Appropriate clearance; signed and approved non-disclosure agreement; and need-to-know. a. What amount is due if Alexa pays on or betwee n April 222222 and May 666? Which of the following is an example of a strong password? NARA has the authority and responsibility to manage the CUI Program across the Federal government. Don't talk about work outside your workspace unless it is a specifically designated public meeting environment and is controlled by the event planners. What is the danger of using public Wi-Fi connections? Reviewing and configuring the available security features, including encryption. Search by Location. (Spillage) What type of activity or behavior should be reported as a potential insider threat? After clicking on a link on a website, a box pops up and asks if you want to run an application. Which of the following is NOT sensitive information? How can you protect your information when using wireless technology? Use the classified network for all work, including unclassified work. ?Access requires Top Secret clearance and indoctrination into SCI program.??? When using a fax machine to send sensitive information, the sender should do which of the following? #1) Open WEKA and select "Explorer" under 'Applications'. *Malicious Code After visiting a website on your Government device, a popup appears on your screen. Which of the following is NOT a type of malicious code? Figure 1. A Back up your data: This will help you recover your data if it's lost or corrupted. What is a possible indication of a malicious code attack in progress? *Spillage A user writes down details marked as Secret from a report stored on a classified system and uses those details to draft a briefing on an unclassified system without authorization. -Classified information that should be unclassified and is downgraded. What should you do? What certificates are contained on the Common Access Card (CAC)? You should remove and take your CAC/PIV card whenever you leave your workstation. DOD Cyber Awareness 2021 (DOD-IAA-V18.0) Know, RT202: Ch. Call your security point of contact immediately. Mark SCI documents appropriately and use an approved SCI fax machine. However, agency personnel and contractors should first consult their agency's CUI implementing policies and program management for guidance. (Malicious Code) A coworker has asked if you want to download a programmers game to play at work. *Spillage Which of the following is a good practice to prevent spillage? Using NIPRNet tokens on systems of higher classification level. (Malicious Code) What are some examples of removable media? Correct. Follow procedures for transferring data to and from outside agency and non-Government networks. **Insider Threat What function do Insider Threat Programs aim to fulfill? What level of damage can the unauthorized disclosure of information classified as Top Secret reasonably be expected to cause? What should the participants in this conversation involving SCI do differently? It is created or received by a healthcare provider, health plan, or employer. A colleague has won 10 high-performance awards, can be playful and charming, is not currently in a relationship, and is occasionally aggressive in trying to access sensitive information. Remove security badge as you enter a restaurant or retail establishment. (Spillage) Which of the following practices may reduce your appeal as a target for adversaries seeking to exploit your insider status? *Sensitive Information Under what circumstances could classified information be considered a threat to national security? It is getting late on Friday. This task is performed with the aim of finding similarities in data points and grouping similar data points together. Confirm the individuals need-to-know and access. Ctrl+F (Cmd+F) will help you a lot when searching through such a large set of questions. They provide guidance on reasons for and duration of classification of information. (Physical Security) which Cyberspace Protection Condition (CPCON) establishes a protection priority focus on critical and essential functions only? What certificates are contained on the DoD Public Key Infrastructure (PKI) implemented by the Common Access Card (CAC)/Personal Identity Verification (PIV) card? (Travel) Which of the following is a concern when using your Government-issued laptop in public? Proactively identify potential threats and formulate holistic mitigation responses. When your vacation is over, after you have returned home. When checking in at the airline counter for a business trip, you are asked if you would like to check your laptop bag. What can you do to protect yourself against phishing? **Social Networking What should you do if you receive a game application request that includes permission to access your friends, profile information, cookies, and sites visited? Log in for more information. Refer the vendor to the appropriate personnel. Someone who uses authorized access, wittingly or unwittingly, to harm national security through unauthorized disclosure or other actions that may cause the loss or degradation of resources or capabilities. This lets the service person know when the tank is "full." **Use of GFE When can you check personal e-mail on your Government-furnished equipment (GFE)? Connect to the Government Virtual Private Network (VPN).?? They can become an attack vector to other devices on your home network. Which of the following is NOT an example of Personally Identifiable Information (PII)? Which of the following is NOT a criterion used to grant an individual access to classified data? **Social Networking Which of the following