Which of the following is a best practice to protect information about you and your organization on social networking sites and applications? e. Why do Elodea and onion cells have more consistent shapes than human epithelial cells? Unusual interest in classified information. *Sensitive Compartmented Information When faxing Sensitive Compartmented Information (SCI), what actions should you take? Share sensitive information only on official, secure websites. (Spillage) What level of damage can the unauthorized disclosure of information classified as confidential reasonably be expected to cause? **Social Engineering Which is a best practice that can prevent viruses and other malicious code from being downloaded when checking your e-mail? A coworker brings a personal electronic device into prohibited areas. Follow procedures for transferring data to and from outside agency and non-Government networks. Which of the following is true of using DoD Public key Infrastructure (PKI) token? Who can be permitted access to classified data? Which of the following should be done to keep your home computer secure? It does not require markings or distribution controls. A Follow instructions given only by verified personnel. Exceptionally grave damage to national security. (GFE) When can you check personal e-mail on your Government-furnished equipment (GFE)? View email in plain text and dont view email in Preview Pane. Follow the steps enlisted below to use WEKA for identifying real values and nominal attributes in the dataset. *Spillage Which of the following may help to prevent spillage? Of the following, which is NOT an intelligence community mandate for passwords? What should you do? When is it okay to charge a personal mobile device using government-furnished equipment (GFE)? A. Use a single, complex password for your system and application logons. Avoid using non-Bluetooth-paired or unencrypted wireless computer peripherals. Dont assume open storage in a secure facility is authorized Maybe. You must have permission from your organization. CPCON 2 (High: Critical and Essential Functions) Maintain possession of your laptop and other government-furnished equipment (GFE) at all times. What is the best way to protect your Common Access Card (CAC) or Personal Identity Verification (PIV) card? The challenges goal is simple: To change user behavior to reduce the risks and vulnerabilities DoD Information Systems face. A .gov website belongs to an official government organization in the United States. New interest in learning another language, Which of the following is a good practice to protect classified information. Quizzma is a free online database of educational quizzes and test answers. **Social Engineering Which of the following is a way to protect against social engineering? What should you do? Which of the following can an unauthorized disclosure of information classified as Confidential reasonably be expected to cause? For Government-owned devices, use approved and authorized applications only. Third, the neighbor ground points of an unclassified point are searched from multiple subspaces. What is the best example of Protected Health Information (PHI)? John submits CUI to his organizations security office to transmit it on his behalf. Attempting to access sensitive information without need-to-know. (Mobile Devices) Which of the following statements is true? You check your bank statement and see several debits you did not authorize. (Sensitive Information) What must the dissemination of information regarding intelligence sources, methods, or activities follow? -Its classification level may rise when aggregated. **Identity management What is the best way to protect your Common Access Card (CAC)? What is a way to prevent the download of viruses and other malicious code when checking your e-mail? What does Personally Identifiable information (PII) include? What should you do? **Insider Threat A colleague has visited several foreign countries recently, has adequate work quality, speaks openly of unhappiness with U.S. foreign policy, and recently had his car repossessed. Refer the vendor to the appropriate personnel. Figure 1. Correct. What portable electronic devices (PEDs) are permitted in a SCIF? Unauthorized Disclosure of Classified Information and Controlled Unclassified Information . What can help to protect the data on your personal mobile device. Everything you need to know aboutControlled UnclassifiedInformation(CUI). *Spillage Which of the following is a good practice to aid in preventing spillage? Which of the following is an example of removable media? What should be done to sensitive data on laptops and other mobile computing devices? *Sensitive Information Which of the following is the best example of Personally Identifiable Information (PII)? Correct. Law Enforcement Sensitive (LES),and others. not correct What level of damage can the unauthorized disclosure of information classified as Top Secret reasonably be expected to cause? In the following situations, determine if the duty describes would be one of the Fed is responsible or is not responsible to enforce. Unclassified information is a threat to national security. Which of the following is NOT a typical result from running malicious code? The proper security clearance and indoctrination into the SCI program. Which of the following is not Controlled Unclassified Information (CUI)? Which designation marks information that does not have potential to damage national