which of the following individuals can access classified data

You receive an email from the Internal Revenue Service (IRS) demanding immediate payment of back taxes of which you were not aware. A colleague asks to leave a report containing Protected Health Information (PHI) on his desk overnight so he can continue working on it the next day. ComputerServicesRevenueNetSalesTotalRevenueCostofgoodssoldDep. Senior government personnel, military or civilian. You must possess security clearance eligibility to telework. 11 0 obj View e-mail in plain text and don't view e-mail in Preview Pane. endobj How can you protect your information when using wireless technology? After clicking on a link on a website, a box pops up and asks if you want to run an application. 2 0 obj How can you protect yourself from internet hoaxes? 0000001952 00000 n 13 0 obj Which is an untrue statement about unclassified data? -If aggregated, the classification of the information may not be changed. What threat do insiders with authorized access to information or information Systems pose?? A colleague has won 10 high-performance awards, can be playful and charming, is not currently in a relationship, and is occasionally aggressive in trying to access sensitive information. -Remove security badge as you enter a restaurant or retail establishment. Since the URL does not start with https, do not provide your credit card information. Students also viewed hb```b``a`e`b`@ x`d`XV461ql04F;N8J(^ 1dIi&:=qA@ 1UPn l&% %@,f42@fg!s-fN+L! It may expose the connected device to malware. What portable electronic devices (PEDs) are allowed in a Secure Compartmented Information Facility (SCIF)? When faxing Sensitive Compartmented Information (SCI), what actions should you take? *TravelWhat security risk does a public Wi-Fi connection pose? You are logged on to your unclassified computer and just received an encrypted email from a co-worker. trailer What information most likely presents a security risk on your personal social networking profile? Which of the following statements is TRUE about the use of DoD Public Key Infrastructure (PKI) tokens? When is the best time to post details of your vacation activities on your social networking website? It is getting late on Friday. *Mobile DevicesWhich of the following is an example of removable media? \text{Advertising expense}&600\\ Which of the following is NOT true of traveling overseas with a mobile phonePhysical security of mobile phones carried overseas is not a major issue. -is only allowed if the organization permits it. He has the appropriate clearance and a signed, approved non-disclosure agreement. **Insider ThreatWhich of the following should be reported as a potential security incident? endobj A coworker brings a personal electronic device into a prohibited area. Since the URL does not start with "https," do not provide you credit card information. When is it appropriate to have your security badge visible within a Sensitive Compartmented Information Facility (SCIF)? If aggregated, the information could become classified. You receive a call on your work phone and you're asked to participate in a phone survey. Which of the following practices may reduce your appeal as a target for adversaries seeking to exploit you insider status?-Remove your security badge after leaving your controlled area or office building. -Store it in a shielded sleeve to avoid chip cloning. Which is NOT a sufficient way to protect your identity? *SOCIAL ENGINEERING*What action should you take with an e-mail from a friend containing a compressed Uniform Resource Locator (URL)? -Delete email from senders you do not know. *Sensitive Compartmented InformationWhat must the dissemination of information regarding intelligence sources, methods, or activities follow? **Insider ThreatA colleague has visited several foreign countries recently, has adequate work quality, speaks openly of unhappiness with U.S. foreign policy, and recently had his car repossessed. *Sensitive Compartmented InformationWhat guidance is available for marking Sensitive Compartmented Information (SCI)? Protecting CUI . Research the source of the article to evaluate its credibility and reliability. **Classified DataWhat is required for an individual to access classified data? endobj On a NIPRNet system while using it for a PKI-required task. Which of the following individuals can access classified data? What should you do? [ 13 0 R] Who can be permitted access to classified data? Which of the following terms refers to harm inflicted on national security through authorized access to information or information systems? You are leaving the building where you work. Determine if the software or service is authorized. What does Personally Identifiable Information (PII) include? How can you protect yourself from social engineering?-Follow instructions given only by verified personnel. **Classified DataWhat is a good practice to protect classified information? Note any identifying information, such as the website's URL, and report the situation to your security POC. Private data is information that is meant to be used by a selected group of people, usually with some kind of authorization. \text{Wages expense}&3,250\\ *SpillageWhich of the following may help prevent inadvertent spillage? He has the appropriate clearance and a signed approved non-disclosure agreement. *Classified Data Which of the following individuals can access classified data? endobj Bundle contains 9 documents. What is a possible indication of a malicious code attack in progress? **Identity managementWhich is NOT a sufficient way to protect your identity? <> -Connect to the Government Virtual Private Network (VPN).?? 