information is a security risk when posted publicly on your social networking profile? Correct. A colleague vacations at the beach every year, is married and a father of four, sometimes has poor work quality, and works well with his team. Which of the following statements is NOT true about protecting your virtual identity? A .gov website belongs to an official government organization in the United States. *Controlled Unclassified Information Which is a best practice for protecting Controlled Unclassified Information (CUI)? A user writes down details from a report stored on a classified system marked as Secret and uses those details to draft an unclassified briefing on an unclassified system without authorization. What information posted publicly on your personal social networking profile represents a security risk? Debra ensures not correct Remove and take it with you whenever you leave your workstation. Not correct. *Spillage What is a proper response if spillage occurs? Were mitochondria as abundant in human epithelial cells as in onion epidermal cells (procedure 4.6)? c. What similarities and differences are there between plant and animal cells? difficult life circumstances such as substance abuse, divided loyalty or allegiance to the U.S., and extreme, persistent interpersonal difficulties. Government-owned PEDs, if expressly authorized by your agency. What type of activity or behavior should be reported as a potential insider threat? Please click here to see any active alerts. Correct. There are no choices provides which make it hard to pick the untrue statement about unclassified data. **Identity management Which of the following is an example of a strong password? It contains certificates for identification, encryption, and digital signature. What should you do to protect yourself while on social networks? *Spillage What should you do if you suspect spillage has occurred? Which of the following is NOT a typical means for spreading malicious code? Do not use any personally owned/non-organizational removable media on your organizations systems. Follow procedures for transferring data to and from outside agency and non-Government networks. A coworker uses a personal electronic device in a secure area where their use is prohibited. Keep your operating system and software up to date: This will help patch any security vulnerabilities in your software. Which of the following is NOT considered a potential insider threat indicator? What level of damage can the unauthorized disclosure of information classified as confidential reasonably be expected to cause? The email provides a website and a toll-free number where you can make payment. How should you respond? Correct. Which of the following does NOT constitute spillage? Phishing can be an email with a hyperlink as bait. Decline to let the person in and redirect her to security. Select the information on the data sheet that is personally identifiable information (PII). What should you do if someone asks to use your government issued mobile device (phone/laptop..etc)? (Malicious Code) Which are examples of portable electronic devices (PEDs)? Which of the following should you do immediately? February 8, 2022. The date of full implementation of the CUI Program will be announced by the EPAs CUI Senior Agency Official (CUI SAO) and updated here on EPAs public web page. Which of these is true of unclassified data? *Classified Data Classified material must be appropriately marked. Discuss why gases, such as barbecue propane gas, are sold by mass and not by volume. Which of the following actions is appropriate after finding classified Government information on the internet? **Social Engineering What is TRUE of a phishing attack? Which of the following should you NOT do if you find classified information on the internet? The email provides a link to a personnel portal where you must enter your personal information as part of an effort to standardize recordkeeping. New answers. -It never requires classification markings. Be aware of classification markings and all handling caveats. Which Cyber Protection Condition (CPCON) establishes a protection priority focus on critical functions only? **Physical Security At which Cyberspace Protection Condition (CPCON) is the priority focus on critical functions only? What is the basis for the handling and storage of classified data? What should you do? Classified material must be appropriately marked. Secure it to the same level as Government-issued systems. Which of the following statements is TRUE about the use of DoD Public Key Infrastructure (PKI) tokens? *Sensitive Information Which of the following is the best example of Personally Identifiable Information (PII)? Learn more about Teams **Classified Data Which of the following can an unauthorized disclosure of information classified as Confidential reasonably be expected to cause? Executive Order 13556, Controlled Unclassified Information, requires the Executive Branch to establish an open and uniform program for managing [unclassified] information that requires safeguarding or dissemination controls pursuant to and consistent with laws, regulations, and Government-wide policies. The National Archives and Records Administration (NARA) was named the Executive Agent (EA) responsible for overseeing the CUI Program. When operationally necessary, owned by your organization, and approved by the appropriate authority. Adversaries exploit social networking sites to disseminate fake news Correct. Which of the following is true of protecting classified data?
Rapid Assault Tactics Near Me,
Washington Middle School Vice Principal,
Articles W