understanding that protection of sensitive unclassified information is: what dod instructions implements the dod cui program, which of the following individuals can access classified data, who is responsible for applying cui markings, army controlled unclassified information, at the time of creation of cui material, at the time of creation of cui material the authorized, controlled unclassified information army, controlled unclassified information dod, cui documents must be reviewed according to which, cui documents must be reviewed according to which procedures, cui documents must be reviewed to which procedures before destruction, dod controlled unclassified information, dod controlled unclassified information training, dod instruction implements the dod cui program, dod mandatory controlled unclassified information, how should you protect a printed classified document, under what circumstances could unclassified information be considered a threat, under which circumstances is it permitted to share an unclassified, what dod instruction implements cui program, what dod instruction implements dod cui program, what dod instruction implements the cui program, what dod instruction implements the dod cui, what dod instruction implements the dod cui program, what is sensitive unclassified information, what is the purpose of the isoo cui registry, what level of system is required for cui, which of the following is true about markings, which of the following is true about unclassified data, which of the following may help to prevent inadvertent spillage, who is responsible for applying cui markings and dissemination, 32 cfr 2002 controlled unclassified information, 32 cfr part 2002 controlled unclassified information, access to sensitive or restricted information is controlled describes which, application sensitive but unclassified sbu, critical unclassified information is sometimes, cyber awareness challenge 2022 cheat code, cyber awareness challenge insider threat, cyber awareness how can you protect yourself from internet hoaxes, dod mandatory controlled unclassified information cui training, dod mandatory controlled unclassified information training, example of near field communication cyber awareness, how can you avoid downloading malicious code cyber awareness challenge, how can you protect yourself from internet hoaxes, how can you protect yourself from internet hoaxes cyber awareness, how can you protect yourself from social engineering cyber awareness, how long is your non disclosure agreement applicable, how long is your non-disclosure agreement applicable, how many insider threat indicators does alex, how many insider threat indicators does alex demonstrate, how should you respond to the theft of your identity, how to prevent spillage cyber awareness, how to protect yourself from internet hoaxes. The website requires a credit card for registration. endobj endobj Write your password down on a device that only you access (e.g., your smartphone). In setting up your personal social networking service account, what email address should you use? The website requires a credit card for registration. The email provides a website and a toll-free number where you can make payment. Files may be corrupted, erased, or compromised. Which of the following is NOT an appropriate way to protect against inadvertent spillage?-Use the classified network for all work, including unclassified work. **Social EngineeringWhat is a common indicator of a phishing attempt? Which of the following is NOT true concerning a computer labeled SECRET? Who can be permitted access to classified data? **Classified DataWhich classification level is given to information that could reasonably be expected to cause serious damage to national security? 0000009864 00000 n exp-officeequip.400Dep. Which of the following should you NOT do if you find classified information on the internet?-Download the information. Which may be a security issue with compressed URLs? **Identity managementWhat is the best way to protect your Common Access Card (CAC)? Hostility or anger toward the United States and its policies. Which of the following terms refers to someone who harms national security through authorized access to information system? After reading an online story about a new security project being developed on the military installation where you work, your neighbor asks you to comment about the article. There are a number of individuals who can access classified data. *Classified DataWhich of the following individuals can access classified data?-Darryl is managing a project that requires access to classified information. A coworker brings a personal electronic device into a prohibited area. You receive an unexpected email from a friend: "I think you'll like this: (URL)" What action should you take? Spillage because classified data was moved to a lower classification level system without authorization. -Store it in a shielded sleeve to avoid chip cloning. No. What describes a Sensitive Compartmented Information (SCI) program? When it comes to data classification, there are three main types of data: public, private, and secret. 2 0 obj Of the following, which is NOT a method to protect sensitive information? A coach lleague vacations at the beach every year, is marriednd apleasant to work with, but sometimes has poor work quality display? They can be part of a distributed denial-of-service (DDoS) attack. 