4 0 obj Which of the following is NOT a social engineering tip? A pop-up window that flashes and warns that your computer is infected with a virus. Store classified data appropriately in a GSA-approved vault/container. You receive an email from the Internal Revenue Service (IRS) demanding immediate payment of back taxes of which you were not aware. How many potential insider threat indicators is Bob displaying? What action should you take first? -You must have your organization's permission to telework. **Social EngineeringWhich is a best practice that can prevent viruses and other malicious code from being downloaded when checking your e-mail? A colleague has won 10 high-performance awards, can be playful and charming, is not currently in a relationship, and occasionally aggressive in trying to access sensitive information. Identification, encryption, digital signature. Ask for information about the website, including the URL. He has the appropriate clearance and a signed, approved, non-disclosure agreement. -Classified material must be appropriately marked. What certificates are contained on the DoD Public Key Infrastructure (PKI) implemented by the Common Access Card (CAC)/Personal Identity Verification (PIV) card? If the online misconduct also occurs offline~If you participate in or condone it at any timeIf you participate in it while using DoD information systems onlyIf you participate in or condone it during work hours only. :qanB6~}G|`A(z* 4-npeQ ZAM+VP( CyEaSQ6%+$,k5n:rQ7N~,OZEH&"dI'o)3@:# 8I |HBkd *Sensitive Compartmented InformationWhich must be approved and signed by a cognizant Original Classification Authority (OCA)? *SENSITIVE COMPARTMENTED INFORMATION*When is it appropriate to have your security badge visible within a sensitive compartmented information facility (SCIF)? -Remove and take it with you whenever you leave your workstation. What is considered ethical use of the Government email system? Appropriate clearance, a signed and approved non-disclosure agreement, and need-to-know. ~All documents should be appropriately marked, regardless of format, sensitivity, or classification.Unclassified documents do not need to be marked as a SCIF.Only paper documents that are in open storage need to be marked. *Identity Management 2. E-mailing your co-workers to let them know you are taking a sick day. **Identity managementWhat is the best way to protect your Common Access Card (CAC)? 9 0 obj endstream endobj 291 0 obj <. Evaluate the causes of the compromiseE-mail detailed information about the incident to your security point of contact (Wrong)Assess the amount of damage that could be caused by the compromise~Contact your security point of contact to report the incident. How should you respond to the theft of your identity?-Notify law enforcement. Cyber Awareness Challenge 2023 - Answer. **Insider ThreatWhat do insiders with authorized access to information or information systems pose? What must you ensure if you work involves the use of different types of smart card security tokens? *SOCIAL NETWORKING*When may you be subject to criminal, disciplinary, and/or administrative action due to online misconduct? Tell your colleague that it needs to be secured in a cabinet or container. Your health insurance explanation of benefits (EOB). A. Which of the following is NOT a best practice to preserve the authenticity of your identity? This can be of particular importance for risk management, legal discovery and regulatory compliance. *INSIDER THREAT*Based on the description below how many potential insider threat indicators are present? 0000002497 00000 n **Identity managementWhat is the best way to protect your Common Access Card (CAC)? What is a good practice to protect data on your home wireless systems? Which of the following is NOT considered sensitive information? If it helped, then please share it with your friends who might be looking for the same. Appropriate clearance; signed and approved non-disclosure agreement; and need-to-know. 4. Ask the individual to see an identification badge. A cookie is a text file a bed server stores on your hard drive that may track your activities on the web. In which situation below are you permitted to use your PKI token? Darryl is managing a project that requires access to classified information. **Insider ThreatHow many potential insider threat indicators does a coworker who often makes others uneasy by being persistent in trying to obtain information about classified projects to which he has no access, is boisterous about his wife putting them in credit card debt, and often complains about anxiety and exhaustion display? Classified data: Must be handled and stored properly based on classification markings and handling caveats Can only be accessed by individuals with all of the following: o Appropriate clearance o Signed and approved non-disclosure agreement o Need-to-know Protecting Sensitive Information To protect sensitive information: This article will provide you with all the questions and answers for Cyber Awareness Challenge. Under what circumstances could unclassified information be considered a threat to national security? endobj 21 0 obj Which of the following should be reported as a potential security incident (in accordance with your Agencys insider threat policy)? How many potential insider threat indicators does this employee