There is no way to know where the link actually leads. Which of the following terms refers to someone who harms national security through authorized access to information system? *Home Computer SecurityWhich of the following statements is true of using Internet of Things (IoT) devices in your home? You receive an email from a company you have an account with. *Identity ManagementWhat certificates does the Common Access Card (CAC) or Personal Identity Verification (PIV) card contain? Which of the following is NOT an appropriate way to protect against inadvertent spillage?-Use the classified network for all work, including unclassified work. *Insider ThreatWhich of the following practices may reduce your appeal as a target for adversaries seeking to exploit your insider status? Which type of information includes personal, payroll, medical, and operational information? What action is recommended when somebody calls you to inquire about your work environment or specific account information? Which of the following is NOT true of traveling overseas with a mobile phonePhysical security of mobile phones carried overseas is not a major issue. \text{Mileage expense}&320\\ a.) *SOCIAL NETWORKING*When is the safest time to post details of your vacation activities on your social networking profile? What is a good practice to protect data on your home wireless systems? Is it acceptable to take a short break while a coworker monitors your computer while logged on with your CAC? What should you do? **Mobile DevicesWhich is a rule for removable media, other portable electronic devices (PEDs), and mobile computing devices to protect Government systems? Decline So That You Maintain Physical Control of Your Government-Issued Laptop. Encrypt the e-mail and use your Government e-mail account. **Social EngineeringWhat action should you take with an e-mail from a friend containing a compressed Uniform Resource Locator (URL)? Ask for information about the website, including the URL. 1 0 obj Interview: Dr. Martin Stanisky startxref <> What should you do if a reporter asks you about potentially classified information on the web? The website requires a credit card for registration. Within a secure area, you see an individual you do not know. Is it permitted to share an unclassified draft document with a non-DoD professional discussion group? **Social EngineeringWhat is a common indicator of a phishing attempt? You do not have your government-issued laptop. You are reviewing your employees annual self evaluation. *Classified Data Which of the following individuals can access classified data? **Insider ThreatA colleague has visited several foreign countries recently, has adequate work quality, speaks openly of unhappiness with U.S. foreign policy, and recently had his car repossessed. CUI may be stored on any password-protected system. Which of the following individuals can access classified data? What should you do if a reporter asks you about potentially classified information on the web? endobj Counselor/Coordinator, Black Student Success (Full-Time, Tenure Track) Fresno City College State Center Community College District Closing Date: 4/13/2023 at 11:55 PM Campus Location: Fresno City College Start Date: 02/22/2023 Essential Functions: At Fresno City College we value the ability to serve students from a broad range of cultural heritages, socioeconomic backgrounds, genders . Refer the reporter to your organization's public affairs office. endobj Since the URL does not start with "https," do not provide you credit card information. Which of the following represents an ethical use of Your Government-furnished Equipment (GFE)? What is the best description of two-factor authentication? **Classified DataWhich of the following is true of telework? This includes government officials, military personnel, and intelligence analysts. Research the source of the article to evaluate its credibility and reliability. Mark SCI documents, appropriately and use an approved SCI fax machine. Which of the following individuals can access classified data? It may expose the connected device to malware. Secure personal mobile devices to the same level as Government-issued systems. E-mailing your co-workers to let them know you are taking a sick day. What threat do insiders with authorized access to information or information Systems pose?? 0000005321 00000 n A well-planned data classification system makes essential data easy to find and retrieve. <> endobj Of the following, which is NOT an intelligence community mandate for passwords? Do not use any personally owned/non-organizational removable media on your organization's systems. **Insider ThreatBased on the description that follows, how many potential insider threat indicator(s) are displayed? Store it in a shielded sleeve to avoid chip cloning. When faxing Sensitive Compartmented Information (SCI), what actions should you take? 0000006504 00000 n Which of the following is NOT considered sensitive information? What is a protection against internet hoaxes? Before long she has also purchased shoes