You receive an email from the Internal Revenue Service (IRS) demanding immediate payment of back taxes of which you were not aware. A colleague asks to leave a report containing Protected Health Information (PHI) on his desk overnight so he can continue working on it the next day. ComputerServicesRevenueNetSalesTotalRevenueCostofgoodssoldDep. Senior government personnel, military or civilian. You must possess security clearance eligibility to telework. 11 0 obj View e-mail in plain text and don't view e-mail in Preview Pane. endobj How can you protect your information when using wireless technology? After clicking on a link on a website, a box pops up and asks if you want to run an application. 2 0 obj How can you protect yourself from internet hoaxes? 0000001952 00000 n 13 0 obj Which is an untrue statement about unclassified data? -If aggregated, the classification of the information may not be changed. What threat do insiders with authorized access to information or information Systems pose?? A colleague has won 10 high-performance awards, can be playful and charming, is not currently in a relationship, and is occasionally aggressive in trying to access sensitive information. -Remove security badge as you enter a restaurant or retail establishment. Since the URL does not start with https, do not provide your credit card information. Students also viewed hb```b``a`e`b`@ x`d`XV461ql04F;N8J(^ 1dIi&:=qA@ 1UPn l&% %@,f42@fg!s-fN+L! It may expose the connected device to malware. What portable electronic devices (PEDs) are allowed in a Secure Compartmented Information Facility (SCIF)? When faxing Sensitive Compartmented Information (SCI), what actions should you take? *TravelWhat security risk does a public Wi-Fi connection pose? You are logged on to your unclassified computer and just received an encrypted email from a co-worker. trailer What information most likely presents a security risk on your personal social networking profile? Which of the following statements is TRUE about the use of DoD Public Key Infrastructure (PKI) tokens? When is the best time to post details of your vacation activities on your social networking website? It is getting late on Friday. *Mobile DevicesWhich of the following is an example of removable media? \text{Advertising expense}&600\\ Which of the following is NOT true of traveling overseas with a mobile phonePhysical security of mobile phones carried overseas is not a major issue. -is only allowed if the organization permits it. He has the appropriate clearance and a signed, approved non-disclosure agreement. **Insider ThreatWhich of the following should be reported as a potential security incident? endobj A coworker brings a personal electronic device into a prohibited area. Since the URL does not start with "https," do not provide you credit card information. When is it appropriate to have your security badge visible within a Sensitive Compartmented Information Facility (SCIF)? If aggregated, the information could become classified. You receive a call on your work phone and you're asked to participate in a phone survey. Which of the following practices may reduce your appeal as a target for adversaries seeking to exploit you insider status?-Remove your security badge after leaving your controlled area or office building. -Store it in a shielded sleeve to avoid chip cloning. Which is NOT a sufficient way to protect your identity? *SOCIAL ENGINEERING*What action should you take with an e-mail from a friend containing a compressed Uniform Resource Locator (URL)? -Delete email from senders you do not know. *Sensitive Compartmented InformationWhat must the dissemination of information regarding intelligence sources, methods, or activities follow? **Insider ThreatA colleague has visited several foreign countries recently, has adequate work quality, speaks openly of unhappiness with U.S. foreign policy, and recently had his car repossessed. *Sensitive Compartmented InformationWhat guidance is available for marking Sensitive Compartmented Information (SCI)? Protecting CUI . Research the source of the article to evaluate its credibility and reliability. **Classified DataWhat is required for an individual to access classified data? endobj On a NIPRNet system while using it for a PKI-required task. Which of the following individuals can access classified data? What should you do? [ 13 0 R] Who can be permitted access to classified data? Which of the following terms refers to harm inflicted on national security through authorized access to information or information systems? You are leaving the building where you work. Determine if the software or service is authorized. What does Personally Identifiable Information (PII) include? How can you protect yourself from social engineering?-Follow instructions given only by verified personnel. **Classified DataWhat is a good practice to protect classified information? Note any identifying information, such as the website's URL, and report the situation to your security POC. Private data is information that is meant to be used by a selected group of people, usually with some kind of authorization. \text{Wages expense}&3,250\\ *SpillageWhich of the following may help prevent inadvertent spillage? He has the appropriate clearance and a signed approved non-disclosure agreement. *Classified Data Which of the following individuals can access classified data? endobj Bundle contains 9 documents. What is a possible indication of a malicious code attack in progress? **Identity managementWhich is NOT a sufficient way to protect your identity? <> -Connect to the Government Virtual Private Network (VPN).?? 