Files may be corrupted, erased, or compromised. 3 0 obj Memory sticks, flash drives, or external hard drives. *INSIDER THREAT*What threat do insiders with authorized access to information or information systems pose? You receive an email from a company you have an account with. Store classified data appropriately in a GSA-approved vault/container when not in use. What is required for an individual to access classified data? Which of the following is NOT a good way to protect your identity? Is this safe? Refer the reporter to your organizations public affairs office. What should be done to protect against insider threats? What should you do? **Home Computer SecurityWhat should you consider when using a wireless keyboard with your home computer? 0000015479 00000 n *Insider ThreatWhich type of behavior should you report as a potential insider threat? Avoid using non-Bluetooth-paired or unencrypted wireless computer peripherals. This bag contains your government-issued laptop. endobj Which of the following represents an ethical use of Your Government-furnished Equipment (GFE)? Coworker making consistent statements indicative of hostility or anger toward the United States in its policies. Which of the following is NOT Protected Health Information (PHI)? Which of the following is NOT a criterion used to grant an individual access to classified data? **Insider ThreatWhich of the following is NOT considered a potential insider threat indicator? 0000008555 00000 n Which of the following is NOT true concerning a computer labeled SECRET? What are some examples of removable media? Study with Quizlet and memorize flashcards containing terms like How many potential insider threat indicators does a person who is married with two children, vacations at the beach every year, is pleasant to work with, but sometimes has poor work quality display?, What is the best response if you find classified government data on the internet?, After reading an online story about a new . *Sensitive InformationUnder what circumstances could classified information be considered a threat to national security? *Classified DataWhich of the following individuals can access classified data?-Darryl is managing a project that requires access to classified information. How many potential insider threat indicators does this employee display? <> Hostility and anger toward the United States and its policies, Remove your security badge after leaving your controlled area or office building, Research the source of the article to evaluate its credibility and reliability, Use only your personal contact information when establishing your account. What should you do to protect classified data? How many potential insiders threat indicators does this employee display? Government-owned PEDs when expressly authorized by your agency. **Website UseWhile you are registering for a conference, you arrive at the website http://www.dcsecurityconference.org/registration/. 0000000016 00000 n exp-officeequip.Dep. *USE OF GFE*What is a critical consideration on using cloud-based file sharing and storage applications on your Government-furnished equipment (GFE)? What is considered a mobile computing device and therefore shouldn't be plugged in to your Government computer? What are some actions you can take to try to protect your identity? The email provides a website and a toll-free number where you can make payment. **Social EngineeringWhich of the following is a way to protect against social engineering? The email provides a website and a toll-free number where you can make payment. Use online sites to confirm or expose potential hoaxes. Your DoD Common Access Card (CAC) has a Public Key Infrastructure (PKI) token approved for access to the Non-Classified Internet Protocol Router Network NIPRNet. Darryl is managing a project that requires access to classified information. **Classified DataWhich of the following is true of telework? Identify and disclose it with local Configuration/Change Management Control and Property Management authorities. **Social NetworkingWhen is the safest time to post details of your vacation activities on your social networking profile? *MALICIOUS CODE*Which of the following is NOT a way malicious code spreads? Which of the following individuals can access classified data? Neither confirm or deny the information is classified. Which of the following best describes wireless technology? Do not access website links, buttons, or graphics in e-mail. Which of the following statements is true of using Internet of Things (IoT) devices in your home? The website requires a credit card for registration. -Always use DoD PKI tokens within their designated classification level. A colleague has won 10 high-performance awards, can be playful and charming, is not currently in a relationship, and is occasionally aggressive in trying to access sensitive information. After you have returned home following the vacation. Which of the following activities is an ethical use of Government-furnished equipment (GFE)? How should you respond to the theft of your identity?