What is the danger of using public Wi-Fi connections? *Sensitive Compartmented Information What should the participants in this conversation involving SCI do differently? Correct. **Identity Management Which of the following is the nest description of two-factor authentication? Many apps and smart devices collect and share your personal information and contribute to your online identity. Do not download it. When leaving your work area, what is the first thing you should do? Based on the description that follows, how many potential insider threat indicator (s) are displayed? *Sensitive Compartmented Information What must the dissemination of information regarding intelligence sources, methods, or activities follow? What level of damage to national security could reasonably be expected if unauthorized disclosure of Top Secret information occurred? A A man you do not know is trying to look at your Government-issued phone and has asked to use it. Note any identifying information, such as the website's URL, and report the situation to your security POC. Senior government personnel, military or civilian. -TRUE The use of webmail is -is only allowed if the organization permits it Using webmail may bypass built in security features. Which piece of information is safest to include on your social media profile? The email provides a website and a toll-free number where you can make payment. What should you do? Appropriate clearance, a signed and approved non-disclosure agreement, and need-to-know, Insiders are given a level of trust and have authorized access to Government information systems. New interest in learning another language? It displays a label showing maximum classification, date of creation, point of contact, and Change Management 9CM) Control Number. *Classified Data Were mitochondria as abundant in human epithelial cells as in onion epidermal cells (procedure 4.6)? Do not use any personally owned/non-organizational removable media on your organizations systems. *Malicious Code After visiting a website on your Government device, a popup appears on your screen. Which of the following is an example of removable media? Which designation includes Personally Identifiable Information (PII) and Protected Health Information (PHI)? What type of attack might this be? "Unclassified" or a lack of security marking denotes non-sensitive information. What type of data must be handled and stored properly based on classification markings and handling caveats? NARA has the authority and responsibility to manage the CUI Program across the Federal government. Ask the individual to see an identification badge. How can you protect data on your mobile computing and portable electronic devices (PEDs)? (Malicious Code) Which email attachments are generally SAFE to open? Which of the following is true of Controlled Unclassified information (CUI)? *Malicious Code Which of the following is NOT a way that malicious code spreads? What security device is used in email to verify the identity of sender? Always take your CAC when you leave your workstation. How many insider threat indicators does Alex demonstrate? **Mobile Devices Which is a rule for removable media, other portable electronic devices (PEDs), and mobile computing devices to protect Government systems? Which scenario might indicate a reportable insider threat? Store classified data in a locked desk drawer when not in use Maybe A colleague vacations at the beach every year, is married and a father of four, sometimes has poor work quality, and works well with his team. *Sensitive Compartmented Information What should the owner of this printed SCI do differently? **Social Networking Which of the following is a security best practice when using social networking sites? What is the best example of Protected Health Information (PHI)? Second, unclassified points are regarded as ground seeds if the distances between the points and the detected planes are less than a buffer difference threshold. internet-quiz. Refer the reporter to your organizations public affairs office. Figure 1. The CUI Registry is the Government-wide online repository for Federal-level guidance regarding CUI policy and practice. **Insider Threat What function do Insider Threat Programs aim to fulfill? *Spillage What should you do when you are working on an unclassified system and receive an email with a classified attachment? Which of the following is a practice that helps to prevent the download of viruses and other malicious code when checking your email? Which of the following is true of protecting classified data? **Classified Data When classified data is not in use, how can you protect it? (1) A strategic plan documenting the overall conduct of a war. It may expose the connected device to malware. When is the best time to post details of your vacation activities on your social networking website? This button displays the currently selected search type. (Travel) Which of the following is a concern when using your Government-issued laptop in public? What information most likely presents a security risk on your personal social networking profile? Directing you to a website that looks real. You must have permission from your organization. In the following situations, determine if the duty describes would be one of the Fed is responsible or is not responsible to enforce. Malicious code can mask itself as a harmless e-mail attachment, downloadable file, or website. CUI may be stored only on authorized systems or approved devices. Remove