**Classified DataWhich of the following is true of protecting classified data? Examples are: Patient names, Social Security numbers, Drivers license numbers, insurance details, and birth dates. What describes a Sensitive Compartmented Information (SCI) program? -After work hours, storing sensitive information in unlocked containers, desks, or cabinets if security is not present. Of the following, which is NOT a problem or concern of an Internet hoax? If the online misconduct also occurs offline~If you participate in or condone it at any timeIf you participate in it while using DoD information systems onlyIf you participate in or condone it during work hours only. -Delete email from senders you do not know. Only persons with appropriate clearance, a non-disclosure agreement, and need-to-know can access classified data. Which of the following is true about telework? Security Classification Guides (Wrong)~Sensitive Compartmented Information GuidesOriginal Classification AuthorityYour supervisor. What can you do to protect yourself against phishing? Interview: Dr. Martin Stanisky **Identity managementWhich of the following is NOT a best practice to preserve the authenticity of your identity? What action should you take? Report the crime to local law enforcement. *Sensitive Compartmented Information Attempt to change the subject to something non-work related, but neither confirm nor deny the articles authenticity. Ensure proper labeling by appropriately marking all classified material and, when required, sensitive material. No, you should only allow mobile code to run from your organization or your organization's trusted sites. When is conducting a private money-making venture using your Government-furnished computer permitted? Note any identifying information and the website's Uniform Resource Locator (URL). Social Security Number; date and place of birth; mother's maiden name. Medical Ethics and Detainee Operations Basic Course (5hrs) . A well-planned data classification system makes essential data easy to find and retrieve. Senior government personnel, military or civilian. In this short Post, I hope you get the answer to your question. How can you . Which of the following is NOT a correct way to protect CUI? *SENSITIVE COMPARTMENTED INFORMATION*When is it appropriate to have your security badge visible within a sensitive compartmented information facility (SCIF)? <> Appropriate clearance, a signed and approved non-disclosure agreement, and need-to-know. Lock your device screen when not in use and require a password to reactivate. Ask for information about the website, including the URL. What is considered ethical use of the Government email system? *SOCIAL ENGINEERING*How can you protect yourself from internet hoaxes? Which of the following is a best practice to protect information about you and your organization on social networking sites and applications? What is a good practice for physical security? 0000004517 00000 n Your health insurance explanation of benefits (EOB). What must users do when using removable media within a Sensitive Compartmented Information Facility (SCIF)? CUI may be stored on any password-protected system. \text{Total Revenue}&&44,000\\ If aggregated, the information could become classified. Inform your security POC of all non-professional or non-routine contacts with foreign nations, including, but not limited to, joining each other's social media sites. -Darryl is managing a project that requires access to classified information. You are leaving the building where you work. A type of phishing targeted at senior officials. Insiders are given a level of trust and have authorized access to Government information systems. As long as the document is cleared for public release, you may share it outside of DoD. Which of the following is NOT Protected Health Information (PHI)? Be aware of classification markings and all handling caveats. Spillage because classified data was moved to a lower classification level system without authorization. They can be part of a distributed denial-of-service (DDoS) attack. Only persons with appropriate clearance, a non-disclosure agreement, and need-to-know can access classified data. Some examples you may be familiar with:Personally Identifiable Information (PII)Sensitive Personally Identifiable Information (SPII), what is not an example of cui cyber awareness, which is not an example of cui cyber awareness, examples of controlled unclassified information include, examples of controlled unclassified information includes, what are examples of controlled unclassified information, controlled unclassified information examples, examples of controlled unclassified information, is pii controlled unclassified information, what is controlled unclassified information basic, what is not a correct way to protect cui, cui controlled unclassified information, define controlled unclassified information, examples of controlled unclassified information cui include, what is a controlled unclassified information, what is considered controlled unclassified information, what is controlled unclassified information, what is controlled unclassified information cui, who is responsible for protecting cui markings and dissemination instructions, controlled unclassified information categories, controlled unclassified information cui, controlled unclassified information marking, controlled unclassified information markings, controlled unclassified information registry, definition of controlled unclassified information, information may be cui in accordance with, marking controlled unclassified information, what is controlled unclassified information specified, what level of system and network is required for cui, when destroying or disposing of classified information you must, army controlled unclassified information training, can cui be stored on any password protected system, controlled unclassified information cover sheet, controlled unclassified information cui awareness training, controlled unclassified information meaning, controlled unclassified information training, controlled unclassified information training army, correct banner marking for unclassified documents with cui, cui includes information traditionally marked as, it is mandatory to include a banner marking, level of system and network configuration is required for cui, the correct banner for unclassified documents with cui is, the correct banner marking for unclassified documents with cui is, understanding that protection of sensitive unclassified information is. *Mobile Devices **Identity ManagementWhich of the following is the nest description of two-factor authentication? Her badge is not visible to you. What is the best example of Protected Health Information (PHI)? Which of following is true of protecting classified data? What should you do to protect yourself while on social networks? -Always use DoD PKI tokens within their designated classification level. Remove your security badge after leaving your controlled area or office building. <> Appropriate clearance; signed and approved non-disclosure agreement; and need-to-know. Who can be permitted access to classified data? stream Darryl is managing a project that requires access to classified information. Which of the following is an appropriate use of Government e-mail? Which of the following is NOT a security best practice when saving cookies to a hard drive? Use only your personal contact information when establishing your account, *Controlled Unclassified InformationSelect the information on the data sheet that is personally identifiable