What must you ensure if you work involves the use of different types of smart card security tokens? **Social NetworkingWhen is the safest time to post details of your vacation activities on your social networking profile? Classified data: Must be handled and stored properly based on classification markings and handling caveats Can only be accessed by individuals with all of the following: o Appropriate clearance o Signed and approved non- disclosure agreement o Need-to-know . *SpillageWhich of the following actions is appropriate after finding classified information on the internet? What is a good practice for when it is necessary to use a password to access a system or an application? WebWhich of the following individuals can access classified data? Calculate cost of goods sold for for the year. Which of the following is a way to protect against social engineering? What should you do? Damage to national security It is permissible to release unclassified information to the public prior to being cleared. What should you do if you receive a game application request that includes permission to access your friends, profile information, cookies, and sites visited? Under which circumstances may you be subject to criminal, disciplinary, and/or administrative action due to online misconduct? What are some actions you can take to try to protect your identity? Darryl is managing a project that requires access to classified information. You should only accept cookies from reputable, trusted websites. This information is summarized here. **Social NetworkingWhich of the following is a security best practice when using social networking sites? *Insider Threat Which type of behavior should you report as a potential insider threat? A coworker removes sensitive information without authorization. How dotraditional orientations contrast withchange? Which of the following is a best practice for securing your home computer? WebThere are a number of individuals who can access classified data. What is a good practice for physical security? What should you do? e. Calculate the critical boundaries for the p-chart (i.e., UCL, LCL, Upper AB boundary, etc.). *Mobile DevicesWhich of the following is an example of removable media? internet-quiz. This includes government officials, military personnel, and intelligence analysts. cyber-awareness. WebYou must have your organizations permission to telework. He has the appropriate clearance and a signed, approved, non-disclosure agreement. If aggregated, the information could become classified. ~All documents should be appropriately marked, regardless of format, sensitivity, or classification.Unclassified documents do not need to be marked as a SCIF.Only paper documents that are in open storage need to be marked. Which of the following is an example of near field communication (NFC)?-A smartphone that transmits credit card payment information when held in proximity to a credit card reader. (do NOT click links or respond before verifying it is legitimate). Which of the following does a security classification guide provided? **TravelWhich of the following is a concern when using your Government-issued laptop in public? 0000015315 00000 n -Put the CD in the trash DoD employees are prohibited from using a DoD CAC in card-reader-enabled public devices. *Classified Data Which of the following individuals can access classified data? Pictures of your petYour birthdayYour hobbies~Your personal e-mail address. Classified information may be made available to a person only when the possessor of the information establishes that the person has a valid need to know and the access is essential to the accomplishment of official government duties. data. *Malicious CodeWhat is a possible effect of malicious code?-Files may be corrupted, erased, or compromised. Which of the following individuals can access classified data? Malicious code: During the year, the company purchases additional inventory for$23,000. WebPotential Impact on Organizations and Individuals . Jarden prepares a schedule of its December 31, 2017, accounts receivable by age. Which type of behavior should you report as a potential insider threat? a unidentifiable email requiring you to use a special link to verify log in information. Hostility or anger toward the United States and its policies. What must users ensure when using removable media such as a compact disk (CD)? On the basis of past experience, it estimates the percent of receivables in each age category that will become uncollectible. true traveling overseas mobile phone cyber awareness. Which of the following individuals can access classified data? WebOnly persons with appropriate clearance, a non-disclosure agreement, and need-to-know can access classified data. Which of the following is NOT a best practice to preserve the authenticity of your identity? Immediately notify your security point of contact. An unsecured IoT device can become an attack vector to any other device on your home network, including your Government laptop. Physically assess that everyone within listening distance is cleared and has a need-to-know for the information being discussed. He has the appropriate clearance and a signed, approved, non-disclosure agreement. You should only accept cookies from reputable, trusted websites. 0000006207 00000 n At the beginning of the year, Bryers Incorporated reports inventory of $8,000. Which of the following is an appropriate use of Government e-mail? 1 Answer 0 votes answered Aug 3, 2022 by kabita (13.8k points) Best answer Only persons with appropriate clearance, a non-disclosure agreement, and need-to Spillage can be either inadvertent or intentional. What should you do? internet-quiz. *Sensitive Compartmented InformationWhat should the participants in this conversation involving SCI do differently? Users must adhere to the rules of behavior defined in applicable Systems Security Plans, DOL and agency guidance. Government-owned PEDs when expressly authorized by your agency. Dr. Baker reports that the sessions addressed Ms. Jones's depression, which poses no national security risk. *Insider Threat Which type of behavior should you report as a potential insider threat? Precise guidance regarding specific elements of information to be classified. Transmissions must be between Government e-mail accounts and must be encrypted and digitally signed when possible. Which of the following is an example of a strong password? 