Maria received an assignment to support a project that requires access to classified information. Which type of behavior should you report as a potential threat?-Hostility or anger toward the United States and its policies. 0000034293 00000 n Web*Classified Data Which of the following individuals can access classified data?-Darryl is managing a project that requires access to classified information. **Identity managementWhat is the best way to protect your Common Access Card (CAC)? 0000008555 00000 n Darryl is managing a project that requires access to classified information. On June 30, 2018, Jarden Company concludes that a customer's$4,750 receivable (created in 2017) is uncollectible and that the account should be written off. 0000015479 00000 n WebClassified information may be made available to a person only when the possessor of the information establishes that the person has a valid need to know and the access is essential to the accomplishment of official government duties. *Social NetworkingYour cousin posted a link to an article with an incendiary headline on social media. Immediately notify your security point of contact. WebClassified information that should be unclassified and is downgraded. Maintain visual or physical control of the device. You receive a call from someone from the help desk who needs your assistance with a problem on your computer. Regardless of state, data classified as confidential must remain confidential. Compute the payback period for the advertising program. Something you possess like a CAC, and a Pin or Password. 0000006504 00000 n Only persons with appropriate clearance, a non-disclosure agreement, and need-to-know can access classified data. Jarden prepares a schedule of its December 31, 2017, accounts receivable by age. Classified material must be appropriately marked. WebBe aware of classification markings and all handling caveats. WebOnly persons with appropriate clearance, a non-disclosure agreement, and need-to-know can access classified data. Spillage occurs when information is spilled from a higher classification or protection level to a lower classification or protection level. *Use of GFEWhich of the following represents an ethical use of your Government-furnished equipment (GFE)? False Which of the following is NOT sensitive information? What are some actions you can take to try to protect you identity? What information posted publicly on your personal social networking profile represents a security risk? A colleague has won 10 high-performance awards, can be playful and charming, is not currently in a relationship, and is occasionally aggressive in trying to access sensitive information. Data states data exists in one of three statesat rest, in process, or in transit. Refer the reporter to your organization's public affair office. the wine conventions I have attended. \text { Production site } & \text { France } & \text { France } & \text { France } & \text { France } P2P (Peer-to-Peer) software can do the following except: Allow attackers physical access to network assets. *Insider Threat Which type of behavior should you report as a potential insider threat? Sensitive information may be stored on any password-protected system. What is required for an individual to access classified data? Which of the following is a god practice to protect classified information? **Social NetworkingWhich of the following information is a security risk when posted publicly on your social networking profile? Which of the following practices may reduce your appeal as a target for adversaries seeking to exploit you insider status?-Remove your security badge after leaving your controlled area or office building. This information is summarized here. He has the appropriate clearance and a signed approved non-disclosure agreement. Store classified data appropriately in a GSA-approved vault/container. Spillage can be either inadvertent or intentional. industry. Required Users must adhere to the rules of behavior defined in applicable Systems Security Plans, DOL and agency guidance. Create separate user accounts with strong individual passwords. Which of the following is NOT a correct way to protect sensitive information? Which of the following is an example of Protected Health Information (PHI)? At the end of the year, the cost of inventory remaining is $10,000. **TravelWhich of the following is true of traveling overseas with a mobile phone? Prepare the adjusting entry to record bad debts expense at December 31, 2017. Which of the following is a security best practice when using social networking sites?-Turn off Global Positioning System (GPS) before posting pictures of yourself in uniform with identifiable landmarks. 