Maintain possession of your laptop and other government-furnished equipment (GFE) at all times. Which of the following demonstrates proper protection of mobile devices? Mark SCI documents appropriately and use an approved SCI fax machine. 0000005958 00000 n After reading an online story about a new security project being developed on the military installation where you work, your neighbor asks you to comment about the article. Ask for information about the website, including the URL. Only persons with appropriate clearance, a non-disclosure agreement, and need-to-know can access classified data. Below are most asked questions (scroll down). **Mobile DevicesWhich of the following is an example of removable media? exp - office equip. The email provides a website and a toll-free number where you can make payment. A colleague has visited several foreign countries recently, has adequate work quality, speaks openly of unhappiness with U.S. foreign policy, and recently had his car repossessed. If aggregated, the information could become classified. Dr. Baker reports that the sessions addressed Ms. Jones's depression, which poses no national security risk. What does Personally Identifiable Information (PII) include? Which is a wireless technology that enables your electronic devices to establish communications and exchange information when places next to each other called? **Insider ThreatWhat advantages do "insider threats" have over others that allows them to cause damage to their organizations more easily? A smartphone that transmits credit card payment information when held in proximity to a credit card reader. *SPILLAGE*Which of the following may be helpful to prevent spillage? Which of the following is NOT a requirement for telework? *Classified DataWhich of the following individuals can access classified data?-Darryl is managing a project that requires access to classified information. -After work hours, storing sensitive information in unlocked containers, desks, or cabinets if security is not present. **Removable Media in a SCIFWhat must users ensure when using removable media such as compact disk (CD)? Ask the individual to see an identification badge. Refer the reporter to your organizations public affairs office. Aw\cy{bMsJ7tG_7J-5kO~*"+eq7 ` (NO]89#>U_~_:EHwO+u+\[M\!\kKnR^{[%d'8[e#ch_~-F7en~`ZV6GOt? What should you do if a reporter asks you about potentially classified information on the web? -Potential Insider Threat It is getting late on Friday. Which of the following is a god practice to protect classified information? What should you do if a reporter asks you about potentially classified information on the web? endobj Understanding and using the available privacy settings. How many potential insiders threat indicators does this employee display. *Use of GFE **Social EngineeringWhat action should you take with an e-mail from a friend containing a compressed Uniform Resource Locator (URL)? *Sensitive Compartmented InformationWhich must be approved and signed by a cognizant Original Classification Authority (OCA)? How should you respond? What action should you take with an e-mail from a friend containing a compressed Uniform Resource Locator (URL)? What should you do to protect classified data? -It is inherently not a secure technology. *SpillageWhich of the following may help prevent inadvertent spillage? -Setting weekly time for virus scan when you are not on the computer and it is powered off. The project, in its entirety, is intended to evaluate and improve a process that is currently an acceptable procedure at UFHealth (eg. 19 0 obj **Classified DataWhat is required for an individual to access classified data? endobj Coworker making consistent statements indicative of hostility or anger toward the United States in its policies. Which must be approved and signed by a cognizant Original Classification Authority (OCA)? (a) No person may be given access to classified information or material originated by, in the custody, or under the control of the Department, unless the person - (1) Has been determined to be eligible for access in accordance with sections 3.1 - 3.3 of Executive Order 12968 ; endstream endobj 321 0 obj <>/Filter/FlateDecode/Index[54 236]/Length 31/Size 290/Type/XRef/W[1 1 1]>>stream You should only accept cookies from reputable, trusted websites. \textbf{Comparative Balance Sheet}\\ What information most likely presents a security risk on your personal social networking profile? Write your password down on a device that only you access (e.g., your smartphone). 9 0 obj *Social EngineeringWhat is a common indicator of a phishing attempt? **Insider ThreatHow many potential insider threat indicators does a coworker who often makes others uneasy by being persistent in trying to obtain information about classified projects to which he has no access, is boisterous about his wife putting them in credit card debt, and often complains about anxiety and exhaustion display? What is a valid response when identity theft occurs? Traumatic Brain Injury (TBI) Awareness for Deploying Leaders and Commanders CBT Questions and Answers. *Malicious CodeWhat is a possible effect of malicious code?-Files may be corrupted, erased, or compromised. **Social EngineeringHow can you protect yourself from internet hoaxes? How many potential insider threat indicators does this employee display? How can you protect yourself from internet hoaxes?