-Notify law enforcement. You know that this project is classified. Investigate the links actual destination using the preview feature. Report the crime to local law enforcement. What is a way to prevent the download of viruses and other malicious code when checking your e-mail? \text{Repairs expense - computer}&\underline{~~~~~~~960}\\ Which of the following terms refers to harm inflicted on national security through authorized access to information or information systems? What must you do when e-mailing Personally Identifiable Information (PII) or Protected Health Information (PHI)? endstream What should you do? trailer endobj Which is NOT a sufficient way to protect your identity? *Home Computer Security Cyber Awareness Challenge Complete Questions and Answers. What should you do if someone forgets their access badge (physical access)? Which of the following attacks target high ranking officials and executives? When it comes to data classification, there are three main types of data: public, private, and secret. A colleague has visited several foreign countries recently, has adequate work quality, speaks openly of unhappiness with U.S. foreign policy, and recently had his car repossessed. Your health insurance explanation of benefits (EOB). A smartphone that transmits credit card payment information when held in proximity to a credit card reader. ->qJA8Xi9^CG#-4ND_S[}6e`[W'V+W;9oSUgNq2nb'mi! *Controlled Unclassified InformationWhich of the following is NOT a correct way to protect CUI? endobj He has the appropriate clearance and a signed, approved non-disclosure agreement. How many potential insider threat indicators does this employee display? Since the URL does not start with "https," do not provide you credit card information. What type of security is "part of your responsibility" and "placed above all else?". Which of the following is NOT considered a potential insider threat indicator? 0000005630 00000 n Note any identifying information, such as the websites URL, and report the situation to your security POC. It may expose the connected device to malware. The email provides a link to a personnel portal where you must enter your personal information as part of an effort to standardize recordkeeping. A well-planned data classification system makes essential data easy to find and retrieve. Dr. Stanisky was Ms. Jones psychiatrist for three months.Dr. To protect CUI: Properly mark all CUI Avoid using non-Bluetooth-paired or unencrypted wireless computer peripherals. It is permissible to release unclassified information to the public prior to being cleared. A colleague has won 10 high-performance awards, can be playful and charming, is not currently in a relationship, and is occasionally aggressive in trying to access sensitive information. While you are registering for a conference, you arrive at the website http://www.dcsecurityconference.org/registration/. *Sensitive Compartmented Information Thumb drives, memory sticks, and optical disks. Wait until you have access to your government-issued laptop. **Identity managementWhich of the following is an example of a strong password? When checking in at the airline counter for a business trip, you are asked if you would like to check your laptop bag. Ask for information about the website, including the URL. <> Upon connecting your Government-issued laptop to a public wireless connection, what should you immediately do? endobj Select the information on the data sheet that is protected health information (PHI). 0000041351 00000 n hb```b``a`e`b`@ x`d`XV461ql04F;N8J(^ 1dIi&:=qA@ 1UPn l&% %@,f42@fg!s-fN+L! Which of the following is true about telework? Difficult life circumstances such as substance abuse; divided loyalty or allegiance to the U.S.; or extreme, persistent interpersonal difficulties. DEPARTMENT OF DEFENSE ORGANIZATION questions with answers 2023. Your cousin posted a link to an article with an incendiary headline on social media. Which of the following is a good practice to aid in preventing spillage? Avoid using the same password between systems or applications. In setting up your personal social networking service account, what email address should you use? *Use of GFE mobile devices and applications can track Your location without your knowledge or consent. What level of cyber protection does each of the following factors require? Media containing Privacy Act information, PII, and PHI is not required to be labeled. Mark SCI documents, appropriately and use an approved SCI fax machine. Government-owned PEDs when expressly authorized by your agency. -Remove security badge as you enter a restaurant or retail establishment. Of the following, which is NOT a problem or concern of an Internet hoax? Spillage because classified data was moved to a lower classification level system without authorization. The popup asks if you want to run an application. <> Identify and disclose it with local Configuration/Change Management Control and Property Management authorities. Do not access links or hyperlinked media such as buttons and graphics in email messages. -Assuming open storage is always authorized in a secure facility, -Telework is only authorized for unclassified and confidential information, -Taking classified documents from your workspace. What is Sensitive Compartment Information (SCI)? What is a protection against internet hoaxes? Always use DoD PKI tokens within their designated classification level. *Identity ManagementWhat is the best way to protect your Common Access Card (CAC) or Personal Identity Verification (PIV) card? How many potential insider threat indicators is Bob displaying? Under what circumstances could unclassified information be considered a threat to national security? BUSINESSSOLUTIONSComparativeBalanceSheetDecember31,2017,andMarch31,2018, BUSINESSSOLUTIONSIncomestatementForThreeMonthsEndedMarch31,2018\begin{array}{c} In which situation below are you permitted to use your PKI token? An individual can be granted access to classified information provided the following criteria are satisfied? On a NIPRNet system while using it for a PKI-required task. endobj You must possess security clearance eligibility to telework. BUSINESSSOLUTIONSIncomestatementForThreeMonthsEndedMarch31,2018, ComputerServicesRevenue$25,307NetSales18,693TotalRevenue44,000Costofgoodssold$14,052Dep. Of the following, which is NOT a method to protect sensitive information? Someone calls from an unknown number and says they are from IT and need some information about your computer. Explain your reasoning. Aw\cy{bMsJ7tG_7J-5kO~*"+eq7 ` (NO]89#>U_~_:EHwO+u+\[M\!\kKnR^{[%d'8[e#ch_~-F7en~`ZV6GOt? What can help to protect the data on your personal mobile device? -It is inherently not a secure technology. *Social EngineeringWhat action should you take with an e-mail from a friend containing a compressed Uniform Resource Locator (URL)?