1 Answer 0 votes answered Aug 3, 2022 by kabita (13.8k points) Best answer Only persons with appropriate clearance, a non-disclosure agreement, and need-to At the beginning of the year, Bryers Incorporated reports inventory of $8,000. To protect CUI: Properly mark all CUI In which situation below are you permitted to use your PKI token? Senior government personnel, military or civilian. How many potential insiders threat indicators does this employee display. *SpillageAfter reading an online story about a new security project being developed on the military installation where you work, your neighbor asks you to comment about the article. How many the Cyberspace Protection Conditions (CPCON) are there? \text { (more than 80\% concentration) } & \text { France } & \text { France } & \text { England } & \text { U.S. } \\ Webasked in Internet by voice (265k points) Question : Which of the following is true about unclassified data? On the basis of past experience, it estimates the percent of receivables in each age category that will become uncollectible. What actions should you take upon hearing a discussion involving Sensitive Compartmented Information (SCI) while seated in a cafeteria with an SCI Facility (SCIF)? Which of the following individuals can access classified data? The projected additional sales revenue in year 111 is $75,000\$ 75,000$75,000, with associated expenses of $25,000\$ 25,000$25,000. Difficult life circumstances such as substance abuse, divided loyalty or allegiance to the U.S., and extreme, persistent interpersonal difficulties. Don't talk about work outside your workspace unless it is a specifically designated public meeting environment and is controlled by the event planners. How should you respond to the theft of your identity? Cover sheets will be used to protect classified documents from inadvertent disclosure while in use. Maintain possession of your laptop and other government-furnished equipment (GFE) at all times. *Social EngineeringWhat is a common indicator of a phishing attempt? Senior government personnel, military or civilian. Identify and disclose it with local Configuration/Change Management Control and Property Management authorities. When opening an email, what caution should you use? He has the appropriate clearance and a signed, approved non-disclosure agreement. It displays a label showing maximum classification, date of creation, point of contact, and Change Management 9CM) Control Number. *Controlled Unclassified InformationWhich of the following is NOT a correct way to protect CUI? WebClassified Information can only be accessed by individuals with All of the above Which of the following definitions is true about disclosure of confidential information? Use a common password for all your system and application logons. Damage to national security It is permissible to release unclassified information to the public prior to being cleared. If aggregated, the information could become classified. Lock your device screen when not in use and require a password to reactivate. What action should you take?-Research the source of the article to evaluate its credibility and reliability. VanDriesen tells her that he is a wine connoisseur himself and often makes purchases To protect CUI: Properly mark all CUI 2.2.2. Which of the following is an example of near field communication (NFC)?-A smartphone that transmits credit card payment information when held in proximity to a credit card reader. The cover sheet should be removed prior to placing the document in the files. A random sample of surgical procedures was selected each month for 30 consecutive months, and the number of procedures with postoperative complications was recorded. Protecting CUI . WebWhat is required for an individual to access classified data? **Social NetworkingWhat should you do if you receive a game application request that includes permission to access your friends, profile information, cookies, and sites visited? He has the appropriate clearance and a signed, approved, non-disclosure agreement. Be aware of classification markings and all handling caveats. 0000015315 00000 n He has the appropriate clearance and a signed, approved non-disclosure agreement. *Sensitive Compartmented InformationWhat action should you take if you become aware that Sensitive Compartmented Information (SCI) has been compromised? Electronic Code of Federal Regulations (e-CFR), CHAPTER III - OFFICE OF MANAGEMENT AND BUDGET, PART 1312 - CLASSIFICATION, DOWNGRADING, DECLASSIFICATION AND SAFEGUARDING OF NATIONAL SECURITY INFORMATION, Subpart B - Control and Accountability of Classified Information. Winery as a stuck-in-the-middle firm. Coworker making consistent statements indicative of hostility or anger toward the United States and its policies. *Sensitive Compartmented InformationWhich must be approved and signed by a cognizant Original Classification Authority (OCA)? What should you do? Determine if the software or service is authorized. internet-quiz. Which of the following individuals can access classified data? What is the best response to an incident such as opening an uncontrolled DVD on a computer in a Sensitive Compartmented Information Facility (SCIF)? **Classified DataWhich of the following is true of protecting classified data? Connect to the Government Virtual Private Network (VPN). Physical security of mobile phones carried overseas is not a major issue. *SpillageWhich of the following is a good practice to prevent spillage? WebData classification is the process of organizing data into categories for its most effective and efficient use. A coworker uses a personal electronic device in a secure area where their use is prohibited. *Website UseWhat action should you take with an e-mail from a friend containing a compressed Uniform Resource Locator (URL)? Based on the description that follows, how many potential insider threat indicator(s) are displayed? Data classification helps organizations answer important questions about their data that inform how they mitigate risk and manage data governance policies. Spillage can be either inadvertent or intentional. 