You receive an inquiry from a reporter about government information not cleared for public release. Linda encrypts all of the sensitive data on her government issued mobile devices. Which of the following is a good practice to avoid email viruses? Always use DoD PKI tokens within their designated classification level. JavaScript appears to be disabled on this computer. A colleague complains about anxiety and exhaustion, makes coworkers uncomfortable by asking excessive questions about classified projects, and complain about the credit card bills that his wife runs up. Which of the following should you NOT do if you find classified information on the internet? Ask them to verify their name and office number. What portable electronic devices (PEDs) are permitted in a SCIF? Which of the following is NOT a typical means for spreading malicious code? *Sensitive Compartmented Information When should documents be marked within a Sensitive Compartmented Information Facility (SCIF). Media containing Privacy Act information, PII, and PHI is not required to be labeled. After you have returned home following the vacation. E-mailing your co-workers to let them know you are taking a sick day. Attempt to change the subject to something non-work related, but neither confirm nor deny the articles authenticity. Information should be secured in a cabinet or container while not in use. *Sensitive Compartmented Information What should the participants in this conversation involving SCI do differently? Press release data. They may be used to mask malicious intent. They can be part of a distributed denial-of-service (DDoS) attack. The following table lists the number of drivers in the United States, the number of fatal accidents, and the number of total accidents in each age group in 2002. What should you consider when using a wireless keyboard with your home computer? BMW crash victim Alaa Al-Siddiq was on Cotswolds birthday weekend