What information should you avoid posting on social networking sites? **Insider Threat What advantages do insider threats have over others that allows them to cause damage to their organizations more easily? However, agency personnel and contractors should first consult their agency's CUI implementing policies and program management for guidance. What is best practice while traveling with mobile computing devices? correct. Coworker making consistent statements indicative of hostility or anger toward the United States in its policies. Correct. Which of the following is a good practice to prevent spillage. What should you consider when using a wireless keyboard with your home computer? A. Is this safe? How can you protect your information when using wireless technology? **Social Engineering What action should you take with an e-mail from a friend containing a compressed Uniform Resource Locator (URL)? (2) War planning documents which contain worldwide -- (a) Planning data and assumptions, (b) Wartime planning factors for the use of nuclear weapons, (c) Intelligence estimates of enemy capabilities, (d) Force composition and development, and Your cousin posted a link to an article with an incendiary headline on social media. *Insider Threat Which of the following is a reportable insider threat activity? Correct. **Insider Threat Based on the description that follows, how many potential insider threat indicator(s) are displayed? Controlled Unclassified Information (CUI): Controlled Unclassified information was defined in the Executive Order 13556 as information held by or generated for the Federal Government that requires safeguarding or dissemination controls pursuant to and consistent with applicable law, regulations and government-wide policies that isn't classified Paul verifies that the information is CUI, includes a CUI marking in the subject header, and digitally signs an e-mail containing CUI. Store classified data appropriately in a GSA-approved vault/container when not in use. Follow procedures for transferring data to and from outside agency and non-Government networks. Figure 1. Under What Circumstances Could Unclassified? Which of the following is NOT true of traveling overseas with a mobile phone? Accepting the default privacy settings. Discuss why gases, such as barbecue propane gas, are sold by mass and not by volume. Validate all friend requests through another source before confirming them. (Sensitive Compartmented Information) What portable electronic devices (PEDs) are allow in a Secure Compartmented Information Facility (SCIF)? E-mailing your co-workers to let them know you are taking a sick day. This lets the service person know when the tank is "full." The proper security clearance and indoctrination into the SCI program. Which of the following is NOT a typical result from running malicious code? Only paper documents that are in open storage need to be marked. A colleague is playful and charming, consistently wins performance awards, and is occasionally aggressive in trying to access classified information. After you have returned home following the vacation. Verify the identity of all individuals.??? How can you protect your information when using wireless technology? When gases are sold they are usually compressed to high pressures. Coworker making consistent statements indicative of hostility or anger toward the United States and its policies. Personal information is inadvertently posted at a website. You must possess security clearance eligibility to telework. Which of the following is NOT a social engineering tip? (Spillage) What type of activity or behavior should be reported as a potential insider threat? Which Cyber Protection Condition (CPCON) establishes a protection priority focus on critical functions only? The challenges goal is simple: To change user behavior to reduce the risks and vulnerabilities DoD Information Systems face. **Social Networking As someone who works with classified information, what should you do if you are contacted by a foreign national seeking information on a research project? Which of the following is a practice that helps to prevent the download of viruses and other malicious code when checking your email? **Home Computer Security How can you protect your information when using wireless technology? Which of the following is a good practice to protect classified information? Power off any mobile devices when entering a secure area. Someone calls from an unknown number and says they are from IT and need some information about your computer. Which of the following is true about telework? **Classified Data Which of the following is a good practice to protect classified information? **Insider Threat Based on the description that follows, how many potential insider threat indicator(s) are displayed? Which of the following is a best practice to protect information about you and your organization on social networking sites and applications? Which of the following is NOT an example of Personally Identifiable Information (PII)? Unclassified information is a threat to national security. Which of these is true of unclassified data? What information most likely presents a security risk on your personal social networking profile? **Social Engineering How can you protect yourself from internet hoaxes? When may you be subject to criminal, disciplinary, and/or administrative action due to online harassment, bullying, stalking, hazing, discrimination, or retaliation? Follow instructions given only by verified personnel. Any time you participate in or condone misconduct, whether offline or online. It contains certificates for identification, encryption, and digital signature. Senior government personnel, military or civilian. How many potential insiders threat indicators does this employee display? (Spillage) What is required for an individual to access classified data? **Use of GFE What is a critical consideration on using cloud-based file sharing and storage applications on your Government-furnished equipment (GFE)? Course Introduction Introduction . Spear Phishing attacks commonly attempt to impersonate email from trusted entities. What is the basis for the handling and storage of classified data? 1.1.5 Controlled Unclassified