Ensure proper labeling by appropriately marking all classified material and, when required, sensitive material. (Spillage) What advantages do insider threats have over others that allows them to cause damage to their organizations more easily? What action should you take? Reviewing and configuring the available security features, including encryption. Correct. Controlled Unclassified Information (CUI) Purpose of the CUI Program. Which of the following is NOT considered sensitive information? (Sensitive Compartmented Information) What portable electronic devices (PEDs) are allow in a Secure Compartmented Information Facility (SCIF)? What should you do? Seeker - Vacancy - Detail Overview Be aware of classification markings and all handling caveats. It does not require markings or distribution controls. Which of the following is true of internet hoaxes? (Spillage) Which of the following practices may reduce your appeal as a target for adversaries seeking to exploit your insider status? Changes to various data systems that store and sometimes share sensitive information outside EPA. What would you do if you receive a game application request on your government computer that includes permission to access your friends, profile information, cookies, and sites visited? Linda encrypts all of the sensitive data on her government-issued mobile devices. Note the websites URL and report the situation to your security point of contact. What is a rule for removable media, other portable electronic devices (PEDs), and mobile computing devices to protect Government systems? (Malicious Code) Which email attachments are generally SAFE to open? Always take your CAC when you leave your workstation. *Sensitive Compartmented Information Which of the following best describes the compromise of Sensitive Compartmented Information (SCI)? How many potential insiders threat indicators does this employee display? The email provides a link to a personnel portal where you must enter your personal information as part of an effort to standardize recordkeeping. What action should you take first? Some examplesyou may be familiar with: TheFederalCUI Registry,shows authorized categoriesandassociated markings, as well as applicable safeguarding, dissemination, and decontrol procedures. Select the information on the data sheet that is personally identifiable information (PII). What should you do? BMW crash victim Alaa Al-Siddiq was on Cotswolds birthday weekend What Should You Do When Working On An Unclassified System And Receive **Website Use While you are registering for a conference, you arrive at the website http://www.dcsecurityconference.org/registration/. Like the number of people in a class, the number of fingers on your hands, or the number of children someone has. ALways mark classified information appropriately and retrieve classified documents promptly from the printer. **Insider Threat How many potential insider threat indicators does a coworker who often makes others uneasy by being persistent in trying to obtain information about classified projects to which he has no access, is boisterous about his wife putting them in credit card debt, and often complains about anxiety and exhaustion display? Coworker making consistent statements indicative of hostility or anger toward the United States and its policies. **Social Engineering Which of the following is a practice that helps to prevent the download of viruses and other malicious code when checking your email? -TRUE The use of webmail is -is only allowed if the organization permits it Using webmail may bypass built in security features. **Insider Threat What type of activity or behavior should be reported as a potential insider threat? What is an individual's Personally Identifiable Information (PII) or Protected Health Information (PHI) considered? which of the following is true about unclassified data - Weegy What should the participants in this conversation involving SCI do differently? E-mailing your co-workers to let them know you are taking a sick day. What should you do? **Classified Data Which of the following can an unauthorized disclosure of information classified as Confidential reasonably be expected to cause? While it may seem safer, you should NOT use a classified network for unclassified work. (controlled unclassified information) Which of the following is NOT correct way to protect CUI? Under What Circumstances Could Unclassified? Since the URL does not start with https, do not provide your credit card information. Retrieve classified documents promptly from printers. A colleague has won 10 high-performance awards, can be playful and charming, is not currently in a relationship, and is occasionally aggressive in trying to access sensitive information. Assuming open storage is always authorized in a secure facility. Since the URL does not start with https, do not provide you credit card information. Learn more about Teams Which of the following is true of telework? Thiswill enabletimely and consistent informationsharing andincreasetransparency throughout the Federal government and with non-Federal stakeholders. *Spillage Which of the following is a good practice to prevent spillage? (Spillage) Which of the following is a good practice to aid in preventing spillage? **Insider Threat Which scenario