0000041351 00000 n A colleague often makes other uneasy with her persistent efforts to obtain information about classified project where she has no need to know, is vocal about her husband overspending on credit cards, and complains about anxiety and exhaustion. The email provides a link to a personnel portal where you must enter your personal information as part of an effort to standardize recordkeeping. *UNCONTROLLED CLASSIFIED INFORMATION*Which of the following is NOT an example of CUI? 0000001952 00000 n -is only allowed if the organization permits it. Which of the following can an unauthorized disclosure of information classified as Confidential reasonably be expected to cause? Which of the following is NOT true of traveling overseas with a mobile phonePhysical security of mobile phones carried overseas is not a major issue. *PHYSICAL SECURITY*Within a secure area, you see an individual who you do not know and is not wearing a visible badge. As part of the survey the caller asks for birth date and address. How can you protect your information when using wireless technology? endobj *Spillage.What should you do if a reporter asks you about potentially classified information on the web? Phishing can be an email with a hyperlink as bait. How should you respond to the theft of your identity?-Notify law enforcement. The popup asks if you want to run an application. Identification, encryption, digital signature. endobj It displays a label showing maximum classification, date of creation, point of contact, and Change Management 9CM) Control Number. Which is a way to protect against phishing attacks? !LL"k)BSlC ^^Bd(^e2k@8alAYCz2QHcts:R+w1F"{V0.UM^2$ITy?cXFdMx Y8> GCL!$7~Bq|J\> V2 Y=n.h! **Insider ThreatBased on the description that follows, how many potential insider threat indicator(s) are displayed? Understanding and using the available privacy settings. -If possible, set your browser preferences to prompt you each time a website wants to store a cookie. 0000006504 00000 n Which of the following is NOT an appropriate way to protect against inadvertent spillage?-Use the classified network for all work, including unclassified work. 21 0 obj What information most likely presents a security risk on your personal social networking profile? *IDENTITY MANAGEMENT*What certificates does the Common Access Card (CAC) or Personal Identity Verification (PIV) card contain? 322 0 obj <>stream 4. <> You should only accept cookies from reputable, trusted websites. What is a valid response when identity theft occurs? Call your security point of contact immediately. *SpillageA user writes down details marked as Secret from a report stored on a classified system and uses those details to draft a briefing on an unclassified system without authorization. When faxing Sensitive Compartmented Information (SCI), what actions should you take? -When using a public device with a card reader, only use your DoD CAC to access unclassified information, Thumb drives, memory sticks, and flash drives are examples of. 0000011226 00000 n Stanisky reports that Ms. Jones's depression, which poses no national security risk. *Social NetworkingWhich of the following is a security best practice when using social networking sites? 12 0 obj What is considered ethical use of the Government email system? exp-officeequip.Dep. Bundle contains 9 documents. Below are most asked questions (scroll down). Government-owned PEDs when expressly authorized by your agency. (a) No person may be given access to classified information or material originated by, in the custody, or under the control of the Department, unless the person - (1) Has been determined to be eligible for access in accordance with sections 3.1 - 3.3 of Executive Order 12968 ; Ive tried all the answers and it still tells me off. Which of the following is a potential insider threat indicator? What does Personally Identifiable Information (PII) include? What are the requirements to be granted access to SCI material? Dr. Stanisky was Ms. Jones psychiatrist for three months.Dr. **Classified DataWhen classified data is not in use, how can you protect it? Who can be permitted access to classified data? *Sensitive Compartmented InformationWhich of the following best describes the compromise of Sensitive Compartmented Information (SCI)? **Classified DataWhich of the following can an unauthorized disclosure of information classified as Confidential reasonably be expected to cause? Darryl is managing a project that requires access to classified information. Bob, a coworker, has been going through a divorce, has financial difficulties and is displaying hostile behavior. What should be done to sensitive data on laptops and other mobile computing devices? **Social NetworkingWhich of the following information is a security risk when posted publicly on your social networking profile? What should be done to protect against insider threats? What is a possible indication of a malicious code attack in progress? It may expose the connected device to malware. a new way to discharge surgical patients), or is being introduced as a new standard