Mobile devices and applications can track your location without your knowledge or consent. Attempt to change the subject to something non-work related, but neither confirm nor deny the articles authenticity. not correct. Added 8/5/2020 8:06:16 PM. As a security best practice, what should you do before exiting? Looking for https in the URL. Scan external files from only unverifiable sources before uploading to computer. Malicious code can do the following except? Top Secret information could be expected to cause exceptionally grave damage to national security of disclosed. **Identity Management Which of the following is the nest description of two-factor authentication? Software that installs itself without the users knowledge. Right-click the link and select the option to preview??? (Spillage) When classified data is not in use, how can you protect it? Which of the following is NOT a typical result from running malicious code? Federal agencies routinely generate, use, store, and share information that, while not classified, still requires some level of protection from unauthorized access and release. **Social Networking Which of the following statements is true? What action should you take? correct. **Classified Data Which of the following can an unauthorized disclosure of information classified as Confidential reasonably be expected to cause? What kind of information could reasonably be expected to cause serious damage to national security in the event of unauthorized disclosure? Ive tried all the answers and it still tells me off. Unclassified is a security classification assigned to official information that does not warrant the assignment of Confidential, Secret, or Top Secret markings but which is not publicly-releasable without authorization. They can be part of a distributed denial-of-service (DDoS) attack. correct. The email provides a link to a personnel portal where you must enter your personal information as part of an effort to standardize recordkeeping. Attempting to access sensitive information without need-to-know, Avoid talking about work outside of the workplace or with people without a need-to-know, Report the suspicious behavior in accordance with their organizations insider threat policy. (Sensitive Information) What must the dissemination of information regarding intelligence sources, methods, or activities follow? Permitted Uses of Government-Furnished Equipment (GFE). What certificates are contained on the DoD Public Key Infrastructure (PKI) implemented by the Common Access Card (CAC)/Personal Identity Verification (PIV) card? Correct What is an individual's Personally Identifiable Information (PII) or Protected Health Information (PHI) considered? What is a proper response if spillage occurs? What type of security is part of your responsibility and placed above all else?, If your wireless device is improperly configured someone could gain control of the device? Which of the following is NOT true concerning a computer labeled SECRET? Which of the following statements is NOT true about protecting your virtual identity? (Malicious Code) Which are examples of portable electronic devices (PEDs)? (Spillage) What level of damage can the unauthorized disclosure of information classified as confidential reasonably be expected to cause? data. What should you do? Upon connecting your Government-issued laptop to a public wireless connection, what should you immediately do? A .gov website belongs to an official government organization in the United States. All https sites are legitimate and there is no risk to entering your personal info online. Search for an answer or ask Weegy. Which of the following is NOT true of traveling overseas with a mobile phone? Explain. 1.1.5 Controlled Unclassified Information. e. Why do Elodea and onion cells have more consistent shapes than human epithelial cells? You are reviewing your employees annual self evaluation. not correct The Chinese Spy Balloon Showdown The discovery of a Chinese surveillance balloon floating over the United States has added to the rising tensions between the two superpowers. *Sensitive Compartmented Information When is it appropriate to have your security badge visible? Individuals must avoid referencing derivatively classified reports classified higher than the recipient.??? *Spillage You find information that you know to be classified on the Internet. Jozeal. *Spillage A user writes down details marked as Secret from a report stored on a classified system and uses those details to draft a briefing on an unclassified system without authorization. Many apps and smart devices collect and share your personal information and contribute to your online identity. A pop-up window that flashes and warns that your computer is infected with a virus. What should you do? The emission rate of CO 2 from the soils reached the maximum on the 1st day of incubation and the sequence of CO 2 emission rate and cumulative emission under different amendment treatments was as SG > S > G > CK > N (Fig. *Malicious Code Which of the following is NOT a way that malicious code spreads? **Social Networking When may you be subject to criminal, disciplinary, and/or administrative action due to online misconduct? Only friends should see all biographical data such as where Alex lives and works. Rating. (Malicious Code) What are some examples of removable media? **Social Networking Which of the following information is a security risk when posted publicly on your social networking profile? (1) A strategic plan documenting the overall conduct of a war. Appropriate clearance; signed and approved non-disclosure agreement; and need-to-know. Use a common password for all your system and application logons. what should you do? When is it okay to charge a personal mobile device using government-furnished equipment (GFE)? How can you guard yourself against Identity theft? Based on the description that follows, how many potential insider threat indicator(s) are displayed? Note any identifying information and the websites URL. You can email your employees information to yourself so you can work on it this weekend and go home now. Coworker making consistent statements indicative of