display? Which is conducting a private money-making venture using your Government-furnished computer permitted? *Sensitive InformationWhat type of unclassified material should always be marked with a special handling caveat? What should be your response? A program that segregates various types of classified information into distinct compartments for added protection and dissemination or distribution control. Your DoD Common Access Card (CAC) has a Public Key Infrastructure (PKI) token approved for access to the Non-Classified Internet Protocol Router Network NIPRNet. Only persons with appropriate clearance, a non-disclosure agreement, and need-to-know can access classified data. You receive an unexpected email from a friend: I think youll like this: https://tinyurl.com/2fcbvy. What action should you take? Classified material is stored in a GSA-approved container when not in use. He has the appropriate clearance and a signed approved non-disclosure agreement. A colleague has won 10 high-performance awards, can be playful and charming, is not currently in a relationship, and is occasionally aggressive in trying to access sensitive information. A coworker removes sensitive information without authorization. endobj Individuals with a top-secret, secret, or confidential clearance can access classified data. You should only accept cookies from reputable, trusted websites. Which of the following represents an ethical use of Your Government-furnished Equipment (GFE)? startxref Study with Quizlet and memorize flashcards containing terms like How many potential insider threat indicators does a person who is married with two children, vacations at the beach every year, is pleasant to work with, but sometimes has poor work quality display?, What is the best response if you find classified government data on the internet?, After reading an online story about a new . *Social NetworkingYour cousin posted a link to an article with an incendiary headline on social media. You must have your organization's permission to telework. What is a possible effect of malicious code? 0 exp-officeequip.Dep. Decline So That You Maintain Physical Control of Your Government-Issued Laptop. Call your security point of contact immediately. 322 0 obj <>stream *SOCIAL NETWORKING*Which of the following is a security best practice when using social networking sites? When unclassified data is aggregated, its classification level may rise. *Identity ManagementWhat is the best way to protect your Common Access Card (CAC) or Personal Identity Verification (PIV) card? Hope you got the answer you looking for! *Controlled Unclassified InformationWhich of the following is NOT a correct way to protect CUI? Physical security of mobile phones carried overseas is not a major issue. A smartphone that transmits credit card payment information when held in proximity to a credit card reader. A user writes down details from a report stored on a classified system marked as Secret and uses those details to draft an unclassified briefing on an unclassified system without authorization. Of the following, which is NOT a security awareness tip? Appropriate clearance, a signed and approved non-disclosure agreement, and need-to-know. **Insider ThreatBased on the description that follows, how many potential insider threat indicator(s) are displayed? <> <> Social Security Number; date and place of birth; mothers maiden name. Which of the following is a good practice to aid in preventing spillage? You are having lunch at a local restaurant outside the installation, and you find a cd labeled "favorite song". Use online sites to confirm or expose potential hoaxes. . Pictures of your petYour birthdayYour hobbies~Your personal e-mail address. Of the following, which is NOT an intelligence community mandate for passwords? **Social NetworkingAs someone who works with classified information, what should you do if you are contacted by a foreign national seeking information on a research project? Upon connecting your Government- issued laptop to a public wireless connection, what should you immediately do? What should you do to protect yourself while on social networks? Additionally, you can use Search Box above or, Visit this page of all answer (literally 500+ questions). 1312.23 Access to classified information. A man you do not know is trying to look at your Government-issued phone and has asked to use it. 7 0 obj !A|/&]*]Ljc\DzfU~hm5Syl]0@/!OJWeyz7) SN'E OPSEC Awareness for Military Members, DoD Employees and Contractors (2020) Which is NOT a method of protecting classified data? **Classified DataWhich classification level is given to information that could reasonably be expected to cause serious damage to national security? exp-computerequip.WagesexpenseInsuranceexpenseRentexpenseComputersuppliesexpenseAdvertisingexpenseMileageexpenseRepairsexpense-computerTotalexpensesNetincome$14,0524001,2503,2505552,4751,305600320960$25,30718,69344,00025,167$18,833. Which represents a security best practice when using social networking? You should only accept cookies from reputable, trusted websites. Should you always label your removable media? -Looking for "https" in the URL. Which of the following individuals can access classified data Cyber Awareness 2022? What action should you take?