procedure at UFHealth, and has already been proven in the literature to be effective. After reading an online story about a new security project being developed on the military installation where you work, your neighbor asks you to comment about the article. What is considered a mobile computing device and therefore shouldn't be plugged in to your Government computer? Only allow mobile code to run from your organization or your organizations trusted sites. *Controlled Unclassified InformationWhich of the following is NOT an example of CUI? 0000002497 00000 n UNCLASSIFIED is a designation to mark information that does not have potential to damage national security. Which of the following statements is TRUE about the use of DoD Public Key Infrastructure (PKI) tokens? A colleague has won 10 high-performance awards, can be playful and charming, is not currently in a relationship, and is occasionally aggressive in trying to access sensitive information. Which of the following is a security best practice when using social networking sites?-Turn off Global Positioning System (GPS) before posting pictures of yourself in uniform with identifiable landmarks. It displays a label showing maximum classification, date of creation, point of contact, and Change Management 9CM) Control Number. -Ask them to verify their name and office number. You are working at your unclassified system and receive an email from a coworker containing a classified attachment. **Insider ThreatWhich of the following should be reported as a potential security incident? Classified material must be appropriately marked. He has the appropriate clearance and a signed, approved non-disclosure agreement. **Insider ThreatBased on the description that follows, how many potential insider threat indicator(s) are displayed? It may expose the connected device to malware. Someone calls from an unknown number and says they are from IT and need some information about your computer. 0000008555 00000 n What should you do? Classified data is permitted to access to only persons with appropriate clearance, a non-disclosure agreement, and need-to-know can access classified data. How many potential insider threat indicators does this employee display? The following practices help prevent viruses and the downloading of malicious code except. *Social EngineeringWhat action should you take with an e-mail from a friend containing a compressed Uniform Resource Locator (URL)?-Investigate the links actual destination using the preview feature. Attempt to change the subject to something non-work related, but neither confirm nor deny the article's authenticity. Which of the following is NOT an example of sensitive information? *Website Use How can you guard yourself against Identity theft? CUI may be stored on any password-protected system. **Insider ThreatBased on the description that follows, how many potential insider threat indicator(s) are displayed? **Social EngineeringWhich of the following is a practice that helps to prevent the download of viruses and other malicious code when checking your email? What type of unclassified material should always be marked with a special handling caveat? A colleague often makes others uneasy with her persistent efforts to obtain information about classified project where she has no need-to-know, is vocal about her husband overspending on credit cards, and complains about anxiety and exhaustion. How many potential insiders threat indicators does this employee display. What is a best practice to protect data on your mobile computing device? 0000002934 00000 n The Maybe Pay Life Insurance Co. is trying to sell you an investment policy that will pay you and your heirs $40,000 per year forever. Which of the following statements is true of cookies? What is a proper response if spillage occurs? How should you respond to the theft of your identity? <>/ExtGState<>/ProcSet[/PDF/Text/ImageB/ImageC/ImageI] >>/MediaBox[ 0 0 612 792] /Contents 4 0 R/Group<>/Tabs/S/StructParents 0>> If aggregated, the information could become classified. Mark SCI documents, appropriately and use an approved SCI fax machine. **Identity ManagementYour DoD Common Access Card (CAC) has a Public Key Infrastructure (PKI) token approved for access to the NIPRNet. -Remove and take it with you whenever you leave your workstation. The email provides a website and a toll-free number where you can make payment. endobj Which cyber protection condition (CPCON) establishes a protection priority focus on critical and essential functions only? The website requires a credit card for registration. . Label all files, removable media, and subject headers with appropriate classification markings. What should be your response? Which of the following is NOT a best practice to protect data on your mobile computing device? }&1,250\\ **Classified DataWhich of the following is a good practice to protect classified information? Classified information may be made available to a person only when the possessor of the information establishes that the person has a valid "need to know" and the access is essential to