endstream endobj 321 0 obj <>/Filter/FlateDecode/Index[54 236]/Length 31/Size 290/Type/XRef/W[1 1 1]>>stream <]/Prev 103435/XRefStm 1327>> No, you should only allow mobile code to run from your organization or your organization's trusted sites. Secure it to the same level as Government-issued systems. *Website UseWhat action should you take with an e-mail from a friend containing a compressed Uniform Resource Locator (URL)? Compute the payback period for the advertising program. **Removable Media in a SCIFWhat must users ensure when using removable media such as compact disk (CD)? To protect CUI: Properly mark all CUI *Sensitive Compartmented InformationWhat guidance is available for marking Sensitive Compartmented Information (SCI)? Darryl is managing a project that requires access to classified information. WebData classification is the process of organizing data into categories for its most effective and efficient use. He has the appropriate clearance and a signed, approved, non-disclosure agreement. Government owned PEDs if expressed authorized by your agency. **Insider ThreatWhat type of activity or behavior should be reported as a potential insider threat? 1. WebWhich of the following individuals can access classified data? What is required for an individual to access classified data? **Social EngineeringWhich is a best practice that can prevent viruses and other malicious code from being downloaded when checking your e-mail? Attempting to access sensitive information without a need-to-know. FranceFranceNorthWinery1903CostleadershipFranceFranceEastWinery1812CostleadershipEnglandFranceWestWinery1947CostleadershipU.S.France. Estimate the required balance of the Allowance for Doubtful Accounts at December 31, 2017, using the aging of accounts receivable method. What action should you take? *Spillage.What should you do if a reporter asks you about potentially classified information on the web? Which of the following is NOT considered a potential insider threat indicator? Under what circumstances could unclassified information be considered a threat to national security? Structured data are usually human readable and can be indexed. %%EOF Darryl is managing a project that requires access to classified information. 0000001952 00000 n WebClassified Information can only be accessed by individuals with All of the above Which of the following definitions is true about disclosure of confidential information? How many potential insiders threat indicators does this employee display. The end WebBe aware of classification markings and all handling caveats. **TravelWhat security risk does a public Wi-Fi connection pose? Avoid using non-Bluetooth-paired or unencrypted wireless computer peripherals. 1 answer. **Identity ManagementWhich of the following is the nest description of two-factor authentication? review. 0000006504 00000 n INSCOM Intelligence Oversight and Compliance, Identifying and Safeguarding PII V4.0 (2022), Level I Antiterrorism Awareness Training Oct., Elliot Aronson, Robin M. Akert, Samuel R. Sommers, Timothy D. Wilson, Anderson's Business Law and the Legal Environment, Comprehensive Volume, David Twomey, Marianne Jennings, Stephanie Greene, Operations Management: Sustainability and Supply Chain Management, Service Management: Operations, Strategy, and Information Technology. **Removable Media in a SCIFWhat action should you take when using removable media in a Sensitive Compartmented Information Facility (SCIF)? **Physical SecurityWithin a secure area, you see an individual who you do not know and is not wearing a visible badge. How can you protect yourself from internet hoaxes? true-statement. Users must adhere to the rules of behavior defined in applicable Systems Security Plans, DOL and agency guidance. Users must adhere to the rules of behavior defined in applicable Systems Security Plans, DOL and agency guidance. In the body of Smiths report, she *Mobile DevicesWhat can help to protect the data on your personal mobile device? In order to access this information, these individuals must have security clearance from the appropriate government agency. into distinct operating units, with each unit pursuing a different competitive strategy. Smith A colleague complains about anxiety and exhaustion, makes coworkers uncomfortable by asking excessive questions about classified projects, and complain about the credit card bills that his wife runs up. He has the appropriate clearance and a signed, approved non-disclosure agreement. What type of unclassified material should always be marked with a special handling caveat? **Physical SecurityWhich Cyber Protection Condition (CPCON) is the priority focus on critical and essential functions only? *Sensitive Compartmented InformationWhat action should you take if you become aware that Sensitive Compartmented Information (SCI) has been compromised? Which of the following is a security best practice when using social networking sites?-Turn off Global Positioning System (GPS) before posting pictures of yourself in uniform with identifiable landmarks. WebBe aware of classification markings and all handling caveats. WebThis information can come in the form of, but is not limited to, podcasts, print articles, internet-based articles, books, journals, speeches, television broadcasts, blogs, and postings. **Insider ThreatWhich of the following is NOT considered a potential insider threat indicator? It appears that participants in the French wine industry must Ensure proper labeling by appropriately marking all classified material and, when required, sensitive material. 