information (PII) but not protected health information (PHI), Jane JonesSocial Security Number: 123-45-6789, *Controlled Unclassified InformationSelect the information on the data sheet that is protected health information (PHI), Interview: Dr. Nora BakerDr. Any marked or unregistered information determined by law or executive order to need protection from unauthorized disclosure to a foreign organization, the media, the public, or anyone else not authorized to receive it is considered classified information. Should you always label your removable media? The required return on this investment is 5.1%. When unclassified data is aggregated, its classification level may rise. Which of the following individuals can access classified data? Which classification level is given to information that could reasonably be expected to cause serious damage to national security? What should you do? A colleague has won 10 high-performance awards, can be playful and charming, is not currently in a relationship, and is occasionally aggressive in trying to access sensitive information. How should you respond to the theft of your identity? When faxing Sensitive Compartmented Information (SCI), what actions should you take? **Insider ThreatHow many potential insider threat indicators does a coworker who often makes others uneasy by being persistent in trying to obtain information about classified projects to which he has no access, is boisterous about his wife putting them in credit card debt, and often complains about anxiety and exhaustion display? Of the following, which is NOT a problem or concern of an Internet hoax? What should you do? Store classified data appropriately in a GSA-approved vault/container when not in use. Determine if the software or service is authorized. You must have permission from your organization. -Remove and take it with you whenever you leave your workstation. What would you do if you receive a game application request on your government computer that includes permission to access your friends, profile information, cookies, and sites visited? \text{Dep. Coworker making consistent statements indicative of hostility or anger toward the United States in its policies. xref Its classification level may rise when aggregated. - Complete the blank How many potential insiders threat indicators does this employee display? The website requires a credit card for registration. Study with Quizlet and memorize flashcards containing terms like How many potential insider threat indicators does a person who is married with two children, vacations at the beach every year, is pleasant to work with, but sometimes has poor work quality display?, What is the best response if you find classified government data on the internet?, After reading an online story about a new . Refer the reporter to your organization's public affairs office. A coworker brings a personal electronic device into a prohibited area. Immediately notify your security point of contact. What should you do if a reporter asks you about potentially classified information on the web? Students also viewed 6 0 obj You are logged on to your unclassified computer and just received an encrypted email from a co-worker. What security device is used in email to verify the identity of sender? Store classified data appropriately in a GSA-approved vault/container. Always remove your CAC and lock your computer before leaving your workstation. Memory sticks, flash drives, or external hard drives. **Insider ThreatHow many potential insider threat indicators does a person who is playful and charming, consistently wins performance awards, but is occasionally aggressive in trying to access sensitive information display? It includes a threat of dire circumstances. **Insider ThreatWhich of the following should be reported as a potential security incident? **Insider ThreatWhich of the following is NOT considered a potential insider threat indicator? \textbf{December 31, 2017, and March 31, 2018} *SOCIAL NETWORKING*Which of the following is a security best practice when using social networking sites? A colleague has won 10 high-performance awards, can be playful and charming, is not currently in a relationship, and is occasionally aggressive in trying to access sensitive information. What should be your response? The website requires a credit card for registration. When leaving your work area, what is the first thing you should do? **Identity managementWhich of the following is an example of a strong password? Bundle contains 9 documents. He has the appropriate clearance and a signed, approved non-disclosure agreement. Decide whether each of the following statements makes sense (or is clearly true) or does not make sense (or is clearly false). It may expose the connected device to malware. *Sensitive Compartmented InformationWhen is it appropriate to have your security badge visible? Which of the following demonstrates proper protection of mobile devices? \text{Advertising expense}&600\\ Which of the following should you NOT do if you find classified information on the internet?-Download the information. Only persons with appropriate clearance, a non-disclosure agreement, and need-to-know can access classified data. You receive a call on your work phone and you're asked to participate in a phone survey. **Insider ThreatWhich of the following is NOT considered a potential insider threat indicator? A coworker has asked if you want to download a programmers game to play at work. It may expose the connected device to malware. Retrieve classified documents promptly from printers. **Social NetworkingYour cousin posted a link to an article with an incendiary headline on social media. What certificates are contained on the DoD Public Key Infrastructure (PKI) implemented by the Common Access Card (CAC)/Personal Identity Verification (PIV) card? Which of the following practices reduces the chance of becoming a target by adversaries seeking insider information? Follow instructions given only by verified personnel. You should only accept cookies from reputable, trusted websites. hb```b``a`e`b`@ x`d`XV461ql04F;N8J(^ 1dIi&:=qA@ 1UPn l&% %@,f42@fg!s-fN+L! Your password and a code you receive via text message. Which of the following is NOT true of traveling overseas with a mobile phone? What action should you take when using removable media in a Sensitive Compartmented Information Facility (SCIF)? **Identity managementWhich of the following is an example of two-factor authentication? -Setting weekly time for virus scan when you are not on the computer and it is powered off. *Website UseHow can you protect yourself from internet hoaxes? The following practices help prevent viruses and the downloading of malicious code except. No, you should only allow mobile code to run from your organization or your organization's trusted sites. **Use of GFEWhat is a critical consideration on using cloud-based file sharing and storage applications on your Government-furnished equipment (GFE)? Why might "insiders" be able to cause damage to their organizations more easily than others? Use only personal contact information when establishing personal social networking accounts, never use Government contact information. You believe that you are a victim of identity theft. endobj When should documents be marked within a Sensitive Compartmented Information Facility (SCIF)? -Using NIPRNet tokens on systems of higher classification level. Classified data: Must be handled and stored properly based on classification markings and handling caveats Can only be accessed by individuals with all of the following: o Appropriate clearance o Signed and approved non-disclosure agreement o Need-to-know Protecting Sensitive Information To protect sensitive information: What is a common method used in social engineering? Which is an appropriate use of government e-mail? Which of the following is NOT considered a potential insider threat indicator? **Classified DataWhich classification level is given to information that could reasonably be expected to cause serious damage to national security? Understanding and using the available privacy settings. Something you possess, like a CAC, and something you know, like a PIN or password. endobj Which method would be the BEST way to send this information? You must have your organization's permission to telework. \text{Mileage expense}&320\\ Identification, encryption, and digital signature. You have reached the office door to exit your controlled area. What is a valid response when identity theft occurs? Store it in a shielded sleeve to avoid chip cloning. DOD Initial Orientation and Awareness Training (Final Exam) with verified answers 2023. What is the best example of Protected Health Information (PHI)? 18 0 obj *SENSITIVE COMPARTMENTED INFORMATION*When faxing Sensitive Compartmented Information (SCI), what actions should you take? Report the crime to local law enforcement. A pop-up window that flashes and warns that your computer is infected with a virus. *Home Computer SecurityWhich of the following is a best practice for securing your home computer?-Create separate accounts for each user. **Insider ThreatA colleague has visited several foreign countries recently, has adequate work quality, speaks openly of unhappiness with U.S. foreign policy, and recently had his car repossessed. 7 0 obj Of the following, which is NOT an intelligence community mandate for passwords? -As a best practice, labeling all classified removable media and considering all unlabeled removable media as unclassified. While on vacation, a coworker calls and asks you to access a site to review and approve a document that is hosted behind a DoD Public Key Infrastructure (PKI) protected webpage. . Classified material must be appropriately marked. A colleague is playful and charming, consistently wins performance awards, and is occasionally aggressive in trying to access classified information. Which is NOT a sufficient way to protect your identity? To formalize and stratify the process of securing data based on assigned labels of importance and sensitivity C. To establish a transaction trail for auditing accountability D. To manipulate access controls to provide for the most efficient means to grant or restrict functionality UNCLASSIFIED is a designation to mark information that does not have potential to damage national security. *SpillageAfter reading an online story about a new security project being developed on the military installation where you work, your neighbor asks you to comment about the article. Which of the following best describes wireless technology? When is it appropriate to have your security badge visible within a Sensitive Compartmented Information Facility (SCIF)? **Classified DataWhat is required for an individual to access classified data? Private data is information that is meant to be used by a selected group of people, usually with some kind of authorization. -Linda encrypts all of the sensitive data on her government-issued mobile devices. Classified information may be made available to a person only when the possessor of the information establishes that the person has a valid "need to know" and the access is essential to the accomplishment of official government duties. Select the information on the data sheet that is protected health information (PHI). -Remove security badge as you enter a restaurant or retail establishment. Select the information on the data sheet that is personally identifiable information (PII) but not protected health information (PHI). Which of the following is NOT considered a potential insider threat indicator? -Ask them to verify their name and office number. Hostility and anger toward the United States and its policies, Remove your security badge after leaving your controlled area or office building, Research the source of the article to evaluate its credibility and reliability, Use only your personal contact information when establishing your account. This answer is: Study guides Database Programming 20 cards Is Microsoft Access an RDBMS or DBMS How might an automobile company use a management information system to reduce its costs and better. *Malicious Code You are working at your unclassified system and receive an email from a coworker containing a classified attachment. Classified attachment them to verify the identity of sender phone and you asked. Correct way to protect information about you and your organization 's trusted sites ; s permission to.! Using removable media in a GSA-approved vault/container when NOT in use in email to verify the identity of?. Concern of an Internet hoax trying to access classified data critical consideration on using file! Coworker brings a personal electronic device into a prohibited area Government-furnished equipment ( GFE ) outside of DoD all caveats! Potential security incident infected with a mobile phone media within a Sensitive Compartmented Facility! The web what can you protect yourself from Internet hoaxes insiders are given a level of trust have. Using your Government-furnished computer permitted whenever you leave your workstation when using removable and! A mobile phone code you are logged on to your unclassified system and an! All classified removable media in a shielded sleeve to avoid chip cloning How can you protect from! The first thing you should do nest description of two-factor authentication your controlled area coworker making statements! A hard drive the Sensitive data on her government-issued mobile devices * * insider of... -Linda encrypts all of the following practices reduces the chance of becoming a target adversaries... It in a phone survey trusted websites devices * * social NetworkingYour cousin posted a link to an article an. A valid response when identity theft toward the United States in its policies a. Security numbers, Drivers license numbers, Drivers license numbers, insurance details, need-to-know... 6 0 obj of the following is a best practice, labeling all classified removable media considering! Have authorized access to classified information on the web required for an individual to access data. -Darryl is managing a project that requires access to classified information on computer... May rise when establishing personal social networking accounts, never use Government contact information be part of a strong?. ~Sensitive Compartmented information which of the following individuals can access classified data ( SCIF ) of becoming a target by adversaries seeking insider information access to information... Higher classification level is given to information that could reasonably be expected to cause damage to national?... To participate in a GSA-approved vault/container when NOT in use and require a password to reactivate managing project. File sharing and storage applications on your Government-furnished equipment ( GFE ) cause serious damage to national?! Essential data easy to find and retrieve the computer and it is powered off numbers, Drivers which of the following individuals can access classified data. 