When checking in at the airline counter for a business trip, you are asked if you would like to check your laptop bag. Use a common password for all your system and application logons. Which of the following includes Personally Identifiable Information (PII) and Protected Health Information (PHI)? Do not access links or hyperlinked media such as buttons and graphics in email messages.
Seeker - Vacancy - Detail Overview Refer the vendor to the appropriate personnel. What should you do? (Malicious Code) Upon connecting your Government-issued laptop to a public wireless connection, what should you immediately do? Remove your security badge, common access card (CAC), or personal identity verification (PIV) card. Which of the following is a proper way to secure your CAC/PIV?
Which of these are true of unclassified data? - Answers correct. Malicious code can include viruses, worms, and macros. Which is a way to protect against phishing attacks? Store classified data in a locked desk drawer when not in use Maybe Mark SCI documents appropriately and use an approved SCI fax machine. *Spillage Which of the following may help prevent inadvertent spillage? Look for a digital signature on the email. If aggregated, the classification of the information may not be changed. Setting weekly time for virus scan when you are not on the computer and it is powered off.
Effects of different carbon substrates on PAHs fractions and microbial The annual Cyber Awareness Challenge is a course that helps authorized users learn how to best avoid and reduce threats and vulnerabilities in an organizations system. Cyber Awareness 2022. **Identity management Which of the following is an example of two-factor authentication? Which of the following personally-owned computer peripherals is permitted for use with Government-furnished equipment? Upon connecting your Government- issued laptop to a public wireless connection, what should you immediately do? What information most likely presents a security risk on your personal social networking profile? You receive an email at your official Government email address from an individual at the Office of Personnel Management (OPM). Taking classified documents from your workspace. The age of the driver may top the list of variables. You receive an unexpected email from a friend: I think youll like this: https://tinyurl.com/2fcbvy. What action should you take?
which of the following is true about unclassified data - Soetrust Use only personal contact information when establishing personal social networking accounts, never use Government contact information. Use only your personal contact information when establishing your account. **Social Networking Which piece if information is safest to include on your social media profile? How can you protect your information when using wireless technology? Based on the description that follows, how many potential insider threat indicator (s) are displayed? Which is NOT a wireless security practice? Select the information on the data sheet that is personally identifiable information (PII). Search by Subject Or Level. Decline to let the person in and redirect her to security. (Malicious Code) While you are registering for a conference, you arrive at the website http://www.dcsecurityconference.org/registration/. What action should you take first? **Classified Data Which of the following is true of telework? Refer the reporter to your organizations public affairs office. Correct. **Travel What is a best practice while traveling with mobile computing devices? When operationally necessary, owned by your organization, and approved by the appropriate authority. Controlled Unclassified Information (CUI) is information that requires safeguarding or dissemination controls pursuant to and consistent with applicable law, regulations, and government-wide policies but is not classified under Executive Order 13526 or the Atomic Energy Act, as amended. Social Security Number, date and place of birth, mothers maiden name. Which of the following is true of Controlled Unclassified information (CUI)? **Social Networking Which of the following best describes the sources that contribute to your online identity? Adversaries exploit social networking sites to disseminate fake news. (Spillage) Which of the following practices may reduce your appeal as a target for adversaries seeking to exploit your insider status? When using a fax machine to send sensitive information, the sender should do which of the following? You receive an inquiry from a reporter about government information not cleared for public release. **Insider Threat What type of activity or behavior should be reported as a potential insider threat? Which of the following is an example of punishment by application? Unauthorized Disclosure of Classified Information and Controlled Unclassified Information . **Social Networking When may you be subject to criminal, disciplinary, and/or administrative action due to online misconduct? Not correct. **Insider Threat What function do Insider Threat Programs aim to fulfill? You know this project is classified. CUI is an umbrella term that encompasses many different markings toidentifyinformationthat is not classified but which should be protected. Appropriate clearance; signed and approved non-disclosure agreement; and need-to-know. Which of the following does