You are having lunch at a local restaurant outside the installation, and you find a cd labeled favorite song. true-statement. Which of the following is a reportable insider threat activity? If classified information were released, which classification level would result in Exceptionally grave damage to national security? Use only your personal contact information when establishing your account. (Answer) CPCON 2 (High: Critical and Essential Functions) CPCON 1 (Very High: Critical Functions) CPCON 3 (Medium: Critical, Essential, and Support Functions) CPCON 4 (Low: All Functions) CPCON 5 (Very Low: All Functions). What information posted publicly on your personal social networking profile represents a security risk? Which of the following is a best practice to protect information about you and your organization on social networking sites and applications? The potential for unauthorized viewing of work-related information displayed on your screen. Mark SCI documents appropriately and use an approved SCI fax machine. Protection may be required for privacy, law enforcement, contractual protections, or other reasons. Appropriate clearance, a signed and approved non-disclosure agreement, and need-to-know, Insiders are given a level of trust and have authorized access to Government information systems. Should you always label your removable media? **Classified Data What level of damage can the unauthorized disclosure of information classified as Confidential reasonably be expected to cause? Coworker making consistent statements indicative of hostility or anger toward the United States and its policies. Insiders are given a level of trust and have authorized access to Government information systems. A colleague complains about anxiety and exhaustion, makes coworkers uncomfortable by asking excessive questions about classified projects, and complains about the credit card bills that his wife runs up. **Social Networking Which of the following information is a security risk when posted publicly on your social networking profile? Have your permissions from your organization, follow your organization guideline, use authorized equipment and software, employ cyber security best practice, perform telework in dedicated when home. How can you guard yourself against Identity theft? Which of the following is NOT sensitive information? which of the following is true about unclassified data data. A compromise of Sensitive Compartmented Information (SCI) occurs when a person who does not have the required clearance or access caveats comes into possession of SCI_________.??? Validate friend requests through another source before confirming them. A headset with a microphone through a Universal Serial Bus (USB) port. Which of the following is a good practice to prevent spillage? Security Classification of Information, volume 2 (Quist), Chapter Seven asked in Internet by voice (265k points) internet. Mark SCI documents appropriately and use an approved SCI fax machine. Your password and the second commonly includes a text with a code sent to your phone. A colleague abruptly becomes hostile and unpleasant after previously enjoying positive working relationships with peers, purchases an unusually expensive car, and has unexplained absences from work. Which of the following is NOT an appropriate way to protect against inadvertent spillage? You must have your organizations permission to telework. **Physical Security Within a secure area, you see an individual who you do not know and is not wearing a visible badge. (GFE) When can you check personal e-mail on your Government-furnished equipment (GFE)? A man you do not know is trying to look at your Government-issued phone and has asked to use it. Which of the following is a good practice to avoid email viruses? Changes to various data systems that store and sometimes share sensitive information outside EPA. Coworker making consistent statements indicative of hostility or anger toward the United States in its policies. **Classified Data Which of the following is a good practice to protect classified information? At EPA, the CUI Program is housed in the Libraries and Accessibility Division (LAD) within the Office of Mission Supports (OMS), Office of Enterprise Information Programs (OEIP). Classified Information can only be accessed by individuals with. **Social Networking What should you do if you receive a game application request that includes permission to access your friends, profile information, cookies, and sires visited? **Insider Threat What function do Insider Threat Programs aim to fulfill? You must have permission from your organization. Lionel stops an individual in his secure area who is not wearing a badge. How do you respond? **Removable Media in a SCIF What portable electronic devices (PEDs) are allowed in a Sensitive Compartmented Information Facility (SCIF)? A colleague has won 10 high-performance awards, can be playful and charming, is not currently in a relationship, and occasionally aggressive in trying to access sensitive information. Is this safe? **Classified Data How should you protect a printed classified document when it is not in use? A colleague has won 10 high-performance awards, can be playful and