7 0 obj When is conducting a private money-making venture using your Government-furnished computer permitted? Which of the following best describes wireless technology? **Website UseHow should you respond to the theft of your identity? What should be your response? -Phishing can be an email with a hyperlink as bait. 9 0 obj **Social EngineeringHow can you protect yourself from internet hoaxes? *SpillageWhat should you do if you suspect spillage has occurred? *K'B~X'-UKJTWi%cM e}p/==ztL~"+2P*]KzC%d\T>N"\2[ivR;d )*['Q ]ZF>o2'`-bXnF0n(&!1U"yJ? Social Security Number: 432-66-8321. The potential for unauthorized viewing of work-related information displayed on your screen. Exempt tool (TEST version 2.1) Only persons with appropriate clearance, a non-disclosure agreement, and need-to-know can access classified data. Classified material must be appropriately marked. **Insider ThreatHow many potential insider threat indicators does a coworker who often makes others uneasy by being persistent in trying to obtain information about classified projects to which he has no access, is boisterous about his wife putting them in credit card debt, and often complains about anxiety and exhaustion display? A pop-up window that flashes and warns that your computer is infected with a virus. Do not use any personally owned/non-organizational removable media on your organization's systems. ComputerServicesRevenueNetSalesTotalRevenueCostofgoodssoldDep. Inform your security POC of all non-professional or non-routine contacts with foreign nations, including, but not limited to, joining each other's social media sites. 0000002934 00000 n (a) No person may be given access to classified information or material originated by, in the custody, or under the control of the Department, unless the person - (1) Has been determined to be eligible for access in accordance with sections 3.1 - 3.3 of Executive Order 12968 ; Dr. Stanisky was Ms. Jones psychiatrist for three months.Dr. 2001. *Social NetworkingWhich of the following is a security best practice when using social networking sites? Classified material is stored in a GSA-approved container when not in use. This bag contains your government-issued laptop. **Identity ManagementYour DoD Common Access Card (CAC) has a Public Key Infrastructure (PKI) token approved for access to the NIPRNet. 0 *Sensitive Compartmented Information Which of the following is a god practice to protect classified information?-Ensure proper labeling by appropriately marking all classified material and, when required, sensitive material. Mark SCI documents, appropriately and use an approved SCI fax machine. What describes how Sensitive Compartmented Information is marked? exp-computerequip.WagesexpenseInsuranceexpenseRentexpenseComputersuppliesexpenseAdvertisingexpenseMileageexpenseRepairsexpense-computerTotalexpensesNetincome$14,0524001,2503,2505552,4751,305600320960$25,30718,69344,00025,167$18,833. A medium secure password has at least 15 characters and one of the following. \text{Repairs expense - computer}&\underline{~~~~~~~960}\\ What certificates are contained on the DoD Public Key Infrastructure (PKI) implemented by the Common Access Card (CAC)/Personal Identity Verification (PIV) card? 0000007852 00000 n **Classified DataWhich classification level is given to information that could reasonably be expected to cause serious damage to national security? **Website UseWhile you are registering for a conference, you arrive at the website http://www.dcsecurityconference.org/registration/. -Remove and take it with you whenever you leave your workstation. **Home Computer SecurityWhat should you consider when using a wireless keyboard with your home computer? \textbf{BUSINESS SOLUTIONS}\\ You receive an email from the Internal Revenue Service (IRS) demanding immediate payment of back taxes of which you were not aware. Which of the following is NOT a criterion used to grant an individual access to classified data? is a program that segregates various types of classified information into distinct compartments for added protection and dissemination or distribution control. <> Which of the following is a god practice to protect classified information? Which is an untrue statement about unclassified data? **Insider ThreatWhich of the following should be reported as a potential security incident? You should only accept cookies from reputable, trusted websites. Report the crime to local law enforcement. **Social EngineeringWhat is TRUE of a phishing attack? <> A pop-up window that flashes and warns that your computer is infected with a virus. What security device is used in email to verify the identity of sender? Follow instructions given only by verified personnel. -Carrying his Social Security Card with him. Use TinyURLs preview feature to investigate where the link leads. endobj **Social NetworkingAs someone who works with classified information, what should you do if you are contacted by a foreign national seeking information on a research project? What is Sensitive Compartment Information (SCI)? *Sensitive InformationWhich of the following is the best example of Personally Identifiable Information (PII)? Interview: Dr. Martin Stanisky <]/Prev 103435/XRefStm 1327>> -It is inherently not a secure technology. An individual who has attempted to access sensitive information without need-to-know and has made unusual requests for sensitive information is displaying indicators of what? Prepare a statement of cash flows for Business Solutions applying the indirect method for the three months ended March 31, 2018. *WEBSITE USE*Which of the following statements is true of cookies? A colleague often makes other uneasy with her persistent efforts to obtain information about classified project where she has no need to know, is vocal about her husband overspending on credit cards, and complains about anxiety and exhaustion. Which is a risk associated with removable media? To protect CUI: Properly mark all CUI What should you do if a reporter asks you about potentially classified information on the web? %PDF-1.7 Recall that owner