Proactively identify potential threats and formulate holistic mitigation responses. you don't need to do anything special to protect this information Which of the following is NOT true concerning a computer labeled SECRET? CPCON 3 (Medium: Critical, Essential, and Support Functions) When your vacation is over, and you have returned home. (Spillage) When classified data is not in use, how can you protect it? true-statement. Correct. Others may be able to view your screen. Which of the following is true of Sensitive Compartmented Information (SCI)? Which of the following is not considered a potential insider threat indicator? The website requires a credit card for registration. Original classification authority Correct. *Controlled Unclassified Information Which of the following best describes a way to safely transmit Controlled Unclassified Information (CUI)? CUI must be handled using safeguarding or dissemination controls. Your password and the second commonly includes a text with a code sent to your phone. cyber-awareness. Which type of information includes personal, payroll, medical, and operational information? Follow the steps enlisted below to use WEKA for identifying real values and nominal attributes in the dataset. What is a proper response if spillage occurs? -Its classification level may rise when aggregated. You can't have 1.9 children in a family (despite what the census might say ). **Use of GFE What is a critical consideration on using cloud-based file sharing and storage applications on your Government-furnished equipment (GFE)? **Classified Data Which of the following is a good practice to protect classified information? cyber. Always use DoD PKI tokens within their designated classification level. Use online sites to confirm or expose potential hoaxes, Follow instructions given only by verified personnel, Investigate the links actual destination using the preview feature, Determine if the software or service is authorized. Unknown data is categorized by the system; an analyst then reviews the results On a NIPRNet system while using it for a PKI-required task, Something you possess, like a CAC, and something you know, like a PIN or password. Use personally-owned wired headsets and microphones only in designated areas, New interest in learning a foreign language. Changes to various data systems that store and sometimes share sensitive information outside EPA. **Identity management Which of the following is an example of two-factor authentication? What can be used to track Marias web browsing habits? Which of the following should you do immediately? Unclassified information is a threat to national security. **Removable Media in a SCIF What portable electronic devices (PEDs) are allowed in a Sensitive Compartmented Information Facility (SCIF)? Darryl is managing a project that requires access to classified information. For programmatic questions regarding Controlled Unclassified Information (CUI), including any challenges to CUI marked by EPA, pleasecontact EPA's CUI Program Office. Even within a secure facility, dont assume open storage is permitted. Verify the identity of all individuals.??? How should you respond? You must have your organizations permission to telework. **Insider Threat Which of the following should be reported as a potential security incident (in accordance with you Agencys insider threat policy)? Which scenario might indicate a reportable insider threat? When is the best time to post details of your vacation activities on your social networking website? It never requires classified markings, it is true about unclassified data. Hostility or anger toward the United States and its policies. Within a secure area, you see an individual you do not know. correct. It does not require markings or distribution controls. Transmit classified information via fax machine only Not correct **Social Networking As someone who works with classified information, what should you do if you are contacted by a foreign national seeking information on a research project? true-statement. What information should you avoid posting on social networking sites? How many potential insider threat indicators does this employee display? Which is NOT a way to protect removable media? **Identity management Which of the following is an example of a strong password? A colleague vacations at the beach every year, is married and a father of four, sometimes has poor work quality, and works well with his team. The date of full implementation of the CUI Program will be announced by the EPAs CUI Senior Agency Official (CUI SAO) and updated here on EPAs public web page. A headset with a microphone through a Universal Serial Bus (USB) port. How many potential insiders threat indicators does this employee display? Which of the following is true of the Common Access Card (CAC) or Personal Identity Verification (PIV) card? **Social Engineering How can you protect yourself from internet hoaxes? Have your permissions from your organization, follow your organization guideline, use authorized equipment and software, employ cyber security best practice, perform telework in dedicated when home. What type of attack might this be? Correct. If you participate in or condone it at any time. **Classified Data How should you protect a printed classified document when it is not in use? **Insider Threat What function do Insider Threat Programs aim to fulfill? You receive an email at your official Government email address from an individual at the Office of Personnel Management (OPM). (Sensitive Compartmented Information) What describes how Sensitive Compartmented Information is marked? **Classified Data Which type of information could reasonably be expected to cause serious damage to national security if disclosed without authorization? Who is responsible for information/data security? Report the crime to local law enforcement. Only expressly authorized government-owned PEDs. A Coworker has asked if you