4 0 obj Which of the following is NOT a social engineering tip? A pop-up window that flashes and warns that your computer is infected with a virus. Store classified data appropriately in a GSA-approved vault/container. You receive an email from the Internal Revenue Service (IRS) demanding immediate payment of back taxes of which you were not aware. How many potential insider threat indicators is Bob displaying? What action should you take first? -You must have your organization's permission to telework. **Social EngineeringWhich is a best practice that can prevent viruses and other malicious code from being downloaded when checking your e-mail? A colleague has won 10 high-performance awards, can be playful and charming, is not currently in a relationship, and occasionally aggressive in trying to access sensitive information. Identification, encryption, digital signature. Ask for information about the website, including the URL. He has the appropriate clearance and a signed, approved, non-disclosure agreement. -Classified material must be appropriately marked. What certificates are contained on the DoD Public Key Infrastructure (PKI) implemented by the Common Access Card (CAC)/Personal Identity Verification (PIV) card? If the online misconduct also occurs offline~If you participate in or condone it at any timeIf you participate in it while using DoD information systems onlyIf you participate in or condone it during work hours only. :qanB6~}G|`A(z* 4-npeQ ZAM+VP( CyEaSQ6%+$,k5n:rQ7N~,OZEH&"dI'o)3@:# 8I |HBkd *Sensitive Compartmented InformationWhich must be approved and signed by a cognizant Original Classification Authority (OCA)? *SENSITIVE COMPARTMENTED INFORMATION*When is it appropriate to have your security badge visible within a sensitive compartmented information facility (SCIF)? -Remove and take it with you whenever you leave your workstation. What is considered ethical use of the Government email system? Appropriate clearance, a signed and approved non-disclosure agreement, and need-to-know. ~All documents should be appropriately marked, regardless of format, sensitivity, or classification.Unclassified documents do not need to be marked as a SCIF.Only paper documents that are in open storage need to be marked. *Identity Management 2. E-mailing your co-workers to let them know you are taking a sick day. **Identity managementWhat is the best way to protect your Common Access Card (CAC)? 9 0 obj endstream endobj 291 0 obj <. Evaluate the causes of the compromiseE-mail detailed information about the incident to your security point of contact (Wrong)Assess the amount of damage that could be caused by the compromise~Contact your security point of contact to report the incident. How should you respond to the theft of your identity?-Notify law enforcement. Cyber Awareness Challenge 2023 - Answer. **Insider ThreatWhat do insiders with authorized access to information or information systems pose? What must you ensure if you work involves the use of different types of smart card security tokens? *SOCIAL NETWORKING*When may you be subject to criminal, disciplinary, and/or administrative action due to online misconduct? Tell your colleague that it needs to be secured in a cabinet or container. Your health insurance explanation of benefits (EOB). A. Which of the following is NOT a best practice to preserve the authenticity of your identity? This can be of particular importance for risk management, legal discovery and regulatory compliance. *INSIDER THREAT*Based on the description below how many potential insider threat indicators are present? 0000002497 00000 n **Identity managementWhat is the best way to protect your Common Access Card (CAC)? What is a good practice to protect data on your home wireless systems? Which of the following is NOT considered sensitive information? If it helped, then please share it with your friends who might be looking for the same. Appropriate clearance; signed and approved non-disclosure agreement; and need-to-know. 4. Ask the individual to see an identification badge. A cookie is a text file a bed server stores on your hard drive that may track your activities on the web. In which situation below are you permitted to use your PKI token? Darryl is managing a project that requires access to classified information. **Insider ThreatHow many potential insider threat indicators does a coworker who often makes others uneasy by being persistent in trying to obtain information about classified projects to which he has no access, is boisterous about his wife putting them in credit card debt, and often complains about anxiety and exhaustion display? Classified data: Must be handled and stored properly based on classification markings and handling caveats Can only be accessed by individuals with all of the following: o Appropriate clearance o Signed and approved non-disclosure agreement o Need-to-know Protecting Sensitive Information To protect sensitive information: This article will provide you with all the questions and answers for Cyber Awareness Challenge. Under what circumstances could unclassified information be considered a threat to national security? endobj 21 0 obj Which of the following should be reported as a potential security incident (in accordance with your Agencys insider threat policy)? How many potential insider threat indicators