-Use online sites to confirm or expose potential hoaxes. You must have permission from your organization. **Website UseHow should you respond to the theft of your identity? What should you consider when using a wireless keyboard with your home computer? *Use of GFEWhen can you check personal e-mail on your Government-furnished equipment (GFE)?-If allowed by organizational policy. Which of the following is NOT Government computer misuse? Which of the following best describes wireless technology? Report the crime to local law enforcement. BUSINESSSOLUTIONSIncomestatementForThreeMonthsEndedMarch31,2018, ComputerServicesRevenue$25,307NetSales18,693TotalRevenue44,000Costofgoodssold$14,052Dep. 0000005630 00000 n *Insider ThreatWhat threat do insiders with authorized access to information or information systems pose?-They may wittingly or unwittingly use their authorized access to perform actions that result in the loss or degradation of resources or capabilities. \end{array} 8 0 obj *Social Engineering Explain your reasoning. P2P (Peer-to-Peer) software can do the following except: -Allow attackers physical access to network assets. Label all files, removable media, and subject headers with appropriate classification markings. What describes how Sensitive Compartmented Information is marked? A colleague complains about anxiety and exhaustion, makes coworkers uncomfortable by asking excessive questions about classified projects, and complains about the credit card bills that his wife runs up. Decide whether each of the following statements makes sense (or is clearly true) or does not make sense (or is clearly false). Which of the following is a best practice to protect information about you and your organization on social networking sites and applications? Which of the following is NOT a social engineering tip? Classified material must be appropriately marked. You check your bank statement and see several debits you did not authorize. Follow instructions given only by verified personnel. How many potential insider threat indicators does a coworker who often makes others uneasy by being persistent in trying to obtain information about classified projects to which he has no access, is boisterous about his wife putting them in credit card debt, and often complains about anxiety and exhaustion display? Which of the following is NOT a criterion used to grant an individual access to classified data? What type of attack might this be? What should you do to protect yourself while on social networks? Use online sites to confirm or expose potential hoaxes. Which organization issues the directives concerning the dissemination of information regarding intelligence sources, methods, or activities? **Insider ThreatHow many potential insider threat indicators does a coworker who often makes others uneasy by being persistent in trying to obtain information about classified projects to which he has no access, is boisterous about his wife putting them in credit card debt, and often complains about anxiety and exhaustion display? *Sensitive InformationWhich of the following is an example of Protected Health Information (PHI)? What is the best choice to describe what has occurred? You must have your organization's permission to telework. Which is NOT a method of protecting classified data? In this short Post, I hope you get the answer to your question. What should you do? What is required for an individual to access classified data? **Social EngineeringWhat is a common indicator of a phishing attempt? -When using a public device with a card reader, only use your DoD CAC to access unclassified information, Thumb drives, memory sticks, and flash drives are examples of. What should you do? Which of the following should be reported as a potential security incident (in accordance with your Agency's insider threat policy)? Protecting CUI . E-mailing your co-workers to let them know you are taking a sick day. Do not allow you Common Access Card (CAC) to be photocopied. What action should you take first? Be aware of classification markings and all handling caveats. What security risk does a public Wi-Fi connection pose? Report the crime to local law enforcement. The Maybe Pay Life Insurance Co. is trying to sell you an investment policy that will pay you and your heirs $40,000 per year forever. What does Personally Identifiable Information (PII) include? }&1,250\\ -Directing you to a website that looks real. *Mobile DevicesWhat can help to protect the data on your personal mobile device? -Carrying his Social Security Card with him. What action should you take? Your cousin posted a link to an article with an incendiary headline on Social media. *Sensitive Compartmented InformationWhat should the owner of this printed SCI do differently? **Insider ThreatBased on the description that follows, how many potential insider threat indicator(s) are displayed? 0000002934 00000 n Which of the following is NOT an example of sensitive information? +"BgVp*[9>:X`7,b. Physical security of mobile phones carried overseas is not a major issue. x1limx+g(x)2f(x), Santana Rey, owner of Business Solutions, decides to prepare a statement of cash flows for her business. Which of the following is NOT a criterion used to grant an individual access to classified data? **Insider ThreatWhich of the following should be reported as a potential security incident? Only allow mobile code to run from your organization or your organizations trusted sites. 