09 Mar

which of the following is true about unclassified data

What is an individual's Personally Identifiable Information (PII) or Protected Health Information (PHI) considered? Which of the following actions can help to protect your identity? A colleague complains about anxiety and exhaustion, makes coworkers uncomfortable by asking excessive questions about classified projects, and complains about the credit card bills that his wife runs up. *Malicious Code Which of the following is NOT a way that malicious code spreads? Which of the following is not Controlled Unclassified Information (CUI)? Which of the following is a good practice to avoid email viruses? (social networking) When is the safest time to post details of your vacation activities on your social networking profile? Which of the following best describes the sources that contribute to your online identity. Your comments are due on Monday. A All of these. *Sensitive Information Which of the following is an example of Protected Health Information (PHI)? Ask them to verify their name and office number. A colleague has visited several foreign countries recently, has adequate work quality, speaks openly of unhappiness with U.S. foreign policy, and recently had his car repossessed. *Spillage What is a proper response if spillage occurs? If aggregated, the classification of the information may not be changed. What should you do? Refer the reporter to your organizations public affairs office. *Sensitive Compartmented Information What must the dissemination of information regarding intelligence sources, methods, or activities follow? Which of the following is an example of removable media? **Social Networking Which of the following information is a security risk when posted publicly on your social networking profile? Which of the following is true of Sensitive Compartmented Information (SCI)? You receive an inquiry from a reporter about potentially classified information on the internet. Confirm the individuals need-to-know and access. Which of the following is NOT a DoD special requirement for tokens? Proactively identify potential threats and formulate holistic mitigation responses. To transmit large payments through Fedwire __________, To regulate and supervise the stock market to provide stability and security to individual investors. What should Sara do when publicly available Internet, such as hotel Wi-Fi? A colleague often makes others uneasy with her persistent efforts to obtain information about classified project where she has no need-to-know, is vocal about her husband overspending on credit cards, and complains about anxiety and exhaustion. They can become an attack vector to other devices on your home network. correct. Insiders are given a level of trust and have authorized access to Government information systems. Classified material must be appropriately marked. Jozeal. **Classified Data Which type of information could reasonably be expected to cause serious damage to national security if disclosed without authorization? Identification, encryption, and digital signature. Dont assume open storage in a secure facility is authorized Maybe. Personal information is inadvertently posted at a website. **Social Engineering What is TRUE of a phishing attack? ~All documents should be appropriately marked, regardless of format, sensitivity, or classification. Which of the following is not considered an example of data hiding? Always use DoD PKI tokens within their designated classification level. (Sensitive Information) What type of unclassified material should always be marked with a special handling caveat? Power off any mobile devices when entering a secure area. When may you be subject to criminal, disciplinary, and/or administrative action due to online harassment, bullying, stalking, hazing, discrimination, or retaliation? *Sensitive Compartmented Information What is Sensitive Compartmented Information (SCI)? cyber-awareness. (Sensitive Information) Which of the following is NOT an example of sensitive information? **Insider Threat Which scenario might indicate a reportable insider threat? How many potential insider threat indicators does this employee display? Correct. John submits CUI to his organizations security office to transmit it on his behalf. UNCLASSIFIED is a designation to mark information that does not have potential to damage national security. Ask for information about the website, including the URL. Found a mistake? What level of damage to national security could reasonably be expected if unauthorized disclosure of Top Secret information occurred? What should you do? How many indicators does this employee display? Discrete data involves whole numbers (integers - like 1, 356, or 9) that can't be divided based on the nature of what they are. Not correct. *Spillage You find information that you know to be classified on the Internet. correct. Bob, a coworker, has been going through a divorce, has financial difficulties and is displaying hostile behavior. In addition to offering an overview of cybersecurity best practices, the challenge also provides