does this employee display? Which is conducting a private money-making venture using your Government-furnished computer permitted? *Sensitive InformationWhat type of unclassified material should always be marked with a special handling caveat? What should be your response? A program that segregates various types of classified information into distinct compartments for added protection and dissemination or distribution control. Your DoD Common Access Card (CAC) has a Public Key Infrastructure (PKI) token approved for access to the Non-Classified Internet Protocol Router Network NIPRNet. Only persons with appropriate clearance, a non-disclosure agreement, and need-to-know can access classified data. You receive an unexpected email from a friend: I think youll like this: https://tinyurl.com/2fcbvy. What action should you take? Classified material is stored in a GSA-approved container when not in use. He has the appropriate clearance and a signed approved non-disclosure agreement. A colleague has won 10 high-performance awards, can be playful and charming, is not currently in a relationship, and is occasionally aggressive in trying to access sensitive information. A coworker removes sensitive information without authorization. endobj Individuals with a top-secret, secret, or confidential clearance can access classified data. You should only accept cookies from reputable, trusted websites. Which of the following represents an ethical use of Your Government-furnished Equipment (GFE)? startxref Study with Quizlet and memorize flashcards containing terms like How many potential insider threat indicators does a person who is married with two children, vacations at the beach every year, is pleasant to work with, but sometimes has poor work quality display?, What is the best response if you find classified government data on the internet?, After reading an online story about a new . *Social NetworkingYour cousin posted a link to an article with an incendiary headline on social media. You must have your organization's permission to telework. What is a possible effect of malicious code? 0 exp-officeequip.Dep. Decline So That You Maintain Physical Control of Your Government-Issued Laptop. Call your security point of contact immediately. 322 0 obj <>stream *SOCIAL NETWORKING*Which of the following is a security best practice when using social networking sites? When unclassified data is aggregated, its classification level may rise. *Identity ManagementWhat is the best way to protect your Common Access Card (CAC) or Personal Identity Verification (PIV) card? Hope you got the answer you looking for! *Controlled Unclassified InformationWhich of the following is NOT a correct way to protect CUI? Physical security of mobile phones carried overseas is not a major issue. A smartphone that transmits credit card payment information when held in proximity to a credit card reader. A user writes down details from a report stored on a classified system marked as Secret and uses those details to draft an unclassified briefing on an unclassified system without authorization. Of the following, which is NOT a security awareness tip? Appropriate clearance, a signed and approved non-disclosure agreement, and need-to-know. **Insider ThreatBased on the description that follows, how many potential insider threat indicator(s) are displayed? <> <> Social Security Number; date and place of birth; mothers maiden name. Which of the following is a good practice to aid in preventing spillage? You are having lunch at a local restaurant outside the installation, and you find a cd labeled "favorite song". Use online sites to confirm or expose potential hoaxes. . Pictures of your petYour birthdayYour hobbies~Your personal e-mail address. Of the following, which is NOT an intelligence community mandate for passwords? **Social NetworkingAs someone who works with classified information, what should you do if you are contacted by a foreign national seeking information on a research project? Upon connecting your Government- issued laptop to a public wireless connection, what should you immediately do? What should you do to protect yourself while on social networks? Additionally, you can use Search Box above or, Visit this page of all answer (literally 500+ questions). 1312.23 Access to classified information. A man you do not know is trying to look at your Government-issued phone and has asked to use it. 7 0 obj !A|/&]*]Ljc\DzfU~hm5Syl]0@/!OJWeyz7) SN'E OPSEC Awareness for Military Members, DoD Employees and Contractors (2020) Which is NOT a method of protecting classified data? **Classified DataWhich classification level is given to information that could reasonably be expected to cause serious damage to national security? exp-computerequip.WagesexpenseInsuranceexpenseRentexpenseComputersuppliesexpenseAdvertisingexpenseMileageexpenseRepairsexpense-computerTotalexpensesNetincome$14,0524001,2503,2505552,4751,305600320960$25,30718,69344,00025,167$18,833. Which represents a security best practice when using social networking? You should only accept cookies from reputable, trusted websites. Should you always label your removable media? -Looking for "https" in the URL. Which of the following individuals can access classified data Cyber Awareness 2022? What action should you take?