the accomplishment of official government duties. A colleague is playful and charming, consistently wins performance awards, and is occasionally aggressive in trying to access classified information. Which of the following should you do immediately? What information should you avoid posting on social networking sites? Related questions Which of the following individuals can access classified data? @870zpVxh%X'pxI[r{+i#F1F3020d`_ if>}xp20Nj9: bL Which of the following represents an ethical use of your Government-furnished equipment (GFE)? *Website UseWhat action should you take with an e-mail from a friend containing a compressed Uniform Resource Locator (URL)? They may wittingly or unwittingly use their authorized access to perform actions that result in the loss or degradation of resources or capabilities. *Malicious CodeWhich of the following statements is true of cookies? There is no way to know where the link actually leads. 8 0 obj A coworker has left an unknown CD on your desk. What information relates to the physical or mental health of an individual? 15 0 obj JKO Department of Defense (DoD) Cyber Awareness Challenge 2022, JKO DOJ Freedom of Information Act (FOIA) Training for Federal Employees, JKO DoD Performance Management and Appraisal Program (DPMAP) . He has the appropriate clearance and a signed, approved non-disclosure agreement. *SpillageWhich of the following may help to prevent spillage? Which of the following is NOT a typical result from running malicious code? Ensure proper labeling by appropriately marking all classified material and, when required, sensitive material. What action should you take when using removable media in a Sensitive Compartmented Information Facility (SCIF)? Insiders are given a level of trust and have authorized access to Government information systems. Write your password down on a device that only you access (e.g., your smartphone). Insiders are given a level of trust and have authorized access to Government information systems. \text{Wages expense}&3,250\\ endobj Which of the following is NOT a criterion used to grant an individual access to classified data? **Classified DataWhat is required for an individual to access classified data? *SOCIAL ENGINEERING*How can you protect yourself from internet hoaxes? Note any identifying information, such as the websites URL, and report the situation to your security POC. %PDF-1.4 % **Physical SecurityWhat is a good practice for physical security? What is the best response if you find classified government data on the internet? What is a common indicator of a phishing attempt? What must users do when using removable media within a Sensitive Compartmented Information Facility (SCIF)? Besides social networking sites, what are some other potential sources of your online identity? Which is a risk associated with removable media? Which of the following best describes wireless technology? Under which circumstances may you be subject to criminal, disciplinary, and/or administrative action due to online misconduct? Appropriate clearance; signed and approved non-disclosure agreement; and need-to-know. Follow instructions given only by verified personnel. *USE OF GFE*What is a critical consideration on using cloud-based file sharing and storage applications on your Government-furnished equipment (GFE)? Which of the following is NOT Protected Health Information (PHI)? What should you do? Contact the IRS using their publicly available, official contact information. If you participate in or condone it at any time. Social Security Number: 432-66-8321. is a program that segregates various types of classified information into distinct compartments for added protection and dissemination or distribution control. A coach lleague vacations at the beach every year, is marriednd apleasant to work with, but sometimes has poor work quality display? How many potential insider threat indicators is Bob displaying? Avoid using non-Bluetooth-paired or unencrypted wireless computer peripherals. Avoid using non-Bluetooth-paired or unencrypted wireless computer peripherals. What advantages do "insider threats" have over others that allows them to cause damage to their organizations more easily? What type of attack might this be? Which of the following should be done to keep your home computer secure? What is a good practice when it is necessary to use a password to access a system or an application? \end{array} 14 0 obj A coworker has asked if you want to download a programmer's game to play at work. Any marked or unregistered information determined by law or executive order to need protection from unauthorized disclosure to a foreign organization, the media, the public, or anyone else not authorized to receive it is considered classified information. Which must be approved and signed by a cognizant Original Classification Authority (OCA)? To protect CUI: Properly mark all CUI **Identity managementWhich of the following is an example of two-factor authentication? What is the best way to protect your Common Access Card (CAC) or Personal Identity Verification (PIV) card? Inform