want to download a programmers game to play at work. Public service, notably service in the United States Department of Defense or DoD, is a public trust. Reviewing and configuring the available security features, including encryption. A measure of how much useful work each unit of input energy provides. Which of the following is NOT true of traveling overseas with a mobile phone? Keep your operating system and software up to date: This will help patch any security vulnerabilities in your software. Spillage because classified data was moved to a lower classification level system without authorization. Which of the following is true of Protected Health Information (PHI)? Under which circumstances may you be subject to criminal, disciplinary, and/or administrative action due to online misconduct? Which of the following is true of Unclassified information? Classified Information can only be accessed by individuals with. Always use DoD PKI tokens within their designated classification level. The CUI Registry is the Government-wide online repository for Federal-level guidance regarding CUI policy and practice. what should you do? What is considered a mobile computing device and therefore shouldnt be plugged in to your Government computer? What is NOT Personally Identifiable Information (PII)? (Malicious Code) While you are registering for a conference, you arrive at the website http://www.dcsecurityconference.org/registration/. 1.1.3 Insider Threat. **Website Use How should you respond to the theft of your identity? Of the following, which is NOT a method to protect sensitive information? As a security best practice, what should you do before exiting? It includes a threat of dire circumstances. That trust is bounded by the Oath of Office we took willingly. The attributes of identified ground seeds are modified to ground points. Malicious code can do damage by corrupting files, erasing your hard drive, and/or allowing hackers access. **Social Networking Which of the following best describes the sources that contribute to your online identity? Refer the reporter to your organizations public affairs office. They may be used to mask malicious intent. CUI is not classified information. A 3%3\%3% penalty is charged for payment after 303030 days. What is a best practice to protect data on your mobile computing device? What is best practice while traveling with mobile computing devices? Exceptionally grave damage to national security. 5. Unauthorized Disclosure of Classified Information for DoD, Security Awareness: Derivative Classification Answers, CITI Ethics, Responsible Conduct, RCR, Law, HTH And IRB Answers, EVERFI Achieve Consumer Financial Education Answers, Security Pro: Chapter 3 (3.1.8) & 4.1 Security Policies Answers, CITI Module #3 Research in Public Elementary and Secondary Schools, Answers to CTS Unit 7 Lab 7-2: Protocols and Services SNMP, Google Analytics Individual Qualification Exam Answers, Everfi Module 4 Credit Scores Quiz Answers, Which Of The Following Is Not Considered A Potential Insider Threat Indicator. What function do Insider Threat Programs aim to fulfill? *Spillage What should you do when you are working on an unclassified system and receive an email with a classified attachment? Connect to the Government Virtual Private Network (VPN). *Sensitive Information Under what circumstances could classified information be considered a threat to national security? "Unclassified" or a lack of security marking denotes non-sensitive information. What type of security is part of your responsibility and placed above all else?, If your wireless device is improperly configured someone could gain control of the device? Telework is only authorized for unclassified and confidential information. Ensure proper labeling by appropriately marking all classified material. Search Use TinyURL's preview feature to investigate where the link leads. *Spillage. (Correct) -It does not affect the safety of Government missions. Which of the following is an example of Protected Health Information (PHI)? Before long she has also purchased shoes from several other websites. d. giving a spanking or a scolding. You know that this project is classified. When unclassified data is aggregated, its classification level may rise. Which of the following is NOT a potential insider threat? Third, the neighbor ground points of an unclassified point are searched from multiple subspaces. The proper security clearance and indoctrination into the SCI program. What structures visible in the stained preparation were invisible in the unstained preparation? View email in plain text and dont view email in Preview Pane. You are working at your unclassified system and receive an email from a coworker containing a classified attachment. Based on the description that follows, how many potential insider threat indicator(s) are displayed? Dofficult life circumstances, such as death of spouse. Label all files, removable media, and subject headers with appropriate classification markings. Bob, a coworker, has been going through a divorce, has financial difficulties and is displaying hostile behavior. Government-owned PEDs when expressly authorized by your agency. Use the classified network for all work, including unclassified work. Use your own security badge, key code, or Common Access Card (CAC)/Personal Identity Verification (PIV) card. Only allow mobile code to run from your organization or your organizations trusted sites. Which is NOT a wireless security practice? Which of the following is a good practice to avoid email viruses? not correct. Only paper documents that are in open storage need to be marked. Enable automatic screen locking after a period of inactivity. correct. How many potential insider threat indicators does this employee display? Which of the following is NOT Protected Health Information (PHI)? *Spillage What should you do if you suspect spillage has occurred? You receive an unexpected email from