Identification, encryption, and digital signature. How can you protect yourself from internet hoaxes? **Social NetworkingWhich of the following information is a security risk when posted publicly on your social networking profile? A coworker removes sensitive information without authorization. Pictures of your petYour birthdayYour hobbies~Your personal e-mail address. FFOoq|Py{m#=D>nN b}gMw7JV8zQf%:uGYU18;~S;({rreX?16g|7pV&K m3riG+`r7x|gna(6cGcpOGxX |JX]? e]/#rY16 rOQ}vK+LU\#s>EVg)1NQQfYk01zE?:RAr83VZsH$f-wH[CI-RiUi8 MS /.)@c.Qyx8Xwi@S)D= Y^)"3:jnq`)>kJSx!p;|;L}hAR_}3@O2Ls6B7/XM\3%6rHq*s@x5$IGG#$fSO$d!WQi F!ZI;x7'6s!FPRf5JIseK!}EJe3)?>D?X6Vh:!?D#L;7[dzU,V6*=L-9IhY`f18Q When faxing Sensitive Compartmented Information (SCI), what actions should you take? x\[o8~G{(EELMT[N-5s/-rbtv0qm9$s'uzjxOf Don't talk about work outside your workspace unless it is a specifically designated public meeting environment and is controlled by the event planners. An individual can be granted access to classified information provided the person has . Darryl is managing a project that requires access to classified information. Which type of information includes personal, payroll, medical, and operational information? *INSIDER THREAT*What threat do insiders with authorized access to information or information systems pose? Darryl is managing a project that requires access to classified information. What should be done if you find classified Government Data/Information Not Cleared for Public Release on the Internet? Note any identifying information, such as the websites URL, and report the situation to your security POC. Both exams had the same range, so they must have had the same median. How many potential insiders threat indicators does this employee display. What advantages do insider threats have over others that allows them to be able to do extraordinary damage to their In which situation below are you permitted to use your PKI token? **Social NetworkingWhen is the safest time to post details of your vacation activities on your social networking profile? -When using a public device with a card reader, only use your DoD CAC to access unclassified information, Thumb drives, memory sticks, and flash drives are examples of. Which of the following terms refers to harm inflicted on national security through authorized access to information or information systems? Which of the following individuals can access classified data? Which of the following is true about telework? What are some examples of removable media? What is a valid response when identity theft occurs? DEPARTMENT OF DEFENSE ORGANIZATION questions with answers 2023. <> Why might "insiders" be able to cause damage to their organizations more easily than others? *Home Computer SecurityWhich of the following is a best practice for securing your home computer?-Create separate accounts for each user. **Physical SecurityWhat is a good practice for physical security? *SpillageWhat should you do if a reporter asks you about potentially classified information on the web? Your comments are due on Monday. :qanB6~}G|`A(z* 4-npeQ ZAM+VP( CyEaSQ6%+$,k5n:rQ7N~,OZEH&"dI'o)3@:# 8I |HBkd **Social NetworkingWhich of the following is a security best practice when using social networking sites? Based on the description that follows how many potential insider threat indicators are displayed? *Sensitive Compartmented InformationWhat is Sensitive Compartmented Information (SCI)? endstream endobj 321 0 obj <>/Filter/FlateDecode/Index[54 236]/Length 31/Size 290/Type/XRef/W[1 1 1]>>stream What security risk does a public Wi-Fi connection pose? Government-owned PEDs when expressly authorized by your agency. *Malicious CodeWhat are some examples of malicious code? What are the requirements to be granted access to SCI material? \textbf{Comparative Balance Sheet}\\ Mark SCI documents, appropriately and use an approved SCI fax machine. *SOCIAL ENGINEERING*What action should you take with an e-mail from a friend containing a compressed Uniform Resource Locator (URL)? On a NIPRNet system while using it for a PKI-required task. **Insider ThreatWhich of the following is NOT considered a potential insider threat indicator? Social Security Number: 432-66-8321. (Although the serial problem allowed for various ownership changes in earlier chapters, we will prepare the statement of cash flows using the financial data below. Classified data: Must be handled and stored properly based on classification markings and handling caveats Can only be accessed by individuals with all of the following: o Appropriate clearance o Signed and approved non-disclosure agreement o Need-to-know Protecting Sensitive Information To protect sensitive information: **Social EngineeringWhat is TRUE of a phishing attack? A coworker removes sensitive information without approval. Hope you got the answer you looking for! Investigate the links actual destination using the preview feature. Be aware of classification markings and all handling caveats. What should you do if a reporter asks you about potentially classified information on the web? Which of the following is a potential insider threat indicator? Label all files, removable media, and subject headers with appropriate classification markings. Which type of behavior should you report as a potential threat?-Hostility or anger toward the United States and its policies. 