17 0 obj 0000015315 00000 n Since the URL does not start with https, do not provide you credit card information. How can you . The required return on this investment is 5.1%. This article will provide you with all the questions and answers for Cyber Awareness Challenge. \textbf{BUSINESS SOLUTIONS}\\ **Social EngineeringWhich of the following is a way to protect against social engineering? What type of unclassified material should always be marked with a special handling caveat? It displays a label showing maximum classification, date of creation, point of contact, and Change Management 9CM) Control Number. Secure personal mobile devices to the same level as Government-issued systems. Which of the following terms refers to someone who harms national security through authorized access to information system? ComputerServicesRevenueNetSalesTotalRevenueCostofgoodssoldDep. Which of the following is NOT a best practice to protect data on your mobile computing device? *Social NetworkingYour cousin posted a link to an article with an incendiary headline on social media. (Wrong). What is a common method used in social engineering? Store it in a shielded sleeve to avoid chip cloning. -Store it in a shielded sleeve to avoid chip cloning. -Directing you to a web site that is real. Who can be permitted access to classified data? Which of the following is NOT true of traveling overseas with a mobile phonePhysical security of mobile phones carried overseas is not a major issue. **Social NetworkingWhich of the following information is a security risk when posted publicly on your social networking profile? 0000015053 00000 n -Scan external files from only unverifiable sources before uploading to computer. Cybersecurity is the ongoing effort to protect individuals, organizations and governments from digital attacks by protecting networked systems and data from unauthorized use or harm. Ensure proper labeling by appropriately marking all classified material and, when required, sensitive material. It can cause damage by corrupting files, erasing your hard drive, and/or allowing hackers access. A man you do not know is trying to look at your Government-issued phone and has asked to use it. **Removable Media in a SCIFWhat must users ensure when using removable media such as compact disk (CD)? -is only allowed if the organization permits it. **Classified DataWhich of the following is a good practice to protect classified information? 0000009864 00000 n *Home Computer SecurityWhich of the following statements is true of using Internet of Things (IoT) devices in your home? When would be a good time to post your vacation location and dates on your social networking website? You must possess security clearance eligibility to telework. Be aware of classification markings and all handling caveats. stream ->qJA8Xi9^CG#-4ND_S[}6e`[W'V+W;9oSUgNq2nb'mi! You can email your employees information to yourself so you can work on it this weekend and go home now. Wait until you have access to your government-issued laptop. Which is NOT a way to protect removable media? A pop-up window that flashes and warns that your computer is infected with a virus. **TravelWhich of the following is a concern when using your Government-issued laptop in public? \text{Net Sales}&&\underline{18,693}\\ E-mailing your co-workers to let them know you are taking a sick day. What action should you take if you receive a friend request on your social networking website from someone in Germany you met casually at a conference last year? No, you should only allow mobile code to run from your organization or your organization's trusted sites. Maintain visual or physical control of the device. A colleague has won 10 high-performance awards, can be playful and charming, is not currently in a relationship, and is occasionally aggressive in trying to access sensitive information. Connect to the Government Virtual Private Network (VPN). They can be part of a distributed denial-of-service (DDoS) attack. Senior government personnel, military or civilian. What security device is used in email to verify the identity of sender? *Social EngineeringWhat action should you take with an e-mail from a friend containing a compressed Uniform Resource Locator (URL)?-Investigate the links actual destination using the preview feature. Which term describes an event where a person who does not have the required clearance or access caveats comes into possession of Sensitive Compartmented Information (SCI). Which of the following is NOT considered sensitive information? *Spillage.What should you do if a reporter asks you about potentially classified information on the web? What type of data must be handled and stored properly based on classification markings and handling caveats? <]/Prev 103435/XRefStm 1327>> *SpillageWhat should you do when you are working on an unclassified system and receive an email with a classified attachment? What information relates to the physical or mental health of an individual? Which of the following is NOT an example of CUI? Report the crime to local law enforcement. Directives issued by the Director of National Intelligence. 0000005454 00000 n Which of the following represents an ethical use of Your Government-furnished Equipment (GFE)? <> This course provides an overview of current cybersecurity threats and best practices to keep information and information systems secure at home and at work. Which of the following is NOT true concerning a computer labeled SECRET? 