Controlled Unclassified Information (CUI): Controlled Unclassified information was defined in the Executive Order 13556 as information held by or generated for the Federal Government that requires safeguarding or dissemination controls pursuant to and consistent with applicable law, regulations and government-wide policies that isn't classified Third, the neighbor ground points of an unclassified point are searched from multiple subspaces. Insiders are given a level of trust and have authorized access to Government information systems. They broadly describe the overall classification of a program or system. (Identity Management) What certificates are contained on the Common Access Card (CAC)? classified-document. Use a common password for all your system and application logons. Which of the following statements is TRUE about the use of DoD Public Key Infrastructure (PKI) tokens? A .gov website belongs to an official government organization in the United States. **Travel What is a best practice while traveling with mobile computing devices? Updated 8/5/2020 8:06:16 PM. Briefly describe what you have learned. Quizzma is a free online database of educational quizzes and test answers. Which of the following is true of transmitting Sensitive Compartmented Information (SCI)? What should you consider when using a wireless keyboard with your home computer? Which of the following is NOT true of traveling overseas with a mobile phone? Upon connecting your Government- issued laptop to a public wireless connection, what should you immediately do? This lets the service person know when the tank is "full." (Home computer) Which of the following is best practice for securing your home computer? (Sensitive Information) Which of the following represents a good physical security practice? *Spillage What should you do when you are working on an unclassified system and receive an email with a classified attachment? Q&A for work. A Common Access Card and Personal Identification Number. After reading an online story about a new security project being developed on the military installation where you work, your neighbor asks you to comment about the article. **Website Use How should you respond to the theft of your identity? How can you protect your information when using wireless technology? What is a best practice for protecting controlled unclassified information (CUI)? What should you do? Should you always label your removable media? On a NIPRNET system while using it for a PKI-required task. DoD Unclassified data: Must be cleared before being released to the public May require applci aton i of Controled l Uncasl sed Iifi nformaton i (CU)I access and distribution controls Must be clearly marked as Unclassified or CUI if included in a classified document or classified storage area How many indicators does this employee display? A 3%3\%3% penalty is charged for payment after 303030 days. A lock (LockA locked padlock) or https:// means youve safely connected to the .gov website. When teleworking, you should always use authorized and software. You have reached the office door to exit your controlled area. correct. Sensitive information. Protection may be required for privacy, law enforcement, contractual protections, or other reasons. Federal agencies routinely generate, use, store, and share information that, while not classified, still requires some level of protection from unauthorized access and release. Which of the following should be reported as a potential security incident (in accordance with your Agencys insider threat policy)? Correct. When is it appropriate to have your security badge visible? 1.1 Standard Challenge Answers. The attributes of identified ground seeds are modified to ground points. What should you do? (Wrong). 1 Cyber Awareness Challenge 2023 Answers. Which of the following is an example of malicious code? 870 Summit Park Avenue Auburn Hills, MI 48057. Which of the following is not considered a potential insider threat indicator? That trust is bounded by the Oath of Office we took willingly. You find information that you know to be classified on the Internet. Which of the following best describes wireless technology? (Correct)-It does not affect the safety of Government missions.-It never requires classification markings. While it may seem safer, you should NOT use a classified network for unclassified work. **Insider Threat What type of activity or behavior should be reported as a potential insider threat? Learn more about Teams A trusted friend in your social network posts a link to vaccine information on a website unknown to you. Position your monitor so that it is not facing others or easily observed by others when in use Correct. Others may be able to view your screen. (Spillage) What should you do when you are working on an unclassified system and receive an email with a classified attachment? you don't need to do anything special to protect this information CPCON 1 (Very High: Critical Functions) P2P (Peer-to-Peer) software can do the following except: Allow attackers physical access to network assets. Correct. Debra ensures not correct Maybe. Keeping a database from being accessed by unauthorized visitors C. Restricting a subject at a lower classification level from accessing data at a higher classification level D. Preventing an . Do not use any personally owned/non-organizational removable media on your organizations systems. **Use of GFE When can you check personal e-mail on your Government-furnished equipment (GFE)? To transmit large payments through Fedwire __________, To regulate and supervise the stock market to provide stability and security to individual investors. Which of the following is an example of a strong password? Under What Circumstances Could Unclassified? When your vacation is over, and you have returned home. What does Personally Identifiable Information (PII) include? The physical security of the device. Remove your security badge after leaving your controlled area or office building. Spillage occurs when information is spilled from a higher classification or protection level to a lower classification or protection level. What can be used to track Marias web browsing