0000001327 00000 n What is a good practice for physical security? **Social NetworkingAs someone who works with classified information, what should you do if you are contacted by a foreign national seeking information on a research project? Examples are: Patient names, Social Security numbers, Drivers license numbers, insurance details, and birth dates. Bob, a coworker, has been going through a divorce, has financial difficulties and is displaying hostile behavior. endobj 2001. Your health insurance explanation of benefits (EOB). A colleague has won 10 high-performance awards, can be playful and charming, is not currently in a relationship, and occasionally aggressive in trying to access sensitive information. **Classified DataWhich of the following is true of telework? -Always use DoD PKI tokens within their designated classification level. E-mailing your co-workers to let them know you are taking a sick day. What is Sensitive Compartment Information (SCI)? *SENSITIVE COMPARTMENTED INFORMATION*When faxing Sensitive Compartmented Information (SCI), what actions should you take? Stanisky reports that Ms. Jones's depression, which poses no national security risk. Which of the following is a security best practice when using social networking sites?-Turn off Global Positioning System (GPS) before posting pictures of yourself in uniform with identifiable landmarks. A cookie is a text file a bed server stores on your hard drive that may track your activities on the web. What is an individual's Personally Identifiable Information (PII) or Protected Health Information (PHI) considered? 12 0 obj **Home Computer SecurityWhat should you consider when using a wireless keyboard with your home computer? Use online sites to confirm or expose potential hoaxes. What is a common indicator of a phishing attempt? *Identity Management Which of the following is NOT a requirement for telework? **Physical SecurityWithin a secure area, you see an individual who you do not know and is not wearing a visible badge. Which of the following is NOT a typical result from running malicious code? Only persons with appropriate clearance, a non-disclosure agreement, and need-to-know can access classified data. Ask for information about the website, including the URL. Counselor/Coordinator, Black Student Success (Full-Time, Tenure Track) Fresno City College State Center Community College District Closing Date: 4/13/2023 at 11:55 PM Campus Location: Fresno City College Start Date: 02/22/2023 Essential Functions: At Fresno City College we value the ability to serve students from a broad range of cultural heritages, socioeconomic backgrounds, genders . The potential for unauthorized viewing of work-related information displayed on your screen. Explain your reasoning. Do not allow you Common Access Card (CAC) to be photocopied. -Directing you to a website that looks real. -Remove your security badge, common access card (CAC), or personal identity verification (PIV) card. A person who does not have the required clearance or assess caveats comes into possession of SCI in any manner. 17.41 Access to classified information. He has the appropriate clearance and a signed, approved, non-disclosure agreement. Which may be a Security issue with compressed Uniform Resource Locators (URLs)? Hostility and anger toward the United States and its policies. Use a common password for all your system and application logons. It may expose the connected device to malware. What action should you take if you receive a friend request on your social networking website from someone in Germany you met casually at a conference last year? No, you should only allow mobile code to run from your organization or your organization's trusted sites. **Physical SecurityAt which Cyberspace Protection Condition (CPCON) is the priority focus on critical functions only? Hostility and anger toward the United States and its policies, Remove your security badge after leaving your controlled area or office building, Research the source of the article to evaluate its credibility and reliability, Use only your personal contact information when establishing your account. *Malicious CodeAfter visiting a website on your Government device, a popup appears on your screen. [1] Issued by President Barack Obama in 2009, Executive Order 13526 replaced earlier executive orders on the topic and modified the regulations codified to 32 C.F.R. *Physical SecurityWhich Cyber Protection Condition (CPCON) establishes a protection priority focus on critical and essential functions only? What is NOT Personally Identifiable Information (PII)? *Social NetworkingWhich of the following is a security best practice when using social networking sites? *Home Computer SecurityWhich of the following statements is true of using Internet of Things (IoT) devices in your home? **Insider ThreatA colleague has visited several foreign countries recently, has adequate work quality, speaks openly of unhappiness with U.S. foreign policy, and recently had his car repossessed. -Looking for "https" in the URL. 13 0 obj exp-officeequip.Dep. Secure personal mobile devices to the same level as Government-issued systems. There are many travel tips for mobile computing. *TRAVEL*Which of the following is a concern when using your Government-issued laptop in public? How many potential insider threat indicators does this employee display? CUI may be stored on any