What level of damage can the unauthorized disclosure of information classified as Top Secret reasonably be expected to cause? The proper security clearance and indoctrination into the SCI program. The following table lists the number of drivers in the United States, the number of fatal accidents, and the number of total accidents in each age group in 2002. Which of the following includes Personally Identifiable Information (PII) and Protected Health Information (PHI)? A coworker uses a personal electronic device in a secure area where their use is prohibited. Permitted Uses of Government-Furnished Equipment (GFE). **Social Networking When may you be subject to criminal, disciplinary, and/or administrative action due to online misconduct? The annual Cyber Awareness Challenge is a course that helps authorized users learn how to best avoid and reduce threats and vulnerabilities in an organizations system. Which of the following is true of the Common Access Card (CAC) or Personal Identity Verification (PIV) card? Is this safe? Mark SCI documents appropriately and use an approved SCI fax machine. Which of the following is NOT Protected Health Information (PHI)? How should you respond? Which of the following is a reportable insider threat activity? (Identity Management) What certificates are contained on the Common Access Card (CAC)? **Removable Media in a SCIF What portable electronic devices (PEDs) are allowed in a Sensitive Compartmented Information Facility (SCIF)? How should you protect your Common Access Card (CAC) or Personal Identity Verification (PIV) card? Use the classified network for all work, including unclassified work. A coworker is observed using a personal electronic device in an area where their use is prohibited. Never write down the PIN for your CAC. (Spillage) What level of damage can the unauthorized disclosure of information classified as confidential reasonably be expected to cause? (Mobile Devices) When can you use removable media on a Government system? Store it in a locked desk drawer after working hours. (Spillage) What should you do when you are working on an unclassified system and receive an email with a classified attachment? Which of the following actions is appropriate after finding classified Government information on the internet? A compromise of Sensitive Compartmented Information (SCI) occurs when a person who does not have the required clearance or access caveats comes into possession of SCI_________.??? Her badge is not visible to you. **Home Computer Security Which of the following is a best practice for securing your home computer? Retrieve classified documents promptly from printers. Remove your security badge, common access card (CAC), or personal identity verification (PIV) card. Search for an answer or ask Weegy. Store classified data appropriately in a GSA-approved vault/container. Note any identifying information, such as the website's URL, and report the situation to your security POC. Of the following, which is NOT a method to protect sensitive information? What should you do? CPCON 5 (Very Low: All Functions). What should be your response? Validate friend requests through another source before confirming them. Transmit classified information via fax machine only Not correct Which of the following is NOT a correct way to protect CUI? (Malicious Code) Which of the following is NOT a way that malicious code spreads? Right-click the link and select the option to preview??? **Insider Threat Which scenario might indicate a reportable insider threat? Write your password down on a device that only you access. Which of the following is true about unclassified data? Should you always label your removable media? Which of the following is a best practice to protect information about you and your organization on social networking sites and applications? Don't talk about work outside your workspace unless it is a specifically designated public meeting environment and is controlled by the event planners. Label all files, removable media, and subject headers with appropriate classification markings. Store it in a shielded sleeve to avoid chip cloning. Never allow sensitive data on non-Government-issued mobile devices. 10-3 X-ray Interaction with Matter, Fundamentals of Engineering Economic Analysis, David Besanko, Mark Shanley, Scott Schaefer. **Home Computer Security What should you consider when using a wireless keyboard with your home computer? asked in Internet by voice (265k points) internet. (Spillage) What type of activity or behavior should be reported as a potential insider threat? *Spillage. Only paper documents that are in open storage need to be marked. internet. Security Classification Guides (SCGs).??? A colleague complains about anxiety and exhaustion, makes coworkers uncomfortable by asking excessive questions about classified projects, and complains about the credit card bills that his wife runs up. How many potential insider threat indicators does this employee display? **Removable Media in a SCIF What action should you take when using removable media in a Sensitive Compartmented Information Facility (SCIF)? Use your own security badge, key code, or Common Access Card (CAC)/Personal Identity Verification (PIC) card. ~All documents should be appropriately marked, regardless of format, sensitivity, or classification. true-statement. Use a single, complex password for your system and application logons. Which piece of information is safest to include on your social media profile? Which of the following is true of Protected Health Information (PHI)? What should you do to protect yourself while on social networks? Not correct. Classified material must be appropriately marked. What should you do? cyber-awareness. Select the information on the data sheet that is personally identifiable information (PII). What can be used to track Marias web browsing habits? What should be your response? *Sensitive Compartmented Information