Which of the following represents a good physical security practice? Search for an answer or ask Weegy. Retrieve classified documents promptly from printers. Using webmail may bypass built in security features. It should only be in a system while actively using it for a PKI-required task. Dont assume open storage in a secure facility is authorized Maybe. A coworker has left an unknown CD on your desk. Thiswill enabletimely and consistent informationsharing andincreasetransparency throughout the Federal government and with non-Federal stakeholders. PII, PHI, and financial information is classified as what type of information? Which of the following actions can help to protect your identity? (Answer) CPCON 2 (High: Critical and Essential Functions) CPCON 1 (Very High: Critical Functions) CPCON 3 (Medium: Critical, Essential, and Support Functions) CPCON 4 (Low: All Functions) CPCON 5 (Very Low: All Functions). They may wittingly or unwittingly use their authorized access to perform actions that result in the loss or degradation of resources or capabilities. *Controlled Unclassified Information Which is a best practice for protecting Controlled Unclassified Information (CUI)? What information most likely presents a security risk on your personal social networking profile? Correct. As long as the document is cleared for public release, you may share it outside of DoD. You must have your organization's permission to telework. Hostility or anger toward the United States and its policies. (social networking) When may you be subjected to criminal, disciplinary, and/or administrative action due to online misconduct? *Sensitive Compartmented Information What is Sensitive Compartmented Information (SCI)? Maybe A user writes down details from a report stored on a classified system marked as Secret and uses those details to draft an unclassified briefing on an unclassified system without authorization. Store it in a locked desk drawer after working hours. Which of the following is true of Sensitive Compartmented Information (SCI)? A pop-up window that flashes and warns that your computer is infected with a virus. Which of the following is NOT considered sensitive information? Which of the following is a concern when using your Government-issued laptop in public? A coworker has asked if you want to download a programmer's game to play at work. There is no way to know where the link actually leads. It is releasable to the public without clearance. Which of the following is not considered an example of data hiding? You must possess security clearance eligibility to telework. Maintain visual or physical control of the device. What should you do after you have ended a call from a reporter asking you to confirm potentially classified info found on the web? (Malicious Code) What is a common indicator of a phishing attempt? Which is a good practice to protect classified information? You have reached the office door to exit your controlled area. When vacation is over, after you have returned home. What certificates are contained on the Common Access Card (CAC)? Which of the following is true of protecting classified data? (Insider Threat) A colleague vacations at the beach every year, is married and a father of four, his work quality is sometimes poor, and he is pleasant to work with. Which of the following is a good practice to prevent spillage? How Do I Answer The CISSP Exam Questions? What information should you avoid posting on social networking sites? What action should you take? Only paper documents that are in open storage need to be marked. Controlled Unclassified Information (CUI) is information that requires safeguarding or dissemination controls pursuant to and consistent with applicable law, regulations, and government-wide policies but is not classified under Executive Order 13526 or the Atomic Energy Act, as amended. which of the following is true about unclassified data. What is the response to an incident such as opening an uncontrolled DVD on a computer in a SCIF. A compromise of Sensitive Compartmented Information (SCI) occurs when a person who does not have the required clearance or access caveats comes into possession of SCI_________.??? Definition 1 / 24 -It must be released to the public immediately. What should the participants in this conversation involving SCI do differently? Secure it to the same level as Government-issued systems. Which of the following is NOT one? Which may be a security issue with compressed urls? CPCON 1 (Very High: Critical Functions) Setting weekly time for virus scan when you are not on the computer and it is powered off. Ive tried all the answers and it still tells me off. correct. Physical security of mobile phones carried overseas is not a major issue. Looking at your MOTHER, and screaming THERE SHE BLOWS! *Sensitive Compartmented Information What should the owner of this printed SCI do differently? To transmit large payments through Fedwire __________, To regulate and supervise the stock market to provide stability and security to individual investors. Appropriate clearance; signed and approved non-disclosure agreement; and need-to-know. Paul verifies that the information is CUI, includes a CUI marking in the subject header and digitally signs an e-mail containing CUI. You check your bank statement and see several debits you did not authorize. UNCLASSIFIED is a designation to mark information that does not have potential to damage national security. **Social Networking What should you do if you receive a game application request that includes permission to access your friends, profile information, cookies, and sites visited? It is not corporate intellectual property unless created for or included in requirements related to a government contract. How can you avoid downloading malicious code? *Sensitive Information What is the best example of Personally Identifiable Information (PII)? Remove your security badge, common access card (CAC), or personal identity verification (PIV) card. Your comments are due on Monday. -Its classification level may rise when aggregated. Correct. NARA has the authority and responsibility to manage the CUI Program across the Federal government. They can be part of a distributed denial-of-service (DDoS) attack. 