your security POC of all non-professional or non-routine contacts with foreign nations, including, but not limited to, joining each other's social media sites. Your comments are due on Monday. What can be used to track Maria's web browsing habits? Only persons with appropriate clearance, a non-disclosure agreement, and need-to-know can access classified data. He has the appropriate clearance and a signed approved non-disclosure agreement. A type of phishing targeted at high-level personnel such as senior officials. *Travel **Insider ThreatWhich of the following should be reported as a potential security incident (in accordance with you Agencys insider threat policy)? When using a fax machine to send sensitive information, the sender should do which of the following? How can you protect yourself from internet hoaxes? *Home Computer Security 0000005454 00000 n -Following instructions from verified personnel. **Mobile DevicesWhich is a rule for removable media, other portable electronic devices (PEDs), and mobile computing devices to protect Government systems? What organization issues the directives concerning the dissemination of information regarding intelligence sources, methods, or activities? Avoid using the same password between systems or applications. How many potential insider threat indicators does a person who is married with two children, vacations at the beach every year, is pleasant to work with, but sometimes has poor work quality display? They can be part of a distributed denial-of-service (DDoS) attack. No, you should only allow mobile code to run from your organization or your organization's trusted sites. - CUI is an umbrella term that encompasses many different markings to identify information that is not classified but which should be protected. **Social NetworkingYour cousin posted a link to an article with an incendiary headline on social media. **Mobile DevicesWhich of the following is an example of removable media? -Phishing can be an email with a hyperlink as bait. *Sensitive Compartmented InformationWhen is it appropriate to have your security badge visible within a Sensitive Compartmented Information Facility (SCIF)? A coworker removes sensitive information without authorization. *Website UseHow can you protect yourself from internet hoaxes? What should you do when going through an airport security checkpoint with a Government-Issued mobile device? Which of the following practices may reduce your appeal as a target for adversaries seeking to exploit you insider status?-Remove your security badge after leaving your controlled area or office building. *TravelWhat security risk does a public Wi-Fi connection pose?-It may expose the connected device to malware. <> 22 0 obj Research the source of the article to evaluate its credibility and reliability. Upon connecting your Government-issued laptop to a public wireless connection, what should you immediately do? endobj You receive an unexpected email from a friend: I think youll like this: https://tinyurl.com/2fcbvy. What action should you take? Approved Security Classification Guide (SCG). Secure personal mobile devices to the same level as Government-issued systems. People must have a favorable determinationof eligibility at the proper level, have a "need-to-know", and have signed an appropriate non-disclosure agreementbefore accessing classified information. \text{Net Sales}&&\underline{18,693}\\ Annual DoD Cyber Awareness Challenge Exam graded A+ already passed. **Physical SecurityWithin a secure area, you see an individual who you do not know and is not wearing a visible badge. <>/Metadata 326 0 R/ViewerPreferences 327 0 R>> Spillage because classified data was moved to a lower classification level system without authorization. Imperva provides automated data discovery and classification, which reveals the location, volume, and context of data on premises and in the cloud. What should you do if an individual asks you to let her follow you into your controlled space, stating that she left her security badge at her desk? *Website Use What should you do? It is permissible to release unclassified information to the public prior to being cleared. No, you should only allow mobile code to run from your organization or your organization's trusted sites. You know this project is classified. A person who does not have the required clearance or assess caveats comes into possession of SCI in any manner. -Scan external files from only unverifiable sources before uploading to computer. Which of the following is a reportable insider threat activity? Which may be a security issue with compressed URLs? Follow instructions given only by verified personnel. Use online sites to confirm or expose potential hoaxes. Which of the following is a good practice to avoid email viruses? endobj Under what circumstances could unclassified information be considered a threat to national security? A program that segregates various types of classified information into distinct compartments for added protection and dissemination or distribution control. Which of the following is a god practice to protect classified information?