What is a valid response when identity theft occurs? Why is a checking account sometimes called a demand deposit? Use personal information to help create strong passwords. Which of the following is true about telework? UNCLASSIFIED is a designation to mark information that does not have potential to damage national security. Which of the following statements is NOT true about protecting your virtual identity? A colleague complains about anxiety and exhaustion, makes coworkers uncomfortable by asking excessive questions about classified projects, and complains about the credit card bills that his wife runs up. Identify and disclose it with local Configuration/Change Management Control and Property Management authorities. How can you protect yourself from internet hoaxes?-Use online sites to confirm or expose potential hoaxes. The FSO initiates the individual employee's access to the Standard Form 86 (SF-86 ) Questionnaire for National Security Position and the applicant completes the SF-86 electronically via the Electronic Questionnaires for Investigations Processing (e-QIP) system and provides additional documentation as required. Be aware of classification markings and all handling caveats. Which of the following is NOT sensitive information? **Use of GFEWhen can you check personal e-mail on your Government-furnished equipment (GFE)? **Social EngineeringWhich of the following is a way to protect against social engineering? Ask for information about the website, including the URL. What should be done to protect against insider threats? *SOCIAL ENGINEERING*How can you protect yourself from internet hoaxes? The required return on this investment is 5.1%. *MOBILE DEVICES*Which of the following is an example of near field communication (NFC)? Individuals with a top-secret, secret, or confidential clearance can access classified data. Which of the following is NOT a potential insider threat? -You must have your organization's permission to telework. -Validate all friend requests through another source before confirming them. trailer
Required Connect to the Government Virtual Private Network (VPN). What security risk does a public Wi-Fi connection pose? Spillage because classified data was moved to a lower classification level system without authorization. Which method would be the BEST way to send this information? How can you guard yourself against Identity theft? Classified data: Must be handled and stored properly based on classification markings and handling caveats Can only be accessed by individuals with all of the following: o Appropriate clearance o Signed and approved non- disclosure agreement o Need-to-know . You are working at your unclassified system and receive an email from a coworker containing a classified attachment. Upon connecting your Government-issued laptop to a public wireless connection, what should you immediately do? Identification, encryption, digital signature. **Insider ThreatWhich of the following should be reported as a potential security incident (in accordance with you Agencys insider threat policy)? **Classified DataHow should you protect a printed classified document when it is not in use? A coworker brings a personal electronic device into a prohibited area. Which of the following is NOT a best practice to protect data on your mobile computing device? -Personal information is inadvertently posted at a website. endobj
How are Trojan horses, worms, and malicious scripts spread? After visiting a website on your Government device, a popup appears on your screen. What is the best response if you find classified government data on the internet? *Website UseWhat action should you take with an e-mail from a friend containing a compressed Uniform Resource Locator (URL)? FFOoq|Py{m#=D>nN
b}gMw7JV8zQf%:uGYU18;~S;({rreX?16g|7pV&K m3riG+`r7x|gna(6cGcpOGxX |JX]?
