Validate friend requests through another source before confirming them. As long as the document is cleared for public release, you may release it outside of DoD. If classified information were released, which classification level would result in Exceptionally grave damage to national security? The answer has been confirmed to be correct. At EPA, the CUI Program is housed in the Libraries and Accessibility Division (LAD) within the Office of Mission Supports (OMS), Office of Enterprise Information Programs (OEIP). Ensure that any cameras, microphones, and Wi-Fi embedded in the laptop are physically disabled.- Correct. It does not require markings or distribution controls. Which of the following is true of protecting classified data? Executive Order 13556, Controlled Unclassified Information, requires the Executive Branch to establish an open and uniform program for managing [unclassified] information that requires safeguarding or dissemination controls pursuant to and consistent with laws, regulations, and Government-wide policies. The National Archives and Records Administration (NARA) was named the Executive Agent (EA) responsible for overseeing the CUI Program. Be aware of classification markings and all handling caveats. Found a mistake? Use only personal contact information when establishing your personal account. Which of the following should be reported as a potential security incident? What Is True About Unclassified Information *Spillage After reading an online story about a new security project being developed on the military installation where you work, your neighbor asks you to comment about the article. That trust is bounded by the Oath of Office we took willingly. Unclassified is a security classification assigned to official information that does not warrant the assignment of Confidential, Secret, or Top Secret markings but which is not publicly-releasable without authorization. Cyber Awareness 2020 Knowledge Check Flashcards | Quizlet Search the Registry: Categories, Markings and Controls: Category list CUI markings A man you do not know is trying to look at your Government-issued phone and has asked to use it. Based on the description that follows, how many potential insider threat indicator(s) are displayed? You should only accept cookies from reputable, trusted websites. This lets the service person know when the tank is "full." Original classification authority Correct. Which Cyber Protection Condition (CPCON) establishes a protection priority focus on critical functions only? Social Security Number; date and place of birth; mothers maiden name. ~All documents should be appropriately marked, regardless of format, sensitivity, or classification. Being cognizant of classification markings and labeling practices are good strategies to avoid inadvertent spillage. **Insider Threat Based on the description that follows, how many potential insider threat indicator(s) are displayed? What is required for an individual to access classified data? Log in for more information. Ensure there are no identifiable landmarks visible in any photos taken in a work setting that you post. Remove your security badge after leaving your controlled area or office building. CUI is an umbrella term that encompasses many different markings toidentifyinformationthat is not classified but which should be protected. How can you avoid downloading malicious code? What type of social engineering targets particular individuals, groups of people, or organizations? Teams. With WEKA users, you can access WEKA sample files. Use your own security badge, key code, or Common Access Card (CAC)/Personal Identity Verification (PIC) card. Any time you participate in or condone misconduct, whether offline or online. Use the government email system so you can encrypt the information and open the email on your government issued laptop. A medium secure password has at least 15 characters and one of the following. Neither confirm or deny the information is classified. Your password and a code you receive via text message. Which of the following is a best practice to protect information about you and your organization on social networking sites and applications? What information relates to the physical or mental health of an individual? Assuming open storage is always authorized in a secure facility. **Insider Threat What advantages do insider threats have over others that allows them to cause damage to their organizations more easily? What should you do? A colleague is playful and charming, consistently wins performance awards, and is occasionally aggressive in trying to access classified information. After work hours, storing sensitive information in unlocked containers, desks, or cabinets if security is not present. However, unclassified data. f. Get an answer. (Insider Threat) Based on the description that follows, how many potential insider threat indicator(s) are displayed? After clicking on a link on a website, a box pops up and asks if you want to run an application. (Malicious Code) Which of the following is NOT a way that malicious code spreads? **Social Networking Which piece if information is safest to include on your social media profile? Dont allow other access or to piggyback into secure areas. You many only transmit SCI via certified mail. Store it in a GSA approved vault or container. (Malicious Code) Which are examples of portable electronic devices (PEDs)? What should you do after you have ended a call from a reporter asking you to confirm potentially classified info found on the web? **Insider Threat Based on the description that follows, how many potential insider threat indicator(s) are displayed? **Insider Threat Based on the description that follows, how many potential insider threat indicator(s) are displayed? Which of the following is NOT an example of CUI? *Classified Data (Spillage) After reading an online story about a new security project being developed on the military installation