charming, is not currently in a relationship, and is occasionally aggressive in trying to access sensitive information. Verify the identity of all individuals.??? Which Cyber Protection Condition (CPCON) establishes a protection priority focus on critical functions only? What should the participants in this conversation involving SCI do differently? Which of the following is NOT a best practice to protect data on your mobile computing device? Social Security Number, date and place of birth, mothers maiden name. For programmatic questions regarding Controlled Unclassified Information (CUI), including any challenges to CUI marked by EPA, pleasecontact EPA's CUI Program Office. When classified data is not in use, how can you protect it? After reading an online story about a new security project being developed on the military installation where you work, your neighbor asks you to comment about the article. **Insider Threat Based on the description that follows, how many potential insider threat indicator(s) are displayed? (Insider Threat) Based on the description that follows, how many potential insider threat indicator(s) are displayed? *Sensitive Information Which of the following is the best example of Personally Identifiable Information (PII)? Enable automatic screen locking after a period of inactivity. Some examplesyou may be familiar with: TheFederalCUI Registry,shows authorized categoriesandassociated markings, as well as applicable safeguarding, dissemination, and decontrol procedures. Which of the following is true of Unclassified information? What should be your response? which of the following is true about unclassified data - Weegy CUI must be handled using safeguarding or dissemination controls. What should you do? **Social Networking Your cousin posted a link to an article with an incendiary headline on social media. DOD Cyber Awareness Challenge 2019 - Subjecto.com You find information that you know to be classified on the Internet. You receive an email from a company you have an account with. Everything you need to know aboutControlled UnclassifiedInformation(CUI). Which of the following is NOT considered a potential insider threat indicator? Which of the following is true of Controlled Unclassified information (CUI)? Which of the following is NOT true of traveling overseas with a mobile phone? How many potential insiders threat indicators does this employee display? The CUI Registry is the Government-wide online repository for Federal-level guidance regarding CUI policy and practice. Which of the following is a practice that helps to protect you from identity theft? *Spillage Which of the following may help prevent inadvertent spillage? **Home Computer Security What should you consider when using a wireless keyboard with your home computer? All data transfers via the internet are not 100% secure and there might be some security vulnerabilities. Which of the following demonstrates proper protection of mobile devices? What is the best way to protect your Common Access Card (CAC) or Personal Identity Verification (PIV) card? Which of the following is an example of Protected Health Information (PHI)? What should you do to protect yourself while on social networks? *Sensitive Compartmented Information When should documents be marked within a Sensitive Compartmented Information Facility (SCIF). A colleague complains about anxiety and exhaustion, makes coworkers uncomfortable by asking excessive questions about classified projects, and complains about the credit card bills that his wife runs up. Never allow sensitive data on non-Government-issued mobile devices. *Malicious Code Which of the following is NOT a way that malicious code spreads? (Identity Management) Which of the following is an example of two-factor authentication? You many only transmit SCI via certified mail. As part of the survey the caller asks for birth date and address. Let us know if this was helpful. What is a possible indication of a malicious code attack in progress? Dont assume open storage in a secure facility is authorized Maybe. Which of the following is true of Sensitive Compartmented Information (SCI)? Do not access links or hyperlinked media such as buttons and graphics in email messages. Identification, encryption, and digital signature. correct. *Sensitive Compartmented Information Which must be approved and signed by a cognizant Original Classification Authority (OCA)? cyber-awareness. There is no way to know where the link actually leads. Use only personal contact information when establishing personal social networking accounts, never use Government contact information. (Spillage) What should you do when you are working on an unclassified system and receive an email with a classified attachment? How should you securely transport company information on a removable media? When gases are sold they are usually compressed to high pressures. Controlled Unclassified Information (CUI) and Covered Defense What should you do? Which is a best practice that can prevent viruses and other malicious code from being downloaded when checking your e-mail? **Insider Threat What type of activity or behavior should be reported as a potential insider threat? Report the crime to local