322 0 obj <>stream Write your password down on a device that only you access (e.g., your smartphone). **Social NetworkingYour cousin posted a link to an article with an incendiary headline on social media. What is the best example of Protected Health Information (PHI)? Understanding and using the available privacy settings. WebThings required to access classified information: Signed SF 312. Need-to-know is a determination that an individual requires access to specific classified information in the performance of (or assist in the performance of) lawful and authorized government functions and duties. WebTheodore is seeking access to classified information that he does not need to know to perform his job duties. **Classified DataWhich type of information could reasonably be expected to cause serious damage to national security if disclosed without authorization? How can you protect yourself from social engineering?-Follow instructions given only by verified personnel. **Social EngineeringWhat is a common indicator of a phishing attempt? "I'll pass " Appropriate clearance; signed and approved non-disclosure agreement; and need-to-know. What type of activity or behavior should be reported as a potential insider threat? What type of activity or behavior should be reported as a potential insider threat? WebBe aware of classification markings and all handling caveats. *Website UseWhat action should you take with an e-mail from a friend containing a compressed Uniform Resource Locator (URL)? Spillage can be either inadvertent or intentional. Only persons with appropriate clearance, a non-disclosure agreement, and need-to-know can access classified data. Land where the soil is fertile enough to grow grapes necessary for the wine production Report the crime to local law enforcement, A type of phishing targeted at senior officials. All of the above. **Classified DataHow should you protect a printed classified document when it is not in use? **Classified DataWhich of the following is a good practice to protect classified information? He has the appropriate clearance and a signed, approved, non-disclosure agreement. 2.2.2. 0 \end{array} Which of the following terms refers to someone who harms national security through authorized access to information system? Which type of behavior should you report as a potential threat?-Hostility or anger toward the United States and its policies. Maintain possession of your laptop and other government-furnished equipment (GFE) at all times. What should you do? He has the appropriate clearance and a signed, approved non-disclosure agreement. WebBe aware of classification markings and all handling caveats. *Controlled Unclassified InformationWhich of the following is NOT a correct way to protect CUI? Darryl is managing a project that requires access to classified information. 0000002497 00000 n WebOnly persons with appropriate clearance, a non-disclosure agreement, and need-to-know can access classified data. What are some examples of removable media? Coworker making consistent statements indicative of hostility or anger toward the United States and its policies. Data format data can be either structured or unstructured. Investigate the destination by using the preview feature and see where the link actually leads: using internet search engine to find instructions to preview specific compressed URL format. The end Which of the following individuals can access classified data? WebWhich of the following is NOT a criterion used to grant an individual access to classified data? true-statement. *Insider Threat Which type of behavior should you report as a potential insider threat? Research the source of the article to evaluate its credibility and reliability. Smiths report identifies four wineries that are the major players in the French wine Which of the following is NOT a way that malicious code spreads? False Which of the following is NOT sensitive information? Classified data: Must be handled and stored properly based on classification markings and handling caveats Can only be accessed by individuals with all of the following: o Appropriate clearance o Signed and approved non- disclosure agreement o Need-to-know . *SpillageWhat should you do if a reporter asks you about potentially classified information on the web? **Insider ThreatHow many potential insider threat indicators does a coworker who often makes others uneasy by being persistent in trying to obtain information about classified projects to which he has no access, is boisterous about his wife putting them in credit card debt, and often complains about anxiety and exhaustion display? WebStore classified data appropriately in a GSA-approved vault/container. P2P (Peer-to-Peer) software can do the following except: Allow attackers physical access to network assets. Retrieve classified documents promptly from printers. *Social NetworkingYour cousin posted a link to an article with an incendiary headline on social media. WebWhat is required for an individual to access classified data? Need-to-know is a determination that an individual requires access to specific classified information in the performance of (or assist in the performance of) lawful and authorized government functions and duties. Avoid a potential security violation by using the appropriate token for each system. Which of the following is NOT true of traveling overseas with a mobile phone? WebClassified information that should be unclassified and is downgraded. What is a way to prevent the download of viruses and other malicious code when checking your e-mail? *Home Computer SecurityWhich of the following statements is true of using Internet of Things (IoT) devices in your home? over the past five years, the French wine industry has not responded to changing consumer Classified data: Must be handled and stored properly based on classification markings and handling caveats Can only be accessed by individuals with all of the following: o Appropriate clearance o Signed and approved non- disclosure agreement o Need-to-know . a year. 1312.23 Access to classified information. Darryl is managing a project that requires access to classified information. At the same time, the distribution of income has become more unequal. When is it appropriate to have your securing badge visible with a sensitive compartmented information facility. Shred personal documents; never share passwords; and order a credit report annually. Determine if the software or service is authorized, Which of the following is an example of removable media. Be aware of classification markings and all handling caveats. 