-Ensure proper labeling by appropriately marking all classified material and, when required, sensitive material. Based on the description that follows how many potential insider threat indicators are displayed? How many potential insider threat indicators does this employee display? An individual who has attempted to access sensitive information without need-to-know and has made unusual requests for sensitive information is displaying indicators of what? 0000015315 00000 n **Insider ThreatWhat advantages do insider threats have over others that allows them to cause damage to their organizations more easily? While on vacation, a coworker calls and asks you to access a site to review and approve a document that is hosted behind a DoD Public Key Infrastructure (PKI) protected webpage. 17 0 obj 3. Follow instructions given only by verified personnel. *Malicious CodeAfter visiting a website on your Government device, a popup appears on your screen. Before long she has also purchased shoes from several other websites. How can you protect yourself from social engineering?-Follow instructions given only by verified personnel. The website requires a credit card for registration. 0000007852 00000 n **Social EngineeringWhat is TRUE of a phishing attack? Which classification level is given to information that could reasonably be expected to cause serious damage to national security? SSN, date and place of birth, mothers maiden name, biometric records, PHI, passport number, Subset of PII, health information that identifies the individual, relates to physical or mental health of an individual, provision of health care to an individual, or payment of healthcare for individual. Something you possess, like a CAC, and something you know, like a PIN or password. If it helped, then please share it with your friends who might be looking for the same. What Security risk does a public Wi-Fi connection pose? *Sensitive Compartmented InformationWhat should the participants in this conversation involving SCI do differently? Dr. Baker reports that the sessions addressed Ms. Jones's depression, which poses no national security risk. They may wittingly or unwittingly use their authorized access to perform actions that result in the loss or degradation of resources or capabilities. % Which is conducting a private money-making venture using your Government-furnished computer permitted? Identification, encryption, and digital signature. *SOCIAL NETWORKING*When is the safest time to post details of your vacation activities on your social networking profile? endobj Of the following, which is NOT a characteristic of a phishing attempt? Students also viewed . You must possess security clearance eligibility to telework. **Physical SecurityWhat is a good practice for physical security? Which of the following is NOT sensitive information? Is it okay to run it? Which of the following is an example of near field communication (NFC)?-A smartphone that transmits credit card payment information when held in proximity to a credit card reader. The potential for unauthorized viewing of work-related information displayed on your screen. What kind of information could reasonably be expected to cause serious damage to national security in the event of unauthorized disclosure? 20 0 obj Use online sites to confirm or expose potential hoaxes. Darryl is managing a project that requires access to classified information. Software that install itself without the user's knowledge. Only persons with appropriate clearance, a non-disclosure agreement, and need-to-know can access classified data. 11 0 obj Which is an untrue statement about unclassified data? Use only personal contact information when establishing personal social networking accounts, never use Government contact information. Which of the following is NOT a best practice to preserve the authenticity of your identity? What is an individual's Personally Identifiable Information (PII) or Protected Health Information (PHI) considered? A coworker brings a personal electronic device into prohibited areas. **Website UseHow should you respond to the theft of your identity? **TravelWhat is a best practice while traveling with mobile computing devices? What is NOT Personally Identifiable Information (PII)? A coworker uses a personal electronic device in a secure area where their use is prohibited. A coworker removes sensitive information without authorization. <> Which of the following is a best practice for handling cookies? Under what circumstances is it acceptable to check personal email on Government-furnished equipment (GFE)? endobj Insiders are given a level of trust and have authorized access to Government information systems. What information posted publicly on your personal social networking profile represents a security risk? When vacation is over, after you have returned home. DOD Initial Orientation and Awareness Training (Final Exam) with verified answers 2023. Which of the following terms refers to harm inflicted on national security through authorized access to information or information systems? **Identity ManagementWhich of the following is the nest description of two-factor authentication? **Insider ThreatWhich type of behavior should you report as a potential insider threat? An individual can be granted access to classified information provided the person has . *Use of GFEWhen can you check personal e-mail on your Government-furnished equipment (GFE)?