0000011071 00000 n 0000001676 00000 n Classified Information can only be accessed by individuals with -All of the above Classified Information is -Assigned a classification level by a supervisor A coworker has left an unknown CD on your desk. WebDOL internal policy specifies the following security policies for the protection of PII and other sensitive data: It is the responsibility of the individual user to protect data to which they have access. (notify security POC, analysis of media for virus and malicious code, and analyze other workstations in the scif). *Sensitive Compartmented InformationWhen should documents be marked within a Sensitive Compartmented Information Facility (SCIF). Since the URL does not start with "https," do not provide you credit card information. **TravelWhat is a best practice while traveling with mobile computing devices? Smiths report identifies four wineries that are the major players in the French wine He has the appropriate clearance and a signed approved non-disclosure agreement. When is the safest time to post details of your vacation activities on your social networking website? Explain. **Social NetworkingAs someone who works with classified information, what should you do if you are contacted by a foreign national seeking information on a research project? P2P (Peer-to-Peer) software can do the following except: Allow attackers physical access to network assets. When is conducting a private money-making venture using your Government-furnished computer permitted? She notes that Only persons with appropriate clearance, a non-disclosure agreement, and need-to-know can access classified data. Something you possess, like a CAC, and something you know, like a PIN or password. **Social EngineeringHow can you protect yourself from internet hoaxes? He has the appropriate clearance and a signed, approved, non-disclosure agreement. Hostility or anger toward the United States and its policies. How can you guard yourself against Identity theft? Electronic Code of Federal Regulations (e-CFR), CHAPTER III - OFFICE OF MANAGEMENT AND BUDGET, PART 1312 - CLASSIFICATION, DOWNGRADING, DECLASSIFICATION AND SAFEGUARDING OF NATIONAL SECURITY INFORMATION, Subpart B - Control and Accountability of Classified Information. On the basis of past experience, it estimates the percent of receivables in each age category that will become uncollectible. to examine the competitive strategies employed by various French wineries. bargaining power over the industry? internet-quiz. *Website UseHow can you protect yourself from internet hoaxes? true traveling overseas mobile phone cyber awareness. What actions should you take upon hearing a discussion involving Sensitive Compartmented Information (SCI) while seated in a cafeteria with an SCI Facility (SCIF)? *Social NetworkingWhich of the following is a security best practice when using social networking sites? Data states data exists in one of three statesat rest, in process, or in transit. 0000000975 00000 n Which of the following individuals can access classified data? *Removable Media in a SCIFWhat action should you take when using removable media in a Sensitive Compartmented Information Facility (SCIF)? (do NOT click links or respond before verifying it is legitimate). A colleague complains about anxiety and exhaustion, makes coworkers uncomfortable by asking excessive questions about classified projects, and complain about the credit card bills that his wife runs up. Based on the description that follows, how many potential insider threat indicator(s) are displayed? Clearance eligibility at the appropriate level. Web*Classified Data Which of the following individuals can access classified data?-Darryl is managing a project that requires access to classified information. Baker was Ms. Jones's psychiatrist for three months. Is it ok to run it? Try to observe the direction taken and any other useful information and immediately make a report to your security point of contact. Which of the following individuals can access classified data? **Physical SecurityWhat is a good practice for physical security? Web(a) No person may be given access to classified information or material originated by, in the custody, or under the control of the Department, unless the person - (1) Has been determined to be eligible for access in accordance with sections 3.1-3.3 of Executive Order 12968; (2) Has a demonstrated need-to-know; and (3) Has signed an approved nondisclosure Which of the following individuals can access classified data? She supports this conclusion with five key points, which she labels Bargaining Power of What type of activity or behavior should be reported as a potential insider threat? read opinions from other customers, and identify which producers have the best prices. . A colleague has won 10 high-performance awards, can be playful and charming, is not currently in a relationship, and is occasionally aggressive in trying to access sensitive information. You should only accept cookies from reputable, trusted websites. WebTheodore is seeking access to classified information that he does not need to know to perform his job duties. Which of the following is NOT a correct way to protect sensitive information? Which is true for protecting classified data? Hostility or anger toward the United States and its policies. *Insider Threat Which type of behavior should you report as a potential insider threat? An individual can be granted access to classified information provided the person has been in the Armed Services for 10 years. Which of the following individuals can access classified data? Immediately notify your security POC. An example is when an individual with access to classified information shares that vital information with a journalist who then releases it. Need-to-know is a determination that an individual requires access to specific classified information in the performance of (or assist in the performance of) lawful and authorized government functions and duties. 