0000005958 00000 n ~All documents should be appropriately marked, regardless of format, sensitivity, or classification.Unclassified documents do not need to be marked as a SCIF.Only paper documents that are in open storage need to be marked. Which of the following statements is TRUE about the use of DoD Public Key Infrastructure (PKI) tokens? 0000006207 00000 n Determine if the software or service is authorized, Which of the following is an example of removable media. Since the URL does not start with "https," do not provide you credit card information. wine at a time. *Sensitive Compartmented InformationWhen faxing Sensitive Compartmented Information (SCI), what actions should you take? Classified Information can only be accessed by individuals with -All of the above Classified Information is -Assigned a classification level by a supervisor A coworker has left an unknown CD on your desk. Do not use any personally owned/non-organizational removable media on your organization's systems. WebData classification is the process of organizing data into categories for its most effective and efficient use. WebWhat is required for an individual to access classified data? WebWhich of the following individuals can access classified data Cyber Awareness 2022? **Mobile DevicesWhich of the following is an example of removable media? How should you respond to the theft of your identity?-Notify law enforcement. WebPotential Impact on Organizations and Individuals . **Social EngineeringWhat action should you take with an e-mail from a friend containing a compressed Uniform Resource Locator (URL)? Which of the following is NOT true of traveling overseas with a mobile phone? More than 65% of the business for the French wine industry consists of purchases from He has the appropriate clearance and a signed approved non-disclosure agreement. 0000009864 00000 n Ask for information about the website, including the URL. 0000003786 00000 n Protecting CUI . WebAccess is only permitted to individuals after determining they have a need to know. Need-to-know. Which may be a security issue with compressed URLs? 0000001676 00000 n Which of the following is NOT a way that malicious code spreads? "I'll pass " It may expose the connected device to malware. CostleadershipCostleadershipCostleadershipMajorcustomermarket(morethan80%concentration)FranceFranceEnglandU.S.ProductionsiteFranceFranceFranceFrance\begin{array}{lcccc} data. **Social NetworkingWhich of the following best describes the sources that contribute to your online identity? Damage to national security It is permissible to release unclassified information to the public prior to being cleared. 0000009188 00000 n If the online misconduct also occurs offline~If you participate in or condone it at any timeIf you participate in it while using DoD information systems onlyIf you participate in or condone it during work hours only. **Insider ThreatBased on the description that follows, how many potential insider threat indicator(s) are displayed? How many potential insider threat indicators does a person who is married with two children, vacations at the beach every year, is pleasant to work with, but sometimes has poor work quality display? 0000011226 00000 n Your cousin posted a link to an article with an incendiary headline on social media. Darryl is managing a project that requires access to classified information. WebTheodore is seeking access to classified information that he does not need to know to perform his job duties. Spillage because classified data was moved to a lower classification level system without authorization. Under what circumstances is it acceptable to use your Government-furnished computer to check personal e-mail and do other non-work-related activities? He has the appropriate clearance and a signed approved non-disclosure agreement. Hostility or anger toward the United States and its policies. *Identity ManagementWhat certificates does the Common Access Card (CAC) or Personal Identity Verification (PIV) card contain? Under which circumstances is permitted to share an unclassified draft document with a non-DoD professional discussion group? How many potential insider threat indicators does a coworker who often makes others uneasy by being persistent in trying to obtain information about classified projects to which he has no access, is boisterous about his wife putting them in credit card debt, and often complains about anxiety and exhaustion display? Coworker making consistent statements indicative of hostility or anger toward the United States and its policies. **Use of GFEWhen can you check personal e-mail on your Government-furnished equipment (GFE)? Secure it to the same level as Government-issued systems. Data classification helps organizations answer important questions about their data that inform how they mitigate risk and manage data governance policies. What action should you take? Which of the following is the best example of Personally Identifiable Information (PII)? 