hostility or anger toward the United States and its policies. CUI is not classified information. Historically, each agency developed its own practices for sensitive unclassified information, resulting in a patchwork of systems across the Executive branch, in which similar information might be defined or labeled differently, or where dissimilar information might share a definition and/or label. There are no choices provides which make it hard to pick the untrue statement about unclassified data. Public service, notably service in the United States Department of Defense or DoD, is a public trust. Let us know if this was helpful. Refer the vendor to the appropriate personnel. A trusted friend in your social network posts a link to vaccine information on a website unknown to you. You are logged on to your unclassified computer and just received an encrypted email from a co-worker. John submits CUI to his organizations security office to transmit it on his behalf. Which of these is true of unclassified data? Controlled Unclassified Information (CUI) Purpose of the CUI Program. How should you securely transport company information on a removable media? Not correct. (Sensitive Compartmented Information) What portable electronic devices (PEDs) are allow in a Secure Compartmented Information Facility (SCIF)? **Classified Data What is required for an individual to access classified data? ?Access requires Top Secret clearance and indoctrination into SCI program.??? Store it in a General Services Administration (GSA)-approved vault or container. Store it in a locked desk drawer after working hours. A colleague has won 10 high-performance awards, can be playful and charming, is not currently in a relationship, and occasionally aggressive in trying to access sensitive information. Delete email from senders you do not know. EPAs CUI Program is responsible for issuing CUI policy, procedures, training, and guidance to program offices and regions, along with providing oversight and reporting on the Agencys progress on meeting NARAs CUI deadlines. **Use of GFE Under what circumstances is it acceptable to use your Government-furnished computer to check personal e-mail and do other non-work-related activities? **Physical Security Within a secure area, you see an individual who you do not know and is not wearing a visible badge. **Insider Threat Based on the description that follows, how many potential insider threat indicator(s) are displayed? Search the Registry: Categories, Markings and Controls: Category list CUI markings Note the websites URL and report the situation to your security point of contact. Prudence faxes CUI using an Unclassified cover sheet via a Secret fax machine. What information posted publicly on your personal social networking profile represents a security risk? Spillage because classified data was moved to a lower classification level system without authorization. You receive an unexpected email from a friend: I think youll like this: https://tinyurl.com/2fcbvy. What action should you take? Avoid using non-Bluetooth-paired or unencrypted wireless computer peripherals. Coworker making consistent statements indicative of hostility or anger toward the United States in its policies. A type of phishing targeted at senior officials. Research the source to evaluate its credibility and reliability. Click the card to flip Flashcards Learn Test Match Created by Jamie_Lancaster Terms in this set (24) Access requires a formal need-to-know determination issued by the Director of National Intelligence.? The physical security of the device. Teams. THIS IS THE BEST ANSWER . -Its classification level may rise when aggregated. General Services Administration (GSA) approval. internet-quiz. (Spillage) What advantages do insider threats have over others that allows them to cause damage to their organizations more easily? **Social Networking When is the safest time to post details of your vacation activities on your social networking profile? 1.1 Standard Challenge Answers. The EPAs Controlled Unclassified Information (CUI) Program issued its Interim CUI Policy in December 2020. **Identity management Which is NOT a sufficient way to protect your identity? Controlled Unclassified Information (CUI) is information that requires safeguarding or dissemination controls consistent with applicable laws, regulations, and Government-wide policies, but is not classified under Executive Order 13526 "Classified National Security Informat What are examples of CUI? Cyber Awareness Challenge Knowledge Check 2023 Answers, Cyber Awareness Challenge 2022 Knowledge Check Answers. Try this test to determine if it's considered unclassified, classified or protected, and check out tips on what to do and what not to do when working with sensitive information. (Malicious Code) Which of the following is true of Internet hoaxes? How many potential insider threat indicators does this employee display? Leaked classified or controlled information is still classified/controlled even if it has already been compromised. All to Friends Only. What level of damage to national security could reasonably be expected if unauthorized disclosure of Top Secret information occurred? which of the following is true about unclassified data. Which of the following is not considered an example of data hiding? Which of the following can an unauthorized disclosure of information classified as Confidential reasonably be expected to cause? Your comments are due on Monday. Always use DoD PKI tokens within their designated classification level. *Sensitive Information Which of the following is an example of Protected Health Information (PHI)? However, agency personnel and contractors should first consult their agency's CUI implementing policies and program management for guidance. **Classified Data What level of damage can the unauthorized disclosure of information classified as Confidential reasonably be expected to cause? How many potential insiders threat indicators does this employee display? (Identity Management) What certificates are contained on the Common Access Card (CAC)? A vendor conducting a pilot program with your organization contacts you for organizational data to use in a prototype. You find information that you know to be classified on the Internet. Use the classified network for all work, including unclassified work. Which of the following is NOT a typical means for spreading malicious code? Proactively identify potential threats and formulate holistic mitigation responses. What action should you take? Store it in a shielded sleeve to avoid chip cloning. Media containing Privacy Act information, PII, and PHI is not required to be labeled. 