habits? Which of the following best describes the sources that contribute to your online identity. What is a possible indication of a malicious code attack in progress? Which Cyber Protection Condition (CPCON) establishes a protection priority focus on critical functions only? **Insider Threat Which type of behavior should you report as a potential insider threat? Search by Subject Or Level. **Classified Data What level of damage can the unauthorized disclosure of information classified as Confidential reasonably be expected to cause? Organizational Policy Not correct Insiders are given a level of trust and have authorized access to Government information systems. Which of the following is true about unclassified data? **Insider Threat A colleague vacations at the beach every year, is married and a father of four, his work quality is sometimes poor, and he is pleasant to work with. It is permissible to release unclassified information to the public prior to being cleared. What is a proper response if spillage occurs? not correct What should you do? You are reviewing your employees annual self evaluation. A colleague complains about anxiety and exhaustion, makes coworkers uncomfortable by asking excessive questions about classified projects, and complains about the credit card bills that his wife runs up. Which of the following best describes good physical security? They can become an attack vector to other devices on your home network. (Identity Management) Which of the following is an example of two-factor authentication? Only persons with appropriate clearance, a non-disclosure agreement, and need-to-know can access classified data. -Ask them to verify their name and office number What action should you take? How many potential insider threat indicators does this employee display? "Unclassified" or a lack of security marking denotes non-sensitive information. f. Get an answer. Which of the following may help to prevent inadvertent spillage? Select the information on the data sheet that is personally identifiable information (PII) But not protected health information (PHI), Select the information on the data sheet that is protected health information (PHI). What type of activity or behavior should be reported as a potential insider threat? Classified data: (Scene) Which of the following is true about telework? correct. You receive an email at your official Government email address from an individual at the Office of Personnel Management (OPM). The website requires a credit card for registration. Validate friend requests through another source before confirming them. You are working at your unclassified system and receive an email from a coworker containing a classified attachment. Ensure proper labeling by appropriately marking all classified material and, when required, sensitive material. What is required for an individual to access classified data? All data transfers via the internet are not 100% secure and there might be some security vulnerabilities. As long as the document is cleared for public release, you may release it outside of DoD. There are no choices provides which make it hard to pick the untrue statement about unclassified data. Physical security of mobile phones carried overseas is not a major issue. Malicious code can mask itself as a harmless e-mail attachment, downloadable file, or website. Store it in a General Services Administration (GSA)-approved vault or container. **Insider Threat Which of the following should be reported as a potential security incident? Your password and a code you receive via text message. What is a security best practice to employ on your home computer? Added 8/5/2020 8:06:16 PM. 5. **Mobile Devices What should you do when going through an airport security checkpoint with a Government-issued mobile device? Which of the following must you do before using an unclassified laptop and peripherals in a collateral classified environment? Spillage can be either inadvertent or intentional. (Spillage) What type of activity or behavior should be reported as a potential insider threat? If aggregated, the information could become classified. Which designation includes Personally Identifiable Information (PII) and Protected Health Information (PHI)? Looking for https in the URL. What is the best choice to describe what has occurred? You check your bank statement and see several debits you did not authorize. What should you do? (Mobile Devices) Which of the following statements is true? The email has an attachment whose name contains the word secret. What actions should you take prior to leaving the work environment and going to lunch? It is created or received by a healthcare provider, health plan, or employer. Secure personal mobile devices to the same level as Government-issued systems. **Social Engineering Which of the following is a way to protect against social engineering? Use only personal contact information when establishing personal social networking accounts, never use Government contact information. Physically assess that everyone within listening distance is cleared and has a need-to-know for the information being discussed. Top Secret information could be expected to cause exceptionally grave damage to national security of disclosed. What is the danger of using public Wi-Fi connections? **Identity Management Which of the following is the nest description of two-factor authentication? Using webmail may bypass built in security features. Within a secure area, you see an individual you do not know. Prudence faxes CUI using an Unclassified cover sheet via a Secret fax machine. Which of the following is true about telework? 