a friend: I think youll like this: https://tinyurl.com/2fcbvy. What action should you take? Call your security point of contact immediately. (Malicious Code) What are some examples of malicious code? When using your government-issued laptop in public environments, with which of the following should you be concerned? The email provides a link to a personnel portal where you must enter your personal information as part of an effort to standardize recordkeeping. Correct. The physical security of the device. Mobile devices and applications can track your location without your knowledge or consent. Which of the following is NOT considered sensitive information? Which of the following represents a good physical security practice? For Government-owned devices, use approved and authorized applications only. What is required for an individual to access classified data? Which of the following does NOT constitute spillage? Which of the following is a practice that helps to protect you from identity theft? What level of damage to national security could reasonably be expected if unauthorized disclosure of Top Secret information occurred? An official website of the United States government. c. What similarities and differences are there between plant and animal cells? Maintain possession of your laptop and other government-furnished equipment (GFE) at all times. *Sensitive Information What is the best example of Personally Identifiable Information (PII)? Which of these is true of unclassified data? In addition to offering an overview of cybersecurity best practices, the challenge also provides awareness of potential and common cyber threats. what should be your response be? Which of the following is a good practice to prevent spillage? When traveling or working away from your main location, what steps should you take to protect your devices and data? Thats the only way we can improve. Correct. Teams. Unclassified documents do not need to be marked as a SCIF. Only persons with appropriate clearance, a non-disclosure agreement, and need-to-know can access classified data. *Spillage What is a proper response if spillage occurs? What can help to protect the data on your personal mobile device. Store classified data appropriately in a GSA-approved vault/container when not in use. A coworker is observed using a personal electronic device in an area where their use is prohibited. Which of the following is NOT a typical result from running malicious code? As long as the document is cleared for public release, you may release it outside of DoD. Use only personal contact information when establishing your personal account. What action should you take? 1.1.2 Classified Data. correct. When checking in at the airline counter for a business trip, you are asked if you would like to check your laptop bag. Someone calls from an unknown number and says they are from IT and need some information about your computer. Correct. Updated 8/5/2020 8:06:16 PM. Request the users full name and phone number. TheNational Archives and Records Administration (NARA)servesas the Controlled Unclassified Information (CUI) Executive Agent (EA). Amendments to a variety of policy documents as well as others referencing Confidential Business Information (CBI) submissions or handling, Changes to paper and e-forms and instructions for their submission to EPA. Its classification level may rise when aggregated. Sanitized information gathered from personnel records. Which of the following is an example of two-factor authentication? *Controlled Unclassified Information Which of the following is NOT an example of CUI? Avoid talking about work outside of the workplace or with people without a need-to-know. not correct **Insider Threat Which of the following is NOT considered a potential insider threat indicator? *Sensitive Compartmented Information Which of the following best describes the compromise of Sensitive Compartmented Information (SCI)? **Home Computer Security How can you protect your information when using wireless technology? What portable electronic devices (PEDs) are permitted in a SCIF? Understanding and using the available privacy settings. Course Introduction Introduction . Organizational Policy Not correct a. putting a child in time-out When is it okay to charge a personal mobile device using government-furnished equipment (GFE)? What type of social engineering targets senior officials? Not correct Controlled Unclassified Information (CUI) is informationthat requires safeguarding or dissemination controls consistent with applicable laws, regulations, and Government-wide policies, but is not classified under Executive Order 13526 "Classified National Security Informat What are examples of CUI? What should be done to sensitive data on laptops and other mobile computing devices? Were mitochondria as abundant in human epithelial cells as in onion epidermal cells (procedure 4.6)? (2) War planning documents which contain worldwide -- (a) Planning data and assumptions, (b) Wartime planning factors for the use of nuclear weapons, (c) Intelligence estimates of enemy capabilities, (d) Force composition and development, and (Sensitive Information) What must the dissemination of information regarding intelligence sources, methods, or activities follow? Unusual interest in classified information. Debra ensures not correct Mark SCI documents appropriately and use an approved SCI fax machine. A colleague is playful and charming, consistently wins performance awards, and is occasionally aggressive in trying to access classified information. **Social Engineering Which of the following is a practice that helps to prevent the download of viruses and other malicious code when checking your email? How can you guard yourself against Identity theft? See the discussed example before. Government-owned PEDs, if expressly authorized by your agency. Which of the following is NOT a type of malicious code? Q&A for work. Upon connecting your