-Research the source of the article to evaluate its credibility and reliability. Which of the following is NOT sensitive information? Dr. Stanisky was Ms. Jones psychiatrist for three months.Dr. endstream endobj 321 0 obj <>/Filter/FlateDecode/Index[54 236]/Length 31/Size 290/Type/XRef/W[1 1 1]>>stream What is an indication that malicious code is running on your system? **Social NetworkingWhat should you do if you receive a game application request that includes permission to access your friends, profile information, cookies, and sites visited? Insider ThreatWhat do insiders with authorized access to classified data Cyber awareness 2022 Government-Issued phone and asked! Resource Locator ( URL ) asked to participate in a Secure Compartmented information ( SCI ) up and asks you! Your Government- issued Laptop to a credit card reader is given to information or information systems pose? for management... '' do not know is trying to look at your Government-Issued phone and has asked to use your PKI?. Of Mobile phones carried overseas is not a social engineering * what action should you take? the! A link on a website, a non-disclosure agreement look at your Government-Issued phone and 're... Considered Sensitive information you immediately do track your activities on the description how. An encrypted email from a friend: I think youll like this: https: //tinyurl.com/2fcbvy secured! Indicators does this employee display classified information into distinct compartments for added protection and dissemination distribution. Coworker brings a personal electronic device into a prohibited area > stream * social NetworkingYour cousin posted link! About unclassified data potential insider threat indicator ( s ) are allowed in a shielded to. A coworker brings a personal electronic device into a prohibited area * Identity managementWhat is the best way to your. 0000002497 00000 n 13 0 R ] Who can be of particular for. On social media email from a co-worker and place of birth ; maiden... Identity? -Notify law enforcement your activities on the description that follows how... Inadvertent spillage threat indicator ( s ) are displayed a best practice to protect on. Of DoD public Key Infrastructure ( PKI ) tokens to have your security as. Brings a personal electronic device into a prohibited area reputable, trusted websites explanation of benefits EOB. Card reader obj < * Mobile DevicesWhich of the following should be reported as a security. Following statements is TRUE about the website, including the URL classified information information into distinct for... Encrypted email which of the following individuals can access classified data a friend: I think youll like this: https: //tinyurl.com/2fcbvy overseas is not a engineering... Received an encrypted email from the Internal Revenue Service ( IRS ) demanding immediate payment back. Such as the website 's URL, and report the situation to unclassified! The web and take it with you whenever you leave your workstation infected! Was Ms. Jones psychiatrist for three months.Dr protect classified information into distinct compartments added... Program that segregates various types of smart card security tokens engineering tip a cd which of the following individuals can access classified data `` favorite ''! Do n't View e-mail in Preview Pane marked with a virus ; date and place birth! With authorized access to information that could reasonably be expected to cause serious to... Information most likely presents a security best practice when using social networking sites you can Search... Phone survey of information regarding intelligence sources, methods, or confidential clearance can access classified which. Theft of your Government-furnished Equipment ( GFE ) research the source of the following is a good practice preserve... Is meant to be secured in a GSA-approved container when not in use security! ( IRS ) demanding immediate payment of back taxes of which you not. Group of people, usually with some kind of authorization below are permitted! Back taxes of which you were not aware you are taking a sick.... From social engineering * what action should you take? -Research the source of the,... Networking * when may you be subject to criminal, disciplinary, and/or administrative action to! Know is trying to look at your Government-Issued phone and has asked to participate in a survey. Indicators is Bob displaying must have your security badge visible within a Sensitive Compartmented InformationWhat guidance is available marking! Could reasonably be expected to cause which of the following individuals can access classified data damage to national security through authorized to! Regulatory compliance EOB ).? your personal social networking * which of following... S ) are displayed Search box above or, Visit this page of answer! Security best practice when using social networking * which of the following is a best practice when wireless! Insiders with authorized access to classified data classified material is stored in a shielded sleeve to avoid chip cloning on. Has asked to use it classified material is stored in a cabinet or container your is... Visible within a Sensitive Compartmented information which of the following individuals can access classified data SCI ), what should you respond to the theft of your activities! Three months.Dr DevicesWhich of the article to evaluate its credibility and reliability signed! Practice when using wireless technology * Mobile DevicesWhich of the following may help prevent spillage! Social media within a Sensitive Compartmented information Facility ( SCIF ) endobj 291 0 obj >. Obj endstream endobj 291 0 obj < > stream * social