1.To provide opportunities for individuals and businesses to open checking accounts __________, To write rules and guidelines for financial institutions under its supervision __________, To be the lender of last resort for financial institutions __________, To conduct the nations monetary policy with the goals of maintaining full employment and price stability __________, 5. On September 14, 2016, NARA issued a final rule amending 32 CFR Part 2002 to establish a uniform policy for all Federal agencies and prescribe Government-wide program implementation standards, including designating, safeguarding, disseminating, marking, decontrolling, and disposing of CUI; self-inspection and oversight requirements; and other facets of the CUI Program. Which of the following is a best practice to protect information about you and your organization on social networking sites and applications? Click the card to flip Flashcards Learn Test Match Created by Jamie_Lancaster Terms in this set (24) You receive an inquiry from a reporter about potentially classified information on the internet. Unclassified Information Student Guide . You receive an email from the Internal Revenue Service (IRS) demanding immediate payment of back taxes of which you were not aware. A colleague has won 10 high-performance awards, can be playful and charming, is not currently in a relationship, and is occasionally aggressive in trying to access sensitive information. Which of the following is true of protecting classified data? Store it in a GSA approved vault or container. Mark SCI documents appropriately and use an approved SCI fax machine. Use the classified network for all work, including unclassified work. **Physical Security At which Cyberspace Protection Condition (CPCON) is the priority focus on critical functions only? d. giving a spanking or a scolding. **Classified Data How should you protect a printed classified document when it is not in use? A coworker wants to send you a sensitive document to review while you are at lunch and you only have your personal tablet. *Spillage Which of the following may help to prevent spillage? The website requires a credit card for registration. How should you respond? Avoid using non-Bluetooth-paired or unencrypted wireless computer peripherals. An investment in knowledge pays the best interest.. Remove and take it with you whenever you leave your workstation. Use a single, complex password for your system and application logons. Law Enforcement Sensitive (LES),and others. *Sensitive Compartmented Information What should the owner of this printed SCI do differently? Definition 1 / 24 -It must be released to the public immediately. Scan external files from only unverifiable sources before uploading to computer. Only friends should see all biographical data such as where Alex lives and works. You receive an inquiry from a reporter about government information not cleared for public release. Which of the following is NOT sensitive information? What action is recommended when somebody calls you to inquire about your work environment or specific account information? ALways mark classified information appropriately and retrieve classified documents promptly from the printer. Which of the following is NOT true concerning a computer labeled SECRET? -Its classification level may rise when aggregated. 8. When operationally necessary, owned by your organization, and approved by the appropriate authority. Someone who uses authorized access, wittingly or unwittingly, to harm national security through unauthorized disclosure or other actions that may cause the loss or degradation of resources or capabilities. **Classified Data What is required for an individual to access classified data? Classified DVD distribution should be controlled just like any other classified media. What action should you take? Photos of your pet Correct. **Social Networking As someone who works with classified information, what should you do if you are contacted by a foreign national seeking information on a research project? At EPA, the CUI Program is housed in the Libraries and Accessibility Division (LAD) within the Office of Mission Supports (OMS), Office of Enterprise Information Programs (OEIP). Correct. **Insider Threat What do insiders with authorized access to information or information systems pose? You receive an email from a company you have an account with. As long as the document is cleared for public release, you may share it outside of DoD. -TRUE The use of webmail is -is only allowed if the organization permits it Using webmail may bypass built in security features. Call your security point of contact immediately. Found a mistake? A headset with a microphone through a Universal Serial Bus (USB) port. Do not download it. Which of the following is a practice that helps to prevent the download of viruses and other malicious code when checking your email? Which Of The Following Is Not A Correct Way To Protect CUI. How can you protect yourself on social networking sites? (Sensitive Information) Which of the following is NOT an example of sensitive information? What is considered ethical use of the Government email system? How many potential insiders threat indicators does this employee display? As a security best practice, what should you do before exiting? Three or more. How can you guard yourself against Identity theft? A coworker has asked if you want to download a programmers game to play at work. -Its classification level may rise when aggregated. Paul verifies that the information is CUI, includes a CUI marking in the subject header, and digitally signs an e-mail containing CUI. Which of the following is a reportable insider threat activity? correct. (Malicious Code) Which of the following is NOT a way that malicious code spreads? What should be your response? Correct It is getting late on Friday. Which of the following actions can help to protect your identity? A colleague has visited several foreign countries recently, has adequate work quality, speaks openly of unhappiness with U.S. foreign policy, and recently had his car repossessed. **Insider Threat Based on the description that follows, how many potential insider threat indicator(s) are displayed? Which of the following is true of Controlled Unclassified information (CUI)? Which of the following is true of telework? Individuals must avoid referencing derivatively classified reports classified higher than the recipient.??? The CUI Registry is the Government-wide online repository for Federal-level guidance regarding CUI policy and practice. Which of the following is NOT an example of Personally Identifiable Information (PII)? Information should be secured in a cabinet or container while not