CUI may be stored only on authorized systems or approved devices. Not correct Verify the identity of all individuals.??? **Social Networking When may you be subject to criminal, disciplinary, and/or administrative action due to online misconduct? Of the following, which is NOT an intelligence community mandate for passwords? 1).Compared with CK, straw addition treatments (S and SG) significantly (P < 0.01) increased the emission rate and cumulative emission of CO 2 and the cumulative CO 2 . DoD Unclassified data: Must be cleared before being released to the public May require applci aton i of Controled l Uncasl sed Iifi nformaton i (CU)I access and distribution controls Must be clearly marked as Unclassified or CUI if included in a classified document or classified storage area When teleworking, you should always use authorized and software. **Social Networking When is the safest time to post details of your vacation activities on your social networking profile? Badges must be visible and displayed above the waist at all times when in the facility. NARA has the authority and responsibility to manage the CUI Program across the Federal government. What should be done to protect against insider threats? February 8, 2022. correct. What should you do if someone forgets their access badge (physical access)? Use a common password for all your system and application logons. You can't have 1.9 children in a family (despite what the census might say ). Unclassified information cleared for public release. What should be your response? Social Security Number; date and place of birth; mothers maiden name. In setting up your personal social networking service account, what email address should you use? Which of the following is true about unclassified data? - Getvoice.org Chinese Hackers Steal Unclassified Data From Navy Contractor Q&A for work. Which of the following is true of internet hoaxes? Which of the following actions is appropriate after finding classified Government information on the internet? Reviewing and configuring the available security features, including encryption. What is considered ethical use of the Government email system? Exceptionally grave damage to national security. It contains certificates for identification, encryption, and digital signature. How can you avoid downloading malicious code? What is the basis for the handling and storage of classified data? Which of the following is true about unclassified data? correct. (Malicious Code) While you are registering for a conference, you arrive at the website http://www.dcsecurityconference.org/registration/. What should you do? All of these. difficult life circumstances such as substance abuse, divided loyalty or allegiance to the U.S., and extreme, persistent interpersonal difficulties. **Classified Data Which of the following must you do before using and unclassified laptop and peripherals in a collateral environment? All https sites are legitimate. (Spillage) Which type of information could reasonably be expected to cause serious damage to national security if disclosed without authorization? (Malicious Code) Which of the following is NOT a way that malicious code spreads? After reading an online story about a new security project being developed on the military installation where you work, your neighbor asks you to comment about the article. Briefly describe what you have learned. *Spillage Which of the following may help to prevent spillage? Replace data starts with '' with np.NaN - Stack Overflow How Do I Answer The CISSP Exam Questions? Which method would be the BEST way to send this information? Where. **Classified Data How should you protect a printed classified document when it is not in use? What Should You Do When Working On An Unclassified System And Receive Before long she has also purchased shoes from several other websites. A colleague abruptly becomes hostile and unpleasant after previously enjoying positive working relationships with peers, purchases an unusually expensive car, and has unexplained absences from work. Reviewing and configuring the available security features, including encryption. Ans: True Question 2: The Government Information Security Reform Act (Security Reform Act) of 2000 focuses on management View the full answer correct. Not correct. **Classified Data What is required for an individual to access classified data? Which of the following is NOT a type of malicious code? No. All https sites are legitimate and there is no risk to entering your personal info online. It includes a threat of dire circumstances. A colleague vacations at the beach every year, is married and a father of four, sometimes has poor work quality, and works well with his team. How should you respond? Which of the following is a security best practice when using social networking sites? You receive an inquiry from a reporter about potentially classified information on the internet. How can you guard yourself against Identity theft? JavaScript appears to be disabled on this computer. What is considered a mobile computing device and therefore shouldnt be plugged in to your Government computer? Understanding Controls on Unclassified Government Information When using your government-issued laptop in public environments, with which of the following should you be concerned? Federal agencies routinely generate, use, store, and share information that, while not meeting the threshold for classification as national security or atomic energy information, requires some level of protection from unauthorized access and release. Changes to various data systems that store and sometimes share sensitive information outside EPA. In addition to avoiding the temptation of greed to betray his country, what should Alex do differently? Use your own security badge, key code, or Common Access Card (CAC)/Personal Identity Verification (PIC) card. "Unclassified" or a lack of security marking denotes non-sensitive information. Spear Phishing attacks commonly attempt to impersonate email from trusted entities. Note any identifying information, such as the website's URL, and report the situation to your security POC. Which designation marks information that does not have potential to damage national security? **Use of GFE What is a critical consideration on using cloud-based file sharing and storage applications on your Government-furnished equipment (GFE)? The National Archives and Records Administration (NARA) serves as the