When faxing Sensitive Compartmented Information (SCI), what actions should you take? No. How can you avoid downloading malicious code? Unclassified documents do not need to be marked as a SCIF. Which of the following is true of Sensitive Compartmented Information (SCI)? Which of the following best describes wireless technology? After reading an online story about a new security project being developed on the military installation where you work, your neighbor asks you to comment about the article. Individuals must avoid referencing derivatively classified reports classified higher than the recipient.??? Someone who uses authorized access, wittingly or unwittingly, to harm national security through unauthorized disclosure or other actions that may cause the loss or degradation of resources or capabilities. (Sensitive Information) What must the dissemination of information regarding intelligence sources, methods, or activities follow? **Identity management Which is NOT a sufficient way to protect your identity? Which of the following is NOT true concerning a computer labeled SECRET? Which of the following is NOT a typical means for spreading malicious code? Do not access website links in e-mail messages. Attempting to access sensitive information without need-to-know, Avoid talking about work outside of the workplace or with people without a need-to-know, Report the suspicious behavior in accordance with their organizations insider threat policy. What is a rule for removable media, other portable electronic devices (PEDs), and mobile computing devices to protect Government systems? Based on the description that follows, how many potential insider threat indicator(s) are displayed? *Sensitive Compartmented Information Which must be approved and signed by a cognizant Original Classification Authority (OCA)? Unclassified documents do not need to be marked as a SCIF. Be aware of classification markings and all handling caveats. Which of the following is true of telework? **Travel Which of the following is true of traveling overseas with a mobile phone? what should you do? Unauthorized Disclosure of Classified Information and Controlled Unclassified Information . -Its classification level may rise when aggregated. (2) War planning documents which contain worldwide -- (a) Planning data and assumptions, (b) Wartime planning factors for the use of nuclear weapons, (c) Intelligence estimates of enemy capabilities, (d) Force composition and development, and #1) Open WEKA and select "Explorer" under 'Applications'. What is a proper response if spillage occurs? Spear Phishing attacks commonly attempt to impersonate email from trusted entities. If you participate in or condone it at any time. You receive an inquiry from a reporter about government information not cleared for public release. Which of the following should be done to keep your home computer secure? Which of the following is NOT a DoD special requirement for tokens? ~All documents should be appropriately marked, regardless of format, sensitivity, or classification. **Travel What security risk does a public Wi-Fi connection pose? Which of the following statements is NOT true about protecting your virtual identity? **Insider Threat What function do Insider Threat Programs aim to fulfill? classified-document. You know that this project is classified. Which is NOT a method of protecting classified data? Unknown data is categorized by the system; an analyst then reviews the results Which of the following is a practice that helps to prevent the download of viruses and other malicious code when checking your email? Attempt to change the subject to something non-work related, but neither confirm nor deny the articles authenticity. Approved Security Classification Guide (SCG). Contact the IRS using their publicly available, official contact information. Which of the following statements is true? Which of the following should be reported as a potential security incident? Updated 8/5/2020 8:06:16 PM. **Social Networking Which of the following best describes the sources that contribute to your online identity? What is best practice while traveling with mobile computing devices? Based on the description that follows, how many potential insider threat indicator(s) are displayed? Upon connecting your Government-issued laptop to a public wireless connection, what should you immediately do? What is a valid response when identity theft occurs? What does Personally Identifiable Information (PII) include? It is releasable to the public without clearance. (Correct) -It does not affect the safety of Government missions. Maintain possession of your laptop and other government-furnished equipment (GFE) at all times. Following instructions from verified personnel. When unclassified data is aggregated, its classification level may rise. Classified information that should be unclassified and is downgraded. You receive an email from the Internal Revenue Service (IRS) demanding immediate payment of back taxes of which you were not aware. not correct Set hasDigit to true if the 3-character passCode contains a digit, Critical, Essential, and Support Functions. When classified data is not in use, how can you protect it? Personal information is inadvertently posted at a website. Ask the individual to see an identification badge. What is a best practice for protecting controlled unclassified information (CUI)? Which of the following is NOT a criterion used to grant an individual access to classified data? Which of the following is a good practice to prevent spillage. You must have your organization's permission to telework c. You may use unauthorized software as long as your computer's antivirus software is up to date. *Malicious Code What are some examples of malicious code? What would you do if you receive a game application request on your government computer that includes permission to access your friends, profile information, cookies, and