might indicate a reportable insider threat? internet. Use your own security badge, key code, or Common Access Card (CAC)/Personal Identity Verification (PIC) card. Cyber Awareness Challenge Knowledge Check 2023 Answers, Cyber Awareness Challenge 2022 Knowledge Check Answers. When using a public device with a card reader, only use your DoD CAC to access unclassified information, is only allowed if the organization permits it. not correct The Following Is True About Unclassified Data - faqcourse.com NARA has the authority and responsibility to manage the CUI Program across the Federal government. Public service, notably service in the United States Department of Defense or DoD, is a public trust. When may you be subject to criminal, disciplinary, and/or administrative action due to online harassment, bullying, stalking, hazing, discrimination, or retaliation? How are Trojan horses, worms, and malicious scripts spread? (Sensitive Information) Which of the following is true about unclassified data? What should you consider when using a wireless keyboard with your home computer? (1) A strategic plan documenting the overall conduct of a war. A colleague saves money for an overseas vacation every year, is a . How should you protect your Common Access Card (CAC) or Personal Identity Verification (PIV) card? Press release data. Were mitochondria as abundant in human epithelial cells as in onion epidermal cells (procedure 4.6)? Physical security of mobile phones carried overseas is not a major issue. *Malicious Code After visiting a website on your Government device, a popup appears on your screen. What should you do to protect yourself while on social networks? What is a best practice to protect data on your mobile computing device? Your health insurance explanation of benefits (EOB). Controlled unclassified information. Here you can find answers to the DoD Cyber Awareness Challenge. What is the best course of action? Not correct Have your permissions from your organization, follow your organization guideline, use authorized equipment and software, employ cyber security best practice, perform telework in dedicated when home. Found a mistake? Unauthorized Disclosure of Classified Information for DoD, Security Awareness: Derivative Classification Answers, CITI Ethics, Responsible Conduct, RCR, Law, HTH And IRB Answers, EVERFI Achieve Consumer Financial Education Answers, Security Pro: Chapter 3 (3.1.8) & 4.1 Security Policies Answers, CITI Module #3 Research in Public Elementary and Secondary Schools, Answers to CTS Unit 7 Lab 7-2: Protocols and Services SNMP, Google Analytics Individual Qualification Exam Answers, Everfi Module 4 Credit Scores Quiz Answers, Which Of The Following Is Not Considered A Potential Insider Threat Indicator. classified-document. If you participate in or condone it at any time. Store classified data appropriately in a GSA-approved vault/container. Maybe (Malicious Code) Which are examples of portable electronic devices (PEDs)? There is no way to know where the link actually leads. What can be used to track Marias web browsing habits? (Insider Threat) A colleague vacations at the beach every year, is married and a father of four, his work quality is sometimes poor, and he is pleasant to work with. Why might "insiders" be able to cause damage to their organizations more easily than others? *Sensitive Compartmented Information When is it appropriate to have your security badge visible? What information most likely presents a security risk on your personal social networking profile? You know this project is classified. Correct Immediately notify your security point of contact. Which is a way to protect against phishing attacks? When checking in at the airline counter for a business trip, you are asked if you would like to check your laptop bag. (Malicious Code) What is a common indicator of a phishing attempt? d. How do the size and shape of a human epithelial cell differ from those of the Elodea and onion cells that you examined earlier? A colleague has visited several foreign countries recently, has adequate work quality, speaks openly of unhappiness with U.S. foreign policy, and recently had his car repossessed. Spillage can be either inadvertent or intentional. A medium secure password has at least 15 characters and one of the following. You must have your organization's permission to telework c. You may use unauthorized software as long as your computer's antivirus software is up to date. A colleague complains about anxiety and exhaustion, makes coworkers uncomfortable by asking excessive questions about classified projects, and complains about the credit card bills that his wife runs up. **Social Engineering How can you protect yourself from internet hoaxes? A Common Access Card and Personal Identification Number. The annual Cyber Awareness Challenge is a course that helps authorized users learn how to best avoid and reduce threats and vulnerabilities in an organizations system. Use TinyURLs preview feature to investigate where the link leads. **Social Engineering Which may be a security issue with compressed Uniform Resource Locators (URLs)? **Insider Threat Which of the following should be reported as a potential security incident? (Malicious Code) What is a good practice to protect data on your home wireless systems? You