How many insider threat indicators does Alex demonstrate? Hold the conversation over e-mail or instant messenger to avoid being overheard. In setting up your personal social networking service account, what email address should you use? Which of the following is NOT a typical result from running malicious code? We use some essential cookies to make this website work. https:// The relevant people will be named in the subsequent contract. Which of the following is NOT an example of CUI? The guidance below will help you to understand who can apply for funding, the sort of projects the Defence and Security Accelerator (DASA) funds, and the terms and conditions of DASA contracts. Of the following, which is NOT a method to protect sensitive information? What should be your response? Illegally downloading copyrighted material - No . A colleague enjoys playing video games online, regularly use social media, and frequently forgets to secure her smartphone elsewhere before entering areas where it is prohibited. It is permissible to release unclassified information to the public prior to being cleared. (Malicious Code) Which email attachments are generally SAFE to open? When may you be subject to criminal, disciplinary, and/or administrative action due to online harassment, bullying, stalking, hazing, discrimination, or retaliation? Darryl is managing a project that requires access to classified information. Chillmax Company plans to sell 3,500 pairs of shoes at $60 each in the coming year. ~All documents should be appropriately marked, regardless of format, sensitivity, or classification. Incident (controlled unclassified information) Which of the following is NOT an example of CUI? [1]. A colleague removes sensitive information without seeking authorization in order to perform authorized telework. What action is recommended when somebody calls you to inquire about your work environment or specific account information? *Sensitive Information Which of the following is an example of Protected Health Information (PHI)? **Insider Threat How many potential insider threat indicators does a person who is playful and charming, consistently wins performance awards, but is occasionally aggressive in trying to access sensitive information display? Department Guidance Use of Government Furnished Equipment (GFE) During Foreign Travel. Which of the following is a practice that helps to protect you from identity theft? Youll need to register and then activate your account before you can browse the toolkit. A Common Access Card and Personal Identification Number. The job cost sheet for Job 413 shows that $12,000 in direct materials has been used on the job and that$8,000 in direct labor cost has been incurred. Which of the following must you do before using an unclassified laptop and peripherals in a collateral classified environment? What portable electronic devices (PEDs) are permitted in a SCIF? View email in plain text and dont view email in Preview Pane. Retrieve classified documents promptly from printers. (removable media) If an incident occurs involving removable media in a Sensitive Compartmented Information Facility (SCIF), what action should you take? The website requires a credit card for registration. Correct. The site is available via registered access. (Spillage) Which of the following practices may reduce your appeal as a target for adversaries seeking to exploit your insider status? Brainscape helps you realize your greatest personal and professional ambitions through strong habits and hyper-efficient studying. When traveling or working away from your main location, what steps should you take to protect your devices and data? Which of the following is an example of malicious code? Is this safe? Security Classification Guides. Only use Government-furnished or Government-approved equipment to process CUI, including PII. When using mobile computing devices, including laptops and cell phones, in public: Be careful of information visible on your mobile computing device; consider screen protection Maintain possession of laptop and other government-furnished equipment (GFE) at all times and be extra vigilant in protecting it Protect your mobile computing device Based on the description that follows how many potential insider threat indicators are displayed? You know that this project is classified. When teleworking, you should always use authorized and software. What should you do? What is a best practice for protecting controlled unclassified information (CUI)? Paul verifies that the information is CUI, includes a CUI marking in the subject header, and digitally signs an e-mail containing CUI. A coworker removes sensitive information without authorization. On Jan. 30, 2023, President Joe Biden announced that the COVID-19 public health emergency (PHE) will end May 11, 2023. 4 0 obj *Sensitive Compartmented Information When is it appropriate to have your security badge visible? Which of the following is an example of Protected Health Information (PHI)? Decisions to provide GFE must be identified and a comparison made of the cost difference between using GFE or CFE. Classified data: (Theory) Which of the following is true of protecting classified data? Travel (Incident): What should Sara do when using publicly available Internet, such as hotel Wi-Fi? A colleague abruptly becomes hostile and unpleasant after previously enjoying positive working relationships with peers, purchases an unusually expensive car, and has unexplained absences from work. Individuals must avoid referencing derivatively classified reports classified higher than the recipient.??? HTMk0(XlB[[CxBIQv ,h{K{:2I!ILaTh}|?