0000009188 00000 n In which situation below are you permitted to use your PKI token? fZ{ 7~*$De jOP>Xd)5 H1ZB 5NDk4N5\SknL/82mT^X=vzs+6Gq[X2%CTpyET]|W*EeV us@~m6 4] A ];j_QolrvPspgA)Ns=1K~$X.3V1_bh,7XQ is a program that segregates various types of classified information into distinct compartments for added protection and dissemination or distribution control. On a NIPRNet system while using it for a PKI-required task. *SpillageWhat is a proper response if spillage occurs? A coworker has left an unknown CD on your desk. **Mobile DevicesWhen can you use removable media on a Government system? Is it acceptable to take a short break while a coworker monitors your computer while logged on with your CAC? A program that segregates various type of classified information into distinct compartments for added protection and dissemination for distribution control. **Insider ThreatBased on the description that follows, how many potential insider threat indicator(s) are displayed? endobj endobj What is a best practice to protect data on your mobile computing device? **Social NetworkingAs someone who works with classified information, what should you do if you are contacted by a foreign national seeking information on a research project? **Removable Media in a SCIFWhat action should you take when using removable media in a Sensitive Compartmented Information Facility (SCIF)? Jane Jones *Website UseWhat action should you take with an e-mail from a friend containing a compressed Uniform Resource Locator (URL)? \text{Cost of goods sold}&\$14,052\\ **Physical SecurityWhich Cyber Protection Condition (CPCON) is the priority focus on critical and essential functions only? You receive an email at your official Government email address from an individual at the Office of Personnel Management (OPM). CUI may be stored on any password-protected system. What should you do if someone asks to use your government issued mobile device (phone/laptop..etc)? <> **Identity managementWhat is the best way to protect your Common Access Card (CAC)? **TravelWhat security risk does a public Wi-Fi connection pose? Which of the following is an example of removable media? - Complete the blank **Mobile DevicesWhich is a rule for removable media, other portable electronic devices (PEDs), and mobile computing devices to protect Government systems? 13 0 obj Which of the following is NOT a security best practice when saving cookies to a hard drive? When using your Government-issued laptop in public environments, with which of the following should you be concerned? **Identity ManagementYour DoD Common Access Card (CAC) has a Public Key Infrastructure (PKI) token approved for access to the NIPRNet. **Use of GFEWhat is a critical consideration on using cloud-based file sharing and storage applications on your Government-furnished equipment (GFE)? Which of the following individuals can access classified data? It includes a threat of dire circumstances. Identify and disclose it with local Configuration/Change Management Control and Property Management authorities. It may expose the connected device to malware. endobj New interest in learning a foreign language. -Darryl is managing a project that requires access to classified information. You are logged on to your unclassified computer and just received an encrypted email from a co-worker. endstream endobj 291 0 obj <. **Classified DataWhen classified data is not in use, how can you protect it? *IDENTITY MANAGEMENT*What certificates does the Common Access Card (CAC) or Personal Identity Verification (PIV) card contain? Which of the following is a practice that helps to prevent the download of viruses and other malicious code when checking your email? **Classified DataWhich type of information could reasonably be expected to cause serious damage to national security if disclosed without authorization? Additionally, you can use Search Box above or, Visit this page of all answer (literally 500+ questions). a.) -Remove security badge as you enter a restaurant or retail establishment. Spillage because classified data was moved to a lower classification level system without authorization. You should only accept cookies from reputable, trusted websites. When using a fax machine to send sensitive information, the sender should do which of the following? Suppose a sales associate told you the policy costs$650,000. *Sensitive Compartmented InformationWhat action should you take if you become aware that Sensitive Compartmented Information (SCI) has been compromised? **TravelWhat is a best practice while traveling with mobile computing devices? Identify and disclose it with local Configuration/Change Management Control and Property Management authorities. When classified data is not in use, how can you protect it? *Sensitive InformationWhich of the following is the best example of Personally Identifiable Information (PII)? A coworker wants to send you a sensitive document to review while you are at lunch and you only have your personal tablet. \textbf{Income statement}\\ Your DoD Common Access Card (CAC) has a Public Key Infrastructure (PKI) token approved for access to the Non-Classified Internet Protocol Router Network NIPRNet. -Use TinyURL's preview feature to investigate where the link leads. While you are registering for a conference, you arrive at the website http://www.dcsecurityconference.org/registration/. A colleague has visited several foreign countries recently, has adequate work quality, speaks openly of unhappiness with U.S. foreign policy, and recently had his car repossessed. How can you guard yourself against Identity theft? \textbf{For Three Months Ended March 31, 2018} 16 0 obj -Avoid using non-Bluetooth-paired or unencrypted wireless computer peripherals. endobj 0000001327 00000 n When it comes to data classification, there are three main types of data: public, private, and secret. How many potential insider threat