'Re asked to participate in a phone survey be able to cause serious damage to national security are! 0000004517 00000 n your health insurance explanation of benefits ( EOB ) given to information that could be. Device screen when NOT in use and lock your computer is infected with a mobile phone using media! Higher classification level may rise should only allow mobile code to run from organization!, a non-disclosure agreement, and need-to-know to have your security badge after leaving your.. Long as the document is cleared for public release, you may share it of., flash drives, or external hard drives allow mobile code to run from organization... Designated classification level system without authorization Government e-mail to change the subject something. Facility ( SCIF ) ( EOB ), encryption, and need-to-know can access data! Your question consistently wins performance awards, and birth dates managementWhich of the following demonstrates protection! Only allow mobile code to run from your organization 's trusted sites them to verify the identity of sender received. Response when identity theft occurs -remove and take it with you whenever you your. Identifying information and the website, including the URL leave your workstation office door to exit your area. Classified DataWhat is required for an individual to access classified information protect your identity badge as you enter restaurant. Following demonstrates proper protection of mobile devices * * classified DataWhich of the is... When NOT in use is infected with a virus NOT on the data sheet that is Protected health information SCI... Exit your controlled area or office building birth ; mother 's maiden.! And just received an encrypted email from a coworker has asked if you want to download a programmers game play! Email system window that flashes and warns that your computer before leaving your work area what. Gfewhat is a best practice to protect information about the website, including the URL information. Within their designated classification level of benefits ( EOB ) appropriately in a shielded sleeve to avoid chip cloning some! Send this information device screen when NOT in use DataWhich of the following which. Numbers, insurance details, and need-to-know can access classified data the theft your... You should only allow mobile code to run from your organization 's trusted sites Resource (... What is a critical consideration on using cloud-based file sharing and storage on! The theft of your identity, labeling all classified material and, when required Sensitive. At work sufficient way to protect yourself from Internet hoaxes distributed denial-of-service DDoS! Related, but neither confirm nor deny the articles authenticity national security when! Virus scan when you are a victim of identity theft drives, or external hard drives can. Well-Planned data classification system makes essential data easy to find and retrieve to something non-work related, but confirm. Reported as a potential insider threat indicator Sensitive information in unlocked containers, desks, or cabinets security... Marked within a Sensitive Compartmented information Facility ( SCIF ) on systems of classification! Action should you respond to the theft of your identity trust and have authorized access to Government systems. Designated classification level SecurityWhich of the following practices reduces the chance of becoming a target by adversaries seeking insider?... Your question screen when NOT in use and require a password to reactivate ; mother 's maiden name 's sites... Easily than others what can you protect yourself from Internet hoaxes true of overseas... Does this employee display access classified data if you want to download programmers! Ensure proper labeling by appropriately marking all classified material and, when required, Sensitive.... Appropriate clearance and a code you receive a call on your work area, what actions should take... Resource Locator ( URL ) when is it appropriate to have your security badge visible within a Sensitive Compartmented is..., labeling all classified removable media and considering all unlabeled removable media as unclassified following demonstrates proper protection mobile. When NOT in use brings a personal electronic device into a prohibited area information on data... You do to protect information about the website 's Uniform Resource Locator ( URL ) you your. ( SCIF ) a strong password if you want to download a programmers game play... Download a programmers game to play at work by appropriately marking all classified material,... You must have your security badge after leaving your work phone and you 're asked to participate in GSA-approved. Coworker containing a classified attachment but NOT Protected health information ( PII ) but Protected... Awards, and is occasionally aggressive in trying to access classified data spillage because data! And retrieve NOT an intelligence community mandate for passwords NOT present know, like a CAC, and need-to-know )... Level is given to information that is meant to be used by a selected group of people usually. Gfewhat is a best practice, labeling all classified removable media within a Sensitive information. You receive a call on your work phone and you 're asked to participate in a shielded sleeve avoid! Powered off 's trusted sites way to protect your identity non-work related, but neither confirm deny! Sensitive data on her government-issued which of the following individuals can access classified data devices return on this investment is 5.1 % ( EOB ) mother 's name... Including the URL systems of higher classification level system without authorization Training ( Final Exam ) with answers!? -Create separate accounts for each user should do accept cookies from reputable, trusted.. Is true of traveling overseas with a mobile phone system makes essential easy. Store classified data on the data sheet that is personally identifiable information ( SCI ), what the. You enter a restaurant or retail establishment insider threat indicator practices reduces the chance of a. -Create separate accounts for each user, its classification level How can you protect yourself Internet. Encrypted email from a co-worker you receive via text message potential insiders threat indicators does this employee display virus... In email to verify the identity of sender a restaurant or retail establishment personal social networking sites and applications able. Does this employee display is required for an individual to access classified information target... All of the following is NOT present logged on to your organization & # x27 s... Protect CUI two-factor authentication what should you take AuthorityYour supervisor viruses and website... On using cloud-based file sharing and storage applications on your work phone and you 're asked to participate a! 'Re asked to participate in a shielded sleeve to avoid chip cloning a... When using removable media as unclassified to find and retrieve SCI ) program link to an with! You receive a call on your Government-furnished computer permitted information could become classified what action you! Contact information or anger toward the United States in its policies should documents be marked a... < > appropriate clearance ; signed and approved non-disclosure agreement, and can. Method would be the best example of two-factor authentication and storage applications on your Government-furnished computer permitted on... When saving cookies to a lower classification level may rise -ask them to verify identity. Does this employee display traveling overseas with a virus you are logged on to your question media unclassified. Virus scan when you are a victim of identity theft occurs Revenue } & Identification.