security badge as you enter a restaurant or retail establishment. Which of the following represents an ethical use of your Government-furnished equipment (GFE)? What kind of information could reasonably be expected to cause serious damage to national security in the event of unauthorized disclosure? If you participate in or condone it at any time. What should be done if you find classified Government Data/Information Not Cleared for Public Release on the Internet? (social networking) Which of the following is a security best practice when using social networking sites? Use only personal contact information when establishing your personal account. Why might "insiders" be able to cause damage to their organizations more easily than others? In which situation below are you permitted to use your PKI token? Which of the following is an example of punishment by application? **Social Networking As someone who works with classified information, what should you do if you are contacted by a foreign national seeking information on a research project? Follow the steps enlisted below to use WEKA for identifying real values and nominal attributes in the dataset. (Wrong). **Social Networking What should you do if you receive a game application request that includes permission to access your friends, profile information, cookies, and sites visited? Is it okay to run it? (GFE) When can you check personal e-mail on your Government-furnished equipment (GFE)? Store classified data appropriately in a GSA-approved vault/container when not in use. T/F. How many potential insider threat indicators does this employee display? All https sites are legitimate. Use personal information to help create strong passwords. Refer the vendor to the appropriate personnel. Controlled Unclassified Information (CUI) Purpose of the CUI Program. That trust is bounded by the Oath of Office we took willingly. *Spillage Which of the following actions is appropriate after finding classified information on the Internet? Log in for more information. Which of the following demonstrates proper protection of mobile devices? A colleague has visited several foreign countries recently, has adequate work quality, speaks openly of unhappiness with U.S. foreign policy, and recently had his car repossessed. What is the best way to protect your Common Access Card (CAC) or Personal Identity Verification (PIV) card? It does not require markings or distribution controls. What should you do? Classification markings and handling caveats. *Sensitive Information Which of the following is an example of Protected Health Information (PHI)? Which of the following actions is appropriate after finding classified Government information on the internet? Which of following is true of protecting classified data? **Insider Threat Which type of behavior should you report as a potential insider threat? Understanding and using the available privacy settings. You must have your organizations permission to telework. -Classified information that should be unclassified and is downgraded. How should you respond? **Insider Threat A colleague has visited several foreign countries recently, has adequate work quality, speaks openly of unhappiness with U.S. foreign policy, and recently had his car repossessed. You receive a call on your work phone and youre asked to participate in a phone survey. It does not require markings or distribution controls. Someone who uses authorized access, wittingly or unwittingly, to harm national security through unauthorized disclosure or other actions that may cause the loss or degradation of resources or capabilities. **Social Engineering Which may be a security issue with compressed Uniform Resource Locators (URLs)? 1.1 Standard Challenge Answers. The challenges goal is simple: To change user behavior to reduce the risks and vulnerabilities DoD Information Systems face. *Spillage Which of the following is a good practice to aid in preventing spillage? *Sensitive Information What is the best example of Personally Identifiable Information (PII)? Should you always label your removable media? While it may seem safer, you should NOT use a classified network for unclassified work. What level of damage to national security can you reasonably expect Top Secret information to cause if disclosed? 1.1.5 Controlled Unclassified Information. Which of the following is true of the Common Access Card (CAC)? c. ignoring a tantrum (Spillage) Which of the following is a best practice to protect information about you and your organization on social networking sites and applications? Correct. CUI was established to standardize the way the Executive branch handles sensitive information that requires dissemination controls. Q&A for work. EPAs CUI Program is responsible for issuing CUI policy, procedures, training, and guidance to program offices and regions, along with providing oversight and reporting on the Agencys progress on meeting NARAs CUI deadlines. Store your Common Access Card (CAC) or Personal Identity Verification (PIV) card in a shielded sleeve ~Write your password down on a device that only you access (e.g., your smartphone) Change your password at least every 3 months Enable two-factor authentication whenever available, even for personal accounts. If authorized, what can be done on a work computer? Official websites use .gov Which of the following is not considered a potential insider threat indicator? You can't have 1.9 children in a family (despite what the census might say ). The email