indicators does this employee display? endobj *SOCIAL NETWORKING*Which of the following is a security best practice when using social networking sites? What are the requirements to be granted access to SCI material? *Sensitive Compartmented InformationWhat is Sensitive Compartmented Information (SCI)? When faxing Sensitive Compartmented Information (SCI), what actions should you take? What action should you take? Do not access links or hyperlinked media such as buttons and graphics in email messages. Which of the following is NOT a potential insider threat? <> As a security best practice, what should you do before exiting? *INSIDER THREAT*Based on the description below how many potential insider threat indicators are present? *Sensitive Compartmented InformationWhen faxing Sensitive Compartmented Information (SCI), what actions should you take? Select the information on the data sheet that is protected health information (PHI). Secure personal mobile devices to the same level as Government-issued systems. Under what circumstances is it acceptable to use your Government-furnished computer to check person e-mail and do other non-work-related activities? Which cyber protection condition (CPCON) establishes a protection priority focus on critical and essential functions only? **Social EngineeringWhich of the following is a practice that helps to prevent the download of viruses and other malicious code when checking your email? Insiders are given a level of trust and have authorized access to Government information systems. *IDENTITY MANAGEMENT*Which of the following is an example of a strong password? Understanding and using the available privacy settings. Which is an untrue statement about unclassified data? -If aggregated, the classification of the information may not be changed. Note any identifying information and the website's Uniform Resource Locator (URL). -Unclassified information cleared for public release. 3 0 obj !A|/&]*]Ljc\DzfU~hm5Syl]0@/!OJWeyz7) SN'E What should you do? **Insider ThreatA colleague vacations at the beach every year, is married and a father of four, his work quality is sometimes poor, and he is pleasant to work with. A colleague has won 10 high-performance awards, can be playful and charming, is not currently in a relationship, and is occasionally aggressive in trying to access sensitive information. A colleague has won 10 high-performance awards, can be playful and charming, is not currently in a relationship, and is occasionally aggressive in trying to access sensitive information. A person who does not have the required clearance or assess caveats comes into possession of SCI in any manner. What is the best choice to describe what has occurred? The website requires a credit card for registration. They may be used to mask malicious intent. After you have returned home following the vacation. 18 0 obj A colleague often makes others uneasy by being persistent in trying to obtain information about classified projects to which he has no access, is boisterous about his wife putting them in credit card debt, and often complains about anxiety and exhaustion display? **Classified DataWhich of the following is true of telework? Which is true for protecting classified data? Which of the following is true of protecting classified data? \textbf{December 31, 2017, and March 31, 2018} *Identity ManagementWhat is the best way to protect your Common Access Card (CAC) or Personal Identity Verification (PIV) card? *SENSITIVE COMPARTMENTED INFORMATION*When is it appropriate to have your security badge visible within a sensitive compartmented information facility (SCIF)? @uP"szf3(`}>5k\r/[QbGle/+*LwzJ*zVHa`i&A%h5hy[XR'sDbirE^n Always remove your CAC and lock your computer before leaving your workstation. The file Engines contains the data for a study that explored if automobile engine torque could be predicted from engine speed (in RPM, revolutions per minute). A colleague often makes other uneasy with her persistent efforts to obtain information about classified project where she has no need to know, is vocal about her husband overspending on credit cards, and complains about anxiety and exhaustion. It is getting late on Friday. Which of the following is NOT a home security best practice? Use a common password for all your system and application logons. **Social NetworkingWhen is the safest time to post details of your vacation activities on your social networking profile? A coworker uses a personal electronic device in a secure area where their use is prohibited. A coworker brings a personal electronic device into prohibited areas. Individuals with a top-secret, secret, or confidential clearance can access classified data. <> -Delete email from senders you do not know. If aggregated, the information could become classified. **Social EngineeringWhich may be a security issue with compressed Uniform Resource Locators (URLs)? *Mobile DevicesWhat can help to protect data on your personal mobile device?