1 Answer/Comment. A colleague complains about anxiety and exhaustion, makes coworkers uncomfortable by asking excessive questions about classified projects, and complains about the credit card bills that his wife runs up. When unclassified data is aggregated, its classification level may rise. Which is NOT a wireless security practice? In which situation below are you permitted to use your PKI token? b. Badges must be visible and displayed above the waist at all times when in the facility. Ensure proper labeling by appropriately marking all classified material and, when required, sensitive material. You have reached the office door to exit your controlled area. What is the best choice to describe what has occurred? Identify and disclose it with local Configuration/Change Management Control and Property Management authorities. What is a best practice for protecting controlled unclassified information (CUI)? Attempt to change the subject to something non-work related, but neither confirm nor deny the articles authenticity. Which of the following is NOT considered sensitive information? Which is a good practice to protect classified information? Which of the following is a good practice to avoid email viruses? Dont assume open storage in a secure facility is authorized Maybe. Share sensitive information only on official, secure websites. They can become an attack vector to other devices on your home network. *Social Networking CUI may be stored only on authorized systems or approved devices. Note the websites URL and report the situation to your security point of contact. (Correct)-It does not affect the safety of Government missions.-It never requires classification markings. What information should you avoid posting on social networking sites? Which of the following personally-owned computer peripherals is permitted for use with Government-furnished equipment? You must have your organization's permission to telework c. You may use unauthorized software as long as your computer's antivirus software is up to date. Who is responsible for information/data security? How many potential insider threat indicators is Bob displaying? true-statement. When using your government-issued laptop in public environments, with which of the following should you be concerned? Is this safe? Confirm the individuals need-to-know and access. **Social Engineering Which is a best practice that can prevent viruses and other malicious code from being downloaded when checking your e-mail? Briefly describe what you have learned. Which of the following is not considered a potential insider threat indicator? Monitor credit card statements for unauthorized purchases, Thumb drives, memory sticks, and flash drives are examples of. Were mitochondria as abundant in human epithelial cells as in onion epidermal cells (procedure 4.6)? Ensure proper labeling by appropriately marking all classified material and, when required, sensitive material. A A headset with a microphone through a Universal Serial Bus (USB) port. How should you respond? Executive Order 13556, Controlled Unclassified Information, requires the Executive Branch to establish an open and uniform program for managing [unclassified] information that requires safeguarding or dissemination controls pursuant to and consistent with laws, regulations, and Government-wide policies. The National Archives and Records Administration (NARA) was named the Executive Agent (EA) responsible for overseeing the CUI Program. Which of the following best describes the sources that contribute to your online identity. Only expressly authorized government-owned PEDs. Exceptionally grave damage to national security. Which of the following is true of telework? Under which circumstances may you be subject to criminal, disciplinary, and/or administrative action due to online misconduct? **Identity management Which of the following is an example of two-factor authentication? Which of the following may be helpful to prevent inadvertent spillage? What should you do? You know this project is classified. If you receive a phone call from a stranger asking for information about your invoice payment process, you should: Crucial information about a user or organization can be gained through. the following is true about unclassified data fy23 controlled unclassified information cui quizlet what is true of controlled unclassified information What. Third, the neighbor ground points of an unclassified point are searched from multiple subspaces. Which of the following represents an ethical use of your Government-furnished equipment (GFE)? Which of the following must you do before using an unclassified laptop and peripherals in a collateral classified environment? Only allow mobile code to run from your organization or your organizations trusted sites. What is required for an individual to access classified data? Of the following, which is NOT a problem or concern of an Internet hoax? -Classified information that should be unclassified and is downgraded. A colleague abruptly becomes hostile and unpleasant after previously enjoying positive working relationships with peers, purchases an unusually expensive new car, and has unexplained absences from work. Discuss why gases, such as barbecue propane gas, are sold by mass and not by volume. Within a secure area, you see an individual you do not know. Maria is at home shopping for shoes on Amazon.com. Which of the following is true of Unclassified Information? cyber-awareness. Which piece of information is safest to include on your social media profile? which of the following is true about unclassified data. You many only transmit SCI via certified mail. Any time you participate in or condone misconduct, whether