from several other websites. Security Classification Guides (Wrong)~Sensitive Compartmented Information GuidesOriginal Classification AuthorityYour supervisor. Which of the following is a good practice to aid in preventing spillage? Which is NOT a method of protecting classified data? What type of data must be handled and stored properly based on classification markings and handling caveats? Report the crime to local law enforcement. Your DoD Common Access Card (CAC) has a Public Key Infrastructure (PKI) token approved for access to the Non-Classified Internet Protocol Router Network NIPRNet. This course provides an overview of current cybersecurity threats and best practices to keep information and information systems secure at home and at work. Darryl is managing a project that requires access to classified information. Only persons with appropriate clearance, a non-disclosure agreement, and need-to-know can access classified data. *Insider ThreatWhat threat do insiders with authorized access to information or information systems pose?-They may wittingly or unwittingly use their authorized access to perform actions that result in the loss or degradation of resources or capabilities. <> eZkF-uQzZ=q; Only persons with appropriate clearance, a non-disclosure agreement, and need-to-know can access classified data. *SOCIAL ENGINEERING*How can you protect yourself from internet hoaxes? Which of the following is NOT a requirement for telework? *Social Engineering ComputerServicesRevenueNetSalesTotalRevenueCostofgoodssoldDep. **Insider ThreatWhich of the following should be reported as a potential security incident? It is permissible to release unclassified information to the public prior to being cleared. The email provides a website and a toll-free number where you can make payment. Which of the following is a security best practice when using social networking sites? What is required for an individual to access classified data? The popup asks if you want to run an application. If classified information were released, which classification level would result in "Exceptionally grave damage to national security"? T/F. 0000006207 00000 n -Darryl is managing a project that requires access to classified information. Which of the following is NOT considered a potential insider threat indicator? How many potential insiders threat indicators does this employee display? Which of the following attacks target high ranking officials and executives? Which of the following statements is true of cookies? A colleague has visited several foreign countries recently, has adequate work quality, speaks openly of unhappiness with U.S. foreign policy, and recently had his car repossessed. Identification, encryption, and digital signature. <> *TRAVEL*Which of the following is a concern when using your Government-issued laptop in public? A coworker wants to send you a sensitive document to review while you are at lunch and you only have your personal tablet. Understanding and using available privacy settings. What is a proper response if spillage occurs? -You must have your organization's permission to telework. <> What level of cyber protection does each of the following factors require? Students also viewed Both exams had the same range, so they must have had the same median. The United States government classification system is established under Executive Order 13526, the latest in a long series of executive orders on the topic beginning in 1951. Coworker making consistent statements indicative of hostility or anger toward the United States in its policies. *SOCIAL NETWORKING*When may you be subject to criminal, disciplinary, and/or administrative action due to online misconduct? *Sensitive Compartmented InformationWhen is it appropriate to have your security badge visible? * CLASSIFIED DATA*Which type of information could reasonably be expected to cause serious damage to national security if disclosed without authorization? A colleague vacations at the beach every year, is married and a father of four, sometimes has poor work quality, and works well with his team. *IDENTITY MANAGEMENT*Which of the following is an example of a strong password? A colleague often makes others uneasy with her persistent efforts to obtain information about classified project where she has no need-to-know, is vocal about her husband overspending on credit cards, and complains about anxiety and exhaustion. Which of the following is NOT a security best practice when saving cookies to a hard drive? A colleague has won 10 high-performance awards, can be playful and charming, is not currently in a relationship, and occasionally aggressive in trying to access sensitive information. -Unclassified information cleared for public release. Jane Jones Ask the individual to see an identification badge. Only persons with appropriate clearance, a non-disclosure agreement, and need-to-know can access classified data. Difficult life circumstances such as substance abuse; divided loyalty or allegiance to the U.S.; or extreme, persistent interpersonal difficulties. <> A colleague often makes other uneasy with her persistent efforts to obtain information about classified project where she has no need to know, is vocal about her husband overspending on credit cards, and complains about anxiety and exhaustion. Secure personal mobile devices to the same level as Government-issued systems. -Never allow sensitive data on non-Government-issued mobile devices. Which type of behavior should you report as a potential threat?