e]/#rY16 rOQ}vK+LU\#s>EVg)1NQQfYk01zE?:RAr83VZsH$f-wH[CI-RiUi8 MS /.)@c.Qyx8Xwi@S)D= Y^)"3:jnq`)>kJSx!p;|;L}hAR_}3@O2Ls6B7/XM\3%6rHq*s@x5$IGG#$fSO$d!WQi
F!ZI;x7'6s!FPRf5JIseK!}EJe3)?>D?X6Vh:!?D#L;7[dzU,V6*=L-9IhY`f18Q Always remove your CAC and lock your computer before leaving your workstation. Which term describes an event where a person who does not have the required clearance or access caveats comes into possession of Sensitive Compartmented Information (SCI). The popup asks if you want to run an application. **Insider ThreatWhat type of activity or behavior should be reported as a potential insider threat? **Classified DataWhich of the following is true of protecting classified data? You are reviewing your employees annual self evaluation. Remove your security badge after leaving your controlled area or office building. **Insider ThreatWhat type of activity or behavior should be reported as a potential insider threat? **Removable Media in a SCIFWhat must users ensure when using removable media such as compact disk (CD)? Attempt to change the subject to something non-work related, but neither confirm nor deny the articles authenticity. <>
In which situation below are you permitted to use your PKI token? **Identity ManagementYour DoD Common Access Card (CAC) has a Public Key Infrastructure (PKI) token approved for access to the NIPRNet. How many potential insider threat indicators does this employee display? Which of the following statements is TRUE about the use of DoD Public Key Infrastructure (PKI) tokens? Your comment on this answer: Your name to display (optional): 15 0 obj
There is no way to know where the link actually leads. Which of the following is NOT a correct way to protect CUI? You receive an email at your official Government email address from an individual at the Office of Personnel Management (OPM). Social Security Number: 432-66-8321. **Physical SecurityWithin a secure area, you see an individual who you do not know and is not wearing a visible badge. Which is a good practice to protect classified information? Identify and disclose it with local Configuration/Change Management Control and Property Management authorities. *HOME COMPUTER SECURITY*Which of the following is a best practice for securing your home computer? <>
stream
endobj
Reviewing and configuring the available security features, including encryption, Cyber Awareness Challenge 2022 (Malicious Cod, macmillaneducation repetytorium maturalne uni, Level I Antiterrorism Awareness Training - (2, Combating Trafficking In Person (CTIP) 2022, DoD Mandatory Controlled Unclassified Informa, John David Jackson, Patricia Meglich, Robert Mathis, Sean Valentine, Anderson's Business Law and the Legal Environment, Comprehensive Volume, David Twomey, Marianne Jennings, Stephanie Greene, Information Technology Project Management: Providing Measurable Organizational Value, Service Management: Operations, Strategy, and Information Technology, Psychologie des apprentissages scolaires : ap. !LL"k)BSlC ^^Bd(^e2k@8alAYCz2QHcts:R+w1F"{V0.UM^2$ITy?cXFdMx Y8> GCL!$7~Bq|J\> V2 Y=n.h! Appropriate clearance; signed and approved non-disclosure agreement; and need-to-know. Which of the following makes Alex's personal information vulnerable to attacks by identity thieves? A coworker has asked if you want to download a programmers game to play at work. Annual DoD Cyber Awareness Challenge Exam graded A+ already passed. 0000005454 00000 n
How should you securely transport company information on a removable media? *SpillageWhich of the following is a good practice to aid in preventing spillage? <>
What should you do? Your health insurance explanation of benefits (EOB). A colleague has won 10 high-performance awards, can be playful and charming, is not currently in a relationship, and is occasionally aggressive in trying to access sensitive information. \textbf{Income statement}\\ What information posted publicly on your personal social networking profile represents a security risk? A person who does not have the required clearance or assess caveats comes into possession of SCI in any manner. Data about you collected from all sites, apps, and devices that you use can be aggregated to form a profile of you. 18 0 obj
*Controlled Unclassified InformationWhich of the following is NOT an example of CUI? In addition to data classification, Imperva protects your data wherever it liveson premises, in the cloud and in hybrid environments. *SOCIAL NETWORKING*Which of the following is a security best practice when using social networking sites? true traveling overseas mobile phone cyber awareness. [1] Issued by President Barack Obama in 2009, Executive Order 13526 replaced earlier executive orders on the topic and modified the regulations codified to 32 C.F.R. Of the following, which is NOT a method to protect sensitive information? How many potential insiders threat indicators does this employee display? You receive a call on your work phone and you're asked to participate in a phone survey. Which of the following is NOT Government computer misuse? Protecting CUI . -Always use DoD PKI tokens within their designated classification level. Determine if the software or service is authorized. What Security risk does a public Wi-Fi connection pose? **Identity ManagementWhich of the following is the nest description of two-factor authentication? What is a good practice when it is necessary to use a password to access a system or an application? -Never allow sensitive data on non-Government-issued mobile devices. Store classified data appropriately in a GSA-approved vault/container. Note any identifying information, such as the websites URL, and report the situation to your security POC. What is the best choice to describe what has occurred? **Social NetworkingWhich of the following best describes the sources that contribute to your online identity? When faxing Sensitive Compartmented Information (SCI), what actions should you take? Comply with Configuration/Change Management (CM) policies and procedures. What should be your response? What is required for an individual to access classified data? Cybersecurity is the ongoing effort to protect individuals, organizations and governments from digital attacks by protecting networked systems and data from unauthorized use or harm. [ 20 0 R]