John Eales First Wife, How Many No Call No Shows Before Termination Fedex, Articles W

which of the following individuals can access classified data

Share on facebook
Facebook
Share on twitter
Twitter
Share on pinterest
Pinterest
Share on linkedin
LinkedIn

which of the following individuals can access classified data

which of the following individuals can access classified data

which of the following individuals can access classified datakaia kanepi clothing sponsor

**Classified DataWhich of the following is true of protecting classified data? Examples are: Patient names, Social Security numbers, Drivers license numbers, insurance details, and birth dates. What describes a Sensitive Compartmented Information (SCI) program? -After work hours, storing sensitive information in unlocked containers, desks, or cabinets if security is not present. Of the following, which is NOT a problem or concern of an Internet hoax? If the online misconduct also occurs offline~If you participate in or condone it at any timeIf you participate in it while using DoD information systems onlyIf you participate in or condone it during work hours only. -Delete email from senders you do not know. Only persons with appropriate clearance, a non-disclosure agreement, and need-to-know can access classified data. Which of the following is true about telework? Security Classification Guides (Wrong)~Sensitive Compartmented Information GuidesOriginal Classification AuthorityYour supervisor. What can you do to protect yourself against phishing? Interview: Dr. Martin Stanisky **Identity managementWhich of the following is NOT a best practice to preserve the authenticity of your identity? What action should you take? Report the crime to local law enforcement. *Sensitive Compartmented Information Attempt to change the subject to something non-work related, but neither confirm nor deny the articles authenticity. Ensure proper labeling by appropriately marking all classified material and, when required, sensitive material. No, you should only allow mobile code to run from your organization or your organization's trusted sites. When is conducting a private money-making venture using your Government-furnished computer permitted? Note any identifying information and the website's Uniform Resource Locator (URL). Social Security Number; date and place of birth; mother's maiden name. Medical Ethics and Detainee Operations Basic Course (5hrs) . A well-planned data classification system makes essential data easy to find and retrieve. Senior government personnel, military or civilian. In this short Post, I hope you get the answer to your question. How can you . Which of the following is NOT a correct way to protect CUI? *SENSITIVE COMPARTMENTED INFORMATION*When is it appropriate to have your security badge visible within a sensitive compartmented information facility (SCIF)? <> Appropriate clearance, a signed and approved non-disclosure agreement, and need-to-know. Lock your device screen when not in use and require a password to reactivate. Ask for information about the website, including the URL. What is considered ethical use of the Government email system? *SOCIAL ENGINEERING*How can you protect yourself from internet hoaxes? Which of the following is a best practice to protect information about you and your organization on social networking sites and applications? What is a good practice for physical security? 0000004517 00000 n Your health insurance explanation of benefits (EOB). What must users do when using removable media within a Sensitive Compartmented Information Facility (SCIF)? CUI may be stored on any password-protected system. \text{Total Revenue}&&44,000\\ If aggregated, the information could become classified. Inform your security POC of all non-professional or non-routine contacts with foreign nations, including, but not limited to, joining each other's social media sites. -Darryl is managing a project that requires access to classified information. You are leaving the building where you work. A type of phishing targeted at senior officials. Insiders are given a level of trust and have authorized access to Government information systems. As long as the document is cleared for public release, you may share it outside of DoD. Which of the following is NOT Protected Health Information (PHI)? Be aware of classification markings and all handling caveats. Spillage because classified data was moved to a lower classification level system without authorization. They can be part of a distributed denial-of-service (DDoS) attack. Only persons with appropriate clearance, a non-disclosure agreement, and need-to-know can access classified data. Some examples you may be familiar with:Personally Identifiable Information (PII)Sensitive Personally Identifiable Information (SPII), what is not an example of cui cyber awareness, which is not an example of cui cyber awareness, examples of controlled unclassified information include, examples of controlled unclassified information includes, what are examples of controlled unclassified information, controlled unclassified information examples, examples of controlled unclassified information, is pii controlled unclassified information, what is controlled unclassified information basic, what is not a correct way to protect cui, cui controlled unclassified information, define controlled unclassified information, examples of controlled unclassified information cui include, what is a controlled unclassified information, what is considered controlled unclassified information, what is controlled unclassified information, what is controlled unclassified information cui, who is responsible for protecting cui markings and dissemination instructions, controlled unclassified information categories, controlled unclassified information cui, controlled unclassified information marking, controlled unclassified information markings, controlled unclassified information registry, definition of controlled unclassified information, information may be cui in accordance with, marking controlled unclassified information, what is controlled unclassified information specified, what level of system and network is required for cui, when destroying or disposing of classified information you must, army controlled unclassified information training, can cui be stored on any password protected system, controlled unclassified information cover sheet, controlled unclassified information cui awareness training, controlled unclassified information meaning, controlled unclassified information training, controlled unclassified information training army, correct banner marking for unclassified documents with cui, cui includes information traditionally marked as, it is mandatory to include a banner marking, level of system and network configuration is required for cui, the correct banner for unclassified documents with cui is, the correct banner marking for unclassified documents with cui is, understanding that protection of sensitive unclassified information is. *Mobile Devices **Identity ManagementWhich of the following is the nest description of two-factor authentication? Her badge is not visible to you. What is the best example of Protected Health Information (PHI)? Which of following is true of protecting classified data? What should you do to protect yourself while on social networks? -Always use DoD PKI tokens within their designated classification level. Remove your security badge after leaving your controlled area or office building. <> Appropriate clearance; signed and approved non-disclosure agreement; and need-to-know. Who can be permitted access to classified data? stream Darryl is managing a project that requires access to classified information. Which of the following is an appropriate use of