where you work, your neighbor asks you to comment about the article. what should you do? Only documents that are classified Secret, Top Secret, or SCI require marking. **Use of GFE When can you check personal e-mail on your Government-furnished equipment (GFE)? You can email your employees information to yourself so you can work on it this weekend and go home now. **Classified Data Which of the following is true of telework? Which is a risk associated with removable media? Which of the following is true of protecting classified data PDF Unauthorized Disclosure of Classified Information and Controlled - CDSE Which is NOT a way to protect removable media? Note That The Integers Should Be Type Cast To Doubles. a. putting a child in time-out How can you protect your information when using wireless technology? How should you protect your Common Access Card (CAC) or Personal Identity Verification (PIV) card? Position your monitor so that it is not facing others or easily observed by others when in use Correct. Adversaries exploit social networking sites to disseminate fake news. *Spillage Which of the following actions is appropriate after finding classified information on the Internet? February 8, 2022. **Mobile Devices Which is a rule for removable media, other portable electronic devices (PEDs), and mobile computing devices to protect Government systems? **Classified Data Which classification level is given to information that could reasonably be expected to cause serious damage to national security? Which of the following is an example of two-factor authentication? A program that segregates various type of classified information into distinct compartments for added protection and dissemination for distribution control. What should you do to protect classified data? A colleague vacations at the beach every year, is married and a father of four, sometimes has poor work quality, and works well with his team. Is it permitted to share an unclassified draft document with a non-DoD professional discussion group? Search Confirm the individuals need-to-know and access. Federal agencies routinely generate, use, store, and share information that, while not classified, still requires some level of protection from unauthorized access and release. A colleague removes sensitive information without seeking authorization in order to perform authorized telework. Which of the following best describes wireless technology? How many potential insider threat indicators is Bob displaying? You are having lunch at a local restaurant outside the installation, and you find a cd labeled favorite song. . What level of damage to national security could reasonably be expected if unauthorized disclosure of Top Secret information occurred? After you have returned home following the vacation. How many potential insider threat indicators does this employee display? The EPA will phase out legacy markings and safeguarding practices as implementation proceeds. What information should you avoid posting on social networking sites? Which of the following is a practice that helps to prevent the download of viruses and other malicious code when checking your email? Ensure proper labeling by appropriately marking all classified material and, when required, sensitive material. Ensure proper labeling by appropriately marking all classified material and, when required, sensitive material. It is getting late on Friday. What action should you take? Never write down the PIN for your CAC. What is a way to prevent the download of viruses and other malicious code when checking your e-mail? What information most likely presents a security risk on your personal social networking profile? c. What similarities and differences are there between plant and animal cells? Others may be able to view your screen. Exceptionally grave damage. (Spillage) What is required for an individual to access classified data? **Identity Management Your DoD Common Access Card (CAC) has a Public Key Infrastructure (PKI) token approved for access to the NIPRNet. What should you do? Should you always label your removable media? *Sensitive Compartmented Information When should documents be marked within a Sensitive Compartmented Information Facility (SCIF). Which of the following represents a good physical security practice? You receive an unexpected email from a friend: "I think you'll like this: (URL)" What action should you take? **Mobile Devices What can help to protect the data on your personal mobile device? (Malicious Code) What is a common indicator of a phishing attempt? Which of the following is a best practice to protect information about you and your organization on social networking sites and applications? Which of the following statements is TRUE about the use of DoD Public Key Infrastructure (PKI) tokens? What action should you take? *Sensitive Information Under which circumstances is it permitted to share an unclassified draft document with a non-DoD professional discussion group? Badges must be visible and displayed above the waist at all times when in the facility. Which may be a security issue with compressed urls? Which type of information includes personal, payroll, medical, and operational information? Linda encrypts all of the sensitive data on her government issued mobile devices. -It must be released to the public immediately. What kind of information could reasonably be expected to cause serious damage to national security in the event of unauthorized disclosure? Who is responsible for information/data security? If possible, set your browser preferences to prompt you each time a website wants to store a cookie. It includes a threat of dire circumstances. Which of the following is a clue to recognizing a phishing email? What information posted publicly on your personal social networking profile represents a security risk? Which of these is true of unclassified data? All of these. Someone calls from an unknown number and says they