offline or online. Which of the following best describes wireless technology? What level of damage can the unauthorized disclosure of information classified as confidential reasonably be expected to cause? Which of the following is true of traveling overseas with a mobile phone. What portable electronic devices (PEDs) are permitted in a SCIF? Always use DoD PKI tokens within their designated classification level. Which of the following is a best practice for physical security? Is it okay to run it? Taking classified documents from your workspace. Memory sticks, flash drives, or external hard drives. Maintain possession of your laptop and other government-furnished equipment (GFE) at all times. Before long she has also purchased shoes from several other websites. What does Personally Identifiable information (PII) include? Being cognizant of classification markings and labeling practices are good strategies to avoid inadvertent spillage. Which of the following is NOT a potential insider threat? Follow the steps enlisted below to use WEKA for identifying real values and nominal attributes in the dataset. A program that segregates various types of classified information into distinct compartments for added protection and dissemination or distribution control. What is a security best practice to employ on your home computer? *Insider Threat Which of the following is a potential insider threat indicator? Which of the following statements is TRUE about the use of DoD Public Key Infrastructure (PKI) tokens? Quizzma is a free online database of educational quizzes and test answers. (Malicious Code) Which email attachments are generally SAFE to open? You are leaving the building where you work. **Social Engineering Which of the following is a practice that helps to prevent the download of viruses and other malicious code when checking your email? What should you do? You receive an email from the Internal Revenue Service (IRS) demanding immediate payment of back taxes of which you were not aware. If classified information were released, which classification level would result in Exceptionally grave damage to national security? (Spillage) What type of activity or behavior should be reported as a potential insider threat? Correct. You should only accept cookies from reputable, trusted websites. Which of the following is NOT sensitive information? **Mobile Devices What should you do when going through an airport security checkpoint with a Government-issued mobile device? b. taking away a toy or treat Ensure proper labeling by appropriately marking all classified material and, when required, sensitive material. Which of the following is true about unclassified data? What should be your response? Which of the following is a security best practice when using social networking sites? Set hasDigit to true if the 3-character passCode contains a digit, Critical, Essential, and Support Functions. The following table lists the number of drivers in the United States, the number of fatal accidents, and the number of total accidents in each age group in 2002. Neither confirm or deny the information is classified. What describes how Sensitive Compartmented Information is marked? What level of damage to national security could reasonably be expected if unauthorized disclosure of Top Secret information occurred? A colleague saves money for an overseas vacation every year, is a . *Sensitive Compartmented Information What is a Sensitive Compartmented Information (SCI) program? CUI may be stored on any password-protected system. Keeping a database from being accessed by unauthorized visitors C. Restricting a subject at a lower classification level from accessing data at a higher classification level D. Preventing an . It does not require markings or distribution controls. Ask for information about the website, including the URL. d. giving a spanking or a scolding. **Social Networking When is the safest time to post details of your vacation activities on your social networking website? No. Which of the following is true about telework? (Mobile Devices) Which of the following statements is true? What is the best choice to describe what has occurred? **Social Engineering Which may be a security issue with compressed Uniform Resource Locators (URLs)? It never requires classification markings, is true about unclassified data. CUI is an umbrella term that encompasses many different markings toidentifyinformationthat is not classified but which should be protected. **Insider Threat A colleague vacations at the beach every year, is married and a father of four, his work quality is sometimes poor, and he is pleasant to work with. T/F. The website requires a credit card for registration. They may be used to mask malicious intent. (Malicious Code) What is a common indicator of a phishing attempt? What information most likely presents a security risk on your personal social networking profile? Which of the following is an example of malicious code? A type of phishing targeted at high-level personnel such as senior officials. Which of the following is a concern when using your Government-issued laptop in public? If aggregated, the information could become classified. What should you do? Which is NOT a way to protect removable media? While you are registering for a conference, you arrive at the website http://www.dcsecurityconference.org/registration/. Which method would be the BEST way to send this information? Which of the following is NOT a type of malicious code? When is the best time to post details of your vacation activities on your social networking website? Linda encrypts all of the sensitive data on her government-issued mobile devices. See the discussed example before. Your password and a code you receive via text message. Alexa May, director of accounts, received a bill for $648\$648$648, dated April 666, with sales terms 2/10,1/15,n/302/10, 1/15, n/302/10,1/15,n/30. How should you respond? **Identity management Which of the following is an example of a strong password? Which of the following is true about unclassified data? Everything you need to know aboutControlled UnclassifiedInformation(CUI).
Aduana De Ojinaga Telefono, Articles W