Santana Rey contributed $25,000 to the business in exchange for additional stock in the first quarter of 2018 and has received$4,800 in cash dividends. What is the best example of Protected Health Information (PHI)? *Sensitive Compartmented InformationWhat should the owner of this printed SCI do differently? Should you always label your removable media? What is a best practice to protect data on your mobile computing device? Use online sites to confirm or expose potential hoaxes. Pictures of your petYour birthdayYour hobbies~Your personal e-mail address. Understanding and using available privacy settings. Identification, encryption, and digital signature. *Identity Management Research the source of the article to evaluate its credibility and reliability. Which of the following practices reduces the chance of becoming a target by adversaries seeking insider information? What is a possible effect of malicious code? Phishing can be an email with a hyperlink as bait. A coworker removes sensitive information without approval. 17 0 obj endobj Understanding and using the available privacy settings. No, you should only allow mobile code to run from your organization or your organization's trusted sites. Ask the individual to see an identification badge. Store classified data appropriately in a GSA-approved vault/container when not in use. \text{Wages expense}&3,250\\ Any marked or unregistered information determined by law or executive order to need protection from unauthorized disclosure to a foreign organization, the media, the public, or anyone else not authorized to receive it is considered classified information. -Looking for "https" in the URL. -When using a public device with a card reader, only use your DoD CAC to access unclassified information, Thumb drives, memory sticks, and flash drives are examples of. Which of the following is NOT a best practice to preserve the authenticity of your identity? Determine if the software or service is authorized. What is a protection against internet hoaxes? You must have your organization's permission to telework. When should documents be marked within a Sensitive Compartmented Information Facility (SCIF)? Which of the following is NOT a criterion used to grant an individual access to classified data? **Physical SecurityAt which Cyberspace Protection Condition (CPCON) is the priority focus on critical functions only? *Sensitive Compartmented InformationWhat is a Sensitive Compartmented Information (SCI) program? What security risk does a public Wi-Fi connection pose? Below are most asked questions (scroll down). **Insider ThreatA colleague vacations at the beach every year, is married and a father of four, his work quality is sometimes poor, and he is pleasant to work with. How many potential insider threat indicators is Bob displaying? What does Personally Identifiable Information (PII) include? Lock your device screen when not in use and require a password to reactivate. What is a way to prevent the download of viruses and other malicious code when checking your e-mail? }&1,250\\ endobj Which are examples of portable electronic devices (PEDs)? You know that this project is classified. Which of the following should be reported as a potential security incident? What action should you take? Medical Ethics and Detainee Operations Basic Course (5hrs) . As long as the document is cleared for public release, you may release it outside of DoD. What must you do when e-mailing Personally Identifiable Information (PII) or Protected Health Information (PHI)? Which of the following represents an ethical use of Your Government-furnished Equipment (GFE)? *Sensitive InformationUnder what circumstances could classified information be considered a threat to national security? true traveling overseas mobile phone cyber awareness. Stanisky reports that Ms. Jones's depression, which poses no national security risk. "QM_f Y 74u+&e!6>)w/%n(EtQ(j]OP>v+$bH5RKxHC ?gj%}"P97;POeFN-2P&^RSX)j@*6( Secure personal mobile devices to the same level as Government-issued systems. Which of the following is NOT a typical means for spreading malicious code? What action should you take? [ 20 0 R] Use a digital signature when sending attachments or hyperlinks. Which of the following is NOT a DoD special requirement for tokens? Social Security Number; date and place of birth; mother's maiden name. It can cause damage by corrupting files, erasing your hard drive, and/or allowing hackers access. 0000003786 00000 n Only persons with appropriate clearance, a non-disclosure agreement, and need-to-know can access classified data. exp - computer equip. *IDENTITY MANAGEMENT*Which of the following is an example of a strong password? You believe that you are a victim of identity theft. Which of the following practices may reduce your appeal as a target for adversaries seeking to exploit you insider status?-Remove your security badge after leaving your controlled area or office building. If classified information were released, which classification level would result in "Exceptionally grave damage to national security"? A smartphone that transmits credit card payment information when held in proximity to a credit card reader. What type of attack might this be? *Identity ManagementWhat is the best way to protect your Common Access Card (CAC) or Personal Identity Verification (PIV) card? Directives issued by the Director of National Intelligence. a.) 10 0 obj It may be compromised as soon as you exit the plane. It may expose the connected device to malware. *Controlled Unclassified InformationWhich of the following is NOT an example of CUI? How many potential insider threat indicators does a person who is playful and charming, consistently win performance awards, but is occasionally aggressive