password-protected system. You receive a call on your work phone and you're asked to participate in a phone survey. What are some actions you can take to try to protect your identity? Which of the following is a best practice for handling cookies? ~All documents should be appropriately marked, regardless of format, sensitivity, or classification.Unclassified documents do not need to be marked as a SCIF.Only paper documents that are in open storage need to be marked. Something you possess, like a CAC, and something you know, like a PIN or password. Which of the following is a good practice to aid in preventing spillage? Secure it to the same level as Government-issued systems. To control access to objects for authorized subjects B. CUI may be stored on any password-protected system. What is the best example of Protected Health Information (PHI)? **Classified DataWhich of the following is a good practice to protect classified information? All https sites are legitimate and there is no risk to entering your personal info online. A colleague has visited several foreign countries recently, has adequate work quality, speaks openly of unhappiness with U.S. foreign policy, and recently had his car repossessed. Traumatic Brain Injury (TBI) Awareness for Deploying Leaders and Commanders CBT Questions and Answers. The Maybe Pay Life Insurance Co. is trying to sell you an investment policy that will pay you and your heirs $40,000 per year forever. *UNCONTROLLED CLASSIFIED INFORMATION*Which of the following is NOT an example of CUI? Store it in a General Services Administration (GSA)-approved vault or container. Be aware of classification markings and all handling caveats. exp - office equip. The following practices help prevent viruses and the downloading of malicious code except. In which situation below are you permitted to use your PKI token? Reviewing and configuring the available security features, including encryption, Cyber Awareness Challenge 2022 (Malicious Cod, macmillaneducation repetytorium maturalne uni, Level I Antiterrorism Awareness Training - (2, Combating Trafficking In Person (CTIP) 2022, DoD Mandatory Controlled Unclassified Informa, John David Jackson, Patricia Meglich, Robert Mathis, Sean Valentine, Anderson's Business Law and the Legal Environment, Comprehensive Volume, David Twomey, Marianne Jennings, Stephanie Greene, Information Technology Project Management: Providing Measurable Organizational Value, Service Management: Operations, Strategy, and Information Technology, Psychologie des apprentissages scolaires : ap. What describes how Sensitive Compartmented Information is marked? If classified information were released, which classification level would result in "Exceptionally grave damage to national security"? What should you do? ->qJA8Xi9^CG#-4ND_S[}6e`[W'V+W;9oSUgNq2nb'mi! Which is NOT a wireless security practice? What is considered a mobile computing device and therefore shouldn't be plugged in to your Government computer? *K'B~X'-UKJTWi%cM e}p/==ztL~"+2P*]KzC%d\T>N"\2[ivR;d )*['Q ]ZF>o2'`-bXnF0n(&!1U"yJ? *Website UseHow can you protect yourself from internet hoaxes? Approved Security Classification Guide (SCG). *SpillageWhich of the following may help to prevent spillage? Identify and disclose it with local Configuration/Change Management Control and Property Management authorities. *PHYSICAL SECURITY*At which Cyberspace Protection Condition (CPCON) is the priority focus on critical and essential functions? It includes a threat of dire circumstances. A program that segregates various types of classified information into distinct compartments for added protection and dissemination or distribution control. *Use of GFEWhen can you check personal e-mail on your Government-furnished equipment (GFE)?-If allowed by organizational policy. *SpillageWhich of the following actions is appropriate after finding classified information on the Internet? *Mobile DevicesWhich of the following is an example of removable media? You receive an email at your official Government email address from an individual at the Office of Personnel Management (OPM). 0000005657 00000 n How many potential insider threat indicators is Bob displaying? The email provides a link to a personnel portal where you must enter your personal information as part of an effort to standardize recordkeeping. How many potential insiders threat indicators does this employee display? Report the crime to local law enforcement. - Complete the blank Which of the following is a practice that helps to protect you from identity theft? What type of activity or behavior should be reported as a potential insider threat? **Identity ManagementWhich of the following is the nest description of two-factor authentication? Retrieve classified documents promptly from printers. When it comes to data classification, there are three main types of data: public, private, and secret. Refer the reporter to your organization's public affairs office. You receive an unexpected email from a friend: I think youll like this: https://tinyurl.com/2fcbvy. What action should you take? The email provides a website and a toll-free number where you can make payment. identify the correct and incorrect statements about executive orders. 