security? Never allow sensitive data on non-Government-issued mobile devices. **Social Engineering Which of the following is a practice that helps to prevent the download of viruses and other malicious code when checking your email? What action should you take? **Website Use While you are registering for a conference, you arrive at the website http://www.dcsecurityconference.org/registration/. Which of the following is a good practice for telework? Classified Information can only be accessed by individuals with. There are no choices provides which make it hard to pick the untrue statement about unclassified data. 1.1.2 Classified Data. That trust is bounded by the Oath of Office we took willingly. (Spillage) Which of the following is a best practice to protect information about you and your organization on social networking sites and applications? How do you think antihistamines might work? Ask the individual to see an identification badge. What should you do if someone asks to use your government issued mobile device (phone/laptop..etc)? You are reviewing your employees annual self evaluation. On a NIPRNet system while using it for a PKI-required task, Something you possess, like a CAC, and something you know, like a PIN or password. -It never requires classification markings. (Sensitive Compartmented Information) Which of the following best describes the compromise of Sensitive Compartmented Information (SCI)? What level of damage can the unauthorized disclosure of information classified as confidential reasonably be expected to cause? Which of the following is NOT a security best practice when saving cookies to a hard drive? *Spillage After reading an online story about a new security project being developed on the military installation where you work, your neighbor asks you to comment about the article. Which of the following represents a good physical security practice? Which of the following is NOT an appropriate way to protect against inadvertent spillage? DoD Unclassified data: Must be cleared before being released to the public May require applci aton i of Controled l Uncasl sed Iifi nformaton i (CU)I access and distribution controls Must be clearly marked as Unclassified or CUI if included in a classified document or classified storage area Software that installs itself without the users knowledge. Unclassified documents do not need to be marked as a SCIF. The answer has been confirmed to be correct. Which of the following personally-owned computer peripherals is permitted for use with Government-furnished equipment? What should you do? Sensitive information. Keeping a database from being accessed by unauthorized visitors C. Restricting a subject at a lower classification level from accessing data at a higher classification level D. Preventing an . Maria is at home shopping for shoes on Amazon.com. What should you do if a reporter asks you about potentially classified information on the web? Which of the following is NOT a DoD special requirement for tokens? Research the source to evaluate its credibility and reliability. All to Friends Only. *Sensitive Information What is the best example of Personally Identifiable Information (PII)? be wary of suspicious e-mails that use your name and/or appear to come from inside your organization. Hostility or anger toward the United States and its policies. Use TinyURL's preview feature to investigate where the link leads. Is this safe? correct. Information should be secured in a cabinet or container while not in use. How many potential insiders threat indicators does this employee display? Position your monitor so that it is not facing others or easily observed by others when in use Correct. Controlled Unclassified Information (CUI) is information that requires safeguarding or dissemination controls pursuant to and consistent with applicable law, regulations, and government-wide policies but is not classified under Executive Order 13526 or the Atomic Energy Act, as amended. **Social Networking Your cousin posted a link to an article with an incendiary headline on social media. What does Personally Identifiable Information (PII) include? When is the best time to post details of your vacation activities on your social networking website? All of these. Proactively identify potential threats and formulate holistic mitigation responses. (Identity Management) Which of the following is an example of two-factor authentication? The age of the driver may top the list of variables. **Travel What security risk does a public Wi-Fi connection pose? 870 Summit Park Avenue Auburn Hills, MI 48057. Taking classified documents from your workspace. When using a public device with a card reader, only use your DoD CAC to access unclassified information, is only allowed if the organization permits it. What is considered ethical use of the Government email system? A colleague has won 10 high-performance awards, can be playful and charming, is not currently in a relationship, and is occasionally aggressive in trying to access sensitive information. You receive an inquiry from a reporter about government information not cleared for public release. CUI may be stored on any password-protected system. *Sensitive Compartmented Information What should the participants in this conversation involving SCI do differently? Appropriate clearance, a signed and approved non-disclosure agreement, and need-to-know, Insiders are given a level of trust and have authorized access to Government information systems.