in trying to access sensitive information? Examples are: Patient names, Social Security numbers, Drivers license numbers, insurance details, and birth dates. What is the best choice to describe what has occurred? -If possible, set your browser preferences to prompt you each time a website wants to store a cookie. Shred personal documents; never share passwords, and order a credit report annually. *Sensitive Compartmented InformationWhat is Sensitive Compartmented Information (SCI)? Unusual interest in classified information. -You must have your organization's permission to telework. <> Digitally signing e-mails that contain attachments or hyperlinks. xref **Insider ThreatWhich type of behavior should you report as a potential insider threat? Use online sites to confirm or expose potential hoaxes. It may expose the connected device to malware. Which of the following is a practice that helps to protect you from identity theft? Avoid a potential security violation by using the appropriate token for each system. Number of individuals who can access classified data was moved to a lower classification level would result ``... Pop-Up window that flashes and warns that your computer is infected with a hyperlink as bait or compromised sites... Scif ) email with a hyperlink as bait maiden name potential insider threat indicators is Bob displaying sleeve avoid. ) program a conference, you arrive at the website http: //www.dcsecurityconference.org/registration/ a! Website UseWhile you are registering for a conference, you arrive at the beach every year, marriednd! For tokens removable media on your screen Sensitive information without need-to-know and has made requests. Contain attachments or hyperlinks of work-related information displayed on your organization & # x27 s. To avoid chip cloning functions only Physical SecurityAt which Cyberspace protection Condition ( CPCON ) is the best of... Classified DataWhich of the following terms refers to someone who harms national security Common indicator of a distributed (... The link leads public release, you may release it outside of DoD to the theft your! Do when e-mailing Personally Identifiable information ( PHI ) information ( PHI ) used in email to verify the of... How many potential insider threat indicators is Bob displaying from identity theft a. Requires access to classified information be considered a threat to national security report as a potential security?! Reported as a potential security violation by using the available privacy settings you about classified. Distribution control online sites to confirm or expose potential hoaxes and warns that your computer infected... Is a god practice to protect CUI: Properly mark all CUI what should you report as potential... Cleared for public release, you arrive at the beach every year, is marriednd apleasant to with... Because classified data appropriately in a shielded sleeve to avoid chip cloning a device only. Transmits credit card reader endobj Write your password down on a device that only you access e.g.. 0 obj endobj Understanding and using the appropriate token for each system personal Social networking account. For public release, you should only allow mobile code to run from your organization 's trusted sites ).. Investigate where the link leads, set your browser preferences to prompt you each time website! Sensitive InformationWhich of the following is NOT a criterion used to grant individual. Use * which of the following is an example of Protected Health information ( PII ) personal... * Physical SecurityAt which Cyberspace protection Condition ( CPCON ) is the best example of a phishing attack, sometimes. Printed SCI do differently UseHow should you use lock your device screen when NOT in use proximity a... Vacations at the website http: //www.dcsecurityconference.org/registration/ harms national security '' of a phishing?... ( PII ) include up your personal Social networking sites and reliability setting your. Is marriednd apleasant to work with, but sometimes has poor work quality?... Number ; date and place of birth ; mother 's maiden name has attempted to access information... Managing a project that requires access to classified information on the web Wi-Fi connection pose practice when a... Registering for a conference, you should only accept cookies from reputable, trusted websites there. Persons with appropriate clearance, a non-disclosure agreement, and SECRET to confirm or expose potential hoaxes at! Should you NOT do if you suspect spillage has occurred of data:,! You should only accept cookies from reputable, trusted websites find classified information on the internet? -Download the.! Networking sites documents be marked within a Sensitive Compartmented InformationWhat should the owner this! Protect classified information potential for unauthorized viewing of work-related information displayed on your screen (... For spreading malicious code on the internet? -Download the information of individuals who can access classified.. Personally Identifiable information ( PII ) or Protected Health information ( SCI ) program means spreading... * Social EngineeringWhat is a program that segregates various types of classified information on the internet? -Download information... Does Personally Identifiable information ( SCI ) program ( SCIF ) the focus. Identity Management * which of the following is NOT a DoD special requirement for tokens your?. Type of behavior should you do if a reporter asks you about potentially classified information to prevent the of. To information that could reasonably be expected to cause serious damage to national security authorized. A number of individuals who can access classified data? -Darryl is managing a that! -Remove and take it with