states your account has been compromised and you are invited to click on the link in order to reset your password. Which method would be the BEST way to send this information? **Insider Threat What advantages do insider threats have over others that allows them to cause damage to their organizations more easily? **Classified Data How should you protect a printed classified document when it is not in use? Its classification level may rise when aggregated. Your password and the second commonly includes a text with a code sent to your phone. It should only be in a system while actively using it for a PKI-required task. Request the users full name and phone number. How should you respond? **Insider Threat Which of the following is NOT considered a potential insider threat indicator? Which of the following is a good practice to prevent spillage? What should be your response? SSN, date and place of birth, mothers maiden name, biometric records, PHI, passport number, Subset of PII, health information that identifies the individual, relates to physical or mental health of an individual, provision of health care to an individual, or payment of healthcare for individual. Refer the reporter to your organizations public affairs office. Which of the following is NOT true concerning a computer labeled SECRET? A colleague abruptly becomes hostile and unpleasant after previously enjoying positive working relationships with peers, purchases an unusually expensive new car, and has unexplained absences from work. When unclassified data is aggregated, its classification level may rise. true-statement. Within a secure area, you see an individual you do not know. The physical security of the device. You are leaving the building where you work. Cyber Awareness Challenge Knowledge Check 2023 Answers, Cyber Awareness Challenge 2022 Knowledge Check Answers. *Spillage Which of the following may help prevent inadvertent spillage? Annual DoD Cyber Awareness Challenge Training, DOD Cyber Awareness Challenge 2019: Knowledge, DOD Cyber Awareness Challenge 2019 (DOD-IAA-V, Operations Management: Sustainability and Supply Chain Management, Elliot Aronson, Robin M. Akert, Samuel R. Sommers, Timothy D. Wilson, Anderson's Business Law and the Legal Environment, Comprehensive Volume, David Twomey, Marianne Jennings, Stephanie Greene. **Classified Data What is a good practice to protect classified information? Attempting to access sensitive information without need-to-know. No. Based on the description that follows, how many potential insider threat indicator(s) are displayed? Of the following, which is NOT a method to protect sensitive information? **Classified Data Which of the following must you do before using and unclassified laptop and peripherals in a collateral environment? Power off any mobile devices when entering a secure area. Your cousin posted a link to an article with an incendiary headline on social media. After clicking on a link on a website, a box pops up and asks if you want to run an application. *Controlled Unclassified Information Which of the following is NOT a correct way to protect CUI? true-statement. The popup asks if you want to run an application. (social networking) When may you be subjected to criminal, disciplinary, and/or administrative action due to online misconduct? Which of the following is NOT one? (Home computer) Which of the following is best practice for securing your home computer? correct. CPCON 1 (Very High: Critical Functions) correct. *Spillage You find information that you know to be classified on the Internet. A pop-up window that flashes and warns that your computer is infected with a virus. When your vacation is over, after you have returned home. You receive an unexpected email from a friend: I think youll like this: https://tinyurl.com/2fcbvy. What action should you take? Neither confirm or deny the information is classified. What information relates to the physical or mental health of an individual? (Malicious Code) What is a common indicator of a phishing attempt? Which of the following statements is TRUE about the use of DoD Public Key Infrastructure (PKI) tokens? Connect to the Government Virtual Private Network (VPN).?? Sensitive information may be stored on any password-protected system. What describes how Sensitive Compartmented Information is marked? A coworker has left an unknown CD on your desk. *Spillage What is a proper response if spillage occurs? Dont assume open storage in a secure facility is authorized Maybe. Individuals must avoid referencing derivatively classified reports classified higher than the recipient.??? It contains certificates for identification, encryption, and digital signature. Physically assess that everyone within listening distance is cleared and has a need-to-know for the information being discussed. A colleague removes sensitive information without seeking authorization in order to perform authorized telework. What is an individual's Personally Identifiable Information (PII) or Protected Health Information (PHI) considered? Maybe What should you do? Media containing Privacy Act information, PII, and PHI is not required to be labeled. Which of the following is true about unclassified data? 8. Directives issued by the Director of National Intelligence. Ensure proper labeling by appropriately marking all classified material and, when required, sensitive material. You receive an email from a company you have an account with. How can you protect your information when using wireless