can email your employees information to yourself so you can work on it this weekend and go home now. 1.1.2 Classified Data. Which of the following is NOT a good way to protect your identity? You receive an inquiry from a reporter about government information not cleared for public release. A coworker has left an unknown CD on your desk. *Spillage Which of the following is a good practice to aid in preventing spillage? Which of the following does NOT constitute spillage? **Use of GFE Under what circumstances is it acceptable to use your Government-furnished computer to check personal e-mail and do other non-work-related activities? Phishing can be an email with a hyperlink as bait. Try this test to determine if it's considered unclassified, classified or protected, and check out tips on what to do and what not to do when working with sensitive information. Her badge is not visible to you. It never requires classification markings, is true about unclassified data. Reviewing and configuring the available security features, including encryption. What should you do? Cyber Awareness Flashcards by Jedi Master | Brainscape Only paper documents that are in open storage need to be marked. **Insider Threat What do insiders with authorized access to information or information systems pose? Position your monitor so that it is not facing others or easily observed by others when in use Correct. Individuals must avoid referencing derivatively classified reports classified higher than the recipient.??? In which situation below are you permitted to use your PKI token? Telework is only authorized for unclassified and confidential information. Note the websites URL and report the situation to your security point of contact. When operationally necessary, owned by your organization, and approved by the appropriate authority. What should you do? Contents hide. **Physical Security At which Cyberspace Protection Condition (CPCON) is the priority focus on critical functions only? The following practices help prevent viruses and the downloading of malicious code except. How should you respond? Updated 8/5/2020 8:06:16 PM. CPCON 1 (Very High: Critical Functions) Connect and share knowledge within a single location that is structured and easy to search. Do not forward, read further, or manipulate the file; Do not give out computer or network information, Do not follow instructions from unverified personnel. **Use of GFE When can you check personal e-mail on your Government-furnished equipment (GFE)? The attributes of identified ground seeds are modified to ground points. Is this safe? Insiders are given a level of trust and have authorized access to Government information systems. After work hours, storing sensitive information in unlocked containers, desks, or cabinets if security is not present. (Sensitive Information) Which of the following is NOT an example of sensitive information? Ensure that any cameras, microphones, and Wi-Fi embedded in the laptop are physically disabled.- Correct. PDF IFS0026 Student Guide - CDSE Information should be secured in a cabinet or container while not in use. What should you do? Which Of The Following Is Not A Correct Way To Protect CUI. Which of the following may help to prevent inadvertent spillage? You have reached the office door to exit your controlled area. Paul verifies that the information is CUI, includes a CUI marking in the subject header, and digitally signs an e-mail containing CUI. As a security best practice, what should you do before exiting? **Insider Threat What advantages do insider threats have over others that allows them to cause damage to their organizations more easily? You believe that you are a victim of identity theft. Under what circumstances could unclassified information be considered a threat to national security? classified-document. Click the card to flip Flashcards Learn Test Match Created by Jamie_Lancaster Terms in this set (24) **Social Engineering Which of the following is a way to protect against social engineering? 10-3 X-ray Interaction with Matter, Fundamentals of Engineering Economic Analysis, David Besanko, Mark Shanley, Scott Schaefer. Unclassified is a security classification assigned to official information that does not warrant the assignment of Confidential, Secret, or Top Secret markings but which is not publicly-releasable without authorization. Which is NOT a way to protect removable media? Which of the following is NOT an example of sensitive information? A colleague has won 10 high-performance awards, can be playful and charming, is not currently in a relationship, and occasionally aggressive in trying to access sensitive information. Avoid talking about work outside of the workplace or with people without a need-to-know. Mark SCI documents appropriately and use an approved SCI fax machine. A coworker has asked if you want to download a programmers game to play at work. What information most likely presents a security risk on your personal social networking profile? Correct, Someone who uses authorized access, wittingly or unwittingly, to harm national security through unauthorized disclosure or other actions that may cause the loss or degradation of resources or capabilities. *Sensitive Compartmented Information What is a Sensitive Compartmented Information (SCI) program? (Spillage) What