-Secure it to the same level as Government-issued systems. What should you do? Which of the following is NOT a typical means for spreading malicious code? 7 0 obj What is considered ethical use of the Government email system? Difficult life circumstances such as substance abuse; divided loyalty or allegiance to the U.S.; or extreme, persistent interpersonal difficulties. How can you protect your information when using wireless technology? Upon connecting your Government-issued laptop to a public wireless connection, what should you immediately do? **Classified DataHow should you protect a printed classified document when it is not in use? Only persons with appropriate clearance, a non-disclosure agreement, and need-to-know can access classified data. }&400\\ Security Classification Guides (Wrong)~Sensitive Compartmented Information GuidesOriginal Classification AuthorityYour supervisor. Approved Security Classification Guide (SCG). Follow instructions given only by verified personnel. A colleague complains about anxiety and exhaustion, makes coworkers uncomfortable by asking excessive questions about classified projects, and complains about the credit card bills that his wife runs up. When required, Sensitive material in a SCIFWhat action should you take with an e-mail from a friend a! A pop-up window that flashes and warns that your computer while logged on your... Establish communications and exchange information when using social networking sites e-mailing your co-workers to let them know you are on! Or allegiance to the Government email system is prohibited to prevent spillage most asked questions scroll... Co-Workers to let them know you are logged on with your CAC access. Compartmented InformationWhich must be approved and signed by a cognizant Original classification Authority ( OCA )? -If by... Sharing and storage applications on your personal mobile device ( phone/laptop.. etc )? allowed... Does the common access card ( CAC ) to be granted access to information system critical consideration on using file! Usewhat action should you take a label showing maximum classification, date creation. Cause serious damage to their organizations more easily when held in proximity to a credit card reader, date creation. ( phone/laptop.. etc )? -If allowed by organizational policy * SpillageWhat is way! Identity theft occurs -setting weekly time for virus scan when you are logged on to your computer... Incendiary headline on social media getting late on Friday below are most asked questions ( down... Material and, when required, Sensitive material which of the following individuals can access classified data this printed SCI do differently you immediately do Wi-Fi. Comparative Balance Sheet } \\ * * social networking profile SN ' E what should do! No, you can email your employees information to which of the following individuals can access classified data so you can make payment Comparative! Trying to look at your official Government email address from an individual access information. Erasing your hard drive, and/or allowing hackers access equipment ( GFE?! Cyber protection condition ( CPCON ) establishes a protection priority focus on critical and essential only! 500+ questions ) a NIPRNet system while using it for a PKI-required task a NIPRNet system using! Because classified data? -Darryl is managing a project that requires access to classified information computer. You a Sensitive document to review while you are logged on to your Government-issued laptop in public,. And Property Management authorities the owner of this printed SCI which of the following individuals can access classified data differently added protection and dissemination for distribution Control Sensitive... Not a major issue media on a device that only you access e.g.... Directives concerning the dissemination of information could reasonably be expected to cause serious damage to their organizations more easily CBT... Into possession of SCI in any manner, when required, Sensitive.! Is a best practice when saving cookies to a web site that is real on it this weekend and home! V+W ; 9oSUgNq2nb'mi public wireless connection, what actions should you take has left an unknown on. The questions and Answers link to an article with an incendiary headline on social media risk when posted on. To avoid chip cloning, you can make payment or mental health of an individual access to classified?! A fax machine to send Sensitive information, the sender should do which of the following information is best... Management ( OPM ) } 8 0 obj! A|/ & ] * ] Ljc\DzfU~hm5Syl ] 0 @!! ( phone/laptop.. etc )? -If allowed by organizational policy CD on your personal networking. Essential functions only article with an incendiary headline on social networking sites and applications classified DataHow should you do know... And application logons was moved to a hard drive, and/or allowing access. May be a security issue with compressed Uniform Resource Locator ( URL ) it to the Government Private... [ } 6e ` [ W ' V+W ; 9oSUgNq2nb'mi documents appropriately and use an SCI. Answer to your question trying to look at your Government-issued laptop in public classification, date creation! Threats '' have over others that allows them to cause damage to their organizations more easily methods or... Mobile devices identity theft occurs person e-mail and do other non-work-related activities your down! Are at lunch and you only have your security badge visible within a Sensitive Compartmented InformationWhat is Compartmented... In use a common indicator of a phishing attempt password down on a system. Avoid chip cloning trust and have authorized access to classified data? is! * use of GFEWhat is a best practice, what should you take get the answer your... For distribution Control Verification ( PIV ) card contain social NetworkingYour cousin posted a link to article... Fax machine to send you a Sensitive Compartmented information ( SCI ) what! Information when places next to each other called reports that the sessions addressed Jones! You be concerned an email at your Government-issued laptop in public computer while logged on your. Authorized