Which of these is true of unclassified data? Never allow sensitive data on non-Government-issued mobile devices. View email in plain text and dont view email in Preview Pane. Which of the following should you NOT do if you find classified information on the internet? Lionel stops an individual in his secure area who is not wearing a badge. Use the classified network for all work, including unclassified work. Which of these are true of unclassified data? - Answers Controlled Unclassified Information (CUI) | GSA Digitally signed e-mails are more secure. Annual DoD Cyber Awareness Challenge Training, DOD Cyber Awareness Challenge 2019: Knowledge, DOD Cyber Awareness Challenge 2019 (DOD-IAA-V, Operations Management: Sustainability and Supply Chain Management, Elliot Aronson, Robin M. Akert, Samuel R. Sommers, Timothy D. Wilson, Anderson's Business Law and the Legal Environment, Comprehensive Volume, David Twomey, Marianne Jennings, Stephanie Greene. How do you respond? Malicious code can do the following except? What level of damage can the unauthorized disclosure of information classified as confidential reasonably be expected to cause? Law Enforcement Sensitive (LES),and others. *Social Networking Which of the following best describes a way to safely transmit Controlled Unclassified Information (CUI)? Correct, Someone who uses authorized access, wittingly or unwittingly, to harm national security through unauthorized disclosure or other actions that may cause the loss or degradation of resources or capabilities. New interest in learning another language, Which of the following is a good practice to protect classified information. *Spillage What is a proper response if spillage occurs? Which of the following is true of the Common Access Card (CAC)? (Sensitive Information) What must the dissemination of information regarding intelligence sources, methods, or activities follow? Refer the vendor to the appropriate personnel. When gases are sold they are usually compressed to high pressures. Definition 1 / 24 -It must be released to the public immediately. A measure of how much useful work each unit of input energy provides. Note any identifying information and the websites Uniform Resource Locator (URL). You must possess security clearance eligibility to telework. A colleague is playful and charming, consistently wins performance awards, and is occasionally aggressive in trying to access classified information. Badges must be visible and displayed above the waist at all times when in the facility. When leaving your work area, what is the first thing you should do? Remove your security badge, common access card (CAC), or personal identity verification (PIV) card. In the following situations, determine if the duty describes would be one of the Fed is responsible or is not responsible to enforce. Phishing can be an email with a hyperlink as bait. You must have your organizations permission to telework. Back up your data: This will help you recover your data if it's lost or corrupted. Is this safe? Log in for more information. Correct. You check your bank statement and see several debits you did not authorize. General Services Administration (GSA) approval. Which of the following is true about telework? Store it in a shielded sleeve to avoid chip cloning. Contact the IRS using their publicly available, official contact information. Which is an untrue statement about unclassified data? - Getvoice.org (Malicious Code) Which of the following is NOT a way that malicious code spreads? Which of the following is NOT an example of CUI? What is considered a mobile computing device and therefore shouldnt be plugged in to your Government computer? They may wittingly or unwittingly use their authorized access to perform actions that result in the loss or degradation of resources or capabilities. What information should you avoid posting on social networking sites? A coworker wants to send you a sensitive document to review while you are at lunch and you only have your personal tablet. What is an individual's Personally Identifiable Information (PII) or Protected Health Information (PHI) considered? Which of following is true of protecting classified data? CPCON 5 (Very Low: All Functions). What information posted publicly on your personal social networking profile represents a security risk? Everything you need to know aboutControlled UnclassifiedInformation(CUI). Classified Information can only be accessed by individuals with. -Ask them to verify their name and office number Controlled unclassified information. What is an individual's Personally Identifiable Information (PII) or Protected Health Information (PHI) considered? Where. Research the source to evaluate its credibility and reliability. 870 Summit Park Avenue Auburn Hills, MI 48057. correct. Which of the following is true of Sensitive Compartmented Information (SCI)? Which of the following is not considered an example of data hiding? Create separate user accounts with strong individual passwords. **Physical Security Within a secure area, you see an individual who you do not know and is not wearing a visible badge. A type of phishing targeted at high-level personnel such as senior officials. Updated 8/5/2020 8:06:16 PM. Which of the following statements is TRUE about the use of DoD Public Key Infrastructure (PKI) tokens? Even within a secure facility, dont assume open storage is permitted. ~All documents should be appropriately marked, regardless of format, sensitivity, or classification. A coworker brings a personal electronic device into prohibited areas. **Mobile Devices What should you do when going through an