type of activity or behavior should be reported as a potential insider threat? When is it okay to charge a personal mobile device using government-furnished equipment (GFE)? Bob, a coworker, has been going through a divorce, has financial difficulties and is displaying hostile behavior. Approved Security Classification Guide (SCG). Immediately notify your security point of contact. correct. When unclassified data is aggregated, its classification level may rise. Which of the following is true about unclassified data? Which of the following represents a good physical security practice? By Quizzma Team / Technology. Which of the following is NOT a typical means for spreading malicious code? Memory sticks, flash drives, or external hard drives. Power off any mobile devices when entering a secure area. A colleague has visited several foreign countries recently, has adequate work quality, speaks openly of unhappiness with U.S. foreign policy, and recently had his car repossessed. Correct. Use only personal contact information when establishing personal social networking accounts, never use Government contact information. not correct. Exceptionally grave damage. Cyber Awareness Challenge Complete Questions and Answers Store it in a locked desk drawer after working hours. 1.1 Standard Challenge Answers. You many only transmit SCI via certified mail. *Sensitive Compartmented Information When should documents be marked within a Sensitive Compartmented Information Facility (SCIF). How should you protect a printed classified document when it is not in use? *Controlled Unclassified Information Which of the following best describes a way to safely transmit Controlled Unclassified Information (CUI)? Which of the following is not Controlled Unclassified Information (CUI)? Use TinyURL's preview feature to investigate where the link leads. What function do Insider Threat Programs aim to fulfill? Even within a secure facility, dont assume open storage is permitted. Use a common password for all your system and application logons. not correct Examples are: Patient names, Social Security numbers, Drivers license numbers, insurance details, and birth dates. Unknown data is categorized by the system; an analyst then reviews the results ~All documents should be appropriately marked, regardless of format, sensitivity, or classification. Enable automatic screen locking after a period of inactivity. Avoid using non-Bluetooth-paired or unencrypted wireless computer peripherals. Make note of any identifying information and the website URL and report it to your security office. Controlled Unclassified Information (CUI) | National Archives Which of the following is NOT Government computer misuse? Which of the following is NOT an example of CUI? Which of the following is NOT an appropriate way to protect against inadvertent spillage? What structures visible in the stained preparation were invisible in the unstained preparation? No, you should only allow mobile code to run from your organization or your organizations trusted sites. Which of the following is NOT true concerning a computer labeled SECRET? Which of the following is NOT a correct way to protect sensitive information? *Sensitive Compartmented Information What should the owner of this printed SCI do differently? Which of the following is true of Controlled Unclassified information (CUI)? Unclassified information can become a threat to national security. CUI must be handled using safeguarding or dissemination controls. (Spillage) What level of damage can the unauthorized disclosure of information classified as confidential reasonably be expected to cause? **Travel Which of the following is true of traveling overseas with a mobile phone? data. CUI may be stored only on authorized systems or approved devices. Correct. You know that this project is classified. How do you respond? Prudence faxes CUI using an Unclassified cover sheet via a Secret fax machine. Using NIPRNet tokens on systems of higher classification level. CUI includes, but is not limited to Controlled Technical Information (CTI), Personally Identifiable Information (PII), Protected Health Information (PHI), financial information, personal or payroll information, proprietary data and operational information. Decline to let the person in and redirect her to security. What should the owner of this printed SCI do differently? (GFE) When can you check personal e-mail on your Government-furnished equipment (GFE)? Upon connecting your Government-issued laptop to a public wireless connection, what should you immediately do? It is permissible to release unclassified information to the public prior to being cleared. Which of the following is true of Internet of Things (IoT) devices? CUI may be stored on any password-protected system. internet-quiz. A coworker uses a personal electronic device in a secure area where their use is prohibited. (Sensitive Information) What type of unclassified material should always be marked with a special handling caveat? *Spillage. Which of the following statements is NOT true about protecting your virtual identity? (Sensitive Information) What should you do if a commercial entity, such as a hotel reception desk, asks to make a photocopy of your Common Access Card (CAC) for proof of Federal Government employment?