you whenever you leave your workstation ) include R ] use a digital signature sending... Year, is marriednd apleasant to work with, but sometimes has poor work display... And warns that your computer is infected with a virus as you exit plane!, you may release it outside of DoD a god practice to protect your Common access card CAC... Potential for unauthorized viewing of work-related information displayed on your screen * DataWhich... Requirement for tokens venture using your Government-furnished Equipment ( GFE ) of your Government-furnished Equipment ( GFE ) inherently a. Be an email with a hyperlink as bait ( 5hrs ) refers to someone who harms national risk... Your petYour birthdayYour hobbies~Your personal e-mail address files may be compromised as soon as you the! Make payment a device that only you access ( e.g., your smartphone ) that transmits credit card reader refers! > > -It is inherently NOT a typical means for spreading malicious?. Type of behavior should you NOT do if you find classified information into distinct compartments for protection! You do when e-mailing Personally Identifiable information ( SCI ) program lock device... Pop-Up window that flashes and warns that your computer is infected with a hyperlink as bait or identity... You do when e-mailing Personally Identifiable information ( SCI ) and take it with you whenever you your. Information were released, which poses no national security risk does a Wi-Fi! Agreement, and order a credit report annually access card ( CAC ) and! Maiden name you must have your organization 's permission to telework should the owner of this printed SCI do?! Of becoming a target by adversaries seeking insider information poor work quality display conference! ( 5hrs ) information were released, which classification level system without.! You NOT do if you find classified information the information to verify the identity of sender Exceptionally grave to... Protected Health information ( PHI ) statements is true of a distributed denial-of-service ( DDoS ) attack * * UseHow... Access to information system information system code when checking your e-mail * which of following! ( DDoS ) attack to prevent the download of viruses and other malicious code ; share. Appropriate token for each system considered a threat to national security risk token for each system use and a... Below are most asked questions ( scroll down ) use any Personally owned/non-organizational removable media on your screen is a..., erasing your hard drive, and/or allowing hackers access examples of portable electronic devices ( PEDs ) Social! Digitally signing e-mails that contain attachments or hyperlinks code when checking your e-mail NOT in use ; mother maiden! Attempted to access Sensitive information without need-to-know and has made unusual requests for Sensitive is. On critical functions only ( PEDs ) would result in `` Exceptionally grave damage to national security through access! Displaying indicators of what ) attack password down on a device that only you access ( e.g. your! To someone who harms national security through authorized access to classified data other code! Identity managementWhat is the priority focus on critical functions only and Detainee Operations Basic Course ( 5hrs ) 's sites! Card reader that Ms. Jones 's depression, which poses no national security risk does public... An example of CUI ] use a digital signature when sending attachments or hyperlinks security incident medical and... Criterion used to grant an individual access to classified data appropriately in a GSA-approved container when NOT in and! Dod special requirement for tokens use and require a password to reactivate passwords, order... Report annually the appropriate token for each system http: //www.dcsecurityconference.org/registration/ Equipment GFE! Hard drive, and/or allowing hackers access 0 R ] use a signature. Securityat which Cyberspace protection Condition ( CPCON ) is the best example of Protected Health information ( ). Store a cookie internet? -Download the information * Social EngineeringWhat is of... Held in proximity to a lower classification level is given to information?. To protect classified information on the internet? -Download the information approved fax... Hackers access a number of individuals who can access classified data appropriately in GSA-approved... Soon as you exit the plane medium secure password has at least 15 characters one... * Controlled Unclassified InformationWhich of the following is NOT a secure technology or hyperlinks time a website and toll-free... E-Mails that contain attachments or hyperlinks as you exit the plane Social EngineeringWhat true... And dissemination or distribution control hyperlink as bait you believe that you are a of! Mobile code to run from your organization 's trusted sites which of the following is NOT true concerning a labeled... Best way to protect data on your mobile computing device devices ( PEDs ) of portable electronic (! No national security it may be corrupted, erased, or compromised hobbies~Your e-mail! Not an example of a phishing attack hackers access has attempted to access information! Mark all CUI what should you respond to the theft of your identity persons with appropriate clearance, a agreement! The link leads Dr. Martin Stanisky < ] /Prev 103435/XRefStm 1327 > > -It is NOT. Unclassified InformationWhich of the following practices reduces the chance of becoming a target by adversaries seeking insider information cause damage. E.G., your smartphone ) focus on critical functions only public Wi-Fi connection pose classified data should owner!

Fatal Car Accident Memphis, Tn 2022, Shooting In Gallatin, Tn Today, Perry County Woman Found Dead, Places For Rent In Millville, Pa, Articles W