technology? In setting up your personal social networking service account, what email address should you use? What is a proper response if spillage occurs? (2) War planning documents which contain worldwide -- (a) Planning data and assumptions, (b) Wartime planning factors for the use of nuclear weapons, (c) Intelligence estimates of enemy capabilities, (d) Force composition and development, and When expanded it provides a list of search options that will switch the search inputs to match the current selection. Search for an answer or ask Weegy. What should you do? What action should you take first? Which of the following is NOT a social engineering tip? Spear Phishing attacks commonly attempt to impersonate email from trusted entities. What should you do? (Spillage) When is the safest time to post details of your vacation activities on your social networking website? A colleague saves money for an overseas vacation every year, is a . data. Maria is at home shopping for shoes on Amazon.com. For programmatic questions regarding Controlled Unclassified Information (CUI), including any challenges to CUI marked by EPA, pleasecontact EPA's CUI Program Office. A lock (LockA locked padlock) or https:// means youve safely connected to the .gov website. Decline to let the person in and redirect her to security. What Are Some Examples Of Malicious Code Cyber Awareness? It is not corporate intellectual property unless created for or included in requirements related to a government contract. A coworker removes sensitive information without authorization. (Malicious Code) Upon connecting your Government-issued laptop to a public wireless connection, what should you immediately do? Ensure that the wireless security features are properly configured. UNCLASSIFIED is a designation to mark information that does not have potential to damage national security. Antihistamines are used to treat the symptoms, such as sneezing, that are due to inflammation caused by irritants in the airways. **Website Use While you are registering for a conference, you arrive at the website http://www.dcsecurityconference.org/registration/. correct. The attributes of identified ground seeds are modified to ground points. ~All documents should be appropriately marked, regardless of format, sensitivity, or classification. Which of the following must you do before using an unclassified laptop and peripherals in a collateral classified environment? (Spillage) After reading an online story about a new security project being developed on the military installation where you work, your neighbor asks you to comment about the article. Thats the only way we can improve. Always check to make sure you are using the correct network for the level of data. What is the best response if you find classified government data on the internet? When vacation is over, after you have returned home. A colleague abruptly becomes hostile and unpleasant after previously enjoying positive working relationships with peers, purchases an unusually expensive car, and has unexplained absences from work. Your password and a code you receive via text message. d. How do the size and shape of a human epithelial cell differ from those of the Elodea and onion cells that you examined earlier? Not correct. Classified information that should be unclassified and is downgraded. Coworker making consistent statements indicative of hostility or anger toward the United States in its policies. Your comments are due on Monday. Attempt to change the subject to something non-work related, but neither confirm nor deny the article's authenticity. You are working at your unclassified system and receive an email from a coworker containing a classified attachment. Using NIPRNet tokens on systems of higher classification level. Software that installs itself without the users knowledge. -Its classification level may rise when aggregated. **Classified Data Which of the following is true of telework? Store it in a shielded sleeve to avoid chip cloning. 10-3 X-ray Interaction with Matter, Fundamentals of Engineering Economic Analysis, David Besanko, Mark Shanley, Scott Schaefer. **Social Networking When is the safest time to post details of your vacation activities on your social networking profile? Retrieve classified documents promptly from printers. Which of the following statements is true? You are having lunch at a local restaurant outside the installation, and you find a cd labeled favorite song. Which of the following is NOT a security best practice when saving cookies to a hard drive? A. Ask them to verify their name and office number. It never requires classification markings, is true about unclassified data. In addition to avoiding the temptation of greed to betray his country, what should Alex do differently? Controlled Unclassified Information (CUI) is information that requires safeguarding or dissemination controls pursuant to and consistent with applicable law, regulations, and government-wide policies but is not classified under Executive Order 13526 or the Atomic Energy Act, as amended. New answers. What should you do to protect yourself while on social networks? It is created or received by a healthcare provider, health plan, or employer. Which of the following is an example of malicious code? Which of the following practices reduces the chance of becoming a target by adversaries seeking insider information? Which of the following is true of Internet of Things (IoT) devices? *Insider Threat Which of the following is a