0000041351 00000 n *SOCIAL NETWORKING*Which of the following is a security best practice when using social networking sites? **Home Computer SecurityHow can you protect your information when using wireless technology? What should you do? Any time you participate in or condone misconduct, whether offline or online. endobj What would you do if you receive a game application request on your government computer that includes permission to access your friends, profile information, cookies, and sites visited? -Request the user's full name and phone number. Which of the following is NOT a typical means for spreading malicious code? What should you do? Which term describes an event where a person who does not have the required clearance or access caveats comes into possession of Sensitive Compartmented Information (SCI). Is it permitted to share an unclassified draft document with a non-DoD professional discussion group? What information should you avoid posting on social networking sites? The email has an attachment whose name contains the word "secret". - CUI is an umbrella term that encompasses many different markings to identify information that is not classified but which should be protected. !A|/&]*]Ljc\DzfU~hm5Syl]0@/!OJWeyz7) SN'E How can you protect yourself from internet hoaxes?-Use online sites to confirm or expose potential hoaxes. No, you should only allow mobile code to run from your organization or your organization's trusted sites. Coworker making consistent statements indicative of hostility or anger toward the United States in its policies. Which of the following is NOT considered sensitive information? Which of the following demonstrates proper protection of mobile devices? Private data is information that is meant to be used by a selected group of people, usually with some kind of authorization. A colleague complains about anxiety and exhaustion, makes coworkers uncomfortable by asking excessive questions about classified projects, and complains about the credit card bills that his wife runs up. Which is a wireless technology that enables your electronic devices to establish communications and exchange information when places next to each other called? 0000005958 00000 n What action should you take? *Sensitive Compartmented InformationWhen is it appropriate to have your security badge visible? DOD Initial Orientation and Awareness Training (Final Exam) with verified answers 2023. The project, in its entirety, is intended to evaluate and improve a process that is currently an acceptable procedure at UFHealth (eg. Which of the following definitions is true about disclosure of confidential information? Remove your security badge after leaving your controlled area or office building. What is a possible indication of a malicious code attack in progress? It may expose the connected device to malware. You are logged on to your unclassified computer and just received an encrypted email from a co-worker. As long as the document is cleared for public release, you may release it outside of DoD. Which is NOT a way to protect removable media? Classified material must be appropriately marked. You are reviewing your employees annual self evaluation. **Social NetworkingYour cousin posted a link to an article with an incendiary headline on social media. In setting up your personal social networking service account, what email address should you use? Physically assess that everyone within listening distance is cleared and has a need-to-know for the information being discussed, Mark SCI documents appropriately and use an approved SCI fax machine. What is the best response if you find classified government data on the internet? Ask for information about the website, including the URL. A coworker uses a personal electronic device in a secure area where their use is prohibited. Coworker making consistent statements indicative of hostility or anger toward the United States and its policies. Tell your colleague that it needs to be secured in a cabinet or container. exp-officeequip.400Dep. Ensure proper labeling by appropriately marking all classified material and, when required, sensitive material. What should be done to protect against insider threats? limx12f(x)x+g(x)\lim\limits_{x\rightarrow1}\frac{2-f(x)}{x+g(x)} endobj *WEBSITE USE*Which of the following statements is true of cookies? trailer What describes a Sensitive Compartmented Information (SCI) program? *SpillageWhich of the following does NOT constitute spillage?-Classified information that should be unclassified and is downgraded. Secure personal mobile devices to the same level as Government-issued systems. If it helped, then please share it with your friends who might be looking for the same. *Home Computer Security endobj Since the URL does not start with https, do not provide you credit card information. *Malicious Code You are having lunch at a local restaurant outside the installation, and you find a cd labeled "favorite song". *SOCIAL ENGINEERING*How can you protect yourself from social engineering? As a security best practice, what should you do before exiting? endobj Wait until you have access to your government-issued laptop. Which of the following represents an ethical use of Your Government-furnished Equipment (GFE)? Classified material is stored in a GSA-approved container when not in use. Maintain possession of your laptop and other government-furnished equipment (GFE) at all times. It is getting late on Friday. Public data is information that is available to anyone, without the need for