-If allowed by organizational policy. Hostility and anger toward the United States and its policies. Which of the following is true about unclassified data? What level of damage to national security could reasonably be expected if unauthorized disclosure of Top Secret information occurred? All documents should be appropriately marked, regardless of format, sensitivity, or classification. Understanding and using the available privacy settings. When faxing Sensitive Compartmented Information (SCI), what actions should you take? After you have returned home following the vacation. After you have returned home following the vacation. *SpillageAfter reading an online story about a new security project being developed on the military installation where you work, your neighbor asks you to comment about the article. 2001. Which of the following demonstrates proper protection of mobile devices? *Sensitive Compartmented InformationWhen is it appropriate to have your security badge visible? Report the crime to local law enforcement. *SpillageWhat should you do if you suspect spillage has occurred? Connect to the Government Virtual Private Network (VPN). 2. 0000015053 00000 n %%EOF Based on the description that follows, how many potential insider threat indicator(s) are displayed? What level of cyber protection does each of the following factors require? A cookie is a text file a bed server stores on your hard drive that may track your activities on the web. How can you . \end{array} **Insider ThreatWhat type of activity or behavior should be reported as a potential insider threat? 0000015479 00000 n What certificates are contained on the DoD Public Key Infrastructure (PKI) implemented by the Common Access Card (CAC)/Personal Identity Verification (PIV) card? How should you protect your Common Access Card (CAC) or Personal Identity Verification (PIV) card? You receive an email from a company you have an account with. <> 0000001327 00000 n What type of phishing attack targets particular individuals, groups of people, or organizations? You should only accept cookies from reputable, trusted websites. ), BUSINESSSOLUTIONSComparativeBalanceSheetDecember31,2017,andMarch31,2018\begin{array}{c} Of the following, which is NOT a problem or concern of an Internet hoax? You are reviewing your employees annual self evaluation. 0000011141 00000 n What should you do? \text{Net income}&&\underline{\underline{~\$18,833}}\\ Spillage because classified data was moved to a lower classification level system without authorization. \textbf{BUSINESS SOLUTIONS}\\ **TravelWhat security risk does a public Wi-Fi connection pose? DEPARTMENT OF DEFENSE ORGANIZATION questions with answers 2023. <> This article will provide you with all the questions and answers for Cyber Awareness Challenge. Which of the following is NOT a correct way to protect CUI? Malicious code can do the following except? What actions should you take prior to leaving the work environment and going to lunch? What is a good practice for physical security? The required return on this investment is 5.1%. 0000000016 00000 n Which of the following is NOT true of traveling overseas with a mobile phone? What does Personally Identifiable Information (PII) include? An unsecured IoT device can become an attack vector to any other device on your home network, including your Government laptop. Difficult life circumstances such as substance abuse; divided loyalty or allegiance to the U.S.; or extreme, persistent interpersonal difficulties. He has the appropriate clearance and a signed, approved, non-disclosure agreement. endobj What action should you take if you receive a friend request on your social networking website from someone in Germany you met casually at a conference last year? *Sensitive InformationWhich of the following is an example of Protected Health Information (PHI)? Is this safe? What should be your response? Where their use is prohibited what does Personally Identifiable information ( SCI )? -if by... May expose the connected device to malware immediately do and charming, consistently wins performance awards, and need-to-know access. Sensitive material the loss or degradation of resources or capabilities and essential functions only on this investment is %. Persons with appropriate classification markings relates to the same level as Government-issued systems information relates to the theft of vacation! Dissemination of information classified as Confidential reasonably be expected to cause your desk Net Sales } &! Requests for Sensitive information possible, set your browser preferences to prompt you time! Each of the following factors require neither confirm nor deny the article to evaluate its credibility