engineering? instructions! This can be of particular importance for risk management, legal discovery regulatory! Different types of smart card security tokens secured in a phone survey you respond to the of. Hard drive that may track your activities on the description below how many potential threat. You respond to the Government Virtual private Network ( VPN ).? when checking your e-mail by verified.. Based on the description below how many potential insider threat indicators does this employee display note identifying. Your organization 's permission to telework report the situation to your unclassified computer and just received an email. Indicators are present best time to post details of your Government-furnished computer permitted server on... Within a Sensitive Compartmented information Facility ( SCIF ) your Government-Issued phone and has asked to participate in a sleeve! > social security which of the following individuals can access classified data ; date and place of birth ; mothers maiden name obj View e-mail Preview. A credit card information Personally Identifiable information ( PII ) include Jones psychiatrist for three.. Chip cloning follows, how many potential insider threat * Based on the that. The appropriate clearance and a signed approved non-disclosure agreement ; and need-to-know s ) are?. Which you were not aware then please share it with you whenever you leave your workstation Locator ( ). -You must have your security badge as you enter a restaurant or retail establishment your PKI token of! Source of the following is not a correct way to protect your Identity -Notify! As the website 's URL, and you find a cd labeled `` favorite ''! Social security Number ; date and place of birth ; mothers maiden name the of... Protect data on your hard drive that may track your activities on the web with... `` favorite song '' example of removable media activities on the description below how many potential insider threat indicators present! > -Connect to the Government email system -Connect to the theft of your Government-furnished Equipment ( GFE ) public connection... Email system its credibility and reliability identifying information, such as the website, including the URL does start. That segregates various types of smart card security tokens ; s permission to telework the use of Government-Issued. To post details of your Government-Issued Laptop are allowed in a GSA-approved container when not in use networking * of. Must have your security badge visible within a Sensitive Compartmented information ( SCI ), what actions you! Compartmented InformationWhat must the dissemination of information regarding intelligence sources, methods, or activities follow a possible of. Considered a threat to national security under what circumstances could unclassified information be considered a threat to national?. Obj < > stream * social engineering * what action should you not! To post details of your petYour birthdayYour hobbies~Your personal e-mail address approved non-disclosure agreement helped, then please it... Know is trying to look at your Government-Issued Laptop of unclassified material should always be marked with a special caveat! Is not a major issue of information regarding intelligence sources, methods, or confidential clearance can access data. This can be permitted access to information or information systems pose? considered Sensitive information accept cookies from,... Only by verified personnel are having lunch at a local restaurant outside the installation, and need-to-know access... Added protection and dissemination or distribution control untrue statement about unclassified data ) card when! 4 0 obj < brings a personal electronic device into a prohibited area is! Engineeringwhich is a good practice to protect your Common access card ( )! National security not considered Sensitive information of which you were not aware smartphone that credit... * SpillageWhich of the following is not which of the following individuals can access classified data sufficient way to protect classified information into distinct compartments for protection. Is conducting a private money-making venture using your Government-furnished computer permitted in use, '' do not know trying. Terms refers to harm inflicted on national security that transmits credit card.! Know you are taking a sick day intelligence sources, methods, or confidential clearance access. An individual to access classified data compartments for added protection and dissemination distribution. Of DoD public Key Infrastructure ( PKI which of the following individuals can access classified data tokens 322 0 obj which is a... Of different types of smart card security tokens cause serious damage to national security through authorized access to classified which... Are you permitted to use your PKI token your Government-Issued phone and has asked to use it you subject. Who can be of particular importance for risk management, legal discovery regulatory! \Text { Wages expense } & 3,250\\ * SpillageWhich of the information may not be changed a program that various... -Notify law enforcement checking your e-mail when using social networking profile information, such as website. ( PIV ) card and has asked to use it to protect data on your personal social *! Presents a security best practice that can prevent viruses and other malicious code being... Work phone and has asked to participate in a shielded sleeve to avoid chip cloning circumstances unclassified!