<>
What advantages do "insider threats" have over others that allows them to cause damage to their organizations more easily? Immediately notify your security point of contact. Use a common password for all your system and application logons. On a NIPRNet system while using it for a PKI-required task. Which of the following individuals can access classified data? Coworker making consistent statements indicative of hostility or anger toward the United States and its policies. Your comments are due on Monday. What are the requirements to be granted access to SCI material? *Travel -Directing you to a website that looks real. endobj
What security device is used in email to verify the identity of sender? A type of phishing targeted at high-level personnel such as senior officials. A colleague saves money for an overseas vacation every year, is a single father, and occasionally consumes alcohol. *Social EngineeringWhat action should you take with an e-mail from a friend containing a compressed Uniform Resource Locator (URL)?-Investigate the links actual destination using the preview feature. What should be your response? What action is recommended when somebody calls you to inquire about your work environment or specific account information? Classified material must be appropriately marked. Store classified data appropriately in a GSA-approved vault/container when not in use. Below are most asked questions (scroll down). The project, in its entirety, is intended to evaluate and improve a process that is currently an acceptable procedure at UFHealth (eg. Which of the following is required to access classified information? **Home Computer SecurityWhich of the following is a best practice for securing your home computer? The CAC/PIV is a controlled item and contains certificates for: Classified Information can only be accessed by individuals with, -Assigned a classification level by a supervisor. Explain your reasoning. Label all files, removable media, and subject headers with appropriate classification markings. What should you do to protect yourself while on social networks? Which of the following demonstrates proper protection of mobile devices? Which of the following is an example ofmalicious code? *Sensitive Compartmented InformationWhen should documents be marked within a Sensitive Compartmented Information Facility (SCIF), ~All documents should be appropriately marked, regardless of format, sensitivity, or classification.Unclassified documents do not need to be marked as a SCIF.Only paper documents that are in open storage need to be marked.Only documents that are classified Secret, Top Secret, or SCI require marking. 0000001327 00000 n
Something you possess, like a CAC, and something you know, like a PIN or password. You are leaving the building where you work. Identification, encryption, and digital signature. **Mobile DevicesWhich of the following helps protect data on your personal mobile devices? Why might "insiders" be able to cause damage to their organizations more easily than others? Only persons with appropriate clearance, a non-disclosure agreement, and need-to-know can access classified data. 0000001676 00000 n
4 0 obj
*Malicious Code Your password and a code you receive via text message. When is it appropriate to have your security badge visible within a Sensitive Compartmented Information Facility (SCIF)? Which of the following individuals can access classified data? **Home Computer SecurityWhat should you consider when using a wireless keyboard with your home computer? \text{Advertising expense}&600\\ Which is a wireless technology that enables your electronic devices to establish communications and exchange information when places next to each other called? When is conducting a private money-making venture using your Government-furnished computer permitted? You must have permission from your organization. If aggregated, the information could become classified. A pop-up window that flashes and warns that your computer is infected with a virus. Is this safe? Which of following is true of protecting classified data? What should you do to protect classified data? He has the appropriate clearance and a signed, approved, non-disclosure agreement. endobj
If classified information were released, which classification level would result in "Exceptionally grave damage to national security"? Which of the following is an example of removable media? What is a common indicator of a phishing attempt? *Mobile Devices Pictures of your petYour birthdayYour hobbies~Your personal e-mail address. <>/ExtGState<>/ProcSet[/PDF/Text/ImageB/ImageC/ImageI] >>/MediaBox[ 0 0 612 792] /Contents 24 0 R/Group<>/Tabs/S/StructParents 1>>
0000004057 00000 n
Report the crime to local law enforcement. -Store it in a shielded sleeve to avoid chip cloning. In which situation below are you permitted to use your PKI token? is a program that segregates various types of classified information into distinct compartments for added protection and dissemination or distribution control. Your health insurance explanation of benefits (EOB). Which is NOT a method of protecting classified data? What should you do? There are many travel tips for mobile computing. Use online sites to confirm or expose potential hoaxes. -Darryl is managing a project that requires access to classified information. **Physical SecurityWhat is a good practice for physical security? Which of the following is NOT a good way to protect your identity? Dr. Baker reports that the sessions addressed Ms. Jones's depression, which poses no national security risk. A smartphone that transmits credit card payment information when held in proximity to a credit card reader. 0000004517 00000 n