0000010569 00000 n Don't talk about work outside your workspace unless it is a specifically designated public meeting environment and is controlled by the event planners. Call your security point of contact immediately. An individual can be granted access to classified information provided the person has been in the Armed Services for 10 years. Which of the following is a potential insider threat indicator? Classified Information can only be accessed by individuals with -All of the above Classified Information is -Assigned a classification level by a supervisor A coworker has left an unknown CD on your desk. **Home Computer SecurityWhat should you consider when using a wireless keyboard with your home computer? Need-to-know. 0000034293 00000 n Baker was Ms. Jones's psychiatrist for three months. *Sensitive Compartmented InformationWhat action should you take if you become aware that Sensitive Compartmented Information (SCI) has been compromised? cyber-awareness. 0000011071 00000 n False Which of the following is NOT sensitive information? cyber. makes a note to do more research on generic competitive strategies to verify VanDriesens In order to access this information, these individuals must have security clearance from the appropriate government agency. Do not use any personally owned/non-organizational removable media on your organization's systems. Which of the following is the best example of Personally Identifiable Information (PII)? What is a best practice to protect data on your mobile computing device? A coworker uses a personal electronic device in a secure area where their use is prohibited. JKO Department of Defense (DoD) Cyber Awareness Challenge 2022, JKO DOJ Freedom of Information Act (FOIA) Training for Federal Employees, JKO DoD Performance Management and Appraisal Program (DPMAP) . Which of the following individuals can access classified data 2022? Immediately notify your security POC. He has the appropriate clearance and a signed approved non-disclosure agreement. Avoid using the same password between systems or applications. Which of the following is NOT a typical means for spreading malicious code? It tries to be a cost leader by selling its wine at a price that is slightly below the other firms, but it also tries to differentiate itself from its competitors WebData classification is the process of organizing data into categories for its most effective and efficient use. Is it acceptable to take a short break while a coworker monitors your computer while logged on with your Common Access Card (CAC)? -Darryl is managing a project that requires access to classified information. After clicking on a link on a website, a box pops up and asks if you want to run an application. Hostility or anger toward the United States and its policies. **Removable Media in a SCIFWhat portable electronic devices (PEDs) are allowed in a Sensitive Compartmented Information Facility (SCIF)? **Mobile DevicesWhich is a rule for removable media, other portable electronic devices (PEDs), and mobile computing devices to protect Government systems? Classified Information can only be accessed by individuals with -All of the above Classified Information is -Assigned a classification level by a supervisor A coworker has left an unknown CD on your desk. Which of the following is a god practice to protect classified information?-Ensure proper labeling by appropriately marking all classified material and, when required, sensitive material. bargaining power over the industry? to examine the competitive strategies employed by various French wineries. When your vacation is over, after you have returned home. **Insider ThreatBased on the description that follows, how many potential insider threat indicator(s) are displayed? Use online sites to confirm or expose potential hoaxes. Structured data are usually human readable and can be indexed. 290 33 No. Regardless of state, data classified as confidential must remain confidential. A colleague has won 10 high-performance awards, can be playful and charming, is not currently in a relationship, and is occasionally aggressive in trying to access sensitive information. Your cousin posted a link to an article with an incendiary headline on social media. Spillage occurs when information is spilled from a higher classification or protection level to a lower classification or protection level. What is a possible indication of a malicious code attack in progress? industry. Something you possess like a CAC, and a Pin or Password. Insiders are given a level of trust and have authorized access to Government information systems. WebDOL internal policy specifies the following security policies for the protection of PII and other sensitive data: It is the responsibility of the individual user to protect data to which they have access. What action should you take? **Use of GFEWhen can you check personal e-mail on your Government-furnished equipment (GFE)? Appropriate clearance; signed and approved non-disclosure agreement; and need-to-know. To protect CUI: Properly mark all CUI 0000004057 00000 n Structured data are usually human readable and can be indexed. Darryl is managing a project that requires access to classified information. He has the appropriate clearance and a signed, approved, non-disclosure agreement. Store classified data appropriately in a GSA-approved vault/container. Use only your personal contact information when establishing your account. **Classified DataWhich classification level is given to information that could reasonably be expected to cause serious damage to national security? **Home Computer SecurityWhich of the following is a best practice for securing your home computer? Evaluate the causes of the compromiseE-mail detailed