1 Cyber Awareness Challenge 2023 Answers. When your vacation is over, and you have returned home. Memory sticks, flash drives, or external hard drives. How many insider threat indicators does Alex demonstrate? Which of the following is NOT a best practice to protect data on your mobile computing device? Your cousin posted a link to an article with an incendiary headline on social media. Which of the following is an example of malicious code? *Spillage After reading an online story about a new security project being developed on the military installation where you work, your neighbor asks you to comment about the article. Insiders are given a level of trust and have authorized access to Government information systems. Call your security point of contact immediately. Only allow mobile code to run from your organization or your organizations trusted sites. What should be your response? **Mobile Devices What should you do when going through an airport security checkpoint with a Government-issued mobile device? A colleague has visited several foreign countries recently, has adequate work quality, speaks openly of unhappiness with U.S. foreign policy, and recently had his car repossessed. Classification markings and handling caveats. cyber. CUI may be stored only on authorized systems or approved devices. Which of the following is an example of removable media? You may use your personal computer as long as it is in a secure area in your home b. It contains certificates for identification, encryption, and digital signature. (Spillage) What is required for an individual to access classified data? Contents hide. Discrete data involves whole numbers (integers - like 1, 356, or 9) that can't be divided based on the nature of what they are. What action should you take? Which of the following is NOT true of traveling overseas with a mobile phone? (Spillage) What advantages do insider threats have over others that allows them to cause damage to their organizations more easily? Validate friend requests through another source before confirming them. *Spillage Which of the following may help to prevent spillage? Which of the following best describes good physical security? Which of the following is a security best practice for protecting Personally Identifiable Information (PII)? Research the source to evaluate its credibility and reliability. **Classified Data What is required for an individual to access classified data? Which of the following demonstrates proper protection of mobile devices? Which of following is true of protecting classified data? c. What similarities and differences are there between plant and animal cells? Cyber Awareness 2022. Not correct. Ensure proper labeling by appropriately marking all classified material and, when required, sensitive material. Which of these is true of unclassified data? Based on the description that follows, how many potential insider threat indicator (s) are displayed? true-statement. Since the URL does not start with https, do not provide you credit card information. All data transfers via the internet are not 100% secure and there might be some security vulnerabilities. *Sensitive Information Under which circumstances is it permitted to share an unclassified draft document with a non-DoD professional discussion group? What action should you take? Report the suspicious behavior in accordance with their organizations insider threat policy. d. giving a spanking or a scolding. What should you consider when using a wireless keyboard with your home computer? Only documents that are classified Secret, Top Secret, or SCI require marking. Based on the description that follows, how many potential insider threat indicator(s) are displayed? As a security best practice, what should you do before exiting? Which of the following attacks target high ranking officials and executives? What is NOT Personally Identifiable Information (PII)? e. Why do Elodea and onion cells have more consistent shapes than human epithelial cells? What type of attack might this be? Federal agencies routinely generate, use, store, and share information that, while not classified, still requires some level of protection from unauthorized access and release. **Mobile Devices Which of the following helps protect data on your personal mobile devices? Dofficult life circumstances, such as death of spouse. What should you do? Always take your CAC when you leave your workstation. Matt Monroe, a 20-year U. S. Air Force veteran and current operations manager at Omnistruct, explains the breakdown, "There are four classified information categories in the military based on the severity of damage that the information's release would cause. Memory sticks, flash drives, or external hard drives. How many potential insider threat indicators does this employee display? T/F. Which Of The Following Is Not A Correct Way To Protect CUI. What security device is used in email to verify the identity of sender? (Sensitive Information) What should you do if a commercial entity, such as a hotel reception desk, asks to make a photocopy of your Common Access Card (CAC) for proof of Federal Government employment? Press release data. . Correct. EPAs CUI Program is responsible for issuing CUI policy, procedures, training, and guidance to program offices and regions, along with providing oversight and reporting on the Agencys progress on meeting NARAs CUI deadlines. Follow the steps enlisted below to use WEKA for identifying real values and nominal attributes in the dataset. This answer has been confirmed as correct and helpful. What action should you take first? correct. UNCLASSIFIED - CLASSIFICATION MARKINGS FOR TRAINING PURPOSES ONLY Marking in the Electronic Environment Short Student Guide Center for Development of Security Excellence Page 4 UNCLASSIFIED - CLASSIFICATION MARKINGS FOR TRAINING PURPOSES ONLY IM and Chat Instant messages and chats are brief, text-based message exchanges and conversations. d. How do the size and shape of a human epithelial cell differ from those of the Elodea and onion cells that you examined earlier? **Social Networking When may you be subject to criminal, disciplinary, and/or administrative action due to online misconduct? (Sensitive Information) What must the dissemination of information regarding intelligence sources, methods, or activities follow? Insiders are given a level of trust and have authorized access to Government information systems. **Use of GFE When can you check personal