Which of the following is a best practice for physical security? Look for a digital signature on the email. What portable electronic devices (PEDs) are permitted in a SCIF? Others may be able to view your screen. What is a rule for removable media, other portable electronic devices (PEDs), and mobile computing devices to protect Government systems? **Identity Management Which of the following is the nest description of two-factor authentication? What is the best way to protect your Common Access Card (CAC) or Personal Identity Verification (PIV) card? Which of the following is a best practice to protect information about you and your organization on social networking sites and applications? Not correct. You many only transmit SCI via certified mail. Click the card to flip Flashcards Learn Test Match Created by Jamie_Lancaster Terms in this set (24) **Classified Data When classified data is not in use, how can you protect it? Unusual interest in classified information. What structures visible in the stained preparation were invisible in the unstained preparation? Malicious code can do the following except? *Controlled Unclassified Information Which of the following is NOT an example of CUI? CUI is not classified information. As part of the survey the caller asks for birth date and address. What should you do? Which is a best practice that can prevent viruses and other malicious code from being downloaded when checking your e-mail? It never requires classification markings, is true about unclassified data. (Malicious Code) Which of the following is true of Internet hoaxes? cyber. You are reviewing your employees annual self evaluation. (Malicious Code) While you are registering for a conference, you arrive at the website http://www.dcsecurityconference.org/registration/. Classified material must be appropriately marked. **Classified Data Which of the following is a good practice to protect classified information? (Sensitive Compartmented Information) Which of the following best describes the compromise of Sensitive Compartmented Information (SCI)? Antihistamines are used to treat the symptoms, such as sneezing, that are due to inflammation caused by irritants in the airways. Media containing Privacy Act information, PII, and PHI is not required to be labeled. 1.1.3 Insider Threat. What action should you take? (Malicious Code) Which email attachments are generally SAFE to open? On September 14, 2016, NARA issued a final rule amending 32 CFR Part 2002 to establish a uniform policy for all Federal agencies and prescribe Government-wide program implementation standards, including designating, safeguarding, disseminating, marking, decontrolling, and disposing of CUI; self-inspection and oversight requirements; and other facets of the CUI Program. *Sensitive Information Under what circumstances could classified information be considered a threat to national security? What should be your response? Report the suspicious behavior in accordance with their organizations insider threat policy. A program that segregates various type of classified information into distinct compartments for added protection and dissemination for distribution control. Which is a risk associated with removable media? How should you protect your Common Access Card (CAC) or Personal Identity Verification (PIV) card? Linda encrypts all of the sensitive data on her government-issued mobile devices. what should be your response be? Insiders are given a level of trust and have authorized access to Government information systems. not correct Which of the following information is a security risk when posted publicly on your social networking profile? Which of the following does NOT constitute spillage? (Mobile Devices) When can you use removable media on a Government system? Physically assess that everyone within listening distance is cleared and has a need-to-know for the information being discussed. **Social Engineering What action should you take with an e-mail from a friend containing a compressed Uniform Resource Locator (URL)? What would you do if you receive a game application request on your government computer that includes permission to access your friends, profile information, cookies, and sites visited? The emission rate of CO 2 from the soils reached the maximum on the 1st day of incubation and the sequence of CO 2 emission rate and cumulative emission under different amendment treatments was as SG > S > G > CK > N (Fig. What is NOT Personally Identifiable Information (PII)? What is a best practice for protecting controlled unclassified information (CUI)? Controlled Unclassified Information (CUI) is information that requires safeguarding or dissemination controls pursuant to and consistent with applicable law, regulations, and government-wide policies but is not classified under Executive Order 13526 or the Atomic Energy Act, as amended. Federal agencies routinely generate, use, store, and share information that, while not classified, still requires some level of protection from unauthorized access and release. **Identity management Which of the following is an example of a strong password? Should you always label your removable media? What should be done to protect against insider threats? Ask the individual to see an identification badge. correct. Transmit classified information via fax machine only Not correct THIS IS THE BEST ANSWER . **Insider Threat A colleague vacations at the beach every year, is married and a father of four, his work quality is sometimes poor, and he is pleasant to work with. Let us have a look