information about the incident to your security point of contact (Wrong)Assess the amount of damage that could be caused by the compromise~Contact your security point of contact to report the incident. How many potential insider threat indicators does a person who is playful and charming, consistently wins performance awards, but is occasionally aggressive in trying to access sensitive information display? internet. When classified data is not in use, how can you protect it? **Insider ThreatBased on the description that follows, how many potential insider threat indicator(s) are displayed? ALL OF THE ABOVE CUI may be stored on any password-protected system. **Identity managementWhich is NOT a sufficient way to protect your identity? Do not access website links, buttons, or graphics in e-mail. -Darryl is managing a project that requires access to classified information. WebWhich of the following is NOT a criterion used to grant an individual access to classified data? **Insider ThreatWhich of the following is NOT considered a potential insider threat indicator? *Use of GFEWhich of the following represents an ethical use of your Government-furnished equipment (GFE)? WebClassified data: Must be handled and stored properly based on classification markings and handling caveats Can only be accessed by individuals with all of the following: o Appropriate clearance o Signed and approved non- disclosure agreement o Need-to-know . He has the appropriate clearance and a signed, approved, non-disclosure agreement. Cover sheets will be used to protect classified documents from inadvertent disclosure while in use. What is a valid response when identity theft occurs? *Website UseHow can you protect yourself from internet hoaxes? Unusual interest in classified information. What type of unclassified material should always be marked with a special handling caveat? Data states data exists in one of three statesat rest, in process, or in transit. xref When is conducting a private money-making venture using your Government-furnished computer permitted? Coworker making consistent statements indicative of hostility or anger toward the United States and its policies. WebWhich of the following individuals can access classified data Cyber Awareness 2022? Which of the following is a wireless technology that enables your electronic devices to establish communications and exchange information when places next to each other called? Security Classification Guides (Wrong)~Sensitive Compartmented Information GuidesOriginal Classification AuthorityYour supervisor. Based on the description that follows, how many potential insider threat indicator(s) are displayed? You receive a call from someone from the help desk who needs your assistance with a problem on your computer. **Home Computer SecurityHow can you protect your information when using wireless technology? Contact the IRS using their publicly available, official contact information. Required **Mobile DevicesWhat should you do when going through an airport security checkpoint with a Government-issued mobile device? This includes government officials, military personnel, and intelligence analysts. **Insider ThreatWhich of the following should be reported as a potential security incident? In setting up your personal social networking service account, what email address should you use? 1.1.1. Chinas real GDP growth rate has fallen from 10 percent a year to 6.8 percent . He has the appropriate clearance and a signed, approved non-disclosure agreement. **Classified DataWhich of the following is true of protecting classified data? 0000000975 00000 n Which of the following is NOT a correct way to protect sensitive information? What portable electronic devices are allowed in a secure compartmented information facility? from the South Winery. What is required for an individual to access classified data? When may you be subject to criminal, disciplinary, and/or administrative action due to online misconduct? What type of activity or behavior should be reported as a potential insider threat? What portable electronic devices (PEDs) are permitted in a SCIF? *Social EngineeringWhat is a common indicator of a phishing attempt? **Social NetworkingWhat should you do if you receive a game application request that includes permission to access your friends, profile information, cookies, and sites visited? Remove your security badge after leaving your controlled area or office building. Senior government personnel, military or civilian. WebData classification is the process of organizing data into categories for its most effective and efficient use. Maria received an assignment to support a project that requires access to classified information. Based on the description that follows, how many potential insider threat indicator(s) are displayed? **Physical SecurityWithin a secure area, you see an individual who you do not know and is not wearing a visible badge. 0000001676 00000 n A colleague is playful and charming, consistently wins performance awards, and is occasionally aggressive in trying to access classified information. Spillage occurs when information is spilled from a higher classification or protection level to a lower classification or protection level. Which type of information could reasonably be expected to cause serious damage to national security if disclosed without authorization? Attempting to access sensitive information without a need-to-know. He has the appropriate clearance and a signed, approved, non-disclosure agreement. Follow the instructions given only by verified personnel. Which of the following is a good practice to prevent spillage? At the end of the year, the cost of inventory remaining is $10,000. 3. Call your security point of contact immediately. \text { (more than 80\% concentration) } & \text { France } & \text { France } & \text { England } & \text { U.S. } \\ Immediately notify your security point of contact. Refer the reporter to your organization's public affair office. A type of phishing targeted at senior officials. Phishing can be an email with a hyperlink as bait. cyber. *SpillageWhich of the following is a good practice to prevent spillage? WebWhich of the following individuals can access classified data Cyber Awareness 2022?