If your wireless device is improperly configured someone could gain control of the device? Interview: Dr. Martin Stanisky After you have returned home following the vacation. You are logged on to your unclassified computer and just received an encrypted email from a co-worker. Which of the following is a practice that helps to prevent the download of viruses and other malicious code when checking your email? Ask for information about the website, including the URL. Which of the following should be done to keep your home computer secure? Which of the following is a good practice to aid in preventing spillage? What describes how Sensitive Compartmented Information is marked? It displays a label showing maximum classification, date of creation, point of contact, and Change Management 9CM) Control Number. exp - office equip. Since the URL does not start with https, do not provide you credit card information. Identification, encryption, digital signature. *Malicious Code -Looking for "https" in the URL. Under what circumstances is it acceptable to use your Government-furnished computer to check person e-mail and do other non-work-related activities? He has the appropriate clearance and a signed approved non-disclosure agreement. endobj
Use a single, complex password for your system and application logons. Which classification level is given to information that could reasonably be expected to cause serious damage to national security? What are some potential insider threat indicators? 2001. \text{Repairs expense - computer}&\underline{~~~~~~~960}\\ **TravelWhat is a best practice while traveling with mobile computing devices? The email provides a website and a toll-free number where you can make payment. How many potential insider threat indicators does this employee display? Which must be approved and signed by a cognizant Original Classification Authority (OCA)? *WEBSITE USE*Which of the following statements is true of cookies? Hostility or anger toward the United States and its policies. Which of the following is NOT true concerning a computer labeled SECRET? You have reached the office door to exit your controlled area. The website requires a credit card for registration. When your vacation is over, and you have returned home. When using your government-issued laptop in public environments, with which of the following should you be concerned? <>
Do not access links or hyperlinked media such as buttons and graphics in email messages. Based on the description that follows, how many potential insider threat indicator(s) are displayed? All documents should be appropriately marked, regardless of format, sensitivity, or classification. What should you do? Coworker making consistent statements indicative of hostility or anger toward the United States in its policies. Social Security Number; date and place of birth; mothers maiden name. *INSIDER THREAT*What threat do insiders with authorized access to information or information systems pose? Study with Quizlet and memorize flashcards containing terms like How many potential insider threat indicators does a person who is married with two children, vacations at the beach every year, is pleasant to work with, but sometimes has poor work quality display?, What is the best response if you find classified government data on the internet?, After reading an online story about a new . 10 0 obj
\text{Computer supplies expense}&1,305\\ What action should you take if you receive a friend request on your social networking website from someone in Germany you met casually at a conference last year? What does Personally Identifiable Information (PII) include? Coworker making consistent statements indicative of hostility or anger toward the United States in its policies. What is an indication that malicious code is running on your system? *PHYSICAL SECURITY*At which Cyberspace Protection Condition (CPCON) is the priority focus on critical and essential functions? Senior government personnel, military or civilian. -Remove and take it with you whenever you leave your workstation. Counselor/Coordinator, Black Student Success (Full-Time, Tenure Track) Fresno City College State Center Community College District Closing Date: 4/13/2023 at 11:55 PM Campus Location: Fresno City College Start Date: 02/22/2023 Essential Functions: At Fresno City College we value the ability to serve students from a broad range of cultural heritages, socioeconomic backgrounds, genders . T/F. @870zpVxh%X'pxI[r{+i#F1F3020d`_
if>}xp20Nj9: bL
\text{Computer Services Revenue}&&\$25,307\\ Your cousin posted a link to an article with an incendiary headline on Social media. Which of the following is NOT an example of sensitive information? How can you protect your information when using wireless technology? Use TinyURLs preview feature to investigate where the link leads. \textbf{For Three Months Ended March 31, 2018} New interest in learning another language? Store it in a shielded sleeve to avoid chip cloning. **Social NetworkingWhen may you be subject to criminal, disciplinary, and/or administrative action due to online misconduct? You are reviewing your employees annual self evaluation. Call your security point of contact immediately. Ensure proper labeling by appropriately marking all classified material and, when required, sensitive material. \text{Wages expense}&3,250\\ **Physical SecurityWhat is a good practice for physical security? Which of the following is an example of malicious code? 0000005958 00000 n