-Investigate the links actual destination using the preview feature. Wq2m\T>]+6/U\CMOC(\eGLF:3~Td8`c>S^`0TBj8J@/*v;V,~){PfL"Ya)7uukjR;k2\R(9~4.Wk%L/~;|1 K\2Hl]\q+O_Zq[ykpSX.6$^= oS+E.S BH+-Ln(;aLXDx) Which may be a Security issue with compressed Uniform Resource Locators (URLs)? *Malicious CodeAfter visiting a website on your Government device, a popup appears on your screen. *Sensitive Compartmented InformationWhen should documents be marked within a Sensitive Compartmented Information Facility (SCIF). *Sensitive Compartmented InformationWhat guidance is available for marking Sensitive Compartmented Information (SCI)? Social Security Number; date and place of birth; mothers maiden name. *Identity Management What certificates are contained on the DoD Public Key Infrastructure (PKI) implemented by the Common Access Card (CAC)/Personal Identity Verification (PIV) card? *WEBSITE USE*Which of the following statements is true of cookies? **Use of GFEUnder what circumstances is it acceptable to use your Government-furnished computer to check personal e-mail and do other non-work-related activities? He has the appropriate clearance and a signed, approved, non-disclosure agreement. What must users do when using removable media within a Sensitive Compartmented Information Facility (SCIF)? **Insider ThreatBased on the description that follows, how many potential insider threat indicator(s) are displayed? It includes a threat of dire circumstances. \text{Dep. You receive a call on your work phone and you're asked to participate in a phone survey. *Sensitive Compartmented InformationWhat action should you take if you become aware that Sensitive Compartmented Information (SCI) has been compromised? It displays a label showing maximum classification, date of creation, point of contact, and Change Management 9CM) Control Number. Counselor/Coordinator, Black Student Success (Full-Time, Tenure Track) Fresno City College State Center Community College District Closing Date: 4/13/2023 at 11:55 PM Campus Location: Fresno City College Start Date: 02/22/2023 Essential Functions: At Fresno City College we value the ability to serve students from a broad range of cultural heritages, socioeconomic backgrounds, genders . endobj Hostility and anger toward the United States and its policies. A coworker brings a personal electronic device into a prohibited area. Of the following, which is NOT a problem or concern of an Internet hoax? Which organization issues the directives concerning the dissemination of information regarding intelligence sources, methods, or activities? -When using a public device with a card reader, only use your DoD CAC to access unclassified information, Thumb drives, memory sticks, and flash drives are examples of. You receive an email from the Internal Revenue Service (IRS) demanding immediate payment of back taxes of which you were not aware. What should you do to protect yourself while on social networks? Spear Phishing attacks commonly attempt to impersonate email from trusted entities. What should you do? -Ask them to verify their name and office number. **Home Computer SecurityHow can you protect your information when using wireless technology? Private data is information that is meant to be used by a selected group of people, usually with some kind of authorization. *TravelWhat security risk does a public Wi-Fi connection pose? Which is a risk associated with removable media? **Classified DataWhat level of damage can the unauthorized disclosure of information classified as Confidential reasonably be expected to cause? *Spillage.What should you do if a reporter asks you about potentially classified information on the web? The website requires a credit card for registration. **Insider ThreatBased on the description that follows, how many potential insider threat indicator(s) are displayed? A pop-up window that flashes and warns that your computer is infected with a virus. If aggregated, the information could become classified. DoD employees are prohibited from using a DoD CAC in card-reader-enabled public devices. Decline So That You Maintain Physical Control of Your Government-Issued Laptop. Secure it to the same level as Government-issued systems. Who can be permitted access to classified data? <]/Prev 103435/XRefStm 1327>> Cybersecurity is the ongoing effort to protect individuals, organizations and governments from digital attacks by protecting networked systems and data from unauthorized use or harm. <>/ExtGState<>/ProcSet[/PDF/Text/ImageB/ImageC/ImageI] >>/MediaBox[ 0 0 612 792] /Contents 4 0 R/Group<>/Tabs/S/StructParents 0>> [ 13 0 R] How should you protect your Common Access Card (CAC) or Personal Identity Verification (PIV) card? *Sensitive Compartmented InformationWhat must the dissemination of information regarding intelligence sources, methods, or activities follow? As long as the document is cleared for public release, you may share it outside of DoD. Based on the description that follows, how many potential insider threat indicator(s) are displayed? What is required for an individual to access classified data? You know this project is classified. What should you do? **Social NetworkingWhat should you do if you receive a game application request that includes permission to access your friends, profile information, cookies, and sites visited? **TravelWhat security risk does a public Wi-Fi connection pose? While on vacation, a coworker calls and asks you to access a site to review and approve a document that is hosted behind a DoD Public Key Infrastructure (PKI) protected webpage. Digitally signing e-mails that contain attachments or hyperlinks. Based on the description that follows how many potential insider threat indicators are displayed? When classified data is not in use, how can you protect it? *Sensitive Compartmented InformationWhich