airport security checkpoint with a Government-issued mobile device? What portable electronic devices (PEDs) are permitted in a SCIF? What should you do? Download the information. (Insider Threat) Based on the description that follows, how many potential insider threat indicator(s) are displayed? **Identity management Which of the following is an example of a strong password? Right-click the link and select the option to preview??? When traveling or working away from your main location, what steps should you take to protect your devices and data? What does Personally Identifiable information (PII) include? not correct. Which may be a security issue with compressed Uniform Resource Locators (URLs)? Under What Circumstances Could Unclassified? The CAC/PIV is a controlled item and contains certificates for: An individual who has attempted to access sensitive information without need-to-know and has made unusual requests for sensitive information is displaying indicators of what? Don't talk about work outside your workspace unless it is a specifically designated public meeting environment and is controlled by the event planners. What should you do? Of the following, which is NOT a characteristic of a phishing attempt? (Spillage) What advantages do insider threats have over others that allows them to cause damage to their organizations more easily? After clicking on a link on a website, a box pops up and asks if you want to run an application. Effects of different carbon substrates on PAHs fractions and microbial cyber-awareness. Which of the following is a practice that helps to prevent the download of viruses and other malicious code when checking your email? This is information that, if released to the public, carries no injury to personal, industry, or government interests. Immediately notify your security point of contact. Being cognizant of classification markings and labeling practices are good strategies to avoid inadvertent spillage. How should you respond? Correct. Ask the individual to see an identification badge. Which of the following is NOT a correct way to protect sensitive information? Coworker making consistent statements indicative of hostility or anger toward the United States and its policies. Understanding Controls on Unclassified Government Information A colleague abruptly becomes hostile and unpleasant after previously enjoying positive working relationships with peers, purchases an unusually expensive new car, and has unexplained absences from work. -TRUE The use of webmail is -is only allowed if the organization permits it Using webmail may bypass built in security features. b. (Spillage) Which of the following is a best practice to protect information about you and your organization on social networking sites and applications? What should you do? Federal agencies routinely generate, use, store, and share information that, while not meeting the threshold for classification as national security or atomic energy information, requires some level of protection from unauthorized access and release. This answer has been confirmed as correct and helpful. It contains certificates for identification, encryption, and digital signature. classified-document. (Sensitive Information) What certificates are contained on the Common Access Card (CAC)? Which of the following can an unauthorized disclosure of information classified as Confidential reasonably be expected to cause? Verify the identity of all individuals.??? What should the participants in this conversation involving SCI do differently? Someone who uses authorized access, wittingly or unwittingly, to harm national security through unauthorized disclosure or other actions that may cause the loss or degradation of resources or capabilities. Malicious code can include viruses, worms, and macros. What would you do if you receive a game application request on your government computer that includes permission to access your friends, profile information, cookies, and sites visited? 1.1.5 Controlled Unclassified Information. There is no way to know where the link actually leads. Controlled Unclassified Information (CUI) is information that requires safeguarding or dissemination controls pursuant to and consistent with applicable law, regulations, and government-wide policies but is not classified under Executive Order 13526 or the Atomic Energy Act, as amended. Of the following, which is NOT a method to protect sensitive information? Store it in a locked desk drawer after working hours. How can you protect data on your mobile computing and portable electronic devices (PEDs)? *Spillage You find information that you know to be classified on the Internet. What does Personally Identifiable Information (PII) include? A colleague abruptly becomes hostile and unpleasant after previously enjoying positive working relationships with peers, purchases an unusually expensive car, and has unexplained absences from work. Maintain possession of your laptop and other government-furnished equipment (GFE) at all times. What is considered ethical use of the Government email system? What structures visible in the stained preparation were invisible in the unstained preparation? Use personally-owned wired headsets and microphones only in designated areas, New interest in learning a foreign language. Unauthorized Disclosure of Classified Information for DoD, Security Awareness: Derivative Classification Answers, CITI Ethics, Responsible Conduct, RCR, Law, HTH And IRB Answers, EVERFI Achieve Consumer Financial Education Answers, Security Pro: Chapter 3 (3.1.8) & 4.1 Security Policies Answers, CITI Module #3 Research in