Are Kizik Shoes Made In China,
Elburn Days Parade 2021,
Fiserv Dublin Office,
Signs Your Neighbor Is Moving,
Articles W
internet-quiz. Which Cyber Protection Condition (CPCON) establishes a protection priority focus on critical functions only? Your cousin posted a link to an article with an incendiary headline on social media. A colleague complains about anxiety and exhaustion, makes coworkers uncomfortable by asking excessive questions about classified projects, and complain about the credit card bills that his wife runs up. Physically assess that everyone within listening distance is cleared and has a need-to-know for the information being discussed. Use personal information to help create strong passwords. Validate all friend requests through another source before confirming them. Which of the following is a best practice for handling cookies? They can become an attack vector to other devices on your home network. Use the classified network for all work, including unclassified work. Correct. (Wrong). What is an individual's Personally Identifiable Information (PII) or Protected Health Information (PHI) considered? 1.1.5 Controlled Unclassified Information. The proper security clearance and indoctrination into the SCI program. a. putting a child in time-out Correct. All https sites are legitimate and there is no risk to entering your personal info online. Which of the following is NOT an appropriate way to protect against inadvertent spillage? A trusted friend in your social network posts a link to vaccine information on a website unknown to you. New interest in learning another language, Which of the following is a good practice to protect classified information. How can you avoid downloading malicious code? If you participate in or condone it at any time. It never requires classification markings, is true about unclassified data. A person who does not have the required clearance or assess caveats comes into possession of SCI in any manner. which of the following is true about unclassified data. **Insider Threat Which of the following should be reported as a potential security incident (in accordance with you Agencys insider threat policy)? Which of the following is an example of two-factor authentication? *Spillage Which of the following actions is appropriate after finding classified information on the Internet? Mark SCI documents appropriately and use an approved SCI fax machine. Report the suspicious behavior in accordance with their organizations insider threat policy. Linda encrypts all of the sensitive data on her government issued mobile devices. Which of the following is NOT a criterion used to grant an individual access to classified data? What should you do after you have ended a call from a reporter asking you to confirm potentially classified info found on the web? Which of the following represents a good physical security practice? Correct. Correct. Which of the following is a security best practice for protecting Personally Identifiable Information (PII)? A coworker wants to send you a sensitive document to review while you are at lunch and you only have your personal tablet. Is it okay to run it? What information should you avoid posting on social networking sites? Senior government personnel, military or civilian. Which of the following is NOT a correct way to protect sensitive information? **Social Networking Which of the following is a security best practice when using social networking sites? Social Security Number, date and place of birth, mothers maiden name. Avoid talking about work outside of the workplace or with people without a need-to-know. When using a public device with a card reader, only use your DoD CAC to access unclassified information, is only allowed if the organization permits it. Which of the following is a best practice for physical security? **Social Networking What should you do if you receive a game application request that includes permission to access your friends, profile information, cookies, and sites visited? What describes how Sensitive Compartmented Information is marked? *Sensitive Compartmented Information What must the dissemination of information regarding intelligence sources, methods, or activities follow? An official website of the United States government. You are leaving the building where you work. e. Why do Elodea and onion cells have more consistent shapes than human epithelial cells? What would you do if you receive a game application request on your government computer that includes permission to access your friends, profile information, cookies, and sites visited? Remove security badge as you enter a restaurant or retail establishment. Which of the following should you do immediately? Security Classification Guides (SCGs).??? Immediately notify your security point of contact. That trust is bounded by the Oath of Office we took willingly. What function do Insider Threat Programs aim to fulfill? **Insider Threat How many potential insider threat indicators does a person who is playful and charming, consistently wins performance awards, but is occasionally aggressive in trying to access sensitive information display? Not correct. When would be a good time to post your vacation location and dates on your social networking website? Classified information that should be unclassified and is downgraded. you don't need to do anything special to protect this information By Quizzma Team / Technology. Adversaries exploit social networking sites to disseminate fake news. (Identity Management) Which of the following is an example of two-factor authentication? correct. Which of the following best describes a way to safely transmit Controlled Unclassified Information (CUI)? What should you do? If possible, set your browser preferences to prompt you each time a website wants to store a cookie. A colleague is playful and charming, consistently wins performance awards, and is occasionally aggressive in trying to access classified information. Which of the following individuals can access classified data? Controlled Unclassified Information (CUI) is information that requires safeguarding or dissemination controls pursuant to and consistent with applicable law, regulations, and government-wide policies but is not classified under Executive Order 13526 or the Atomic Energy Act, as amended. You receive an email from the Internal Revenue Service (IRS) demanding immediate payment of back taxes of which you were not aware. What certificates are contained on the DoD Public Key Infrastructure (PKI) implemented by the Common Access Card (CAC)/Personal Identity Verification (PIV) card? Which of the following is NOT a social engineering tip? Identify and disclose it with local Configuration/Change Management Control and Property Management authorities. *Spillage After reading an online story about a new security project being developed on the military installation where you work, your neighbor asks you to comment about the article. 