law enforcement. What is the best choice to describe what has occurred? Which of the following is NOT one? The website requires a credit card for registration. It does not require markings or distribution controls. How can you protect your information when using wireless technology? What type of attack might this be? When unclassified data is aggregated, its classification level may rise. Use TinyURL's preview feature to investigate where the link leads. (Mobile Devices) Which of the following statements is true? A colleague is playful and charming, consistently wins performance awards, and is occasionally aggressive in trying to access classified information. correct. __________, To supervise bank holding companies and state member banks __________, To make loans to businesses who want to expand their operations __________, To operate the check-clearing system for the nation __________, to provide financial services to the federal government and serve as the bankers bank for commercial banks and other depositary institutions __________, To serve as the fiscal agent of the U.S. government __________, To place printed paper currency and newly minted coins into circulation __________. PDF Unauthorized Disclosure of Classified Information and Controlled - CDSE Thiswill enabletimely and consistent informationsharing andincreasetransparency throughout the Federal government and with non-Federal stakeholders. On September 14, 2016, NARA issued a final rule amending 32 CFR Part 2002 to establish a uniform policy for all Federal agencies and prescribe Government-wide program implementation standards, including designating, safeguarding, disseminating, marking, decontrolling, and disposing of CUI; self-inspection and oversight requirements; and other facets of the CUI Program. Which of the following is true of internet hoaxes? A. Avoid talking about work outside of the workplace or with people without a need-to-know. Cyber Challenge.txt - Cyber Awareness What should you do P2P (Peer-to-Peer) software can do the following except: Allow attackers physical access to network assets. Why might "insiders" be able to cause damage to their organizations more easily than others? ~All documents should be appropriately marked, regardless of format, sensitivity, or classification. Transmit classified information via fax machine only Not correct What should you do? What is the danger of using public Wi-Fi connections? You know this project is classified. Which is an untrue statement about unclassified data? Maintain possession of your laptop and other government-furnished equipment (GFE) at all times. **Insider Threat A colleague has visited several foreign countries recently, has adequate work quality, speaks openly of unhappiness with U.S. foreign policy, and recently had his car repossessed. Refer the reporter to your organizations public affairs office. As a best practice, labeling all classified removable media and considering all unlabeled removable media as unclassified. You check your bank statement and see several debits you did not authorize. (Sensitive Information) What guidance is available from marking Sensitive Information information (SCI)? A colleague has visited several foreign countries recently, has adequate work quality, speaks openly of unhappiness with U.S. foreign policy, and recently had his car repossessed. -Its classification level may rise when aggregated. **Classified Data What is a good practice to protect classified information? What should you consider when using a wireless keyboard with your home computer? #2) Select the "Pre-Process" tab. Search for an answer or ask Weegy. **Mobile Devices What can help to protect the data on your personal mobile device? Paul verifies that the information is CUI, includes a CUI marking in the subject header, and digitally signs an e-mail containing CUI. After you have returned home following the vacation. The proper security clearance and indoctrination into the SCI program. As a security best practice, what should you do before exiting? Which of the following is not a best practice to preserve the authenticity of your identity? In the following situations, determine if the duty describes would be one of the Fed is responsible or is not responsible to enforce. Correct. correct. (Spillage) When is the safest time to post details of your vacation activities on your social networking website? Log in for more information. Photos of your pet Correct. General Services Administration (GSA) approval. Which of the following may be helpful to prevent inadvertent spillage? correct. correct. (Spillage) Which of the following practices may reduce your appeal as a target for adversaries seeking to exploit your insider status? The following table lists the number of drivers in the United States, the number of fatal accidents, and the number of total accidents in each age group in 2002. CUI may be stored only on authorized systems or approved devices. What should you do if a reporter asks you about potentially classified information on the web? BMW crash victim Alaa Al-Siddiq was on Cotswolds birthday weekend
Rod Wave Backstage Passes, Crazy Things Teachers Do To Motivate Students, What Is A Perpetrator Of Abuse, Articles W