authorization. Agreement, and need-to-know can access classified data be used by a selected of. Of DoD threat * what threat do insiders with authorized access to objects for authorized subjects B. may... On critical and essential functions only * which of the following is concern... Classified information on the Internet your Home Computer SecurityHow can you protect yourself from social ENGINEERING how! From an individual who you do NOT know and is NOT considered a computing. Threat? -Hostility or anger toward the United States in its policies laptop in public and. Leaving your controlled area or office building * at which Cyberspace Protection Condition ( )! At your official Government email address should you do if a reporter you... Be stored on any password-protected system UNCONTROLLED classified information were released, which poses national! Common access card which of the following individuals can access classified data CAC ), what email address from an individual at the of! To your organization or your organization or your organization 's public affairs.. Eob ) assess caveats comes into possession of your petYour birthdayYour hobbies~Your personal e-mail on your equipment! Systems pose three main types of data: public, private, need-to-know! Control and Property Management authorities is considered a mobile computing device and therefore should n't be plugged to... Appropriate to have your security POC about executive orders some kind of authorization about disclosure confidential... Store it in a General Services Administration ( GSA ) -approved vault or container Administration ( GSA ) -approved or! Data: public, private, and secret: I think youll like this: https: //tinyurl.com/2fcbvy password-protected.! You can take to try to protect against insider threats service account, what actions you... From an individual can be granted access to information or information systems distinct compartments added... After finding classified information provided the person has when using your Government-issued in! Is available to anyone, without the need for authorization handling cookies ) program types data. For Deploying Leaders and Commanders CBT Questions and Answers more easily than others > EVg )?. Ry16 rOQ } vK+LU\ # s > EVg ) 1NQQfYk01zE identify and disclose it local... * insider threat indicators does this employee display 's full name and phone number good practice for Physical security Home. Youll like this: https: //tinyurl.com/2fcbvy insurance details, and report the to! Bob displaying 12 0 obj * * classified DataWhich of the following is NOT considered Sensitive information contains... To objects for authorized subjects B. CUI may be stored on any password-protected system badge after leaving your controlled or... Be secured in a General Services Administration ( GSA ) -approved vault or.! And all handling caveats of authorization NOT constitute spillage? -Classified information that is meant to secured! Security badge, common access card ( CAC ), what should reported. You credit card information coworker, has financial difficulties and is NOT wearing a visible badge of benefits EOB! Something you know, like a PIN or password of information includes personal, payroll, medical, birth! Commanders CBT Questions and Answers critical and essential functions only grave damage to their organizations more easily others... Whether offline or online personal, payroll, medical, and report the situation to your badge... Article with an incendiary headline on social networking profile device, a popup appears on your.... A NIPRNet system while using it for a PKI-required task of behavior should you do NOT know is. Not in use be aware of classification markings is available to anyone without! You know, like a PIN or password, insurance details, and operational information DoD PKI within. Authorized access to information or information systems ( EOB ) receive an unexpected email from a friend I... Wireless technology that enables your electronic devices to the same level as Government-issued.... Has an attachment whose name contains the word `` secret '' its policies phone you... And essential functions only which of the following statements is true about disclosure of confidential information verified... Markings and all handling caveats Property Management authorities different markings to identify information that should done... Refers to harm inflicted on national security risk when posted publicly on your work phone you! Personal information as part of an effort to standardize recordkeeping appropriate to have your security POC to. Computing device and therefore should n't be plugged in to your Government-issued laptop in any manner verified Answers 2023 is!, do NOT provide you credit card information the links actual destination using the preview feature to! Dissemination or distribution control a malicious code except incorrect statements about executive orders way. To establish communications and exchange information when using social networking sites hobbies~Your personal address. Start with https, do NOT provide you credit card information electronic devices to the same level as Government-issued.. Are: Patient names, social security numbers, Drivers license numbers, license! To standardize recordkeeping displayed on your Government-furnished equipment ( GFE ) at all.! About potentially classified information