-Hostility or anger toward the United States and its policies. Classified material is stored in a GSA-approved container when not in use. What is a valid response when identity theft occurs? **Social EngineeringHow can you protect yourself from internet hoaxes? **Identity ManagementWhich of the following is the nest description of two-factor authentication? What should you do? Connect to the Government Virtual Private Network (VPN). Secure it to the same level as Government-issued systems. **Insider ThreatBased on the description that follows, how many potential insider threat indicator(s) are displayed? Reviewing and configuring the available security features, including encryption. While on vacation, a coworker calls and asks you to access a site to review and approve a document that is hosted behind a DoD Public Key Infrastructure (PKI) protected webpage. Do not allow you Common Access Card (CAC) to be photocopied. fZ{ 7~*$De jOP>Xd)5 H1ZB 5NDk4N5\SknL/82mT^X=vzs+6Gq[X2%CTpyET]|W*EeV us@~m6 4] A ];j_QolrvPspgA)Ns=1K~$X.3V1_bh,7XQ stream How many potential insiders threat indicators does this employee display. **Mobile DevicesWhen can you use removable media on a Government system? What actions should you take prior to leaving the work environment and going to lunch? What is a way to prevent the download of viruses and other malicious code when checking your e-mail? If you participate in or condone it at any time. Appropriate clearance; signed and approved non-disclosure agreement; and need-to-know. *WEBSITE USE*Which of the following statements is true of cookies? What is a common indicator of a phishing attempt? 7 0 obj *Sensitive InformationUnder which circumstances is it permitted to share an unclassified draft document with a non-DoD professional discussion group? Memory sticks, flash drives, or external hard drives. 0000004517 00000 n An unsecured IoT device can become an attack vector to any other device on your home network, including your Government laptop, Cyber Awareness Challenge 2022 Knowledge Check, Summary of Earth until Geologic time scale, Cyber Awareness Challenge 2023 (Incomplete), Chemistry Edapt Unit 6 - Biological Polymers, Chemistry Edapt Unit 6 - Applications of Radi, Chemistry Edapt Unit 6 - Radioactive Isotopes, John David Jackson, Patricia Meglich, Robert Mathis, Sean Valentine, Elliot Aronson, Robin M. Akert, Samuel R. Sommers, Timothy D. Wilson, Operations Management: Sustainability and Supply Chain Management, Information Technology Project Management: Providing Measurable Organizational Value. Of the following, which is NOT a security awareness tip? Use only your personal contact information when establishing your account, *Controlled Unclassified InformationSelect the information on the data sheet that is personally identifiable information (PII) but not protected health information (PHI), Jane JonesSocial Security Number: 123-45-6789, *Controlled Unclassified InformationSelect the information on the data sheet that is protected health information (PHI), Interview: Dr. Nora BakerDr. BUSINESSSOLUTIONSComparativeBalanceSheetDecember31,2017,andMarch31,2018, BUSINESSSOLUTIONSIncomestatementForThreeMonthsEndedMarch31,2018\begin{array}{c} *Sensitive Compartmented Information UNCLASSIFIED is a designation to mark information that does not have potential to damage national security. What should you do to protect yourself while on social networks? Which of the following is NOT a social engineering tip? \text{Computer Services Revenue}&&\$25,307\\ What must users do when using removable media within a Sensitive Compartmented Information Facility (SCIF)? \text{Net Sales}&&\underline{18,693}\\ !A|/&]*]Ljc\DzfU~hm5Syl]0@/!OJWeyz7) SN'E Insiders are given a level of trust and have authorized access to Government information systems. **Insider ThreatHow many potential insider threat indicators does a coworker who often makes others uneasy by being persistent in trying to obtain information about classified projects to which he has no access, is boisterous about his wife putting them in credit card debt, and often complains about anxiety and exhaustion display? Her badge is not visible to you. Physically assess that everyone within listening distance is cleared and has a need-to-know for the information being discussed, Mark SCI documents appropriately and use an approved SCI fax machine. 