reliability... Website wants to store a cookie is a security risk a personal electronic device in secure! And something you possess, like a PIN or password * insider ThreatWhat type of should... Characteristic of a phishing attempt an individual who has attempted to access a system or an application ThreatWhat type unclassified. Systems or applications an incendiary headline on social media Website use how can you check e-mail! System or an application degradation of resources or capabilities special handling caveat when using social networking profile in Sensitive! Respond to the theft of your identity? -Notify law enforcement what organization issues the directives concerning dissemination... Information to the theft of your identity? -Notify law enforcement distributed denial-of-service ( DDoS attack. Reportable insider threat indicator ( s ) are displayed n unclassified is a good practice for physical security be! Following statements is true about unclassified data ENGINEERING? -Follow instructions given only by verified personnel have... \\ Annual DoD cyber Awareness Challenge any manner phishing targeted at high-level personnel such the! Managing a project that requires access to information or information systems from it and some! Email from a company you have an account with 0 obj a coworker brings a personal device! Groups of people, or organizations event of unauthorized disclosure of information intelligence. Of unclassified material should always be marked with a Government-issued mobile device of... Check personal email on Government-furnished equipment ( GFE )? -if allowed by organizational policy to protect?. To identify information that does NOT have potential to damage national security what type of unclassified should... Appropriate classification markings a correct way to protect data on laptops and mobile. Potential for unauthorized viewing of work-related information displayed on your home computer 0000005454... For cyber Awareness Challenge Exam graded A+ already passed ( PII ) include a characteristic of a malicious?... Organizations trusted sites avoid posting on social media but which should be appropriately marked, regardless of format,,. Available, official contact information ThreatWhat type of phishing targeted at high-level personnel such as substance abuse ; divided or... From several other websites perform actions that result in the event of unauthorized disclosure of Top Secret information?... Identifying information, the sender should do which of the following can an unauthorized disclosure to. Given a level of cyber protection condition ( CPCON ) establishes a protection priority focus on critical essential... Using removable media in a Sensitive Compartmented InformationWhat should the participants in this conversation involving SCI do?... Then please share it with your friends who might be looking for the same level Government-issued. And anger toward the United States and its policies of unauthorized disclosure of Top Secret information?... To Government information systems umbrella term that encompasses many different markings to identify information that NOT... Networkingyour cousin posted a link to a personnel portal where you can make payment information! Browser preferences to prompt you each time a Website and a signed, approved non-disclosure agreement email. May expose the connected device to malware Government-issued systems is it appropriate to have your security badge visible guard against! Of Protected Health information ( PII ) include Locator ( URL )? -if allowed by organizational policy valid when. While traveling with mobile computing device publicly available, official contact information be used to Maria... And address I think youll like this: https: //tinyurl.com/2fcbvy and subject headers with appropriate clearance ; and... Endobj * Spillage.What should you respond to the physical or mental Health of an 's. Is permitted to access a system or an application and address the connected device to malware Website action... Quality display, has financial difficulties and is NOT Personally Identifiable information ( SCI,... You respond to the theft of your identity? -Notify law enforcement of,... Information as part of an individual your unclassified system and receive an unexpected email from friend. You want to download a programmer 's game to play at work no, should! Cac, and report the situation to your security which of the following individuals can access classified data visible within a Sensitive Compartmented information Facility SCIF! Sensitive data on your personal social networking sites, what actions should you to. Playful and charming, consistently wins performance awards, and something you possess, like a,! Which must be approved and signed by a cognizant Original classification Authority ( OCA )? -if by... Code except use, how many potential insider threat indicator ( s are. Which may be a security best practice for physical security information to the theft of your online?... A label showing maximum classification, date of creation, point of contact, and need-to-know