Quizlet Which of the following Is this safe? Maintain possession of your laptop and other government-furnished equipment (GFE) at all times. -Put the CD in the trash DoD employees are prohibited from using a DoD CAC in card-reader-enabled public devices. What is a good practice for physical security? . This includes government officials, military personnel, and intelligence analysts. WebWhich of the following individuals can access classified data? Immediately notify your security point of contact. What are some actions you can take to try to protect you identity? Investigate the destination by using the preview feature and see where the link actually leads: using internet search engine to find instructions to preview specific compressed URL format. Only persons with appropriate clearance, a non-disclosure agreement, and need-to-know can access classified data. What is a way to prevent the download of viruses and other malicious code when checking your e-mail? Which of the following (notify security POC, analysis of media for virus and malicious code, and analyze other workstations in the scif). *Sensitive Compartmented InformationWhat should the participants in this conversation involving SCI do differently? During the year, the company purchases additional inventory for$23,000. *Mobile DevicesWhat can help to protect the data on your personal mobile device? 1 answer. Investigate the link's actual destination using the preview feature. Under which circumstances may you be subject to criminal, disciplinary, and/or administrative action due to online misconduct? ~All documents should be appropriately marked, regardless of format, sensitivity, or classification.Unclassified documents do not need to be marked as a SCIF.Only paper documents that are in open storage need to be marked. Classified information in the United States A colleague often makes others uneasy with her persistent efforts to obtain information about classified project where she has no need-to-know, is vocal about her husband overspending on credit cards, and complains about anxiety and exhaustion. Suggestions for dealing with these problems include encouraging the Identification, encryption, digital signature. Maintain possession of your laptop and other government-furnished equipment (GFE) at all times. What action should you take? **Use of GFEWhat is a critical consideration on using cloud-based file sharing and storage applications on your Government-furnished equipment (GFE)? **Insider ThreatBased on the description that follows, how many potential insider threat indicator(s) are displayed? Annual DoD Cyber Awareness Challenge Exam Maria received an assignment to support a project that requires access to classified information. Coworker making consistent statements indicative of hostility or anger toward the United States and its policies. Calculate the advertising program's net present value, assuming an after-tax hurdle rate of 101010 percent. Only use you agency trusted websites. What type of activity or behavior should be reported as a potential insider threat? Do not use any personally owned/non-organizational removable media on your organization's systems. Classified data: Must be handled and stored properly based on classification markings and handling caveats Can only be accessed by individuals with all of the following: o Appropriate clearance o Signed and approved non- disclosure agreement o Need-to-know . How can you protect yourself from social engineering?-Follow instructions given only by verified personnel. Which of the following individuals can access classified data Medical Ethics and Detainee Operations Basic Course (5hrs) . Physically assess that everyone within listening distance is cleared and has a need-to-know for the information being discussed. Data about you collected from all sites, apps, and devices that you use can be aggregated to form a profile of you. *Classified Data Which of the following individuals can access classified data? Which of the following terms refers to someone who harms national security through authorized access to information system? . Web*Classified Data Which of the following individuals can access classified data?-Darryl is managing a project that requires access to classified information. *Classified Data Which of the following individuals can access classified data? Malicious code: **Home Computer SecurityWhich of the following is a best practice for securing your home computer? a unidentifiable email requiring you to use a special link to verify log in information. Which of the following individuals can access classified data? Maria received an assignment to support a project that requires access to classified information. 322 0 obj <>stream Which of the following is a god practice to protect classified information? All of the above. 0000010569 00000 n Which of the following is a best practice for securing your home computer? *SpillageWhat should you do if you suspect spillage has occurred? P2P (Peer-to-Peer) software can do the following except: Allow attackers physical access to network assets. WebTheodore is seeking access to classified information that he does not need to know to perform his job duties. Access to classified information DoD Cyber Awareness 2019 Maria received an assignment to support a project that requires access to classified information. What is the best practice while traveling with mobile computing devices? In order to access this information, these individuals must have security clearance from the appropriate government agency. **Social EngineeringWhat action should you take with an e-mail from a friend containing a compressed Uniform Resource Locator (URL)? JKO Department of Defense (DoD) Cyber Awareness Challenge 2022 Which of the following statements is TRUE about the use of DoD Public Key Infrastructure (PKI) tokens? What type of activity or behavior should be reported as a potential insider threat? What should you do? classified-document. What are some examples of removable media? Upon connecting your government-issued laptop to a public wireless connection, what should you immediately do? JKO Department of Defense (DoD) Cyber Awareness Challenge 2022, JKO DOJ Freedom of Information Act (FOIA) Training for Federal Employees, JKO DoD Performance Management and Appraisal Program (DPMAP) . 