Information. You are reviewing your employees annual self evaluation. *Sensitive Compartmented Information Which must be approved and signed by a cognizant Original Classification Authority (OCA)? DOD Cyber Awareness 2021 (DOD-IAA-V18.0) Know, RT202: Ch. In unsupervised machine learning, clustering is the most common process used to identify and group similar entities or items together. What should you do? CUI is not classified information. Insiders are given a level of trust and have authorized access to Government information systems. not correct. Its classification level may rise when aggregated. Which designation marks information that does not have potential to damage national security? Controlled Unclassified Information (CUI) Purpose of the CUI Program. Thats the only way we can improve. What must authorized personnel do before permitting another individual to enter a Sensitive Compartmented Information Facility (SCIF)? **Insider Threat What function do Insider Threat Programs aim to fulfill? The following table lists the number of drivers in the United States, the number of fatal accidents, and the number of total accidents in each age group in 2002. A colleague vacations at the beach every year, is married and a father of four, sometimes has poor work quality, and works well with his team. What type of social engineering targets particular individuals, groups of people, or organizations? Where. Store it in a GSA approved vault or container. Which is NOT a wireless security practice? Ask the individual to see an identification badge. *Spillage What is a proper response if spillage occurs? There is no way to know where the link actually leads. Debra ensures not correct Classified information that should be unclassified and is downgraded. If you participate in or condone it at any time. (Correct) -It does not affect the safety of Government missions. *Spillage Which of the following is a good practice to prevent spillage? What action should you take? In setting up your personal social networking service account, what email address should you use? How many potential insiders threat indicators does this employee display? You receive an inquiry from a reporter about government information not cleared for public release. (Spillage) When classified data is not in use, how can you protect it? The website requires a credit card for registration. Following instructions from verified personnel. Note the websites URL and report the situation to your security point of contact. *Spillage You find information that you know to be classified on the Internet. They can be part of a distributed denial-of-service (DDoS) attack. Use a common password for all your system and application logons. Malicious code can do the following except? Correct Correct. Classified material must be appropriately marked. Filter by: All $ Off % Off Free Online Offline. Secure .gov websites use HTTPS Correct. That trust is bounded by the Oath of Office we took willingly. Which may be a security issue with compressed urls? Memory sticks, flash drives, or external hard drives. Protection may be required for privacy, law enforcement, contractual protections, or other reasons. Leaked classified or controlled information is still classified/controlled even if it has already been compromised. *Insider Threat Which of the following is a potential insider threat indicator? The Chinese Spy Balloon Showdown The discovery of a Chinese surveillance balloon floating over the United States has added to the rising tensions between the two superpowers. Right-click the link and select the option to preview??? Ensure that any cameras, microphones, and Wi-Fi embedded in the laptop are physically disabled.- Correct. Which of the following is a security best practice for protecting Personally Identifiable Information (PII)? Use only your personal contact information when establishing your account. Always use DoD PKI tokens within their designated classification level. CPCON 5 (Very Low: All Functions). Physically assess that everyone within listening distance is cleared and has a need-to-know for the information being discussed. **Classified Data What is required for an individual to access classified data? What is required for an individual to access classified data? **Website Use Which of the following statements is true of cookies? Which of the following is NOT one? A smartphone that transmits credit card payment information when held in proximity to a credit card reader. **Insider Threat Which type of behavior should you report as a potential insider threat? You should remove and take your CAC/PIV card whenever you leave your workstation. Which of the following does NOT constitute spillage? asked in Internet by voice (265k points) Question : Which of the following is true about unclassified data? Use only personal contact information when establishing personal social networking accounts, never use Government contact information. (removable media) If an incident occurs involving removable media in a Sensitive Compartmented Information Facility (SCIF), what action should you take? Physical security of mobile phones carried overseas is not a major issue. **Mobile Devices What should you do when going through an airport security checkpoint with a Government-issued mobile device? The email provides a website and a toll-free number where you can make payment. cyber. What is the best way to protect your Common Access Card (CAC) or Personal Identity Verification (PIV) card? Information should be secured in a cabinet or container while not in use. What should you do? Appropriate clearance; signed and approved non-disclosure agreement; and need-to-know. ?Access requires Top Secret clearance and indoctrination into SCI program.??? Classified Information can only be accessed by individuals with. (controlled unclassified information) Which of the following is NOT an example of CUI? If you receive a phone call from a stranger asking for information about your invoice payment process, you should: Crucial information about a user or organization can be gained through. Avoid using non-Bluetooth-paired or unencrypted wireless computer peripherals. Correct. Note the websites URL and report the situation to your security point of contact.