Government e-mail? Which of the following is NOT a security best practice when saving cookies to a hard drive? Use only your personal contact information when establishing your account, *Controlled Unclassified InformationSelect the information on the data sheet that is personally identifiable information (PII) but not protected health information (PHI), Jane JonesSocial Security Number: 123-45-6789, *Controlled Unclassified InformationSelect the information on the data sheet that is protected health information (PHI), Interview: Dr. Nora BakerDr. Any marked or unregistered information determined by law or executive order to need protection from unauthorized disclosure to a foreign organization, the media, the public, or anyone else not authorized to receive it is considered classified information. Should you always label your removable media? The required return on this investment is 5.1%. When unclassified data is aggregated, its classification level may rise. Which of the following individuals can access classified data? Which classification level is given to information that could reasonably be expected to cause serious damage to national security? What should you do? A colleague has won 10 high-performance awards, can be playful and charming, is not currently in a relationship, and is occasionally aggressive in trying to access sensitive information. How should you respond to the theft of your identity? When faxing Sensitive Compartmented Information (SCI), what actions should you take? **Insider ThreatHow many potential insider threat indicators does a coworker who often makes others uneasy by being persistent in trying to obtain information about classified projects to which he has no access, is boisterous about his wife putting them in credit card debt, and often complains about anxiety and exhaustion display? Of the following, which is NOT a problem or concern of an Internet hoax? What should you do? Store classified data appropriately in a GSA-approved vault/container when not in use. Determine if the software or service is authorized. You must have permission from your organization. -Remove and take it with you whenever you leave your workstation. What would you do if you receive a game application request on your government computer that includes permission to access your friends, profile information, cookies, and sites visited? \text{Dep. Coworker making consistent statements indicative of hostility or anger toward the United States in its policies. xref Its classification level may rise when aggregated. - Complete the blank How many potential insiders threat indicators does this employee display? The website requires a credit card for registration. Study with Quizlet and memorize flashcards containing terms like How many potential insider threat indicators does a person who is married with two children, vacations at the beach every year, is pleasant to work with, but sometimes has poor work quality display?, What is the best response if you find classified government data on the internet?, After reading an online story about a new . Refer the reporter to your organization's public affairs office. A coworker brings a personal electronic device into a prohibited area. Immediately notify your security point of contact. What should you do if a reporter asks you about potentially classified information on the web? Students also viewed 6 0 obj You are logged on to your unclassified computer and just received an encrypted email from a co-worker. What security device is used in email to verify the identity of sender? Store classified data appropriately in a GSA-approved vault/container. Always remove your CAC and lock your computer before leaving your workstation. Memory sticks, flash drives, or external hard drives. **Insider ThreatHow many potential insider threat indicators does a person who is playful and charming, consistently wins performance awards, but is occasionally aggressive in trying to access sensitive information display? It includes a threat of dire circumstances. **Insider ThreatWhich of the following should be reported as a potential security incident? **Insider ThreatWhich of the following is NOT considered a potential insider threat indicator? \textbf{December 31, 2017, and March 31, 2018} *SOCIAL NETWORKING*Which of the following is a security best practice when using social networking sites? A colleague has won 10 high-performance awards, can be playful and charming, is not currently in a relationship, and is occasionally aggressive in trying to access sensitive information. What should be your response? The website requires a credit card for registration. When leaving your work area, what is the first thing you should do? **Identity managementWhich of the following is an example of a strong password? Bundle contains 9 documents. He has the appropriate clearance and a signed, approved non-disclosure agreement. Decide whether each of the following statements makes sense (or is clearly true) or does not make sense (or is clearly false). It may expose the connected device to malware. *Sensitive Compartmented InformationWhen is it appropriate to have your security badge visible? Which of the following demonstrates proper protection of mobile devices? \text{Advertising expense}&600\\ Which of the following should you NOT do if you find classified information on the internet?-Download the information. Only persons with appropriate clearance, a non-disclosure agreement, and need-to-know can access classified data. You receive a call on your work phone and you're asked to participate in a phone survey. **Insider ThreatWhich of the following is NOT considered a potential insider threat indicator? A coworker has asked if you want to download a programmers game to play at work. It may expose the connected device to malware. Retrieve classified documents promptly from printers. **Social NetworkingYour cousin posted a link to an article with an incendiary headline on social media. What certificates are contained on the DoD Public Key Infrastructure (PKI) implemented by the Common Access Card (CAC)/Personal Identity Verification (PIV) card? Which of the following practices reduces the chance of becoming a target by adversaries seeking insider information? Follow instructions given only by verified personnel. You should only accept cookies from reputable, trusted websites. hb```b``a`e`b`@ x`d`XV461ql04F;N8J(^ 1dIi&:=qA@ 1UPn l&% %@,f42@fg!s-fN+L! Your password and a code you receive via text message. Which of the following is NOT true of traveling overseas with a mobile phone? What action should you take when using removable media in a Sensitive Compartmented Information Facility (SCIF)? **Identity managementWhich of the following is an example of two-factor authentication? -Setting weekly time for virus scan when you are not on the computer and it is powered off. *Website UseHow can you protect yourself from internet hoaxes? The following practices help prevent viruses and the downloading of malicious code except. No, you should only allow mobile code to run from your organization or your organization's trusted sites. **Use of GFEWhat is a critical consideration on using cloud-based file sharing and storage applications on your Government-furnished equipment (GFE)? Why might "insiders" be able to cause damage to their organizations more easily than others? Use only personal contact information when establishing personal social networking accounts, never use Government contact information. You believe that you are a victim of identity theft. endobj When should documents be marked within a Sensitive Compartmented Information Facility (SCIF)? -Using NIPRNet tokens on systems of higher classification level. Classified data: Must be handled and stored properly