NOT constitute spillage? What action is recommended when somebody calls you to inquire about your work environment or specific account information? CUI is not classified information. Use TinyURLs preview feature to investigate where the link leads. All data transfers via the internet are not 100% secure and there might be some security vulnerabilities. Unauthorized Disclosure of Classified Information for DoD, Security Awareness: Derivative Classification Answers, CITI Ethics, Responsible Conduct, RCR, Law, HTH And IRB Answers, EVERFI Achieve Consumer Financial Education Answers, Security Pro: Chapter 3 (3.1.8) & 4.1 Security Policies Answers, CITI Module #3 Research in Public Elementary and Secondary Schools, Answers to CTS Unit 7 Lab 7-2: Protocols and Services SNMP, Google Analytics Individual Qualification Exam Answers, Everfi Module 4 Credit Scores Quiz Answers, Which Of The Following Is Not Considered A Potential Insider Threat Indicator. What would you do if you receive a game application request on your government computer that includes permission to access your friends, profile information, cookies, and sites visited? A colleague removes sensitive information without seeking authorization in order to perform authorized telework. (Spillage) When classified data is not in use, how can you protect it? -TRUE What action is recommended when somebody calls you to inquire about your work environment or specific account information? What is the response to an incident such as opening an uncontrolled DVD on a computer in a SCIF. Which type of information includes personal, payroll, medical, and operational information? Since the URL does not start with https, do not provide your credit card information. Classification markings and handling caveats. Course Introduction Introduction . What should you do?
which of the following is true about unclassified data - Weegy Discrete data involves whole numbers (integers - like 1, 356, or 9) that can't be divided based on the nature of what they are. **Mobile Devices What should you do when going through an airport security checkpoint with a Government-issued mobile device? (Sensitive Information) Which of the following is true about unclassified data? **Insider Threat Based on the description that follows, how many potential insider threat indicator(s) are displayed? CUI was established to standardize the way the Executive branch handles sensitive information that requires dissemination controls. He has the appropriate clearance and a signed, approved, non-disclosure agreement. What is a proper response if spillage occurs? Ask them to verify their name and office number.
Cyber Awareness 2020 Knowledge Check Flashcards | Quizlet All https sites are legitimate and there is no risk to entering your personal info online. Remove your security badge after leaving your controlled area or office building. Which scenario might indicate a reportable insider threat? Which Of The Following Statements About Adding Social Networks To Hootsuite Is False?
PDF Unauthorized Disclosure of Classified Information and Controlled - CDSE They can be part of a distributed denial-of-service (DDoS) attack. After clicking on a link on a website, a box pops up and asks if you want to run an application. Correct. The Chinese Spy Balloon Showdown The discovery of a Chinese surveillance balloon floating over the United States has added to the rising tensions between the two superpowers. A coworker has asked if you want to download a programmers game to play at work. **Classified Data Which of the following must you do before using and unclassified laptop and peripherals in a collateral environment? **Classified Data Which of the following is true of protecting classified data? What is the best response if you find classified government data on the internet? Which of the following is NOT a social engineering tip? Of the following, which is NOT a characteristic of a phishing attempt? (Sensitive Information) What type of unclassified material should always be marked with a special handling caveat? Which Of The Following Is Not A Correct Way To Protect CUI. What is a best practice for protecting controlled unclassified information (CUI)? -It must be released to the public immediately. You are having lunch at a local restaurant outside the installation, and you find a cd labeled favorite song. Store classified data appropriately in a GSA-approved vault/container when not in use. As a best practice, labeling all classified removable media and considering all unlabeled removable media as unclassified. Store your Common Access Card (CAC) or Personal Identity Verification (PIV) card in a shielded sleeve ~Write your password down on a device that only you access (e.g., your smartphone) Change your password at least every 3 months Enable two-factor authentication whenever available, even for personal accounts. Which of the following is a best practice to protect information about you and your organization on social networking sites and applications? **Identity management Which is NOT a sufficient way to protect your identity? Unclassified information cleared for public release. Lionel stops an individual in his secure area who is not wearing a badge. Which of the following is NOT a home security best practice?
Back To Business I.T. on LinkedIn: #mfa #2fa #multifactorauthentication