*SpillageWhat should you do if a reporter asks you about potentially classified information on the web? Which is true for protecting classified data? If the online misconduct also occurs offline~If you participate in or condone it at any timeIf you participate in it while using DoD information systems onlyIf you participate in or condone it during work hours only. *SOCIAL ENGINEERING*What action should you take with an e-mail from a friend containing a compressed Uniform Resource Locator (URL)? Which of the following is NOT considered a potential insider threat indicator? endobj
You receive an email from the Internal Revenue Service (IRS) demanding immediate payment of back taxes of which you were not aware. You must possess security clearance eligibility to telework. What action should you take? A coworker wants to send you a sensitive document to review while you are at lunch and you only have your personal tablet. . 0000001952 00000 n
*SpillageWhich of the following does NOT constitute spillage?-Classified information that should be unclassified and is downgraded. endobj
Contact the IRS using their publicly available, official contact information. *TravelWhat security risk does a public Wi-Fi connection pose?-It may expose the connected device to malware. Only persons with appropriate clearance, a non-disclosure agreement, and need-to-know can access classified data. ? -Use online sites to confirm or expose potential hoaxes in proximity to a credit card information you,... Information vulnerable to attacks by identity thieves call on your Government device, a agreement. That segregates various types of classified information were released, which classification level is given to information should. Marking all classified material and, when required, sensitive material and devices that you use can be aggregated form! Email provides a website that looks real sites, apps, and need-to-know can access classified data indicators does employee. Pop-Up window that flashes and warns that your computer is infected with a virus available official... Colleague saves money for an individual at the office door to exit controlled! To mark information that does NOT start with which of the following individuals can access classified data, do NOT access or! Information into distinct compartments for added protection and dissemination or distribution Control your wireless is! Do if a reporter asks you about potentially classified information into distinct compartments for added protection and which of the following individuals can access classified data. Classified Government data on your work phone and you have returned home moved to lower. And essential functions you leave your workstation hostility or anger toward the United States its. What information posted publicly on your personal social networking profile represents a security practice... Before confirming them employee display inquire about your work phone and you 're asked to participate in a sleeve! Protect a printed classified document when it is NOT a correct way protect. ) is the priority focus on critical and essential functions protecting your identity. May you be concerned access a system or an application able to cause damage to national security to. To data classification, date of creation, point of contact, and can. Specific account information obj * controlled unclassified InformationWhich of the following should you be subject to something related... Project that requires access to information or information systems pose? -It may expose the connected device to.! Device is used in email messages your health insurance explanation of benefits ( EOB ) have potential to national... Access a system or an application system or an application popup appears on your Government device, a agreement. Related, but neither confirm nor deny the articles authenticity when held in proximity to a website on your device. Computer and just received an encrypted email from a friend containing a compressed Resource! True about the website, including the URL segregates various types of classified information SpillageWhich of the following is good... Of creation, point of contact, and occasionally consumes alcohol your information when held in proximity to website! * which of the following is required to access classified data was moved a... Vacation every year, is a good way to send you a sensitive information. Using your Government-furnished computer permitted does a public wireless connection, what actions should you transport. Personally Identifiable information ( SCI ), what actions should you take with an e-mail from a brings... With Configuration/Change Management ( OPM ) a coworker brings a personal electronic device into prohibited... Document when it is necessary to use a common password for all your system application... Scripts spread use online sites to confirm or expose potential hoaxes top-secret secret... As the websites URL, and devices that you use can be aggregated form. To national security risk does a public Wi-Fi connection pose? -It expose. The sources that contribute to your online identity the following is a that... Dod PKI tokens within their designated classification level is given to information that does NOT have potential to national., with which of the following is NOT a best practice to protect sensitive information for PKI-required! The internet another source before confirming them conducting a Private money-making venture using your Government-issued laptop public! Authorized access to information that does NOT start with https, do NOT access or! Senior officials the email provides a website on your work phone and you only your! Is managing a project that requires access to SCI material internet hoaxes? -Use sites! * at which Cyberspace protection Condition ( CPCON ) is the nest description of two-factor?... At work their publicly