2.2.2. When having a conversation involving SCI, what must you do before verbally discussing things aloud? Suggestions for dealing with these problems include encouraging the View e-mail in plain text and don't view e-mail in Preview Pane. cyber-awareness. A colleague has won 10 high-performance awards, can be playful and charming, is not currently in a relationship, and is occasionally aggressive in trying to access sensitive information. *Use of GFEWhich of the following represents an ethical use of your Government-furnished equipment (GFE)? What are some actions you can take to try to protect your identity? Which of the following can an unauthorized disclosure of information classified as Confidential reasonably be expected to cause? WebOnly persons with appropriate clearance, a non-disclosure agreement, and need-to-know can access classified data. **Social EngineeringWhat is TRUE of a phishing attack? Based on the description that follows, how many potential insider threat indicator(s) are displayed? **TravelWhich of the following is true of traveling overseas with a mobile phone? What action should you take? Only persons with appropriate clearance, a non-disclosure agreement, and need-to-know can access classified data. The projected additional sales revenue in year 111 is $75,000\$ 75,000$75,000, with associated expenses of $25,000\$ 25,000$25,000. Restaurants typically make purchases in bulk, buying four to five cases of JKO Department of Defense (DoD) Cyber Awareness Challenge 2022, JKO DOJ Freedom of Information Act (FOIA) Training for Federal Employees, JKO DoD Performance Management and Appraisal Program (DPMAP) . WebWhich of the following individuals can access classified data Cyber Awareness 2022? Winery as a stuck-in-the-middle firm. 0000001327 00000 n makes a note to do more research on generic competitive strategies to verify VanDriesens Maria received an assignment to support a project that requires access to classified information. Who can be permitted access to classified data? 0000002497 00000 n What is a proper response if spillage occurs. Clearance eligibility at the appropriate level. 2. 290 33 What must you ensure before transmitting Personally Identifiable Information (PII) or Protected Health Information (PHI) via e-mail? Classified material must be appropriately marked. Sensitive information may be stored on any password-protected system. When may you be subject to criminal, disciplinary, and/or administrative action due to online misconduct? You must have permission from your organization. e. Calculate the critical boundaries for the p-chart (i.e., UCL, LCL, Upper AB boundary, etc.). **Social NetworkingWhen is the safest time to post details of your vacation activities on your social networking profile? Which of the following is an example of Protected Health Information (PHI)? Insiders are given a level of trust and have authorized access to Government information systems. A colleague is playful and charming, consistently wins performance awards, and is occasionally aggressive in trying to access classified information. What is a way to prevent the download of viruses and other malicious code when checking your e-mail? What is the best way to protect your Common Access Card (CAC)? consolidate in order to survive. Create separate user accounts with strong individual passwords. On a NIPRNet system while using it for a PKI-required task. Characteristics of four major French wineries, SouthWineryNorthWineryEastWineryWestWineryFoundingdate1750190318121947Genericcompetitivestrategy? Calculate cost of goods sold for for the year. Note any identifying information and the website's Uniform Resource Locator (URL). A coworker removes sensitive information without authorization. Which of the following is NOT an appropriate way to protect against inadvertent spillage?-Use the classified network for all work, including unclassified work. WebClassified information may be made available to a person only when the possessor of the information establishes that the person has a valid need to know and the access is essential to the accomplishment of official government duties. The website requires a credit card for registration. Mary Smith, a Level II CFA candidate, was recently hired for an analyst position at the Bank of Ireland. **Social EngineeringWhich may be a security issue with compressed Uniform Resource Locators (URLs)? the wine conventions I have attended. *SpillageWhich of the following actions is appropriate after finding classified information on the internet? trailer As Chinas growth slows, income inequality speeds up Which of the following individuals can access classified data 2022? *SpillageWhich of the following actions is appropriate after finding classified information on the Internet? Which of the following practices reduces the chance of becoming a target by adversaries seeking insider information? WebDOL internal policy specifies the following security policies for the protection of PII and other sensitive data: It is the responsibility of the individual user to protect data to which they have access. How should you respond? A user writes down details from a report stored on a classified system **Classified DataWhich of the following is true of protecting classified data? What action should you take?-Research the source of the article to evaluate its credibility and reliability. Use only your personal contact information when establishing your account, *Controlled Unclassified InformationSelect the information on the data sheet that is personally identifiable information (PII) but not protected health information (PHI), Jane JonesSocial Security Number: 123-45-6789, *Controlled Unclassified InformationSelect the information on the data sheet that is protected health information (PHI), Interview: Dr. Nora BakerDr. -Put the CD in the trash DoD employees are prohibited from using a DoD CAC in card-reader-enabled public devices. 0000005321 00000 n He has the appropriate clearance and a signed, approved non-disclosure agreement. How should you respond to the theft of your identity?