at your work and suggest how to improve it! You know this project is classified. Which of the following demonstrates proper protection of mobile devices? Learn more about Teams What should you do? Which of the following is NOT a typical result from running malicious code? How should you respond? **Removable Media in a SCIF What portable electronic devices (PEDs) are allowed in a Sensitive Compartmented Information Facility (SCIF)? (Correct) -It does not affect the safety of Government missions. Which of the following statements is TRUE about the use of DoD Public Key Infrastructure (PKI) tokens? It never requires classification markings, is true about unclassified data. Which of the following best describes the sources that contribute to your online identity. Adversaries exploit social networking sites to disseminate fake news Correct. (Mobile Devices) Which of the following statements is true? Aggregating it does not affect its sensitivyty level. Controlled Unclassified Information (CUI) is informationthat requires safeguarding or dissemination controls consistent with applicable laws, regulations, and Government-wide policies, but is not classified under Executive Order 13526 "Classified National Security Informat What are examples of CUI? (Malicious Code) What is a common indicator of a phishing attempt? Power off any mobile devices when entering a secure area. *Spillage Which of the following actions is appropriate after finding classified information on the Internet? What type of attack might this be? **Insider Threat Based on the description that follows, how many potential insider threat indicator(s) are displayed? Unauthorized Disclosure of Classified Information and Controlled Unclassified Information . (controlled unclassified information) Which of the following is NOT correct way to protect CUI? Classified Information can only be accessed by individuals with. Spillage can be either inadvertent or intentional. Which may be a security issue with compressed urls? Explain. Attempting to access sensitive information without need-to-know, Avoid talking about work outside of the workplace or with people without a need-to-know, Report the suspicious behavior in accordance with their organizations insider threat policy. Correct. Unclassified information cleared for public release. **Insider Threat Which scenario might indicate a reportable insider threat? Connect and share knowledge within a single location that is structured and easy to search. Which of the following is true about unclassified data? You check your bank statement and see several debits you did not authorize. 1.1 Standard Challenge Answers. You believe that you are a victim of identity theft. What is required for an individual to access classified data? (Spillage) Which of the following practices may reduce your appeal as a target for adversaries seeking to exploit your insider status? What should you do? The date of full implementation of the CUI Program will be announced by the EPAs CUI Senior Agency Official (CUI SAO) and updated here on EPAs public web page. Unusual interest in classified information. Log in for more information. (Sensitive Information) Which of the following is NOT an example of sensitive information? Which of the following is true of telework? **Removable Media in a SCIF What action should you take when using removable media in a Sensitive Compartmented Information Facility (SCIF)? How can you protect your information when using wireless technology? Assuming open storage is always authorized in a secure facility. Spear Phishing attacks commonly attempt to impersonate email from trusted entities. Which of the following is NOT a security best practice when saving cookies to a hard drive? Neither confirm or deny the information is classified. **Insider Threat What type of activity or behavior should be reported as a potential insider threat? What should be your response? correct. *Sensitive Information What type of unclassified material should always be marked with a special handling caveat? (Spillage) What advantages do insider threats have over others that allows them to cause damage to their organizations more easily? He has the appropriate clearance and a signed, approved, non-disclosure agreement. **Classified Data Which of the following is true of protecting classified data? What type of social engineering targets senior officials? What should be done if you find classified Government Data/Information Not Cleared for Public Release on the Internet? Reviewing and configuring the available security features, including encryption. Which of the following is NOT a home security best practice? You should remove and take your CAC/PIV card whenever you leave your workstation. A colleague often makes others uneasy with her persistent efforts to obtain information about classified project where she has no need-to-know, is vocal about her husband overspending on credit cards, and complains about anxiety and exhaustion. Which of the following is true of internet hoaxes? Which of the following is NOT a social engineering tip? What should you do? **Social Networking Which piece if information is safest to include on your social media profile? Thats the only way we can improve. How should you securely transport company information on a removable media? Controlled Unclassified Information (CUI): Controlled Unclassified information was defined in the Executive Order 13556 as information held by or generated for the Federal Government that requires safeguarding or dissemination controls pursuant to and consistent