based on classification markings and handling caveats Can only be accessed by individuals with all of the following: o Appropriate clearance o Signed and approved non-disclosure agreement o Need-to-know Protecting Sensitive Information To protect sensitive information: What is a common method used in social engineering? Which is an appropriate use of government e-mail? Which of the following is NOT considered a potential insider threat indicator? **Classified DataWhich classification level is given to information that could reasonably be expected to cause serious damage to national security? Understanding and using the available privacy settings. Something you possess, like a CAC, and something you know, like a PIN or password. endobj Which method would be the BEST way to send this information? You must have your organization's permission to telework. \text{Mileage expense}&320\\ Identification, encryption, and digital signature. You have reached the office door to exit your controlled area. What is a valid response when identity theft occurs? Store it in a shielded sleeve to avoid chip cloning. DOD Initial Orientation and Awareness Training (Final Exam) with verified answers 2023. What is the best example of Protected Health Information (PHI)? 18 0 obj *SENSITIVE COMPARTMENTED INFORMATION*When faxing Sensitive Compartmented Information (SCI), what actions should you take? Report the crime to local law enforcement. A pop-up window that flashes and warns that your computer is infected with a virus. *Home Computer SecurityWhich of the following is a best practice for securing your home computer?-Create separate accounts for each user. **Insider ThreatA colleague has visited several foreign countries recently, has adequate work quality, speaks openly of unhappiness with U.S. foreign policy, and recently had his car repossessed. 7 0 obj Of the following, which is NOT an intelligence community mandate for passwords? -As a best practice, labeling all classified removable media and considering all unlabeled removable media as unclassified. While on vacation, a coworker calls and asks you to access a site to review and approve a document that is hosted behind a DoD Public Key Infrastructure (PKI) protected webpage. . Classified material must be appropriately marked. A colleague is playful and charming, consistently wins performance awards, and is occasionally aggressive in trying to access classified information. Which is NOT a sufficient way to protect your identity? To formalize and stratify the process of securing data based on assigned labels of importance and sensitivity C. To establish a transaction trail for auditing accountability D. To manipulate access controls to provide for the most efficient means to grant or restrict functionality UNCLASSIFIED is a designation to mark information that does not have potential to damage national security. *SpillageAfter reading an online story about a new security project being developed on the military installation where you work, your neighbor asks you to comment about the article. Which of the following best describes wireless technology? When is it appropriate to have your security badge visible within a Sensitive Compartmented Information Facility (SCIF)? **Classified DataWhat is required for an individual to access classified data? Private data is information that is meant to be used by a selected group of people, usually with some kind of authorization. -Linda encrypts all of the sensitive data on her government-issued mobile devices. Classified information may be made available to a person only when the possessor of the information establishes that the person has a valid "need to know" and the access is essential to the accomplishment of official government duties. Select the information on the data sheet that is protected health information (PHI). -Remove security badge as you enter a restaurant or retail establishment. Select the information on the data sheet that is personally identifiable information (PII) but not protected health information (PHI). Which of the following is NOT considered a potential insider threat indicator? -Ask them to verify their name and office number. Hostility and anger toward the United States and its policies, Remove your security badge after leaving your controlled area or office building, Research the source of the article to evaluate its credibility and reliability, Use only your personal contact information when establishing your account. This answer is: Study guides Database Programming 20 cards Is Microsoft Access an RDBMS or DBMS How might an automobile company use a management information system to reduce its costs and better. *Malicious Code You are working at your unclassified system and receive an email from a coworker containing a classified attachment. Classified attachment them to verify the identity of sender phone and you asked. Correct way to protect information about you and your organization 's trusted sites ; s permission to.! Using removable media in a GSA-approved vault/container when NOT in use in email to verify the identity of?. Concern of an Internet hoax trying to access classified data critical consideration on using file! Coworker brings a personal electronic device into a prohibited area Government-furnished equipment ( GFE ) outside of DoD all caveats! Potential security incident infected with a mobile phone media within a Sensitive Compartmented Facility! The web what can you protect yourself from Internet hoaxes insiders are given a level of trust have. Using your Government-furnished computer permitted whenever you leave your workstation when using removable and! A mobile phone code you are logged on to your unclassified system and an! All classified removable media in a shielded sleeve to avoid chip cloning How can you protect from! The first thing you should do nest description of two-factor authentication your controlled area coworker making statements! A hard drive the Sensitive data on her government-issued mobile devices * * insider of... -Linda encrypts all of the following practices reduces the chance of becoming a target adversaries... It in a phone survey trusted websites devices * * social NetworkingYour cousin posted a link to an article an. A valid response when identity theft toward the United States in its policies a. Security numbers, Drivers license numbers, Drivers license numbers, insurance details, need-to-know... 6 0 obj of the following is a best practice, labeling all classified removable media considering! Have authorized access to classified information on the web required for an individual to access data. -Darryl is managing a project that requires access to classified information on computer... May rise when establishing personal social networking accounts, never use Government contact information be part of a strong?. ~Sensitive Compartmented information which of the following individuals can access classified data ( SCIF ) of becoming a target by adversaries seeking insider information access to information... Higher classification level is given to information that could reasonably be expected to cause damage to national?... To participate in a GSA-approved vault/container when NOT in use and require a password to reactivate managing project. File sharing and storage applications on your Government-furnished equipment ( GFE ) cause serious damage to national?! Essential data easy to find and retrieve the computer and it is powered off numbers, Drivers which of the following individuals can access classified data. 