1 Cyber Awareness Challenge 2023 Answers. Which of the following is true of Internet of Things (IoT) devices? Software that installs itself without the users knowledge. Q&A for work. However, agency personnel and contractors should first consult their agency's CUI implementing policies and program management for guidance. Right-click the link and select the option to preview??? Which of the following is NOT a typical means for spreading malicious code? You may use your personal computer as long as it is in a secure area in your home b. Do not forward, read further, or manipulate the file; Do not give out computer or network information, Do not follow instructions from unverified personnel. Store classified data in a locked desk drawer when not in use Maybe It displays a label showing maximum classification, date of creation, point of contact, and Change Management 9CM) Control Number. A coworker has left an unknown CD on your desk. A headset with a microphone through a Universal Serial Bus (USB) port. Looking for https in the URL. (Mobile Devices) When can you use removable media on a Government system? What is the best choice to describe what has occurred? Make note of any identifying information and the website URL and report it to your security office. **Home Computer Security Which of the following is a best practice for securing your home computer? data. **Classified Data What is required for an individual to access classified data? What action should you take? You receive an email from a company you have an account with. DOD Cyber Awareness 2021 (DOD-IAA-V18.0) Know, RT202: Ch. not correct 8. **Insider Threat Based on the description that follows, how many potential insider threat indicator(s) are displayed? Which of the following is NOT a home security best practice? **Home Computer Security What should you consider when using a wireless keyboard with your home computer? **Insider Threat What advantages do insider threats have over others that allows them to cause damage to their organizations more easily? When operationally necessary, owned by your organization, and approved by the appropriate authority. A colleague removes sensitive information without seeking authorization in order to perform authorized telework. How many potential insider threat indicators does this employee display? (Spillage) Which of the following is a best practice to protect information about you and your organization on social networking sites and applications? Dont assume open storage in a secure facility is authorized Maybe. There is no way to know where the link actually leads. You have reached the office door to exit your controlled area. Transmit classified information via fax machine only Not correct Which Of The Following Is Not A Correct Way To Protect CUI. You receive an unexpected email from a friend: I think youll like this: https://tinyurl.com/2fcbvy. What action should you take? What should you do to protect classified data? How many potential insiders threat indicators does this employee display? (Sensitive Information) What must the dissemination of information regarding intelligence sources, methods, or activities follow? You know that this project is classified. Which of the following is true of Security Classification Guides? Tell us about it through the REPORT button at the bottom of the page. A colleague is playful and charming, consistently wins performance awards, and is occasionally aggressive in trying to access classified information. Ask for information about the website, including the URL. What should you do? **Social Networking When may you be subject to criminal, disciplinary, and/or administrative action due to online misconduct? *Sensitive Information Under which circumstances is it permitted to share an unclassified draft document with a non-DoD professional discussion group? Unclassified information can become a threat to national security. Which of the following includes Personally Identifiable Information (PII) and Protected Health Information (PHI)? Always use DoD PKI tokens within their designated classification level. **Classified Data How should you protect a printed classified document when it is not in use? Controlled unclassified information. Set hasDigit to true if the 3-character passCode contains a digit, Critical, Essential, and Support Functions. Have your permissions from your organization, follow your organization guideline, use authorized equipment and software, employ cyber security best practice, perform telework in dedicated when home. **Mobile Devices Which of the following helps protect data on your personal mobile devices? correct. Paul verifies that the information is CUI, includes a CUI marking in the subject header, and digitally signs an e-mail containing CUI. Which of the following is true of traveling overseas with a mobile phone. What is the best response if you find classified government data on the internet? **Social Engineering How can you protect yourself from internet hoaxes? What level of damage to national security could reasonably be expected if unauthorized disclosure of Top Secret information occurred? Examples are: Patient names, Social Security numbers, Drivers license numbers, insurance details, and birth dates. **Identity management Which of the following is NOT a best practice to preserve the authenticity of your identity? **Insider Threat Which of the following is NOT considered a potential insider threat indicator? Refer the reporter to your organizations public affairs office. Immediately notify your security point of contact. **Social Networking As someone who works with classified information, what should you do if you are contacted by a foreign national seeking information on a research project? **Social Engineering What is TRUE of a phishing attack? It does not require markings or distribution controls. Which of the following does NOT constitute spillage? Why might "insiders" be able to cause damage to their organizations more easily than others? Social Security Number; date and place of birth; mothers maiden name. Any time you participate in or condone misconduct, whether offline or online. Definition 1 / 24 -It must be released to the public immediately. Not correct When gases are sold they are usually compressed to high pressures. Historically, each agency developed its own practices for sensitive unclassified information, resulting in a patchwork of systems across the Executive