1 answer. *Insider ThreatWhich type of behavior should you report as a potential insider threat? Under what circumstances is it acceptable to use your Government-furnished computer to check personal e-mail and do other non-work-related activities? It tries to be a cost leader by selling its wine at a price that is slightly below the other firms, but it also tries to differentiate itself from its competitors 1312.23 Access to classified information. when is it appropriate to have your security bagde visible? Which of the following individuals can access classified data? A colleague complains about anxiety and exhaustion, makes coworkers uncomfortable by asking excessive questions about classified projects, and complain about the credit card bills that his wife runs up. DOD Cyber Awareness 2021 Knowledge Check 0000006207 00000 n What is the best response to an incident such as opening an uncontrolled DVD on a computer in a Sensitive Compartmented Information Facility (SCIF)? WebClassified information may be made available to a person only when the possessor of the information establishes that the person has a valid need to know and the access is essential to the accomplishment of official government duties. **Insider ThreatWhat do insiders with authorized access to information or information systems pose? What action should you take when using removable media in a Sensitive Compartmented Information Facility (SCIF)? Which of the following Write your password down on a device that only you access (e.g., your smartphone). Your cousin posted a link to an article with an incendiary headline on social media. DoD Cyber Awareness 2019 What should you do? **Classified DataHow should you protect a printed classified document when it is not in use? You know that this project is classified. Which type of behavior should you report as a potential threat?-Hostility or anger toward the United States and its policies. Darryl is managing a project that requires access to classified information. Which of the following Which of the following does a security classification guide provided? Clearance eligibility at the appropriate level. Access to classified information xref access classified At the same time, the distribution of income has become more unequal. Avoid using non-Bluetooth-paired or unencrypted wireless computer peripherals. 0000001509 00000 n *Insider Threat Which type of behavior should you report as a potential insider threat? Which of the following access classified *Malicious CodeWhich of the following statements is true of cookies? 0000001327 00000 n Cyber Awareness 2022 I Hate CBT's *Insider ThreatWhich of the following practices may reduce your appeal as a target for adversaries seeking to exploit your insider status? Darryl is managing a project that requires access to classified information. What type of activity or behavior should be reported as a potential insider threat? **Identity managementWhich of the following is an example of a strong password? Which of the following is a security best practice when using social networking sites? Protecting CUI . Senior government personnel, military or civilian. 0000005958 00000 n Write your password down on a device that only you access (e.g., your smartphone). What effect will this action have on Jarden's 2018 net income? Which of the following is an example of Protected Health Information (PHI)? internet. Avoid a potential security violation by using the appropriate token for each system. assertions before publishing the final draft of her report. Access \hline \text { Founding date } & 1750 & 1903 & 1812 & 1947 \\ *Home Computer SecurityWhich of the following statements is true of using Internet of Things (IoT) devices in your home? 0000004057 00000 n How can you guard yourself against Identity theft? Characteristics of four major French wineries, SouthWineryNorthWineryEastWineryWestWineryFoundingdate1750190318121947Genericcompetitivestrategy? Which of the following @870zpVxh%X'pxI[r{+i#F1F3020d`_ if>}xp20Nj9: bL 0000002497 00000 n \text { (more than 80\% concentration) } & \text { France } & \text { France } & \text { England } & \text { U.S. } \\ 2.2.2. WebStore classified data appropriately in a GSA-approved vault/container. Data classification helps organizations answer important questions about their data that inform how they mitigate risk and manage data governance policies. Which of the following is the best example of Personally Identifiable Information (PII)? Darryl is managing a project that requires access to classified information. **Physical SecurityWhat is a good practice for physical security? Which of the following Which of the following is true of protecting classified data? Web(a) No person may be given access to classified information or material originated by, in the custody, or under the control of the Department, unless the person - (1) Has been determined to be eligible for access in accordance with sections 3.1-3.3 of Executive Order 12968; (2) Has a demonstrated need-to-know; and (3) Has signed an approved nondisclosure cyber. WebClassified information that should be unclassified and is downgraded. FoundingdateGenericcompetitivestrategyMajorcustomermarket(morethan80%concentration)ProductionsiteSouthWinery1750? Classified Information can only be accessed by individuals with -All of the above Classified Information is -Assigned a classification level by a supervisor A coworker has left an unknown CD on your desk. You receive an email from the Internal Revenue Service (IRS) demanding immediate payment of back taxes of which you were not aware. He has the appropriate clearance and a signed approved non-disclosure agreement. Unauthorized Disclosure of Classified Information *Controlled Unclassified InformationWhich of the following is NOT an example of CUI? Which of the following is NOT a way that malicious code spreads? The projected additional sales revenue in year 111 is $75,000\$ 75,000$75,000, with associated expenses of $25,000\$ 25,000$25,000. False Which of the following is NOT sensitive information? the compressed URL may be masking malicious intent- Use only your personal contact information when establishing your account. Webasked in Internet by voice (265k points) Question : Which of the following is true about unclassified data? Darryl is managing a project that requires access to classified information. Mary Smith, a Level II CFA candidate, was recently hired for an analyst position at the Bank of Ireland. data. An individual can be granted access to classified information provided the following criteria are satisfied? Damage to national security It is permissible to release unclassified information to the public prior to being cleared. **Website UseWhich of the following statements is true of cookies? WebWhich of the following individuals can access classified data? *Spillage.What should you do if a reporter asks you about potentially classified information on the web? This includes government officials, military personnel, and intelligence analysts. Spillage occurs when information is spilled from a higher classification or protection level to a lower classification or protection level. In the body of Smiths report, she