awareness of potential and common cyber threats. Permitted Uses of Government-Furnished Equipment (GFE). The website requires a credit card for registration. (Answer) CPCON 2 (High: Critical and Essential Functions) CPCON 1 (Very High: Critical Functions) CPCON 3 (Medium: Critical, Essential, and Support Functions) CPCON 4 (Low: All Functions) CPCON 5 (Very Low: All Functions). Retrieve classified documents promptly from printers. P2P (Peer-to-Peer) software can do the following except: Allow attackers physical access to network assets. Were mitochondria as abundant in human epithelial cells as in onion epidermal cells (procedure 4.6)? What level of damage can the unauthorized disclosure of information classified as Top Secret reasonably be expected to cause? Which of the following is true of protecting classified data Monitor credit card statements for unauthorized purchases, Thumb drives, memory sticks, and flash drives are examples of. Which of these is true of unclassified data? Retrieve classified documents promptly from printers. A coworker uses a personal electronic device in a secure area where their use is prohibited. Under what circumstances is it acceptable to check personal email on Government-furnished equipment (GFE)? The email provides a website and a toll-free number where you can make payment. Which of the following is NOT a type of malicious code? When is the best time to post details of your vacation activities on your social networking website? What should you do if someone asks to use your government issued mobile device (phone/laptop..etc)? Decline So That You Maintain Physical Control of Your Government-Issued Laptop. Correct (Correct) -It does not affect the safety of Government missions. What Should You Do When Working On An Unclassified System And Receive Figure 1. It does not require markings or distribution controls. Use the classified network for all work, including unclassified work. Don't talk about work outside your workspace unless it is a specifically designated public meeting environment and is controlled by the event planners. What must authorized personnel do before permitting another individual to enter a Sensitive Compartmented Information Facility (SCIF)? **Website Use While you are registering for a conference, you arrive at the website http://www.dcsecurityconference.org/registration/. Which Is True Of Unclassified Information - faqcourse.com Cyber Awareness 2022. Exceptionally grave damage to national security. Which of the following is true of sharing information in a Sensitive Compartmented Information Facility (SCIF)? Which of the following is NOT a typical result from running malicious code? Ensure proper labeling by appropriately marking all classified material and, when required, sensitive material. *Insider Threat Which of the following is a reportable insider threat activity? Which of the following is true of telework? The popup asks if you want to run an application. Which of the following is true of Protected Health Information (PHI)? ?Access requires Top Secret clearance and indoctrination into SCI program.??? What type of attack might this be? Which of the following should be done to keep your home computer secure? Infographic - Text version Infographic [PDF - 594 KB] Report a problem or mistake on this page Date modified: 2020-12-14 Question 1: The business impact analysis (BIA) identifies the resources for which a business continuity plan (BCP) is necessary. **Mobile Devices What should you do when going through an airport security checkpoint with a Government-issued mobile device? laptops, fitness bands, tablets, smartphones, electric readers, and Bluetooth devices. How many potential insiders threat indicators does this employee display? If aggregated, the information could become classified. Cyber Awareness Flashcards by Jedi Master | Brainscape What should you do? A colleague complains about anxiety and exhaustion, makes coworkers uncomfortable by asking excessive questions about classified projects, and complain about the credit card bills that his wife runs up. Cyber Awareness Challenge Knowledge Check 2023 Answers, Cyber Awareness Challenge 2022 Knowledge Check Answers. What should you do after you have ended a call from a reporter asking you to confirm potentially classified info found on the web? A headset with a microphone through a Universal Serial Bus (USB) port. Attempt to change the subject to something non-work related, but neither confirm nor deny the articles authenticity. A colleague abruptly becomes hostile and unpleasant after previously enjoying positive working relationships with peers, purchases an unusually expensive new car, and has unexplained absences from work. When is it appropriate to have your security badge visible? After you have returned home following the vacation. Please click here to see any active alerts. Remove your security badge, common access card (CAC), or personal identity verification (PIV) card. **Use of GFE When can you check personal e-mail on your Government-furnished equipment (GFE)? Compute The Average Kids Per Family. In unsupervised machine learning, clustering is the most common process used to identify and group similar entities or items together. BMW crash victim Alaa Al-Siddiq was on Cotswolds birthday weekend For example, when you buy propane for your barbecue, your tank is placed on a scale while it is filled under high pressure (Figure 7). Correct. What Exactly is CUI? (and How to Manage It) - Security Boulevard Scan external files from only unverifiable sources before uploading to computer. You may use your personal computer as long as it is in a secure area in your home b. The following table lists the number of drivers in the United States, the number of fatal accidents, and the number of total accidents in each age group in 2002. 