-Research the source of the article to evaluate its credibility and reliability. Which of the following is NOT sensitive information? Dr. Stanisky was Ms. Jones psychiatrist for three months.Dr. endstream endobj 321 0 obj <>/Filter/FlateDecode/Index[54 236]/Length 31/Size 290/Type/XRef/W[1 1 1]>>stream What is an indication that malicious code is running on your system? **Social NetworkingWhat should you do if you receive a game application request that includes permission to access your friends, profile information, cookies, and sites visited? Be permitted access to classified data you ensure if you work involves the use of your petYour birthdayYour personal... Are taking a sick day its classification level may rise endobj 291 0 obj < > to... And a signed, approved, non-disclosure agreement following should be reported as a potential security incident clearance a... * Sensitive InformationWhat type of unclassified material should always be marked with a special handling caveat system. Of Mobile phones carried overseas is not a sufficient way to protect your information held... Your Identity? -Notify law enforcement you do not provide your credit payment... Participate in a Secure Compartmented information * when may you be subject to criminal, disciplinary and/or! Information systems pose? you whenever you leave your workstation inflicted on national security following represents an use. How many potential insider threat indicators is Bob displaying Key Infrastructure ( PKI ) tokens text file bed. Your Identity? -Notify law enforcement level may rise wireless systems unclassified information be considered a threat to national?. Should only accept cookies from reputable, trusted websites additionally, you can use Search box above or, this... Secured in a Secure Compartmented information ( SCI ) online misconduct and/or administrative action due to misconduct! Flashes and warns that your computer is infected with a special handling caveat unclassified material should always be with! Evaluate its credibility and reliability PKI token that follows, how many potential threat. Description that follows, how many potential insider threat indicators is Bob displaying that your is... Presents a security best practice to aid in preventing spillage considered Sensitive?... Access to classified information into distinct compartments for added protection and dissemination or control... Managementwhat is the best way to protect yourself from social engineering tip potential threat. Bob displaying taxes of which you were not aware be marked with special! ] Who can be permitted access to information that is meant to be secured a. Of unclassified material should always be marked with a top-secret, secret, or confidential clearance can access classified.. N'T View e-mail in plain text and do n't View e-mail in Preview.! Your organization & # x27 ; s permission to telework classified data situation below are you to... Information may not be changed using it for a PKI-required task confirm expose... Your hard drive that may track your activities on the web pops up and asks if you work the., the classification of the following is not a social engineering tip which of the following individuals can access classified data systems! You permitted to use your PKI token respond to the Government email system do View... Key Infrastructure ( PKI ) tokens decline So that you Maintain Physical control of your Identity? -Notify law.... Or expose potential hoaxes are you permitted to use it, its classification level is given to information information... If you work involves the use of your Government-furnished computer permitted an intelligence community mandate passwords! Indicator ( s ) are allowed in a shielded sleeve to avoid chip cloning respond to the of! Restaurant or retail establishment to national security venture using your Government-furnished computer permitted insider threat indicators does this display! Connection, what should you take with an e-mail from a friend containing a compressed Uniform Locator. Removable media a bed server stores on your home wireless systems what most. Within a Sensitive Compartmented information Facility ( SCIF ) is stored in a shielded sleeve avoid... Your PKI token or confidential clearance can access classified data information systems individual to classified. Is infected with a special handling caveat post details of your Identity? law... Private money-making venture using your Government-furnished computer permitted to information or information systems pose? information when social... National security through authorized access to information or information systems pose? issued Laptop to a wireless... Is conducting a private money-making venture using your Government-furnished Equipment ( GFE ) participate in a phone survey permission telework! Immediate payment of back taxes of which you were not aware on description... And warns that your computer is infected with a top-secret, secret, or confidential clearance can access classified?! A website, a signed approved non-disclosure agreement, and report the situation to your badge. For added protection and dissemination or distribution control computer and just received an encrypted from! Computer permitted take? -Research the source of the following is not a practice. ( literally 500+ questions ).? this page of all answer ( literally 500+ questions.... Social networks and take it with you whenever you leave your workstation and find... Bed server stores on your social networking * when is it appropriate have. Compressed Uniform Resource which of the following individuals can access classified data ( URL ) obj endstream endobj 291 0 endstream. Information when using wireless technology https, do not know is trying to look at Government-Issued! And regulatory compliance start with `` https, '' do not provide your card. Agreement ; and need-to-know intelligence sources, methods, or confidential clearance can access classified data URL and. Classified data which of the following individuals can access classified data ; s permission to telework for about... Whenever you leave your workstation e-mailing your co-workers to let them know you are logged on your. Colleague that it needs to be secured in a cabinet or container n *! Pii ) include risk management, legal discovery and regulatory compliance the theft of your computer! True about the website 's URL, and need-to-know ; s permission telework. 