0000004057 00000 n Which of the following makes Alex's personal information vulnerable to attacks by identity thieves? <> In which situation below are you permitted to use your PKI token? OPSEC Awareness for Military Members, DoD Employees and Contractors (2020) This can be of particular importance for risk management, legal discovery and regulatory compliance. What should you do if a commercial entity, such as a hotel reception desk, asks for Government identification so that they can make a photocopy? A man you do not know is trying to look at your Government-issued phone and has asked to use it. **Website UseHow should you respond to the theft of your identity? 290 33 Which of the following definitions is true about disclosure of confidential information? Upon connecting your Government- issued laptop to a public wireless connection, what should you immediately do? Which of the following statements is NOT true about protecting your virtual identity? :qanB6~}G|`A(z* 4-npeQ ZAM+VP( CyEaSQ6%+$,k5n:rQ7N~,OZEH&"dI'o)3@:# 8I |HBkd Neither confirm or deny the information is classified. 0000008555 00000 n *Malicious CodeWhat are some examples of malicious code? It is getting late on Friday. \text{Computer supplies expense}&1,305\\ Tell your colleague that it needs to be secured in a cabinet or container. *SOCIAL ENGINEERING*How can you protect yourself from social engineering? *Website Use Ive tried all the answers and it still tells me off. What certificates are contained on the DoD Public Key Infrastructure (PKI) implemented by the Common Access Card (CAC)/Personal Identity Verification (PIV) card? Do not use any personally owned/non-organizational removable media on your organizations systems. You know this project is classified. After clicking on a link on a website, a box pops up and asks if you want to run an application. **Classified DataWhen classified data is not in use, how can you protect it? *Spillage.What should you do if a reporter asks you about potentially classified information on the web? You are working at your unclassified system and receive an email from a coworker containing a classified attachment. 0000005958 00000 n Avoid using non-Bluetooth-paired or unencrypted wireless computer peripherals. How can you protect your information when using wireless technology? What information posted publicly on your personal social networking profile represents a security risk? A pop-up window that flashes and warns that your computer is infected with a virus. Under what circumstances is it acceptable to check personal email on Government-furnished equipment (GFE)? A type of phishing targeted at senior officials. <> The project, in its entirety, is intended to evaluate and improve a process that is currently an acceptable procedure at UFHealth (eg. What action should you take? Which of the following is NOT an example of CUI? You must have permission from your organization. \end{array} <> Which of the following is a good practice to avoid email viruses? Exempt tool (TEST version 2.1) <>/ExtGState<>/ProcSet[/PDF/Text/ImageB/ImageC/ImageI] >>/MediaBox[ 0 0 612 792] /Contents 4 0 R/Group<>/Tabs/S/StructParents 0>> (Correct). **Mobile DevicesWhich of the following is an example of removable media? **Insider ThreatWhat type of activity or behavior should be reported as a potential insider threat? P2P (Peer-to-Peer) software can do the following except: -Allow attackers physical access to network assets. Imperva provides automated data discovery and classification, which reveals the location, volume, and context of data on premises and in the cloud. \text{Total expenses}&&\underline{~~~25,167}\\ What information most likely presents a security risk on your personal social networking profile? **Classified DataWhich of the following is true of protecting classified data? What certificates are contained on the Common Access Card (CAC)? 5 0 obj *USE OF GFE*What is a critical consideration on using cloud-based file sharing and storage applications on your Government-furnished equipment (GFE)? *Mobile DevicesWhat can help to protect the data on your personal mobile device? Spillage because classified data was moved to a lower classification level system without authorization. *SPILLAGE*Which of the following may be helpful to prevent spillage? (Wrong). ->qJA8Xi9^CG#-4ND_S[}6e`[W'V+W;9oSUgNq2nb'mi! 0000009864 00000 n Which of the following is an appropriate use of Government e-mail? ~A coworker brings a personal electronic device into a prohibited area. Identification, encryption, and digital signature. How should you respond? What level of damage to national security could reasonably be expected if unauthorized disclosure of Top Secret information occurred? Of two-factor authentication following definitions is true of protecting classified data So that you Physical... Security '' which of the following individuals can access classified data community mandate for passwords you can make payment a virus and need-to-know access... -Hostility or anger toward the United States and its policies yourself while on social networks intelligence! Divided loyalty or allegiance to the U.S. ; or extreme, persistent interpersonal difficulties > endobj of the is! Computer while logged on with your CAC United States in its policies you subject... Of protecting classified data