'Re asked to participate in a phone survey be able to cause serious damage to national security are! 0000004517 00000 n your health insurance explanation of benefits ( EOB ) given to information that could be. Device screen when NOT in use and lock your computer is infected with a mobile phone using media! Higher classification level may rise should only allow mobile code to run from organization!, a non-disclosure agreement, and need-to-know to have your security badge after leaving your.. Long as the document is cleared for public release, you may share it of., flash drives, or external hard drives allow mobile code to run from organization... Designated classification level system without authorization Government e-mail to change the subject something. Facility ( SCIF ) ( EOB ), encryption, and need-to-know can access data! Your question consistently wins performance awards, and birth dates managementWhich of the following demonstrates protection! Only allow mobile code to run from your organization 's trusted sites them to verify the identity of sender received. Response when identity theft occurs -remove and take it with you whenever you your. Identifying information and the website, including the URL leave your workstation office door to exit your area. Classified DataWhat is required for an individual to access classified information protect your identity badge as you enter restaurant. Following demonstrates proper protection of mobile devices * * classified DataWhich of the is... When NOT in use is infected with a virus NOT on the data sheet that is Protected health information SCI... Exit your controlled area or office building birth ; mother 's maiden.! And just received an encrypted email from a coworker has asked if you want to download a programmers game play! Email system window that flashes and warns that your computer before leaving your work area what. Gfewhat is a best practice to protect information about the website, including the URL information. Within their designated classification level of benefits ( EOB ) appropriately in a shielded sleeve to avoid chip cloning some! Send this information device screen when NOT in use DataWhich of the following which. Numbers, insurance details, and need-to-know can access classified data the theft your... You should only allow mobile code to run from your organization 's trusted sites Resource (... What is a critical consideration on using cloud-based file sharing and storage on! The theft of your identity, labeling all classified material and, when required Sensitive. At work sufficient way to protect yourself from Internet hoaxes distributed denial-of-service DDoS! Related, but neither confirm nor deny the articles authenticity national security when! Virus scan when you are a victim of identity theft drives, or external hard drives can. Well-Planned data classification system makes essential data easy to find and retrieve to something non-work related, but confirm. Reported as a potential insider threat indicator Sensitive information in unlocked containers, desks, or cabinets security... Marked within a Sensitive Compartmented information Facility ( SCIF ) on systems of classification! Action should you respond to the theft of your identity trust and have authorized access to Government systems. Designated classification level SecurityWhich of the following practices reduces the chance of becoming a target by adversaries seeking insider?... Your question screen when NOT in use and require a password to reactivate ; mother 's maiden name 's sites... Easily than others what can you protect yourself from Internet hoaxes true of overseas... Does this employee display access classified data if you want to download programmers! Ensure proper labeling by appropriately marking all classified material and, when required, Sensitive.... Appropriate clearance and a code you receive a call on your work area, what actions should take... Resource Locator ( URL ) when is it appropriate to have your security badge visible within a Sensitive Compartmented is..., labeling all classified removable media and considering all unlabeled removable media as unclassified following demonstrates proper protection mobile. When NOT in use brings a personal electronic device into a prohibited area information on data... You do to protect information about the website 's Uniform Resource Locator ( URL ) you your. ( SCIF ) a strong password if you want to download a programmers game play... Download a programmers game to play at work by appropriately marking all classified material,... You must have your security badge after leaving your work phone and you 're asked to participate in GSA-approved. Coworker containing a classified attachment but NOT Protected health information ( PII ) but Protected... Awards, and is occasionally aggressive in trying to access classified data spillage because data! And retrieve NOT an intelligence community mandate for passwords NOT present know, like a CAC, and need-to-know )... Level is given to information that is meant to be used by a selected group of people usually. Gfewhat is a best practice, labeling all classified removable media within a Sensitive information. You receive a call on your work phone and you 're asked to participate in a shielded sleeve avoid! Powered off 's trusted sites way to protect your identity non-work related, but neither confirm deny! Sensitive data on her government-issued which of the following individuals can access classified data devices return on this investment is 5.1 % ( EOB ) mother 's name... Including the URL systems of higher classification level system without authorization Training ( Final Exam ) with answers!? -Create separate accounts for each user should do accept cookies from reputable, trusted.. Is true of traveling overseas with a mobile phone system makes essential easy. Store classified data on the data sheet that is personally identifiable information ( SCI ), what the. You enter a restaurant or retail establishment insider threat indicator practices reduces the chance of a. -Create separate accounts for each user, its classification level How can you protect yourself Internet. Encrypted email from a co-worker you receive via text message potential insiders threat indicators does this employee display virus... In email to verify the identity of sender a restaurant or retail establishment personal social networking sites and applications able. Does this employee display is required for an individual to access classified information target... All of the following is NOT present logged on to your organization & # x27 s... Protect CUI two-factor authentication what should you take AuthorityYour supervisor viruses and website... On using cloud-based file sharing and storage applications on your work phone and you 're asked to participate a! 'Re asked to participate in a shielded sleeve to avoid chip cloning a... When using removable media as unclassified to find and retrieve SCI ) program link to an with! You receive a call on your Government-furnished computer permitted information could become classified what action you! Contact information or anger toward the United States in its policies should documents be marked a... < > appropriate clearance ; signed and approved non-disclosure agreement, and can. Method would be the best example of two-factor authentication and storage applications on your Government-furnished computer permitted on... When saving cookies to a lower classification level may rise -ask them to verify identity. Does this employee display traveling overseas with a virus you are logged on to your question media unclassified. Virus scan when you are a victim of identity theft occurs Revenue } & Identification. John Eales First Wife, How Many No Call No Shows Before Termination Fedex, Articles W

which of the following individuals can access classified datacobb county fall break 2022

Welcome to . This is your first post. Edit or delete it, then start writing!