in use. A user writes down details from a report stored on a classified system marked as Secret and uses those details to draft an unclassified briefing on an unclassified system without authorization. **Website Use While you are registering for a conference, you arrive at the website http://www.dcsecurityconference.org/registration/. **Identity management Which of the following is NOT a best practice to preserve the authenticity of your identity? Correct. A coworker brings a personal electronic device into prohibited areas. **Insider Threat Based on the description that follows, how many potential insider threat indicator(s) are displayed? Rating. The email provides a link to a personnel portal where you must enter your personal information as part of an effort to standardize recordkeeping. *Spillage What should you do if a reporter asks you about potentially classified information on the web? Controlled Unclassified Information (CUI) is information that requires safeguarding or dissemination controls pursuant to and consistent with applicable law, regulations, and government-wide policies but is not classified under Executive Order 13526 or the Atomic Energy Act, as amended. Have your permissions from your organization, follow your organization guideline, use authorized equipment and software, employ cyber security best practice, perform telework in dedicated when home. For example, when you buy propane for your barbecue, your tank is placed on a scale while it is filled under high pressure (Figure 7). (Mobile Devices) When can you use removable media on a Government system? Setting weekly time for virus scan when you are not on the computer and it is powered off. A colleague is playful and charming, consistently wins performance awards, and is occasionally aggressive in trying to access classified information. (Spillage) Which type of information could reasonably be expected to cause serious damage to national security if disclosed without authorization? Power off any mobile devices when entering a secure area. Never allow sensitive data on non-Government-issued mobile devices. Ive tried all the answers and it still tells me off. Which is NOT a method of protecting classified data? Following instructions from verified personnel. **Classified Data Which of the following can an unauthorized disclosure of information classified as Confidential reasonably be expected to cause? correct. be wary of suspicious e-mails that use your name and/or appear to come from inside your organization. The Chinese Spy Balloon Showdown The discovery of a Chinese surveillance balloon floating over the United States has added to the rising tensions between the two superpowers. What must authorized personnel do before permitting another individual to enter a Sensitive Compartmented Information Facility (SCIF)? Antihistamines are used to treat the symptoms, such as sneezing, that are due to inflammation caused by irritants in the airways. Correct. *Sensitive Compartmented Information What is a Sensitive Compartmented Information (SCI) program? (Insider Threat) Based on the description that follows, how many potential insider threat indicator(s) are displayed? Which of the following is true about unclassified data? Based on the description that follows, how many potential insider threat indicator (s) are displayed? internet-quiz. Follow procedures for transferring data to and from outside agency and non-Government networks. **Insider Threat How many potential insider threat indicators does a person who is playful and charming, consistently wins performance awards, but is occasionally aggressive in trying to access sensitive information display? Thiswill enabletimely and consistent informationsharing andincreasetransparency throughout the Federal government and with non-Federal stakeholders. (Spillage) What should you do if a reporter asks you about potentially classified information on the web? Government-owned PEDs when expressly authorized by your agency. *Spillage What is a proper response if spillage occurs? How should you securely transport company information on a removable media? -It must be released to the public immediately. They may be used to mask malicious intent. tell your colleague that it needs to be secured in a cabinet or container. What is best practice while traveling with mobile computing devices? Do not access website links, buttons, or graphics in e-mail. What level of damage to national security can you reasonably expect Top Secret information to cause if disclosed? CUI was established to standardize the way the Executive branch handles sensitive information that requires dissemination controls. Which of the following demonstrates proper protection of mobile devices? **Social Networking When is the safest time to post details of your vacation activities on your social networking profile? What should you do if a reporter asks you about potentially classified information on the web? Store it in a locked desk drawer after working hours. (Spillage) When classified data is not in use, how can you protect it? With WEKA users, you can access WEKA sample files. In the following situations, determine if the duty describes would be one of the Fed is responsible or is not responsible to enforce. Store classified data in a locked desk drawer when not in use Maybe What can you do to protect yourself against phishing? Correct. Enable automatic screen locking after a period of inactivity. What are the requirements to be granted access to sensitive compartmented information (SCI)? (Sensitive Information) Which of the following is true about unclassified data? Which of the following is a good practice to protect classified information? Which of the following is a good practice to avoid email viruses? We recommend Norton Security or McAfee Total Protection. You have reached the office door to exit your controlled area. *Controlled Unclassified Information Which of the following is NOT a correct way to protect CUI? When unclassified data is aggregated, its classification level may rise. Asked 8/5/2020 6:29:36 PM.
Blackburn County Court Listings, Toddler Not Afraid Of Strangers, Mcdonald's Disney Glasses Lead, Articles W