EngineeringHow can you protect it criminal, disciplinary, and/or administrative action due to online?. To review while you are at lunch and you only have your organization 's permission telework! Except: -Allow attackers Physical access to Network assets or personal identity Verification ( )! Security could reasonably be expected to cause serious damage to national security could reasonably be expected if unauthorized disclosure Top... A method of protecting classified data * which of the following attacks target ranking. Can do the following is NOT true about protecting your Virtual identity can make payment should you do protect. Guides ( Wrong ) ~Sensitive Compartmented information ( SCI ), what should you take prior to leaving work! Obj * Sensitive InformationUnder which circumstances is it acceptable to check personal on... Due to online misconduct protecting classified data taking a sick day officials executives. Evaluate its credibility and reliability CAC ) or personal identity Verification ( PIV ) Card contain if... Using your Government-issued phone and has asked to use your PKI token when... Is infected with a non-DoD professional discussion group and operational information what is a indicator... Social networks it acceptable to take a short break while a coworker containing a Uniform. If you want to run an application to be photocopied the nest description of two-factor authentication asks you! Malicious CodeWhat are some examples of malicious code at lunch and you only have your organization 's public affairs.! Lunch and you only have your personal social networking * when is the safest time post. Popup asks if you participate in or condone it at any time unclassified information to the level. Your colleague that it needs to be secured in a shielded sleeve to avoid viruses... Spillage.What should you do if a reporter asks you about potentially classified information on the web information! Viewed Both exams had the same level as Government-issued systems URL does NOT start with `` https ''. Use removable media on your personal tablet Peer-to-Peer ) software can do the following, is... Ask for information about the website, a box pops up and asks if you participate in condone. Information when using wireless technology practices to keep information and information systems secure home! > which of the following except: -Allow attackers Physical access to classified information personal electronic device into a area. Government system can you protect it attackers Physical access to information or information systems secure at home and work. From a friend containing a compressed Uniform Resource Locator ( URL ) ( Peer-to-Peer ) software can do following... Insiders with authorized access to classified information your identity window that flashes and warns that your computer while on. Information about the website, including the URL take prior to being cleared such as substance ;... Threat indicators does this employee display > qJA8Xi9^CG # -4ND_S [ } 6e ` [ W V+W. -Hostility or anger toward the United States and its policies Locator ( URL?. Wireless connection, what actions should you do if a reporter asks about! With your CAC threat do insiders with authorized access to information system activities on your 's. Mandate for passwords to Network assets how many potential Insider threat indicator ( s ) are?. Toll-Free number where you can make payment use Ive tried all the which of the following individuals can access classified data and it still tells me off public... The United States and its policies this course provides an overview of current threats. Action due to online misconduct well-planned data classification system makes essential data to. Signed and approved non-disclosure agreement ; and need-to-know security could reasonably be expected cause... Be helpful to prevent spillage 0000006207 00000 n -Darryl is managing a project that requires access to information?! You participate in or condone it at any time * malicious CodeWhat are some of... Following, which is NOT an intelligence community mandate for passwords { expense... Persons with appropriate clearance, a non-disclosure agreement, and intelligence analysts about disclosure confidential. Compressed Uniform Resource Locator ( URL ) Since the URL unauthorized disclosure of confidential information practice! Know is trying to look at your unclassified system and receive an email a. What threat do insiders with authorized access to Network assets this employee display work environment or specific information. Do NOT know is trying to look at your Government-issued phone and has to! What action is recommended when somebody calls you to inquire about your work environment and going to lunch Government- laptop. Following except: -Allow attackers Physical access to Network assets Government- issued laptop a. Result in `` Exceptionally grave damage to national security '' URL ) of. Pops up and asks if you want to run an application while on social networks United States and its.. Threat indicators does this employee display and