Controlled Unclassified Information (CUI) Executive Agent (EA). (Malicious Code) What is a common indicator of a phishing attempt? Your comments are due on Monday. We recommend Norton Security or McAfee Total Protection. What should you do after you have ended a call from a reporter asking you to confirm potentially classified information found on the web? **Insider Threat Based on the description that follows, how many potential insider threat indicator(s) are displayed? When checking in at the airline counter for a business trip, you are asked if you would like to check your laptop bag. Using NIPRNet tokens on systems of higher classification level. A smartphone that transmits credit card payment information when held in proximity to a credit card reader. Ensure proper labeling by appropriately marking all classified material and, when required, sensitive material. Use personal information to help create strong passwords. Which of the following is NOT sensitive information? When your vacation is over, and you have returned home. Cyber Challenge.txt - Cyber Awareness What should you do On September 14, 2016, NARA issued a final rule amending 32 CFR Part 2002 to establish a uniform policy for all Federal agencies and prescribe Government-wide program implementation standards, including designating, safeguarding, disseminating, marking, decontrolling, and disposing of CUI; self-inspection and oversight requirements; and other facets of the CUI Program. Correct. Which of the following is true about telework? A vendor conducting a pilot program with your organization contacts you for organizational data to use in a prototype. You receive an unexpected email from a friend: "I think you'll like this: (URL)" What action should you take? Use only your personal contact information when establishing your account. What type of social engineering targets particular individuals, groups of people, or organizations? Classified Information can only be accessed by individuals with. 1 Cyber Awareness Challenge 2023 Answers. **Mobile Devices Which of the following helps protect data on your personal mobile devices? What information should you avoid posting on social networking sites? Which of these is true of unclassified data? **Insider Threat Which of the following should be reported as a potential security incident? Do not access links or hyperlinked media such as buttons and graphics in email messages. What type of social engineering targets senior officials? Which of the following is NOT a DoD special requirement for tokens? Note the websites URL and report the situation to your security point of contact. **Insider Threat What is an insider threat? Share sensitive information only on official, secure websites. Of the following, which is NOT a security awareness tip? you don't need to do anything special to protect this information **Website Use While you are registering for a conference, you arrive at the website http://www.dcsecurityconference.org/registration/. Which of the following is a best practice to protect information about you and your organization on social networking sites and applications? Understanding and using the available privacy settings. Which of the following does NOT constitute spillage? As long as the document is cleared for public release, you may release it outside of DoD. *Spillage You find information that you know to be classified on the Internet. Which of the following is NOT considered sensitive information? How should you protect your Common Access Card (CAC) or Personal Identity Verification (PIV) card? Make note of any identifying information and the website URL and report it to your security office. Types of Data in Statistics - Nominal, Ordinal, Interval, and Ratio *Spillage Which of the following is a good practice to aid in preventing spillage? Remove your security badge, common access card (CAC), or personal identity verification (PIV) card. (Sensitive Compartmented Information) What portable electronic devices (PEDs) are allow in a Secure Compartmented Information Facility (SCIF)? **Social Networking When is the safest time to post details of your vacation activities on your social networking website? How should you securely transport company information on a removable media? Correct. (social networking) When is the safest time to post details of your vacation activities on your social networking profile? Unsupervised machine learning: Dealing with unknown data You receive an inquiry from a reporter about government information not cleared for public release. d. How do the size and shape of a human epithelial cell differ from those of the Elodea and onion cells that you examined earlier? Which of the following is NOT a correct way to protect sensitive information? Never allow sensitive data on non-Government-issued mobile devices. T/F. tell your colleague that it needs to be secured in a cabinet or container. Based on the description that follows, how many potential insider threat indicator(s) are displayed? CUI was established to standardize the way the Executive branch handles sensitive information that requires dissemination controls. (Spillage) What advantages do insider threats have over others that allows them to cause damage to their organizations more easily? Dofficult life circumstances, such as death of spouse. You must have your organization's permission to telework. Appropriate clearance; signed and approved non-disclosure agreement; and need-to-know. not correct. Not correct Alexa May, director of accounts, received a bill for $648\$648$648, dated April 666, with sales terms 2/10,1/15,n/302/10, 1/15, n/302/10,1/15,n/30. Which designation includes Personally Identifiable Information (PII) and Protected Health Information (PHI)? -Classified information that should be unclassified and is downgraded. After clicking on a link on a website, a box pops up and asks if you want to run an application. Attempt to change the subject to something non-work related, but neither confirm nor deny the articles authenticity. Correct, Someone who uses authorized access, wittingly or unwittingly, to harm national security through unauthorized disclosure or other actions that may cause the loss or degradation of resources or capabilities. not correct Memory sticks, flash drives, or external hard drives. This is information that, if released to the public, carries no injury to personal, industry, or government interests. (Insider Threat) Based on the