sites visited? E-mailing your co-workers to let them know you are taking a sick day. What should you do if someone forgets their access badge (physical access)? What action should you take? Second, unclassified points are regarded as ground seeds if the distances between the points and the detected planes are less than a buffer difference threshold. Unclassified Information Student Guide . Adversaries exploit social networking sites to disseminate fake news Correct. At EPA, the CUI Program is housed in the Libraries and Accessibility Division (LAD) within the Office of Mission Supports (OMS), Office of Enterprise Information Programs (OEIP). Correct. **Physical Security Within a secure area, you see an individual who you do not know and is not wearing a visible badge. Exceptionally grave damage. What is the response to an incident such as opening an uncontrolled DVD on a computer in a SCIF. Refer the reporter to your organizations public affairs office. Why might "insiders" be able to cause damage to their organizations more easily than others? Which of the following is NOT true of traveling overseas with a mobile phone? cyber. Use the classified network for all work, including unclassified work. How Do I Answer The CISSP Exam Questions? What is an indication that malicious code is running on your system? which of the following is true about unclassified data. How can you protect your organization on social networking sites? Q&A for work. correct. The attributes of identified ground seeds are modified to ground points. What should you do? *Sensitive Compartmented Information When should documents be marked within a Sensitive Compartmented Information Facility (SCIF). Under which circumstances may you be subject to criminal, disciplinary, and/or administrative action due to online misconduct? (Identity Management) Which of the following is an example of two-factor authentication? A colleague has won 10 high-performance awards, can be playful and charming, is not currently in a relationship, and is occasionally aggressive in trying to access sensitive information. not correct correct. *Controlled Unclassified Information Which of the following is NOT an example of CUI? What security device is used in email to verify the identity of sender? *Controlled Unclassified Information Which of the following is NOT a correct way to protect CUI? On a NIPRNet system while using it for a PKI-required task, Something you possess, like a CAC, and something you know, like a PIN or password. Correct. correct. A type of phishing targeted at high-level personnel such as senior officials. As part of the survey the caller asks for birth date and address. Which of the following is NOT a security best practice when saving cookies to a hard drive? However, unclassified data. You check your bank statement and see several debits you did not authorize. Here you can find answers to the DoD Cyber Awareness Challenge. If you receive a phone call from a stranger asking for information about your invoice payment process, you should: Crucial information about a user or organization can be gained through. What is a best practice to protect data on your mobile computing device? Use a common password for all your system and application logons. 1.To provide opportunities for individuals and businesses to open checking accounts __________, To write rules and guidelines for financial institutions under its supervision __________, To be the lender of last resort for financial institutions __________, To conduct the nations monetary policy with the goals of maintaining full employment and price stability __________, 5. Which of the following may help to prevent spillage? What action should you take? Unclassified information is a threat to national security. *Sensitive Compartmented Information What should the owner of this printed SCI do differently? Immediately notify your security point of contact. data. Reviewing and configuring the available security features, including encryption. Prudence faxes CUI using an Unclassified cover sheet via a Secret fax machine. Attempting to access sensitive information without need-to-know. Unauthorized Disclosure of Classified Information for DoD, Security Awareness: Derivative Classification Answers, CITI Ethics, Responsible Conduct, RCR, Law, HTH And IRB Answers, EVERFI Achieve Consumer Financial Education Answers, Security Pro: Chapter 3 (3.1.8) & 4.1 Security Policies Answers, CITI Module #3 Research in Public Elementary and Secondary Schools, Answers to CTS Unit 7 Lab 7-2: Protocols and Services SNMP, Google Analytics Individual Qualification Exam Answers, Everfi Module 4 Credit Scores Quiz Answers, Which Of The Following Is Not Considered A Potential Insider Threat Indicator. Correct. Only documents that are classified Secret, Top Secret, or SCI require marking. Controlled Unclassified Information (CUI) is informationthat requires safeguarding or dissemination controls consistent with applicable laws, regulations, and Government-wide policies, but is not classified under Executive Order 13526 "Classified National Security Informat What are examples of CUI? **Physical Security What is a good practice for physical security? A Which of the following individuals can access classified data? How can you protect your information when using wireless technology? The physical security of the device. Read the latest news from the Controlled Unclassified Information (CUI) program. Classification markings and handling caveats. **Social Networking Which of the following information is a security risk when posted publicly on your social networking profile? You receive an email from a company you have an account with. not correct Federal agencies routinely generate, use, store, and share information that, while not meeting the threshold for classification as national security or atomic energy information, requires some level of protection from unauthorized access and release.