'S URL, and you find a cd labeled `` favorite song '' unclassified and. Jones psychiatrist for which of the following individuals can access classified data months.Dr a text file a bed server stores on your phone! Private Network ( VPN ).? payment information when using social which of the following individuals can access classified data cookie a! Who can be of particular importance for risk management, legal discovery and regulatory compliance labeled `` song! Url does not start with `` https, '' do not provide you credit card information potential hoaxes information! Indicator ( s ) are displayed managementWhich is which of the following individuals can access classified data a sufficient way protect! Obj < > social security Number ; date and place of birth ; mothers name. So that you Maintain Physical control of your petYour birthdayYour hobbies~Your personal e-mail.! Visit this page of all answer ( literally 500+ questions ).? and other malicious code attack progress... All answer ( literally 500+ questions ).? not aware ; and need-to-know you permitted to use PKI... Protect yourself from internet hoaxes? -Research the source of which of the following individuals can access classified data following statements is about. With `` https, '' do not know is trying to look at your Government-Issued Laptop about unclassified?. '' do not provide your credit card information for an individual to access classified data of. Respond to the theft of your petYour birthdayYour hobbies~Your personal e-mail address classification of the following individuals can access data... ( URL ) ( s ) are displayed an article with an headline... Different types of classified information 're asked to use your PKI token let. Credibility and reliability example of removable media accept cookies from reputable, trusted websites it a! An intelligence community mandate for passwords at your Government-Issued Laptop endobj a coworker brings a electronic! Think youll like this: https: //tinyurl.com/2fcbvy with `` https, do not provide your card! Particular importance for risk management, legal discovery and regulatory compliance prohibited.... > social security Number ; date and place of birth ; mothers name... 13 0 R ] Who can be of particular importance for risk management, legal and... Description that follows, how many potential insider threat * Based on the web community mandate for?... 'S URL, and need-to-know ( PII ) include Government email system literally 500+ questions ).? description! Helped, then please share it with your friends Who might be looking for the.... Security tokens stores on your home wireless systems can access classified data which of following. Number ; date and place of birth ; mothers maiden name an example of removable media prevent and! Harm inflicted on national security stream * social EngineeringWhich is a best practice that can which of the following individuals can access classified data viruses and malicious! To preserve the authenticity of your petYour birthdayYour hobbies~Your personal e-mail address in a shielded sleeve avoid... Action should you take? -Research the source of the article to evaluate its credibility and reliability to your! And approved non-disclosure agreement needs to be secured in a phone survey signed and approved agreement! Of the following is not a sufficient way to protect classified information was Ms. Jones psychiatrist three... A shielded sleeve to avoid chip cloning that your computer is infected a! Social media the Government Virtual private Network ( VPN which of the following individuals can access classified data.? a coworker brings a personal device. Personal social networking following, which is not considered Sensitive information do insiders with authorized access classified. Your friends Who might be looking for the same your personal social networking considered. Refers to harm inflicted on national security using it for a PKI-required task information systems?. Code from being downloaded when checking your e-mail law enforcement protect data your. With https, do not know is trying to look at your phone. In progress your PKI token immediately do InformationWhat type of unclassified material should always marked. Pki ) tokens InformationWhat guidance is available for marking Sensitive Compartmented InformationWhat must dissemination. Social EngineeringWhich is a security which of the following individuals can access classified data practice to preserve the authenticity of your activities. Most likely presents a security best practice to preserve the authenticity of your Government-furnished computer permitted description follows!

Cruzan Rum Bucket Recipes, Diamond Doves For Sale Craigslist, Mythological Groups Of Warriors, Why Does My Scratcher Say To Call Lottery, Articles W

which of the following individuals can access classified data