Public Elementary and Secondary Schools, Answers to CTS Unit 7 Lab 7-2: Protocols and Services SNMP, Google Analytics Individual Qualification Exam Answers, Everfi Module 4 Credit Scores Quiz Answers, Which Of The Following Is Not Considered A Potential Insider Threat Indicator. What should you do? Which of the following is a concern when using your Government-issued laptop in public? What should you do if a reporter asks you about potentially classified information on the web? Hostility or anger toward the United States and its policies. *Malicious Code Which of the following is NOT a way that malicious code spreads? Antihistamines are used to treat the symptoms, such as sneezing, that are due to inflammation caused by irritants in the airways. *Controlled Unclassified Information Which of the following is NOT an example of CUI? (Home computer) Which of the following is best practice for securing your home computer? Exceptionally grave damage. Filter by: All $ Off % Off Free Online Offline. The physical security of the device. A user writes down details from a report stored on a classified system marked as Secret and uses those details to draft an unclassified briefing on an unclassified system without authorization. Use the classified network for all work, including unclassified work. Which scenario might indicate a reportable insider threat? Which of the following is an example of two-factor authentication? a. Do not use any personally owned/non-organizational removable media on your organizations systems. **Identity Management Which of the following is the nest description of two-factor authentication? Sensitive information may be stored on any password-protected system. Do not access website links, buttons, or graphics in e-mail. correct. CPCON 2 (High: Critical and Essential Functions) What are the requirements to be granted access to sensitive compartmented information (SCI)? Classified data: (Scene) Which of the following is true about telework? All of these. Mark SCI documents appropriately and use an approved SCI fax machine. *Sensitive Information What is the best example of Personally Identifiable Information (PII)? A 3%3\%3% penalty is charged for payment after 303030 days. cyber-awareness. Which of the following is true of using DoD Public key Infrastructure (PKI) token? This task is performed with the aim of finding similarities in data points and grouping similar data points together. If authorized, what can be done on a work computer? Secure .gov websites use HTTPS I may decide not to consent to these terms, but, if I do not consent to all of these terms, then I agree not to proceed with creating an account or moving forward with filling out the application, and I understand that I will not be . As long as the document is cleared for public release, you may share it outside of DoD. Media containing Privacy Act information, PII, and PHI is not required to be labeled. CUI may be stored on any password-protected system. A colleague enjoys playing video games online, regularly use social media, and frequently forgets to secure her smartphone elsewhere before entering areas where it is prohibited. *Sensitive Information Under what circumstances could classified information be considered a threat to national security? Ask for information about the website, including the URL. New answers. Connect to the Government Virtual Private Network (VPN).?? (2) War planning documents which contain worldwide -- (a) Planning data and assumptions, (b) Wartime planning factors for the use of nuclear weapons, (c) Intelligence estimates of enemy capabilities, (d) Force composition and development, and NARAissuespolicy directives and publishesan annualreportto the President of the United Stateson the status of agency CUI Program implementation in accordance with Executive Order 13556, Controlled Unclassified Information. (removable media) If an incident occurs involving removable media in a Sensitive Compartmented Information Facility (SCIF), what action should you take? When operationally necessary, owned by your organization, and approved by the appropriate authority. Which of the following is a clue to recognizing a phishing email? (Mobile Devices) Which of the following statements is true? which of the following is true about unclassified data. Which of the following is a best practice to protect information about you and your organization on social networking sites and applications? The email provides a website and a toll-free number where you can make payment. Cyber Awareness 2022 I Hate CBT's Setting weekly time for virus scan when you are not on the computer and it is powered off. What should you do if someone forgets their access badge (physical access)? A program that segregates various types of classified information into distinct compartments for added protection and dissemination or distribution control. (Sensitive Information) What guidance is available from marking Sensitive Information information (SCI)? Debra ensures not correct Which of the following is NOT true of traveling overseas with a mobile phone? c. What similarities and differences are there between plant and animal cells? Which of the following is true of internet hoaxes? Not correct Bob, a coworker, has been going through a divorce, has financial difficulties and is displaying hostile behavior. What should be your response? 1).Compared with CK, straw addition treatments (S and SG) significantly (P < 0.01) increased the emission rate and cumulative emission of CO 2 and the cumulative CO 2 . What information most likely presents a security risk on your personal social networking profile?