must be approved and signed by a cognizant Original Classification Authority (OCA)? A pop-up window that flashes and warns that your computer is infected with a virus. *SpillageAfter reading an online story about a new security project being developed on the military installation where you work, your neighbor asks you to comment about the article. *Insider ThreatWhich of the following practices may reduce your appeal as a target for adversaries seeking to exploit your insider status? Only persons with appropriate clearance, a non-disclosure agreement, and need-to-know can access classified data. **Mobile DevicesWhen can you use removable media on a Government system? @uP"szf3(`}>5k\r/[QbGle/+*LwzJ*zVHa`i&A%h5hy[XR'sDbirE^n Tell your colleague that it needs to be secured in a cabinet or container. **Insider ThreatHow many potential insider threat indicators does a coworker who often makes others uneasy by being persistent in trying to obtain information about classified projects to which he has no access, is boisterous about his wife putting them in credit card debt, and often complains about anxiety and exhaustion display? **Insider ThreatWhich of the following should be reported as a potential security incident (in accordance with you Agencys insider threat policy)? How can you protect yourself from internet hoaxes? What action should you take?-Research the source of the article to evaluate its credibility and reliability. *Malicious CodeWhat are some examples of malicious code? It displays a label showing maximum classification, date of creation, point of contact, and Change Management 9CM) Control Number. 6 0 obj 5 0 obj **Social NetworkingAs someone who works with classified information, what should you do if you are contacted by a foreign national seeking information on a research project? Which of the following is a god practice to protect classified information? What level of damage to national security could reasonably be expected if unauthorized disclosure of Top Secret information occurred? **Social NetworkingYour cousin posted a link to an article with an incendiary headline on social media. What action should you take? What is considered ethical use of the Government email system? 0000005958 00000 n Which of the following is NOT considered a potential insider threat indicator? Individuals with a top-secret, secret, or confidential clearance can access classified data. A colleague has won 10 high-performance awards, can be playful and charming, is not currently in a relationship, and is occasionally aggressive in trying to access sensitive information. Which is a good practice to protect classified information? 0000010569 00000 n What is a common method used in social engineering? Since the URL does not start with https, do not provide your credit card information. Under what circumstances is it acceptable to use your Government-furnished computer to check person e-mail and do other non-work-related activities? Why is a checking account sometimes called a demand deposit? **Insider ThreatWhat do insiders with authorized access to information or information systems pose? -Make note of any identifying information and the website URL and report it to your security office. Which of the following is an example of removable media? What security risk does a public Wi-Fi connection pose? \textbf{Comparative Balance Sheet}\\ *Home Computer SecurityWhich of the following statements is true of using Internet of Things (IoT) devices in your home? Encrypt the e-mail and use your Government e-mail account. Secure it to the same level as Government-issued systems. What action should you take? \textbf{Income statement}\\ An unsecured IoT device can become an attack vector to any other device on your home network, including your Government laptop, Cyber Awareness Challenge 2022 Knowledge Check, Summary of Earth until Geologic time scale, Cyber Awareness Challenge 2023 (Incomplete), Chemistry Edapt Unit 6 - Biological Polymers, Chemistry Edapt Unit 6 - Applications of Radi, Chemistry Edapt Unit 6 - Radioactive Isotopes, John David Jackson, Patricia Meglich, Robert Mathis, Sean Valentine, Elliot Aronson, Robin M. Akert, Samuel R. Sommers, Timothy D. Wilson, Operations Management: Sustainability and Supply Chain Management, Information Technology Project Management: Providing Measurable Organizational Value. This course provides an overview of current cybersecurity threats and best practices to keep information and information systems secure at home and at work. (Although the serial problem allowed for various ownership changes in earlier chapters, we will prepare the statement of cash flows using the financial data below. *SpillageWhich of the following actions is appropriate after finding classified information on the internet? 12 0 obj stream **Physical SecurityWhat is a good practice for physical security? 23 0 obj You believe that you are a victim of identity theft. \text{Mileage expense}&320\\ He has the appropriate clearance and a signed, approved non-disclosure agreement. 14 0 obj -You must have your organization's permission to telework. Which is a way to protect against phishing attacks? **Insider ThreatA colleague has visited several foreign countries recently, has adequate work quality, speaks openly of unhappiness with U.S. foreign policy, and recently had his car repossessed. Which of the following practices reduces the chance of becoming a target by adversaries seeking insider information? endobj *Malicious Code }&1,250\\ Insiders are given a level of trust and have authorized access to Government information systems. A coach lleague vacations at the beach every year, is marriednd apleasant to work with, but sometimes has poor work quality display?
Waldorf College Athletics Staff Directory, South Attleboro Crash, Omicron Symptoms In Vaccinated Elderly, First Direct Arena Seating View, Toddler Getting Wind Knocked Out Of Them, Articles W