Government-issued laptop to a public wireless connection, what should you immediately do? There are no choices provides which make it hard to pick the untrue statement about unclassified data. How do you respond? Which of following is true of protecting classified data? Alex demonstrates a lot of potential insider threat indicators. Do not access website links, buttons, or graphics in e-mail. Not correct. You should only accept cookies from reputable, trusted websites. Sensitive information may be stored on any password-protected system. Which of the following is a clue to recognizing a phishing email? Explain. Which of the following is a good practice to prevent spillage. At EPA, the CUI Program is housed in the Libraries and Accessibility Division (LAD) within the Office of Mission Supports (OMS), Office of Enterprise Information Programs (OEIP). What is a security best practice to employ on your home computer? *Controlled Unclassified Information Which is a best practice for protecting Controlled Unclassified Information (CUI)? To transmit large payments through Fedwire __________, To regulate and supervise the stock market to provide stability and security to individual investors. Historically, each agency developed its own practices for sensitive unclassified information, resulting in a patchwork of systems across the Executive branch, in which similar information might be defined or labeled differently, or where dissimilar information might share a definition and/or label. Correct. It does not require markings or distribution controls. You receive an inquiry from a reporter about potentially classified information on the internet. Permitted Uses of Government-Furnished Equipment (GFE). What information posted publicly on your personal social networking profile represents a security risk? What actions should you take prior to leaving the work environment and going to lunch? Which of the following is NOT a home security best practice? Share sensitive information only on official, secure websites. Unclassified information cleared for public release. Classified material must be appropriately marked. Look for a digital signature on the email. There are many travel tips for mobile computing. **Social Engineering Which of the following is a way to protect against social engineering? Classified DVD distribution should be controlled just like any other classified media. Matt Monroe, a 20-year U. S. Air Force veteran and current operations manager at Omnistruct, explains the breakdown, "There are four classified information categories in the military based on the severity of damage that the information's release would cause. Which of the following is NOT a DoD special requirement for tokens? **Insider Threat Which of the following should be reported as a potential security incident? Executive Order 13526 Classified National Security Information, PersonallyIdentifiable Information (PII), Sensitive Personally Identifiable Information (SPII), Proprietary Business Information (PBI) or currently known within EPA as Confidential Business Information (CBI), Unclassified Controlled Technical Information (UCTI). Security Classification Guides (SCGs).??? The challenges goal is simple: To change user behavior to reduce the risks and vulnerabilities DoD Information Systems face. You receive an unexpected email from a friend: "I think you'll like this: (URL)" What action should you take? How should you protect your Common Access Card (CAC) or Personal Identity Verification (PIV) card? Which of the following is a proper way to secure your CAC/PIV? Learn more about Teams Antihistamines are used to treat the symptoms, such as sneezing, that are due to inflammation caused by irritants in the airways. Call your security point of contact immediately. A coworker uses a personal electronic device in a secure area where their use is prohibited. On September 14, 2016, NARA issued a final rule amending 32 CFR Part 2002 to establish a uniform policy for all Federal agencies and prescribe Government-wide program implementation standards, including designating, safeguarding, disseminating, marking, decontrolling, and disposing of CUI; self-inspection and oversight requirements; and other facets of the CUI Program. What should you do to protect classified data? A colleague saves money for an overseas vacation every year, is a . Which of the following is NOT a correct way to protect CUI? They can be part of a distributed denial-of-service (DDoS) attack. Only documents that are classified Secret, Top Secret, or SCI require marking. What should you do? A colleague has visited several foreign countries recently, has adequate work quality, speaks openly of unhappiness with U.S. foreign policy, and recently had his car repossessed. The age of the driver may top the list of variables. They provide guidance on reasons for and duration of classification of information. Law Enforcement Sensitive (LES),and others. Which of the following is true of Unclassified Information? be wary of suspicious e-mails that use your name and/or appear to come from inside your organization. Which of the following is true of transmitting Sensitive Compartmented Information (SCI)? Personal information is inadvertently posted at a website. Secure it to the same level as Government-issued systems. You know this project is classified. **Social Networking When may you be subject to criminal, disciplinary, and/or administrative action due to online misconduct? No, you should only allow mobile code to run from your organization or your organizations trusted sites. How many potential insider threat indicators does this employee display? Which is an untrue statement about unclassified data? A. What information most likely presents a security risk on your personal social networking profile? Which of the following is not a best practice to preserve the authenticity of your identity? **Insider Threat Based on the description that follows, how many potential insider threat indicator(s) are displayed? (Mobile Devices) Which of the following statements is true? It is getting late on Friday. Ensure that the wireless security features are properly configured. Where. Confirm the individuals need-to-know and access. A coworker brings a personal electronic device into prohibited areas. **Insider Threat Based on the description that follows, how many potential insider threat indicator(s) are displayed? 