-Notify law enforcement. What does Personally Identifiable Information (PII) include? If you participate in or condone it at any time. CostleadershipCostleadershipCostleadershipMajorcustomermarket(morethan80%concentration)FranceFranceEnglandU.S.ProductionsiteFranceFranceFranceFrance\begin{array}{lcccc} When classified data is not in use, how can you protect it? Difficult life circumstances such as substance abuse, divided loyalty or allegiance to the U.S., and extreme, persistent interpersonal difficulties. Use online sites to confirm or expose potential hoaxes, social engineering that is targeted at individuals, groups or organizations, Which of the following is a concern when using your government-issued laptop in public. What is the best choice to describe what has occurred? **Social NetworkingYour cousin posted a link to an article with an incendiary headline on social media. Which of the following is a god practice to protect classified information? Write your password down on a device that only you access (e.g., your smartphone). Cover sheets will be used to protect classified documents from inadvertent disclosure while in use. Which of the following is a way to protect against social engineering? The popup asks if you want to run an application. -Put the CD in the trash DoD employees are prohibited from using a DoD CAC in card-reader-enabled public devices. **Social NetworkingWhen may you be subject to criminal, disciplinary, and/or administrative action due to online misconduct? What should you do? 0000001509 00000 n *Sensitive Compartmented InformationWhich must be approved and signed by a cognizant Original Classification Authority (OCA)? To protect CUI: Properly mark all CUI data. WebYou must have your organizations permission to telework. Darryl is managing a project that requires access to classified information. This includes government officials, military personnel, and intelligence analysts. by producing wine in bottles with curved necks, which increases its cost structure. Structured data are usually human readable and can be indexed. After clicking on a link on a website, a box pops up and asks if you want to run an application. **Social NetworkingWhich of the following best describes the sources that contribute to your online identity? Only expressly authorized government-owned PEDs. Structured data are usually human readable and can be indexed. Web(a) No person may be given access to classified information or material originated by, in the custody, or under the control of the Department, unless the person - (1) Has been determined to be eligible for access in accordance with sections 3.1-3.3 of Executive Order 12968; (2) Has a demonstrated need-to-know; and (3) Has signed an approved nondisclosure Which of the following is a best practice for physical security? Medical Ethics and Detainee Operations Basic Course (5hrs) . Memory sticks, flash drives, or external hard drives. VanDriesen tells her that he is a wine connoisseur himself and often makes purchases 0000002934 00000 n cyber. process is scarce in France. -Darryl is managing a project that requires access to classified information. *Sensitive Compartmented InformationWhat should the owner of this printed SCI do differently? Call your security point of contact immediately. *Insider Threat Which type of behavior should you report as a potential insider threat? *Sensitive Compartmented InformationWhat should the participants in this conversation involving SCI do differently? Coworker making consistent statements indicative of hostility or anger toward the United States and its policies. **Social NetworkingWhich of the following is a security best practice when using social networking sites? Webasked in Internet by voice (265k points) Question : Which of the following is true about unclassified data? Spear phishing. 0000009864 00000 n *Home Computer SecurityWhich of the following statements is true of using Internet of Things (IoT) devices in your home? **Identity managementWhich of the following is an example of two-factor authentication? How can you protect yourself from social engineering?-Follow instructions given only by verified personnel. What is a security best practice to employ on your home computer? I believe that the South Winery could succeed at following both a cost leadership and a differentiation strategy if its operations were separated \end{array} 0000003201 00000 n Call your security point of contact immediately. *Insider Threat Which type of behavior should you report as a potential insider threat? A colleague saves money for an overseas vacation every year, is a single father, and occasionally consumes alcohol. Data classification helps organizations answer important questions about their data that inform how they mitigate risk and manage data governance policies. What is the best response to an incident such as opening an uncontrolled DVD on a computer in a Sensitive Compartmented Information Facility (SCIF)? He has the appropriate clearance and a signed approved non-disclosure agreement. When your vacation is over, after you have returned home. *TravelWhat security risk does a public Wi-Fi connection pose? 0000000016 00000 n 290 0 obj <> endobj *SpillageWhich of the following may help to prevent spillage? **Classified DataWhich classification level is given to information that could reasonably be expected to cause serious damage to national security? Don't talk about work outside your workspace unless it is a specifically designated public meeting environment and is controlled by the event planners. Data classification is the process of analyzing structured or unstructured data and organizing it into categories based on file type, contents, and other metadata. Do not access website links, buttons, or graphics in e-mail. *Home Computer SecurityWhich of the following is a best practice for securing your home computer?-Create separate accounts for each user. It may expose the connected device to malware. WebStore classified data appropriately in a GSA-approved vault/container. Increasing sales over the Internet have allowed consumers to better research the wines, **Classified DataWhat is required for an individual to access classified data? cyber. Web(a) No person may be given access to classified information or material originated by, in the custody, or under the control of the Department, unless the person - (1) Has been determined to be eligible for access in accordance with sections 3.1-3.3 of Executive Order 12968; (2) Has a demonstrated need-to-know; and (3) Has signed an approved nondisclosure