e-mail on your Government-furnished equipment (GFE)? The following practices help prevent viruses and the downloading of malicious code except. I may decide not to consent to these terms, but, if I do not consent to all of these terms, then I agree not to proceed with creating an account or moving forward with filling out the application, and I understand that I will not be . Learn more about Teams **Social Engineering Which may be a security issue with compressed Uniform Resource Locators (URLs)? What is the best choice to describe what has occurred? Public service, notably service in the United States Department of Defense or DoD, is a public trust. What does Personally Identifiable Information (PII) include? How many potential insiders threat indicators does this employee display? **Social Engineering What is TRUE of a phishing attack? Individuals must avoid referencing derivatively classified reports classified higher than the recipient.??? The proper security clearance and indoctrination into the SCI program. **Insider Threat A colleague vacations at the beach every year, is married and a father of four, his work quality is sometimes poor, and he is pleasant to work with. Exceptionally grave damage. Which of the following is NOT a correct way to protect sensitive information? CUI includes, but is not limited to Controlled Technical Information (CTI), Personally Identifiable Information (PII), Protected Health Information (PHI), financial information, personal or payroll information, proprietary data and operational information. Coworker making consistent statements indicative of hostility or anger toward the United States in its policies. correct. A trusted friend in your social network posts a link to vaccine information on a website unknown to you. The EPA will phase out legacy markings and safeguarding practices as implementation proceeds. Verify the identity of all individuals.??? (Spillage) When is the safest time to post details of your vacation activities on your social networking website? If authorized, what can be done on a work computer? It never requires classified markings, it is true about unclassified data. A colleague often makes others uneasy with her persistent efforts to obtain information about classified project where she has no need-to-know, is vocal about her husband overspending on credit cards, and complains about anxiety and exhaustion. While you are registering for a conference, you arrive at the website http://www.dcsecurityconference.org/registration/. The questions are broken into the following sections: Controlled Unclassified Information (CUI) isinformation that requires safeguarding or dissemination controls consistent with applicable laws, regulations, and Government-wide policies,but is not classified underExecutive Order 13526 Classified National Security Informationorthe Atomic Energy Act, as amended. What must authorized personnel do before permitting another individual to enter a Sensitive Compartmented Information Facility (SCIF)? Which of the following is an example of punishment by application? Use personally-owned wired headsets and microphones only in designated areas, New interest in learning a foreign language. John submits CUI to his organizations security office to transmit it on his behalf. Transmit classified information via fax machine only Not correct (Sensitive Compartmented Information) Which of the following best describes the compromise of Sensitive Compartmented Information (SCI)? You know that this project is classified. Avoid using non-Bluetooth-paired or unencrypted wireless computer peripherals. What type of social engineering targets senior officials? Sanitized information gathered from personnel records. Correct. Follow instructions given only by verified personnel. Which of the following makes Alexs personal information vulnerable to attacks by identity thieves? Classified material must be appropriately marked. Which is NOT a method of protecting classified data? Appropriate clearance, a signed and approved non-disclosure agreement, and need-to-know, Insiders are given a level of trust and have authorized access to Government information systems. Which of the following is true of the Common Access Card (CAC) or Personal Identity Verification (PIV) card? (Malicious Code) Which are examples of portable electronic devices (PEDs)? As part of the survey the caller asks for birth date and address. Which of the following is NOT a type of malicious code? Follow procedures for transferring data to and from outside agency and non-Government networks. (Malicious Code) Which email attachments are generally SAFE to open? Do not access website links in e-mail messages. Confirm the individuals need-to-know and access. CPCON 2 (High: Critical and Essential Functions) **Removable Media in a SCIF What action should you take when using removable media in a Sensitive Compartmented Information Facility (SCIF)? Which of the following is NOT a correct way to protect CUI? Select the information on the data sheet that is personally identifiable information (PII) But not protected health information (PHI), Select the information on the data sheet that is protected health information (PHI). Which of the following should be reported as a potential security incident (in accordance with your Agencys insider threat policy)? Which of the following is a potential insider threat indicator? When is it appropriate to have your security badge visible? Attempting to access sensitive information without need-to-know. ?Access requires Top Secret clearance and indoctrination into SCI program.??? Ensure that the wireless security features are properly configured. Note any identifying information and the websites URL. *Spillage Which of the following may help prevent inadvertent spillage? correct. What should you do? Create separate user accounts with strong individual passwords. **Insider Threat What advantages do insider threats have over others that allows them to cause damage to their organizations more easily? Which of the following is true of Unclassified information? (controlled unclassified information) Which of the following is NOT an example of CUI? PII includes, but is not limited to, social security numbers, date and places of birth, mothers maiden names, biometric records, and PHI. What are some potential insider threat indicators?