description that follows, how many potential insider threat indicator(s) are displayed? Telework is only authorized for unclassified and confidential information. Someone calls from an unknown number and says they are from IT and need some information about your computer. Software that installs itself without the users knowledge. It may expose the connected device to malware. **Social Engineering What action should you take with an e-mail from a friend containing a compressed Uniform Resource Locator (URL)? Looking at your MOTHER, and screaming THERE SHE BLOWS! If classified information were released, which classification level would result in Exceptionally grave damage to national security? What can be used to track Marias web browsing habits? f. Get an answer. What is a best practice to protect data on your mobile computing device? This bag contains your government-issued laptop. How many potential insiders threat indicators does this employee display? Ensure proper labeling by appropriately marking all classified material. Contents hide. Which of the following can an unauthorized disclosure of information classified as Confidential reasonably be expected to cause? Why might "insiders" be able to cause damage to their organizations more easily than others? Maintain possession of your laptop and other government-furnished equipment (GFE) at all times. Report the suspicious behavior in accordance with their organizations insider threat policy. Which of the following is an example of removable media? data. Which scenario might indicate a reportable insider threat? Search by Location. Which of the following is true of Internet of Things (IoT) devices? Log in for more information. In addition to offering an overview of cybersecurity best practices, the challenge also provides awareness of potential and common cyber threats. **Insider Threat Which of the following should be reported as a potential security incident (in accordance with you Agencys insider threat policy)? *Spillage After reading an online story about a new security project being developed on the military installation where you work, your neighbor asks you to comment about the article. A program that segregates various types of classified information into distinct compartments for added protection and dissemination or distribution control. Carrying his Social Security Card with him, DoD employees are prohibited from using a DoD CAC in card-reader-enabled public device, Assigned a classification level by a supervisor. This task is performed with the aim of finding similarities in data points and grouping similar data points together. Her badge is not visible to you. (Malicious Code) What are some examples of removable media? By Quizzma Team / Technology. A user writes down details from a report stored on a classified system marked as Secret and uses those details to draft an unclassified briefing on an unclassified system without authorization. Classification markings and handling caveats. Even within a secure facility, dont assume open storage is permitted. Classified material must be appropriately marked. You must have your organizations permission to telework. What type of data must be handled and stored properly based on classification markings and handling caveats? Which of the following is a good practice for telework? Which of the following includes Personally Identifiable Information (PII) and Protected Health Information (PHI)? After you have returned home following the vacation. Only paper documents that are in open storage need to be marked. **Use of GFE Under what circumstances is it acceptable to use your Government-furnished computer to check personal e-mail and do other non-work-related activities? As a security best practice, what should you do before exiting? **Insider Threat Which of the following is NOT considered a potential insider threat indicator? Ensure proper labeling by appropriately marking all classified material and, when required, sensitive material. Which of these is true of unclassified data? If you participate in or condone it at any time. Exceptionally grave damage. 5. How many potential insider threat indicators does this employee display? (Travel) Which of the following is a concern when using your Government-issued laptop in public? Which of the following statements is TRUE about the use of DoD Public Key Infrastructure (PKI) tokens? Which of the following should you NOT do if you find classified information on the internet? EPAs CUI Program is responsible for issuing CUI policy, procedures, training, and guidance to program offices and regions, along with providing oversight and reporting on the Agencys progress on meeting NARAs CUI deadlines. Were mitochondria as abundant in human epithelial cells as in onion epidermal cells (procedure 4.6)? A colleague has won 10 high-performance awards, can be playful and charming, is not currently in a relationship, and occasionally aggressive in trying to access sensitive information. Unclassified information is a threat to national security. Which of the following may be helpful to prevent inadvertent spillage? Which of the following is NOT a social engineering tip? which of the following is true about unclassified data - Weegy The EPA will phase out legacy markings and safeguarding practices as implementation proceeds. Only friends should see all biographical data such as where Alex lives and works. Which of the following is true of protecting classified data Insiders are given a level of trust and have authorized access to Government information systems. Which is a way to protect against phishing attacks? The CAC/PIV is a controlled item and contains certificates for: An individual who has attempted to access sensitive information without need-to-know and has made unusual requests for sensitive information is displaying indicators of what? not correct. Maybe. (Sensitive Information) What certificates are contained on the Common Access Card (CAC)? What action should you take? Attempt to change the subject to something non-work related, but neither confirm nor deny the article's authenticity. What is the best response if you find classified government data on the internet? Please click here to see any active alerts. **Insider Threat How many potential insider threat indicators does a person who is playful and charming, consistently wins performance awards, but is occasionally aggressive in trying to access sensitive information display?