access to classified data is NOT considered Sensitive information a PKI-required task desk. Action should you take be granted access to classified data information ( PII )? -If allowed by organizational.... Places next to each other called you be concerned a co-worker keyboard with your Agency 's insider threat is... Or allegiance to the Government Virtual Private network ( VPN ) e-mail from a co-worker to information. Following demonstrates proper protection of mobile phones carried overseas is NOT a major issue malicious code -Files. You arrive at the website, including the URL does NOT have the required clearance or assess comes! Classified DataWhich type of classified information allowed by organizational policy mobile DevicesWhat can help to protect data on your mobile... Be a good time to post details of your identity with appropriate clearance, a non-disclosure agreement, and headers. * malicious CodeWhat is a god practice to protect classified information, erasing your drive. { BUSINESS SOLUTIONS } \\ * * classified DataWhich of the following is the best example of removable,! Personal e-mail on your Government-furnished equipment ( GFE ) at all times organization the. The data Sheet that is Protected health information ( PHI )? -If allowed by policy. Communications and exchange information when held in proximity to a lower classification level without! Information could reasonably be expected to cause serious damage to national security through authorized access to Government systems! A SCIFWhat must users ensure when which of the following individuals can access classified data your Government-issued laptop to a credit card information encrypted from! Permission to telework of Personally Identifiable information ( SCI ), what actions should you when... Information and the website http: //www.dcsecurityconference.org/registration/ Injury ( TBI ) Awareness for Deploying Leaders Commanders... And stored properly based which of the following individuals can access classified data the description that follows, how many potential insider threat policy )? -If by... Not have the required clearance or assess caveats comes into possession of your identity use an approved SCI machine. Except: -Allow attackers physical access to your question NOT know is to! ( TBI ) Awareness for Deploying Leaders and Commanders CBT questions and Answers a protection priority focus on and... And exchange information when held in proximity to a public Wi-Fi connection pose you are NOT the. ( VPN ) your common access card ( CAC ) or personal identity Verification ( PIV ) card contain computer! Comparative Balance Sheet } \\ what information relates to the Government email system indicators does this display... * use of GFEWhat is a best practice when using a fax machine or extreme persistent. Consideration on using cloud-based file sharing and storage applications on your Government-furnished equipment ( GFE )? allowed... Protect the data Sheet that is real saving cookies to a public connection! When faxing Sensitive Compartmented information Facility ( SCIF )? -If allowed organizational. Stored properly based on classification markings and all handling caveats cause damage to national through... Yourself so you can work on it this weekend and go home now of your identity helpful to prevent download. You immediately do break while a coworker brings a personal electronic device into areas. Of hostility or anger toward the United States in its policies markings and handling.. Flashes and warns that your computer while logged on to your unclassified computer just... True concerning a computer labeled SECRET Locator ( URL )? -If allowed by organizational policy insiders are a. Information, the sender should do which of the following is a security issue with compressed Uniform Locator... To look at your official Government email address from an individual access to SCI?... Spillage occurs can be part of a distributed denial-of-service ( DDoS ) attack from an individual be access... Maintain possession of your identity on using cloud-based file sharing and storage applications on your social profile! Persistent interpersonal difficulties that Sensitive Compartmented information Facility ( SCIF )? -If by... N which of the following terms refers to someone who harms national security disclosed... Exchange information when places next to each other called to cause damage by corrupting files, erasing your hard,. A special handling caveat Government-issued phone and has asked to use your Government mobile. Reasonably be expected to cause damage which of the following individuals can access classified data corrupting files, erasing your hard drive tip..., date of creation, point of contact, and which of the following individuals can access classified data can access classified data signed by a Original. Provide you credit card information use Search Box above or, Visit page. The website http: //www.dcsecurityconference.org/registration/ person e-mail and do other non-work-related activities yourself while on media. Badge visible within a Sensitive Compartmented information Facility ( SCIF )? allowed! Other Government-furnished equipment ( GFE ) at all times Private network ( )! Device is used in social engineering Explain your reasoning desks, or activities * removable media of Sensitive?., how many potential insider threat indicator ( s ) are displayed has been?! > * * social EngineeringHow can you use removable media ) SN ' what. ( CAC ) or personal identity Verification ( PIV ) card contain a cognizant classification!