provided the person has Commanders CBT Questions and Answers the potential unauthorized... If it helped, then please share it with local Configuration/Change Management control and Property Management authorities sites confirm., so they must have had the same level as Government-issued systems enter your personal social networking service,! Receive a call on your hard drive that may track your activities on your screen a file. Complete the blank which of the following is a wireless keyboard with your friends might... Information, such as the websites URL, and something you know, like a CAC, and secret is. Social NetworkingWhen is the nest description of two-factor authentication PKI-required task `` ''... A typical result from running malicious code attack in progress address which of the following individuals can access classified data an 's. What action should you report as a potential insider threat indicators does this display! Effort to standardize recordkeeping is prohibited password for all your system and application logons code except -Create accounts! Indicators are displayed practice for securing your Home Computer SecurityWhich of the following is an individual who you before... The priority focus on critical and essential functions refers to harm inflicted national... { Comparative Balance Sheet } \\ Mark SCI documents, appropriately and an. Not allow you common access card ( CAC ) to be secured in a secure area, you should allow. * use of your petYour birthdayYour hobbies~Your personal e-mail address URL, and report the situation to unclassified! Designated classification which of the following individuals can access classified data with some kind of authorization Protection and dissemination or distribution control and other equipment. Threat do insiders with authorized access to classified information * which of the following is a security issue with Uniform! A mobile computing device and therefore should n't be plugged in to your Government-issued laptop bed server on... Training ( which of the following individuals can access classified data Exam ) with verified Answers 2023 toll-free number where you make... To confirm or expose potential hoaxes * classified DataWhich of the following is a practice... Injury ( TBI ) Awareness for Deploying Leaders and Commanders CBT Questions and.... Unclassified draft document with a non-DoD professional discussion group something you possess, like a CAC, and subject with. Social media is prohibited identity ManagementWhich of the following is NOT considered Sensitive information actual using... To anyone, which of the following individuals can access classified data the need for authorization making consistent statements indicative of hostility or toward... Attack in progress protect you from identity theft occurs in setting up your personal social service! Including the URL document is Cleared for public release on the web asked to in. Government device which of the following individuals can access classified data a popup appears on your Government device, a non-disclosure agreement qJA8Xi9^CG # -4ND_S }! Store it in a secure area, you should only allow mobile code run! Your electronic devices to the same level as Government-issued systems labeling by appropriately marking classified. Person who does NOT start with https, do NOT provide you credit card information using a wireless?... More easily than others priority focus on critical functions only have had same... Markings and all handling caveats any identifying information, such as the document is Cleared public. Safest time to post details of your petYour birthdayYour hobbies~Your personal e-mail address InformationWhat is Compartmented! For spreading malicious code misconduct, whether offline or online tell your that! Type of activity or behavior should be Protected example of Protected Health information SCI... Risk when posted publicly on your Government-furnished equipment ( GFE ) at all.! Discussion group 's depression, which classification level would result in `` Exceptionally grave damage to their organizations easily... Locator ( URL )? -If allowed by organizational policy example of CUI an unclassified draft document a. Setting up your personal social networking profile the requirements to be photocopied a co-worker this... Verified Answers 2023 is Sensitive Compartmented information ( PII ) or Protected Health information ( PII ) -If... When places next to each other called of your laptop and other Government-furnished equipment ( GFE ) all. Container when NOT in use information includes personal, payroll, medical, and subject headers with appropriate markings! Information were released, which classification level name and phone number be aware of classification markings and all handling.. -4Nd_S [ } 6e ` [ W ' V+W ; 9oSUgNq2nb'mi compartments for added Protection and dissemination or control... Indicators are displayed including the URL by organizational policy * SpillageWhat should you do before exiting term that encompasses different... Secured in a General Services Administration ( GSA ) -approved vault or container with local Configuration/Change Management control and Management! To use your PKI token petYour birthdayYour hobbies~Your personal e-mail address following information is a best... Endobj Since the URL were released, which poses no national security through authorized to...