with applicable law, regulations and government-wide policies that isn't classified No. Search for an answer or ask Weegy. Mark SCI documents appropriately and use an approved SCI fax machine. Use the government email system so you can encrypt the information and open the email on your government issued laptop. You can email your employees information to yourself so you can work on it this weekend and go home now. Refer the vendor to the appropriate personnel. Secure it to the same level as Government-issued systems. Which of the following is true of sharing information in a Sensitive Compartmented Information Facility (SCIF)? **Website Use How should you respond to the theft of your identity? When using your government-issued laptop in public environments, with which of the following should you be concerned? When vacation is over, after you have returned home. A coworker is observed using a personal electronic device in an area where their use is prohibited. Infographic - Text version Infographic [PDF - 594 KB] Report a problem or mistake on this page Date modified: 2020-12-14 Which of the following attacks target high ranking officials and executives? The answer has been confirmed to be correct. *Sensitive Compartmented Information When faxing Sensitive Compartmented Information (SCI), what actions should you take? Correct. What should you do if someone asks to use your government issued mobile device (phone/laptop..etc)? For programmatic questions regarding Controlled Unclassified Information (CUI), including any challenges to CUI marked by EPA, pleasecontact EPA's CUI Program Office. Delete email from senders you do not know. **Insider Threat Which type of behavior should you report as a potential insider threat? Attempt to change the subject to something non-work related, but neither confirm nor deny the articles authenticity. Malicious code can do damage by corrupting files, erasing your hard drive, and/or allowing hackers access. Who designates whether information is classified and its classification level? Unknown data is categorized by the system; an analyst then reviews the results (Insider Threat) A colleague vacations at the beach every year, is married and a father of four, his work quality is sometimes poor, and he is pleasant to work with. Ive tried all the answers and it still tells me off. **Classified Data What is a good practice to protect classified information? How many potential insider threat indicators is Bob displaying? How can you protect data on your mobile computing and portable electronic devices (PEDs)? They provide guidance on reasons for and duration of classification of information. Keeping a database from being accessed by unauthorized visitors C. Restricting a subject at a lower classification level from accessing data at a higher classification level D. Preventing an . Use personal information to help create strong passwords. Which scenario might indicate a reportable insider threat security incident? data. *Sensitive Compartmented Information What is a Sensitive Compartmented Information (SCI) program? ~All documents should be appropriately marked, regardless of format, sensitivity, or classification. A coworker has left an unknown CD on your desk. Government-owned PEDs, if expressly authorized by your agency. (Sensitive Information) Which of the following is true about unclassified data? Using webmail may bypass built in security features. You are logged on to your unclassified computer and just received an encrypted email from a co-worker. How many potential insiders threat indicators does this employee display? You must have your organization's permission to telework. Which of the following is NOT an example of Personally Identifiable Information (PII)? What is a way to prevent the download of viruses and other malicious code when checking your e-mail? Which may be a security issue with compressed Uniform Resource Locators (URLs)? DoD Unclassified data: Must be cleared before being released to the public May require applci aton i of Controled l Uncasl sed Iifi nformaton i (CU)I access and distribution controls Must be clearly marked as Unclassified or CUI if included in a classified document or classified storage area Which of the following is an example of malicious code? Ensure there are no identifiable landmarks visible in any photos taken in a work setting that you post. Store your Common Access Card (CAC) or Personal Identity Verification (PIV) card in a shielded sleeve ~Write your password down on a device that only you access (e.g., your smartphone) Change your password at least every 3 months Enable two-factor authentication whenever available, even for personal accounts. When would be a good time to post your vacation location and dates on your social networking website? How can you protect yourself on social networking sites? Store classified data appropriately in a GSA-approved vault/container when not in use. Research the source to evaluate its credibility and reliability. How many potential insider threat indicators does this employee display? Unclassified documents do not need to be marked as a SCIF. An investment in knowledge pays the best interest.. What are the requirements to be granted access to sensitive compartmented information (SCI)? How can you protect your organization on social networking sites? -Its classification level may rise when aggregated. In addition to offering an overview of cybersecurity best practices, the challenge also provides awareness of potential and common cyber threats.

Idioms About Darkness, Articles W