~54C&F. Only paper documents that are in open storage need to be marked. Its classification level may rise when aggregated. endstream endobj 1075 0 obj <>stream Ensure proper labeling by appropriately marking all classified material and, when required, sensitive material. How many potential insider threat indicators does this employee display? **Insider Threat Based on the description that follows, how many potential insider threat indicator(s) are displayed? Based on the description that follows, how many potential insider threat indicator(s) are displayed? It is often the default but can be prevented by disabling the location function. PII, PHI, and financial information is classified as what type of information? Which of the following is NOT a correct way to protect sensitive information? It does not require markings or distribution controls. A colleague saves money for an overseas vacation every year, is a single father, and occasionally consumes alcohol. DOD Cyber Awareness 2022 Knowledge Check Flashcards | Quizlet There are many travel tips for mobile computing. stream Which piece of information is safest to include on your social media profile? Added link to Current Themed Competitions in the Our Standard Contracts section. Software that installs itself without the users knowledge, Malicious Code (Damage): How can malicious code cause damage? Ensure there are no identifiable landmarks visible in any photos taken in a work setting that you post. Which of the following is NOT an appropriate way to protect against inadvertent spillage? What is the best course of action? GFE consists of: b. Which of the following is NOT a potential insider threat? Which of the following is true of traveling overseas with a mobile phone? DoD Cyber Awareness 2019 - Subjecto.com Beware of sudden flashing pop-ups that warn your computer is infected with a virus. Aggregating it does not affect its sensitivyty level. Which of the following is a good practice to protest classified information? 1082 0 obj <>/Filter/FlateDecode/ID[<6D11769074A68B4F9710B6CBF53B0C2B>]/Index[1068 34]/Info 1067 0 R/Length 76/Prev 82724/Root 1069 0 R/Size 1102/Type/XRef/W[1 2 1]>>stream You must supply a completed Form 388 and CV for any new research workers. Appropriate clearance; signed and approved non-disclosure agreement; and need-to-know. Making unauthorized configuration changes - No. Which of the following may help to prevent spillage? In your proposal to us, you must describe the deliverables from your project; in other words, what will be produced and delivered as a result of the project. Refer the reporter to your organizations public affairs office. What must authorized personnel do before permitting another individual to enter a Sensitive Compartmented Information Facility (SCIF)? Download the information. Set hasDigit to true if the 3-character passCode contains a digit, Critical, Essential, and Support Functions. Select all security issues. A system reminder to install security updates b. Use the classified network for all work, including unclassified work. The email states your account has been compromised and you are invited to click on the link in order to reset your password. How do you respond? What is the total manufacturing cost assigned to Job 413? Removable Media in a SCIF (Evidence): What portable electronic devices (PEDs) are permitted in a SCIF? When classified data is not in use, how can you protect it? Never allow sensitive data on non-Government-issued mobile devices. At all times when in the facility c. At any time during the workday, including when leaving the facility. Your antivirus is out-of-date. The Town and Country Planning (Use Classes) Order 1987 ( as amended) puts uses of land and buildings into various categories known as 'Use Classes' which are detailed below. **Social Networking When is the safest time to post details of your vacation activities on your social networking website? Research the source of the article to evaluate its credibility and reliability. Which of the following is NOT a best practice to protect data on your mobile computing device? Sensitive Compartmented Information (Incident #2): What should the owner of this printed SCI do differently? Nothing. When using a public device with a card reader, only use your DoD CAC to access unclassified information, is only allowed if the organization permits it. Only expressly authorized government-owned PEDs. Maybe 'Change of use' can occur within the same Use Class or from one Use Class to another. How many potential insider threat indicators does this employee display? Photos of your pet Correct. Report the suspicious behavior in accordance with their organizations insider threat policy.
City Of Miami Violation Payment, Chelsea Vs Watford Tickets, What Happened To Ross In Hannah Swensen Mysteries, Autumn Rapper Allegations, James Caan Yearbook Photo In Elf, Articles P