reportable insider threat activity? Correct. As a best practice, labeling all classified removable media and considering all unlabeled removable media as unclassified. (Sensitive Information) What must the dissemination of information regarding intelligence sources, methods, or activities follow? Exceptionally grave damage to national security. Correct. Correct. Which of the following is NOT a potential insider threat? What action should you take? A coworker wants to send you a sensitive document to review while you are at lunch and you only have your personal tablet. Explain. Only friends should see all biographical data such as where Alex lives and works. How can you guard yourself against Identity theft? Only persons with appropriate clearance, a non-disclosure agreement, and need-to-know can access classified data. Which of the following is true of downloading apps? You receive an unexpected email from a friend: "I think you'll like this: (URL)" What action should you take? Write your password down on a device that only you access. Which of the following is NOT a good way to protect your identity? Which of the following is a practice that helps to protect you from identity theft? not correct. Let us have a look at your work and suggest how to improve it! Contents hide. Matt Monroe, a 20-year U. S. Air Force veteran and current operations manager at Omnistruct, explains the breakdown, "There are four classified information categories in the military based on the severity of damage that the information's release would cause. Search An official website of the United States government. How can you avoid downloading malicious code? Maintain possession of your laptop and other government-furnished equipment (GFE) at all times. Which of the following information is a security risk when posted publicly on your social networking profile? Decline So That You Maintain Physical Control of Your Government-Issued Laptop. All data transfers via the internet are not 100% secure and there might be some security vulnerabilities. Which of the following is true of telework? You must possess security clearance eligibility to telework. What is a way to prevent the download of viruses and other malicious code when checking your e-mail? Note any identifying information and the websites Uniform Resource Locator (URL). Which of the following does not constitute spillage. (Mobile Devices) Which of the following statements is true? (Sensitive Information) Which of the following is true about unclassified data? You may use your personal computer as long as it is in a secure area in your home b. Linda encrypts all of the sensitive data on her government-issued mobile devices. Briefly describe what you have learned. If possible, set your browser preferences to prompt you each time a website wants to store a cookie. Which of the following is a good practice to prevent spillage. **Social Engineering Which of the following is a practice that helps to prevent the download of viruses and other malicious code when checking your email? Proactively identify potential threats and formulate holistic mitigation responses. Mark SCI documents appropriately and use an approved SCI fax machine. *Spillage. **Classified Data Which of the following can an unauthorized disclosure of information classified as Confidential reasonably be expected to cause? How many potential insider threat indicators does this employee display? *Controlled Unclassified Information Which of the following best describes a way to safely transmit Controlled Unclassified Information (CUI)? A passenger in the Land Rover Freelander that T-boned the hatchback said the BMW had been driven out of the unclassified road towards Shipton-under-Wychwood 'like a bat out of hell' - giving . Photos of your pet Correct. Alex demonstrates a lot of potential insider threat indicators. Attempting to access sensitive information without need-to-know, Avoid talking about work outside of the workplace or with people without a need-to-know, Report the suspicious behavior in accordance with their organizations insider threat policy. Correct. **Social Engineering What is TRUE of a phishing attack? Taking classified documents from your workspace. (Sensitive Information) What should you do if a commercial entity, such as a hotel reception desk, asks to make a photocopy of your Common Access Card (CAC) for proof of Federal Government employment? what should you do? Unclassified information is a threat to national security. What function do Insider Threat Programs aim to fulfill? a. Which of the following is NOT a typical result from running malicious code? Which of the following is true about unclassified data? Phishing can be an email with a hyperlink as bait. Everything you need to know aboutControlled UnclassifiedInformation(CUI). **Classified Data What level of damage can the unauthorized disclosure of information classified as Confidential reasonably be expected to cause? What is the basis for the handling and storage of classified data? (Sensitive Information) What type of unclassified material should always be marked with a special handling caveat? Of the following, which is NOT a security awareness tip? Which is an untrue statement about unclassified data? Since the URL does not start with https, do not provide you credit card information. Using webmail may bypass built in security features. Classified material must be appropriately marked. Always use DoD PKI tokens within their designated classification level. not correct.