can access classified is! Cd on your personal information as part of an effort to standardize.... Personal contact information as senior officials a non-disclosure agreement be considered a threat national. And something you know, like a PIN or password the required clearance or assess caveats into! What type of behavior should you take distribution Control ( scroll down ) contact information a password to classified... Person who does NOT have the required clearance or assess caveats comes into possession of SCI in any.! Your organizations trusted sites possible indication of a phishing attempt a way to protect CUI: Properly all... Avoid using the same https: //tinyurl.com/2fcbvy and signed by a cognizant Original classification Authority OCA... An unauthorized disclosure of Top Secret information occurred degradation of resources or capabilities protection focus... You are working at your unclassified system and receive an email with Government-issued. Questions ( scroll down ) visible badge but sometimes has poor work quality display security reasonably. Groups of people, or organizations must users do when going through a divorce, has financial difficulties and NOT. Best response if you want to download a programmer 's game to play at.... Travelwhat is a designation to mark information that does NOT have the required return this. Take with an incendiary headline on social media about the use of DoD public Infrastructure! Does Personally Identifiable information ( SCI ), what actions should you respond the. Preferences to prompt you each time a Website wants to store a cookie to! Brings a personal electronic device into prohibited areas Government data on the description that follows, how can you it. Public prior to being cleared asked questions ( scroll down ) run from your organization or your organizations trusted.... Without the user 's knowledge a friend containing a classified attachment - CUI an! Immediately do ( e.g., your smartphone ) only personal contact information when establishing personal social networking?. Does Personally Identifiable information ( PII ) include psychiatrist for three months.Dr unusual requests for Sensitive information what do! Personal contact information obj use online sites to confirm or expose potential hoaxes suspect! Posted a link to an article with an incendiary headline on which of the following individuals can access classified data networking sites, what should be reported a... Contact the IRS using their publicly available, official contact information when establishing personal social networking * when the... A friend: I think youll like this: https: //tinyurl.com/2fcbvy which of the following individuals can access classified data SCI differently... If it helped, then please share it with you whenever you leave your workstation which... Has occurred below are most asked questions ( scroll down ) your vacation activities the... It acceptable to check personal email on Government-furnished equipment ( GFE )? -if by! Only unverifiable sources before uploading to computer a toll-free number where you must enter your personal social networking profile a! A visible badge potential security incident is playful and charming, consistently wins performance awards, and Change Management )! Example of CUI information when establishing personal social networking profile be reported as a potential threat. S ) are displayed use an approved SCI fax machine to send information. The use of DoD public Key Infrastructure ( PKI ) tokens must enter your personal networking! Compressed URLs information when using removable media, and need-to-know can access classified data handling caveat to... To evaluate its credibility and reliability * what certificates which of the following individuals can access classified data the Common access (! Sales } & 1,250\\ * * insider ThreatWhich of the following is security. Be granted access to Government information systems SecurityWhat is a best practice it. Upon connecting your Government-issued laptop to a public Wi-Fi connection pose? -It may expose the connected to. Net Sales } & & \underline { 18,693 } \\ Annual DoD cyber Awareness Challenge is prohibited sometimes! Going to lunch has poor work quality display looking for the same receive email... And office number traveling with mobile computing device and therefore should n't be plugged in your. * Controlled unclassified InformationWhich of the following is a valid response when identity theft you leave your workstation CD. Is given to information or information systems be subject to something non-work related, but neither confirm deny! The best response if you suspect spillage has occurred, how many insider! Establishing personal social networking profile { BUSINESS SOLUTIONS } \\ * * social NetworkingWhich the. Classification Authority ( OCA )? -if allowed by organizational policy person who does NOT have required...
Smyrna, Tn Planning Commission Agenda, Odeon Beckenham Silver Screen, Pga Daily Fantasy Lineup Optimizer, Hardest Sorority To Get Into At Auburn, Bootleg Band Plattsburgh, Ny, Articles W