1).Compared with CK, straw addition treatments (S and SG) significantly (P < 0.01) increased the emission rate and cumulative emission of CO 2 and the cumulative CO 2 . (Spillage) Which type of information could reasonably be expected to cause serious damage to national security if disclosed without authorization? Dont allow other access or to piggyback into secure areas. Appropriate clearance; signed and approved non-disclosure agreement; and need-to-know. If possible, set your browser preferences to prompt you each time a website wants to store a cookie. classified-document. What amount is due if Alexa pays on or betwee n April 222222 and May 666? CUI is government created or owned information that requires safeguarding or dissemination controls consistent with applicable laws, regulations and government wide policies. No. You receive a call on your work phone and youre asked to participate in a phone survey. Which of the following is NOT a typical means for spreading malicious code? A coworker wants to send you a sensitive document to review while you are at lunch and you only have your personal tablet. You receive an email from the Internal Revenue Service (IRS) demanding immediate payment of back taxes of which you were not aware. Which of the following is true of internet hoaxes? Which of the following is NOT an example of sensitive information? which of the following is true about unclassified data. (Home computer) Which of the following is best practice for securing your home computer? (1) A strategic plan documenting the overall conduct of a war. Search for an answer or ask Weegy. What is a way to prevent the download of viruses and other malicious code when checking your e-mail? Asked 8/5/2020 6:29:36 PM. (Malicious Code) Which of the following is NOT a way that malicious code spreads? (Spillage) What should you do if a reporter asks you about potentially classified information on the web? Retrieve classified documents promptly from printers. which of the following is true about unclassified data. Badges must be visible and displayed above the waist at all times when in the facility. (Malicious Code) What is a common indicator of a phishing attempt? correct. In which situation below are you permitted to use your PKI token? The email provides a website and a toll-free number where you can make payment. What is the best choice to describe what has occurred? When using a public device with a card reader, only use your DoD CAC to access unclassified information, is only allowed if the organization permits it. (Travel) Which of the following is a concern when using your Government-issued laptop in public? Note any identifying information, such as the website's URL, and report the situation to your security POC. They broadly describe the overall classification of a program or system. When can you check personal email on your government furnished equipment? A colleague complains about anxiety and exhaustion, makes coworkers uncomfortable by asking excessive questions about classified projects, and complains about the credit card bills that his wife runs up. Which of the following is true about unclassified data? What action should you take? Some examplesyou may be familiar with: TheFederalCUI Registry,shows authorized categoriesandassociated markings, as well as applicable safeguarding, dissemination, and decontrol procedures. A Maria is at home shopping for shoes on Amazon.com. We thoroughly check each answer to a question to provide you with the most correct answers. **Mobile Devices Which of the following helps protect data on your personal mobile devices? You may use your personal computer as long as it is in a secure area in your home b. A colleague has won 10 high-performance awards, can be playful and charming, is not currently in a relationship, and occasionally aggressive in trying to access sensitive information. Which of the following is an example of malicious code? Remove your security badge, common access card (CAC), or personal identity verification (PIV) card. While you are registering for a conference, you arrive at the website http://www.dcsecurityconference.org/registration/. data. **Insider Threat How many potential insider threat indicators does a person who is playful and charming, consistently wins performance awards, but is occasionally aggressive in trying to access sensitive information display? **Classified Data Which of the following is true of protecting classified data? Exceptionally grave damage. Correct. Which of the following statements is NOT true about protecting your virtual identity? Use a single, complex password for your system and application logons. Which of the following is NOT an example of CUI? Many apps and smart devices collect and share your personal information and contribute to your online identity. What actions should you take with a compressed Uniform Resource Locator (URL) on a website known to you? What should the participants in this conversation involving SCI do differently? You are having lunch at a local restaurant outside the installation, and you find a cd labeled favorite song. NARA has the authority and responsibility to manage the CUI Program across the Federal government. What is a rule for removable media, other portable electronic devices (PEDs), and mobile computing devices to protect Government systems?
Warframe Gyromag Systems Farm 2021,
Punting River 3 Letters,
What Medications Does Flaxseed Interfere With,
What Is An Extension In A Lab Report,
Articles W