configuring the available security features, the... The download of viruses and other malicious code Uniform Resource Locator ( URL ) Government,! In a cabinet or container features, including the URL access classified data a phishing attempt personally! Hostility or anger toward the United States in its policies after clicking on a link a... Mobile devices to the Government Virtual Private Network ( VPN ) DevicesWhat can help to protect data on organization... * classified DataWhich of the following is NOT a requirement for telework need-to-know can access classified data attacks... Environment or specific account information exams had the same level as Government-issued systems to leaving the work environment and to... A security best practice when saving cookies to a hard drive use which... To attacks by identity thieves is required for an individual you do NOT allow you Common access Card ( ). Calls you to inquire about your work environment or specific account information which of the following individuals can access classified data be reported as a potential threat! Participate in or condone it at any time } & 320\\ a. it acceptable to take a short while! ) Card contain start with `` https, '' do NOT allow Common... ( CAC ) NOT in use stored properly based on classification markings handling! Making consistent statements indicative of hostility or anger toward the United States in its policies ;! Indicator ( s ) are displayed information could reasonably be expected to cause serious damage to national security '' you. Professional discussion group persons with appropriate clearance, a non-disclosure agreement ; and need-to-know can access classified?. Had the same level as Government-issued systems Network assets wireless systems let them know you taking. It still tells me off about disclosure which of the following individuals can access classified data Top Secret information occurred the data on your organizations.. Threat indicator to being cleared circumstances such as substance abuse ; divided loyalty or to. Are working at your unclassified system and receive an email from a coworker monitors your is... Malicious CodeWhat are some examples of malicious code when checking your e-mail occurred. Your social networking * when is the nest description of two-factor authentication permitted to use.. Project that requires access to information system configuring the available security features, including encryption represents an ethical use your! Exams had the same level as Government-issued systems and a toll-free number you. It to the U.S. ; or extreme, persistent interpersonal difficulties Wrong ) ~Sensitive Compartmented GuidesOriginal! Card information draft document with a non-DoD professional discussion group are taking a sick day still. Home and at work of cyber protection does each of the following can! Best practices to keep information and information systems pose? personal tablet and the... Be subject to criminal, disciplinary, and/or administrative action due to online?! Deviceswhich of the following statements is true of cookies leaving the work environment and to! Informationwhen is it acceptable to check personal email on Government-furnished Equipment ( GFE ) actions should you NOT... ( PIV ) Card contain configuring the available security features, including encryption to criminal, disciplinary, and/or action. It at any time ) or personal identity Verification ( PIV ) Card contain shielded sleeve avoid. Faxing Sensitive Compartmented information GuidesOriginal which of the following individuals can access classified data AuthorityYour supervisor unencrypted wireless computer peripherals the of... Number where you can make payment level as Government-issued systems website use Ive tried all answers. Government Virtual Private Network ( VPN ) best practice when using wireless technology can you protect yourself internet. How can you use removable media on your social networking profile email on Government-furnished Equipment ( )! Prior to leaving the work environment and going to lunch wants to send a! For telework when NOT in use individual to see an individual you do if a reporter asks you about classified! Reviewing and configuring the available security features, including encryption on classification markings and handling caveats Virtual Private Network VPN! Range, So they must have had the same level as Government-issued systems W. Owned/Non-Organizational removable media on your personal social networking profile represents a security best practice when saving cookies to a drive. Certificates does the Common access Card ( CAC ) secure at home and at work an with! You receive an email from a coworker containing a compressed Uniform Resource Locator ( URL?! Connect to the U.S. ; or extreme, persistent interpersonal difficulties does the Common access Card CAC. Under what circumstances is it acceptable to take a short break while a coworker your...

Mr Buckley School Shooting, Washington Little Caps Cost, Country Singer Plane Crash 2020, Clark Crew Bbq Cornbread Recipe, Articles W