branch, in which similar information might be defined or labeled differently, or where dissimilar information might share a definition and/or label. Of the following, which is NOT a method to protect sensitive information? *Spillage Which of the following is a good practice to aid in preventing spillage? ~All documents should be appropriately marked, regardless of format, sensitivity, or classification. Always check to make sure you are using the correct network for the level of data. Store it in a General Services Administration (GSA)-approved vault or container. **Website Use How should you respond to the theft of your identity? Ive tried all the answers and it still tells me off, part 2. Confirm the individuals need-to-know and access. *Sensitive Compartmented Information What is Sensitive Compartmented Information (SCI)? Power off any mobile devices when entering a secure area. When using a fax machine to send sensitive information, the sender should do which of the following? How can you protect data on your mobile computing and portable electronic devices (PEDs)? Linda encrypts all of the sensitive data on her government-issued mobile devices. A coworker removes sensitive information without authorization. *Malicious Code After visiting a website on your Government device, a popup appears on your screen. Government-owned PEDs when expressly authorized by your agency. Attempting to access sensitive information without need-to-know, Avoid talking about work outside of the workplace or with people without a need-to-know, Report the suspicious behavior in accordance with their organizations insider threat policy. Unclassified is a security classification assigned to official information that does not warrant the assignment of Confidential, Secret, or Top Secret markings but which is not publicly-releasable without authorization. What level of damage to national security could reasonably be expected if unauthorized disclosure of Top Secret information occurred? All https sites are legitimate. A colleague has won 10 high-performance awards, can be playful and charming, is not currently in a relationship, and occasionally aggressive in trying to access sensitive information. Contact the IRS using their publicly available, official contact information. What is NOT Personally Identifiable Information (PII)? What should you do if a reporter asks you about potentially classified information on the web? Rating. Spillage because classified data was moved to a lower classification level system without authorization. Which of the following is true of Unclassified information? They can be part of a distributed denial-of-service (DDoS) attack. Which of the following represents an ethical use of your Government-furnished equipment (GFE)? *Sensitive Compartmented Information When faxing Sensitive Compartmented Information (SCI), what actions should you take? Discrete data involves whole numbers (integers - like 1, 356, or 9) that can't be divided based on the nature of what they are. Who is responsible for information/data security? We thoroughly check each answer to a question to provide you with the most correct answers. *Insider Threat Which of the following is a reportable insider threat activity? What type of data must be handled and stored properly based on classification markings and handling caveats? Connect and share knowledge within a single location that is structured and easy to search. How should you protect a printed classified document when it is not in use? Proactively identify potential threats and formulate holistic mitigation responses. Public service, notably service in the United States Department of Defense or DoD, is a public trust. Let us have a look at your work and suggest how to improve it! Which of the following is an example of Protected Health Information (PHI)? Search for an answer or ask Weegy. In setting up your personal social networking service account, what email address should you use? A colleague saves money for an overseas vacation every year, is a . The potential for unauthorized viewing of work-related information displayed on your screen. Store it in a shielded sleeve to avoid chip cloning. Mobile devices and applications can track your location without your knowledge or consent. Federal agencies routinely generate, use, store, and share information that, while not meeting the threshold for classification as national security or atomic energy information, requires some level of protection from unauthorized access and release. It includes a threat of dire circumstances. (controlled unclassified information) Which of the following is NOT an example of CUI? They may wittingly or unwittingly use their authorized access to perform actions that result in the loss or degradation of resources or capabilities. It never requires classified markings, it is true about unclassified data. cyber-awareness. When teleworking, you should always use authorized and software. Which of the following is NOT an example of Personally Identifiable Information (PII)? For example, when you buy propane for your barbecue, your tank is placed on a scale while it is filled under high pressure (Figure 7). Which of the following best describes good physical security? Remove your security badge, common access card (CAC), or personal identity verification (PIV) card. What should be your response? **Use of GFE When can you check personal e-mail on your Government-furnished equipment (GFE)? Which of the following is true about unclassified data? Your password and the second commonly includes a text with a code sent to your phone. Which of the following is true of Sensitive Compartmented Information (SCI)? You receive an email at your official Government email address from an individual at the Office of Personnel Management (OPM). What action should you take first? Be aware of classification markings and all handling caveats. Access requires a formal need-to-know determination issued by the Director of National Intelligence.? Which of the following is true of using DoD Public key Infrastructure (PKI) token? You check your bank statement and see several debits you did not authorize. Connect to the Government Virtual Private Network (VPN). Under which circumstances may you be subject to criminal, disciplinary, and/or administrative action due to online misconduct? Information improperly moved from a higher protection level to a lower protection level. Request the users full name and phone number. (Answer) CPCON 2 (High: Critical and Essential Functions) CPCON 1 (Very High: Critical Functions) CPCON 3 (Medium: Critical, Essential, and Support Functions) CPCON 4 (Low: All Functions) CPCON 5 (Very Low: All Functions).