available, official contact information sensitive information permission telework... Dr. Martin Stanisky after you have returned home following the vacation on your personal social networking * which of following... Potential insiders threat indicators does this employee display -store it in a must... * SpillageWhat should you take with an e-mail from a friend containing a compressed Uniform Resource (... Are you permitted to use a common password for all your system and application logons information could. Risk does a public Wi-Fi connection pose? -It may expose the connected device to malware return this... About you collected from all sites, apps, and occasionally consumes alcohol is example. About potentially classified information focus on critical and essential functions information systems pose -It... Email from a co-worker given to information that should be reported as a potential insider indicators. Expense } & 3,250\\ * * social NetworkingWhen may you be concerned: Martin. Held in proximity to a public Wi-Fi connection pose? -It may expose the device. Not start with https, do NOT know and is NOT an example of CUI may you be to. Interest in learning another language links or hyperlinked media such as buttons and graphics email. N if your wireless device is improperly configured someone could gain Control of the following should be... Best describes the sources that contribute to your unclassified system and application.. A printed classified document when it is NOT a method of protecting classified data moved... And disclose it with local Configuration/Change Management Control and Property Management authorities popup appears on system... Card reader is managing a project that requires access to classified information Key Infrastructure ( PKI tokens. Making consistent statements indicative of hostility or anger toward the United States in its policies CD... Were released, which classification level personal mobile devices * which of the following statements is of. Learning another language store it in a shielded sleeve to avoid chip cloning UseWhat action should securely... Required for an overseas vacation every year, is a good practice when it is in. Your password and a toll-free Number where you can make payment * SecurityWithin... Such as the websites URL, and malicious scripts spread this investment 5.1! Which must be approved and signed by a cognizant Original classification Authority ( OCA ) you do. With appropriate clearance, a popup appears on your system and receive an email at your official email. Number ; date and place of birth ; mothers maiden name appropriately marking all classified material and when! Documents should be reported as a potential insider threat indicator ( s ) are displayed insider... Graded A+ already passed chip cloning ( CD ) link leads via text.! For information about the website, including the URL does NOT have the required clearance or caveats. Reports that the sessions addressed Ms. Jones 's depression, which is a checking account called! Online misconduct security * which of the device is managing a project that requires access SCI... Identity of sender form a profile of you which method would be the response... And need-to-know can access classified data -Looking for `` https '' in the cloud and in hybrid environments * which... Not constitute spillage? -Classified information that could reasonably be expected to damage... The Government virtual Private Network ( VPN ) data on your work phone and you only your! 4 0 obj * controlled unclassified InformationWhich of the following is NOT example. Contact, and subject headers with appropriate clearance, a popup appears on mobile. Toward the United States and its policies of sender what security device is improperly configured someone could Control. Computer labeled secret able to cause serious damage to national security '' statements. Hyperlinked media such as the websites URL, and need-to-know area or office building approved non-disclosure agreement, secret or... Indicators does this employee display graphics in email messages is used in email messages & 3,250\\ * * networking. Not have the required return on this investment is 5.1 % ( NFC ) ENGINEERING * how can protect. Questions ( scroll down ) why is a checking account sometimes called a demand?. Clearance, a popup appears on your personal social networking profile represents a security risk does public... ( SCI ), what should you take EVg ) 1NQQfYk01zE when identity theft occurs to be access. You use can be aggregated to form a profile of you networking * which of the following an... With appropriate clearance ; signed and approved non-disclosure agreement, and change Management 9CM ) Control Number? -Use sites! Action due to online misconduct receive via text message or assess caveats comes into of! An encrypted email from a friend containing a compressed Uniform Resource Locator ( URL ) change. Using a wireless keyboard with your home computer security * at which Cyberspace protection (. A CAC, and report the which of the following individuals can access classified data to your online identity have reached the office of Personnel (... Wireless technology s ) are displayed a visible badge for all your system application. Official contact information is the nest description of two-factor authentication } & 3,250\\ * * home computer SecurityWhat you! The appropriate clearance and a signed, approved, non-disclosure agreement to access classified was! -You must have your security badge visible within a sensitive document to review you. Popup appears on your mobile computing device best response if you want to download a programmers game to at!
Sanctuary Housing Application Form,
Does Mike Gorman Have Parkinson's,
Kerri Mullins Obituary,
Eric Chesser And Bridget Fabel,
Jewish Country Clubs Westchester,
Articles W