0000001327 00000 n Write your password down on a device that only you access (e.g., your smartphone). **Classified DataWhich type of information could reasonably be expected to cause serious damage to national security if disclosed without authorization? Estimate the required balance of the Allowance for Doubtful Accounts at December 31, 2017, using the aging of accounts receivable method. \end{array} What action should you take if you receive a friend request on your social networking website from someone in Germany you met casually at a conference last year? Need-to-know is a determination that an individual requires access to specific classified information in the performance of (or assist in the performance of) lawful and authorized government functions and duties. What type of activity or behavior should be reported as a potential insider threat? How should you respond? Darryl is managing a project that requires access to classified information. **Social EngineeringWhat is a common indicator of a phishing attempt? An example is when an individual with access to classified information shares that vital information with a journalist who then releases it. How many potential insider threat indicators does a person who is playful and charming, consistently win performance awards, but is occasionally aggressive in trying to access sensitive information? 1. Key characteristics of each are cited in Table 12.6. %PDF-1.4 % When is it appropriate to have your securing badge visible with a sensitive compartmented information facility? WebWhich of the following individuals can access classified data Cyber Awareness 2022? Pictures of your petYour birthdayYour hobbies~Your personal e-mail address. -DELETE THE EMAIL. Which of the following should you NOT do if you find classified information on the internet?-Download the information. You receive an email from the Internal Revenue Service (IRS) demanding immediate payment of back taxes of which you were not aware. How many potential insiders threat indicators does this employee display. Government-owned PEDs when expressly authorized by your agency. On a NIPRNet system while using it for a PKI-required task. **Home Computer SecurityHow can you protect your information when using wireless technology? Research the source of the article to evaluate its credibility and reliability. Web*Classified Data Which of the following individuals can access classified data?-Darryl is managing a project that requires access to classified information. Clearance eligibility at the appropriate level. Only use you agency trusted websites. **Insider ThreatHow many potential insider threat indicators does a coworker who often makes others uneasy by being persistent in trying to obtain information about classified projects to which he has no access, is boisterous about his wife putting them in credit card debt, and often complains about anxiety and exhaustion display? What type of activity or behavior should be reported as a potential insider threat? False Which of the following is NOT sensitive information? 0000004517 00000 n A colleague often makes others uneasy with her persistent efforts to obtain information about classified project where she has no need-to-know, is vocal about her husband overspending on credit cards, and complains about anxiety and exhaustion. Sensitive Information: Your cousin posted a link to an article with an incendiary headline on social media. Retrieve classified documents promptly from printers. **Identity managementWhich of the following is an example of a strong password? consolidate in order to survive. New interest in learning a foreign language. Which of the following individuals can access classified data? Which classified level is given to information that could reasonably be expected to cause serious damage to national security? true traveling overseas mobile phone cyber awareness. Spear phishing. What should you do? What are some examples of removable media? *SpillageA user writes down details marked as Secret from a report stored on a classified system and uses those details to draft a briefing on an unclassified system without authorization. Malicious code: The French wine industry is consolidating and consists of only 4 wineries today compared to 10 wineries five years ago. XXXX NOT CORRECT: Remind those involved that such a discussion should not take place in common areas within a SCIF. *Insider Threat Which type of behavior should you report as a potential insider threat? Report the crime to local law enforcement. Which of the following is a god practice to protect classified information? WebData classification is the process of organizing data into categories for its most effective and efficient use. Use antivirus software and keep it up to date. WebWhich of the following individuals can access classified data? *Website UseHow can you protect yourself from internet hoaxes? Is it ok to run it? Darryl is managing a project that requires access to classified information. *Classified Data Which of the following individuals can access classified data? **Classified DataWhich classification level is given to information that could reasonably be expected to cause serious damage to national security? Ask the caller, "What's your full name and phone number?". A coworker has asked if you want to download a programmer's game to play at work.