are from IT and need some information about your computer. All https sites are legitimate. Senior government personnel, military or civilian. (social networking) When may you be subjected to criminal, disciplinary, and/or administrative action due to online misconduct? *Insider Threat Which of the following is a potential insider threat indicator? Select the information on the data sheet that is personally identifiable information (PII). Do not use any personally owned/non-organizational removable media on your organizations systems. Unusual interest in classified information. How many potential insiders threat indicators does this employee display? How can you protect yourself on social networking sites? Create separate user accounts with strong individual passwords. General Services Administration (GSA) approval. asked in Internet by voice (265k points) Question : Which of the following is true about unclassified data? Correct, Someone who uses authorized access, wittingly or unwittingly, to harm national security through unauthorized disclosure or other actions that may cause the loss or degradation of resources or capabilities. The email has an attachment whose name contains the word secret. Spillage can be either inadvertent or intentional. Follow procedures for transferring data to and from outside agency and non-Government networks. Back To Business I.T. on LinkedIn: #mfa #2fa #multifactorauthentication Which of the following is NOT a typical result from running malicious code? How do you respond? What function do Insider Threat Programs aim to fulfill? Only expressly authorized government-owned PEDs. What type of security is part of your responsibility and placed above all else?, If your wireless device is improperly configured someone could gain control of the device? **Identity management Which of the following is an example of a strong password? *Sensitive Compartmented Information Which must be approved and signed by a cognizant Original Classification Authority (OCA)? Correct. Aggregating it does not affect its sensitivyty level. What is a possible indication of a malicious code attack in progress? Managing government information when working remotely Even within a secure facility, dont assume open storage is permitted. What is NOT Personally Identifiable Information (PII)? Which of the following is true of using DoD Public key Infrastructure (PKI) token? Which of the following demonstrates proper protection of mobile devices? Which of the following does not constitute spillage. **Insider Threat A colleague has visited several foreign countries recently, has adequate work quality, speaks openly of unhappiness with U.S. foreign policy, and recently had his car repossessed. We recommend Norton Security or McAfee Total Protection. Which of the following is NOT an appropriate way to protect against inadvertent spillage? Leaked classified or controlled information is still classified/controlled even if it has already been compromised. Looking for https in the URL. Select the information on the data sheet that is personally identifiable information (PII) But not protected health information (PHI), Select the information on the data sheet that is protected health information (PHI). The following practices help prevent viruses and the downloading of malicious code except. (Malicious Code) Which email attachments are generally SAFE to open? **Social Networking Which of the following is a security best practice when using social networking sites? Note any identifying information, such as the websites URL, and report the situation to your security POC. Your favorite movie. Follow instructions given only by verified personnel. Rating. Correct. Which of these is true of unclassified data?-It must be released to the public immediately.-Its classification level may rise when aggregated. (1) A strategic plan documenting the overall conduct of a war. Make note of any identifying information and the website URL and report it to your security office. Maybe. In which situation below are you permitted to use your PKI token? which of the following is true about unclassified data Since the URL does not start with https, do not provide your credit card information. Which of the following is NOT a correct way to protect sensitive information? A colleague has visited several foreign countries recently, has adequate work quality, speaks openly of unhappiness with U.S. foreign policy, and recently had his car repossessed. Controlled Unclassified Information (CUI) is information that requires safeguarding or dissemination controls consistent with applicable laws, regulations, and Government-wide policies, but is not classified under Executive Order 13526 "Classified National Security Informat What are examples of CUI? (Sensitive Compartmented Information) Which of the following best describes the compromise of Sensitive Compartmented Information (SCI)? #1) Open WEKA and select "Explorer" under 'Applications'. true-statement. Which of the following best describes a way to safely transmit Controlled Unclassified Information (CUI)? not correct Which of the following demonstrates proper protection of mobile devices? Unknown data is categorized by the system; an analyst then reviews the results You know that this project is classified. A colleague enjoys playing video games online, regularly use social media, and frequently forgets to secure her smartphone elsewhere before entering areas where it is prohibited. Which of the following is NOT an example of Personally Identifiable Information (PII)? Which of the following is a reportable insider threat activity? Figure 1. Which method would be the BEST way to send this information? *Sensitive Compartmented Information What must the dissemination of information regarding intelligence sources, methods, or activities follow? Which of the following information is a security risk when posted publicly on your social networking profile? 1.1.1 Spillage.