A colleague has visited several foreign countries recently, has adequate work quality, speaks openly of unhappiness with U.S. foreign policy, and recently had his car repossessed. The physical security of the device. How should you securely transport company information on a removable media? What should be your response? What should you do? Social Security Number; date and place of birth; mothers maiden name. Which of the following best describes a way to safely transmit Controlled Unclassified Information (CUI)? Ensure proper labeling by appropriately marking all classified material and, when required, sensitive material. What should you do? Antihistamines are used to treat the symptoms, such as sneezing, that are due to inflammation caused by irritants in the airways. **Use of GFE What is a critical consideration on using cloud-based file sharing and storage applications on your Government-furnished equipment (GFE)? Let us have a look at your work and suggest how to improve it! You receive an email from a company you have an account with. Based on the description that follows, how many potential insider threat indicator(s) are displayed? Which of the following is an example of Protected Health Information (PHI)? It is releasable to the public without clearance. When can you check personal email on your government furnished equipment? Teams. Exceptionally grave damage to national security. Insiders are given a level of trust and have authorized access to Government information systems. Course Introduction Introduction . Cyber Awareness 2022. A medium secure password has at least 15 characters and one of the following. Which is an untrue statement about unclassified data? Setting weekly time for virus scan when you are not on the computer and it is powered off. (Spillage) What level of damage can the unauthorized disclosure of information classified as confidential reasonably be expected to cause? On a NIPRNET system while using it for a PKI-required task. **Insider Threat Based on the description that follows, how many potential insider threat indicator(s) are displayed? How can you protect your information when using wireless technology? You know this project is classified. On a NIPRNet system while using it for a PKI-required task, Something you possess, like a CAC, and something you know, like a PIN or password. Which of the following makes Alexs personal information vulnerable to attacks by identity thieves? The CUI Registry is the Government-wide online repository for Federal-level guidance regarding CUI policy and practice. Of the following, which is NOT a problem or concern of an Internet hoax? A coworker removes sensitive information without authorization. Which of the following is true about telework? difficult life circumstances such as substance abuse, divided loyalty or allegiance to the U.S., and extreme, persistent interpersonal difficulties. correct. At all times while in the facility. Following instructions from verified personnel. Maybe (Mobile Devices) When can you use removable media on a Government system? Only use Government-furnished or Government-approved equipment to process PII. For Government-owned devices, use approved and authorized applications only. Learn more about Teams This task is performed with the aim of finding similarities in data points and grouping similar data points together. What should you do? How many potential insider threat indicators does this employee display? What is an indication that malicious code is running on your system? (1) A strategic plan documenting the overall conduct of a war. Correct. 8. **Classified Data What is required for an individual to access classified data? Sanitized information gathered from personnel records. 1.1.5 Controlled Unclassified Information. A Coworker has asked if you want to download a programmers game to play at work. (Spillage) What should you do when you are working on an unclassified system and receive an email with a classified attachment? Which of the following actions can help to protect your identity? A measure of how much useful work each unit of input energy provides. Classified information that should be unclassified and is downgraded. **Identity management Which of the following is NOT a best practice to preserve the authenticity of your identity? Which of following is true of protecting classified data? correct. Which method would be the BEST way to send this information? There are many travel tips for mobile computing. Which type of information includes personal, payroll, medical, and operational information? What should be your response? Use TinyURL's preview feature to investigate where the link leads. Proactively identify potential threats and formulate holistic mitigation responses. Which of the following is true of Protected Health Information (PHI)? Which of the following is NOT a type of malicious code? Validate all friend requests through another source before confirming them. Which of the following attacks target high ranking officials and executives? It does not require markings or distribution controls. Linda encrypts all of the sensitive data on her government-issued mobile devices. You must have permission from your organization. Which is a best practice that can prevent viruses and other malicious code from being downloaded when checking your e-mail? Official websites use .gov correct. Appropriate clearance; signed and approved non-disclosure agreement; and need-to-know. (Correct) -It does not affect the safety of Government missions. How do you think antihistamines might work? Examples are: Patient names, Social Security numbers, Drivers license numbers, insurance details, and birth dates. You must have your organizations permission to telework. You receive an unexpected email from a friend: I think youll like this: https://tinyurl.com/2fcbvy. What action should you take? Controlled Unclassified Information (CUI): Controlled Unclassified information was defined in the Executive Order 13556 as information held by or generated for the Federal Government that requires safeguarding or dissemination controls pursuant to and consistent with applicable law, regulations and government-wide policies that isn't classified What describes how Sensitive Compartmented Information is marked? In which situation below are you permitted to use your PKI token? How can you guard yourself against Identity theft? What should you do if a reporter asks you about potentially classified information on the web? Use the classified network for all work, including unclassified work. ~A coworker brings a personal electronic device into a prohibited area. What should you do if a reporter asks you about potentially classified information on the web? **Identity Management Which of the following is the nest description of two-factor authentication? (Spillage) When is the safest time to post details of your vacation activities on your social networking website? Mobile devices and applications can track your location without your knowledge or consent. What level of damage can the unauthorized disclosure of information classified as Top Secret reasonably be expected to cause? a. not correct. correct. **Insider Threat Based on the description that follows, how many potential insider threat indicator(s) are displayed? The email provides a website and a toll-free number where you can make payment. What structures visible in the stained preparation were invisible in the unstained preparation? Reviewing and configuring the available security features, including encryption. What should you consider when using a wireless keyboard with your home computer? Which of the following practices reduces the chance of becoming a target by adversaries seeking insider information? Which of the following is a best practice for physical security? Which of the following is not a best practice to preserve the authenticity of your identity? Physical security of mobile phones carried overseas is not a major issue. Attempt to change the subject to something non-work related, but neither confirm nor deny the article's authenticity. **Removable Media in a SCIF What must users ensure when using removable media such as compact disk (CD)? -It never requires classification markings. **Classified Data Which of the following is true of protecting classified data? Remove and take it with you whenever you leave your workstation. P2P (Peer-to-Peer) software can do the following except: Allow attackers physical access to network assets. What should be done if you find classified Government Data/Information Not Cleared for Public Release on the Internet? (Sensitive Information) Which of the following represents a good physical security practice? You know that this project is classified. A colleague complains about anxiety and exhaustion, makes coworkers uncomfortable by asking excessive questions about classified projects, and complains about the credit card bills that his wife runs up. Which of the following may be helpful to prevent inadvertent spillage? **Social Engineering What action should you take with an e-mail from a friend containing a compressed Uniform Resource Locator (URL)? General Services Administration (GSA) approval. not correct (social networking) When may you be subjected to criminal, disciplinary, and/or administrative action due to online misconduct? Which of these is true of unclassified data? Directives issued by the Director of National Intelligence. How do you respond? **Home Computer Security How can you protect your information when using wireless technology? Share sensitive information only on official, secure websites. *Spillage Which of the following may help prevent inadvertent spillage? Information should be secured in a cabinet or container while not in use. *Spillage What should you do when you are working on an unclassified system and receive an email with a classified attachment? Which of the following is NOT sensitive information? **Insider Threat Based on the description that follows, how many potential insider threat indicator(s) are displayed? Which is NOT a wireless security practice? DOD Cyber Awareness 2021 (DOD-IAA-V18.0) Know, RT202: Ch. Ive tried all the answers and it still tells me off. You check your bank statement and see several debits you did not authorize. The following table lists the number of drivers in the United States, the number of fatal accidents, and the number of total accidents in each age group in 2002. Filter by: All $ Off % Off Free Online Offline. (Spillage) What type of activity or behavior should be reported as a potential insider threat? (Wrong). Which of the following is true of telework? They provide guidance on reasons for and duration of classification of information. You should remove and take your CAC/PIV card whenever you leave your workstation. A coworker is observed using a personal electronic device in an area where their use is prohibited. Physically assess that everyone within listening distance is cleared and has a need-to-know for the information being discussed. Spillage because classified data was moved to a lower classification level system without authorization. Paul verifies that the information is CUI, includes a CUI marking in the subject header and digitally signs an e-mail containing CUI. What should you do if someone asks to use your government issued mobile device (phone/laptop..etc)? Use only personal contact information when establishing personal social networking accounts, never use Government contact information. NARA has the authority and responsibility to manage the CUI Program across the Federal government. Which of the following is NOT a best practice to protect data on your mobile computing device? Use only personal contact information when establishing personal social networking accounts, never use Government contact information. How should you respond? What type of social engineering targets senior officials? **Social Engineering Which of the following is a way to protect against social engineering? correct. Which Cyber Protection Condition (CPCON) establishes a protection priority focus on critical functions only? cyber-awareness. Write your password down on a device that only you access. Note any identifying information, such as the websites URL, and report the situation to your security POC. To determine premiums for automobile insurance, companies must have an understanding of the variables that affect whether a driver will have an accident. Since the URL does not start with https, do not provide you credit card information. Public service, notably service in the United States Department of Defense or DoD, is a public trust. Taking classified documents from your workspace. **Insider Threat Which of the following should be reported as a potential security incident (in accordance with you Agencys insider threat policy)?