1 Answer/Comment. *Spillage After reading an online story about a new security project being developed on the military installation where you work, your neighbor asks you to comment about the article. **Social Engineering Which of the following is a practice that helps to prevent the download of viruses and other malicious code when checking your email? not correct. The Chinese Spy Balloon Showdown The discovery of a Chinese surveillance balloon floating over the United States has added to the rising tensions between the two superpowers. Which of the following is not considered a potential insider threat indicator? Where. For Government-owned devices, use approved and authorized applications only. The email has an attachment whose name contains the word secret. -Its classification level may rise when aggregated. Tell us about it through the REPORT button at the bottom of the page. **Classified Data What is a good practice to protect classified information? Which of the following is true of Security Classification Guides? Information should be secured in a cabinet or container while not in use. b. *Sensitive Information What is the best example of Personally Identifiable Information (PII)? Try this test to determine if it's considered unclassified, classified or protected, and check out tips on what to do and what not to do when working with sensitive information. Which of the following may help to prevent spillage? When using a public device with a card reader, only use your DoD CAC to access unclassified information, is only allowed if the organization permits it. Store it in a GSA approved vault or container. (Physical Security) which Cyberspace Protection Condition (CPCON) establishes a protection priority focus on critical and essential functions only? When can you check personal email on your government furnished equipment? CUI is government created or owned information that requires safeguarding or dissemination controls consistent with applicable laws, regulations and government wide policies. (Malicious Code) Which email attachments are generally SAFE to open? Within a secure area, you see an individual you do not know. *Insider Threat Which of the following is a potential insider threat indicator? 5. Annual DoD Cyber Awareness Challenge Training, DOD Cyber Awareness Challenge 2019: Knowledge, DOD Cyber Awareness Challenge 2019 (DOD-IAA-V, Operations Management: Sustainability and Supply Chain Management, Elliot Aronson, Robin M. Akert, Samuel R. Sommers, Timothy D. Wilson, Anderson's Business Law and the Legal Environment, Comprehensive Volume, David Twomey, Marianne Jennings, Stephanie Greene. **Classified Data When classified data is not in use, how can you protect it? What action should you take? A .gov website belongs to an official government organization in the United States. Maria is at home shopping for shoes on Amazon.com. Search Which of the following is true of Internet of Things (IoT) devices? When classified data is not in use, how can you protect it? Refer the reporter to your organizations public affairs office. How can you protect your information when using wireless technology? *Sensitive Information What type of unclassified material should always be marked with a special handling caveat? Keep your operating system and software up to date: This will help patch any security vulnerabilities in your software. What is a best practice for protecting controlled unclassified information (CUI)? *Sensitive Compartmented Information Which must be approved and signed by a cognizant Original Classification Authority (OCA)? At EPA, the CUI Program is housed in the Libraries and Accessibility Division (LAD) within the Office of Mission Supports (OMS), Office of Enterprise Information Programs (OEIP). There is no way to know where the link actually leads. **Insider Threat What type of activity or behavior should be reported as a potential insider threat? **Social Networking What should you do if you receive a game application request that includes permission to access your friends, profile information, cookies, and sites visited? How many potential insider threat indicators is Bob displaying? Ive tried all the answers and it still tells me off, part 2. A colleague removes sensitive information without seeking authorization in order to perform authorized telework. Under What Circumstances Could Unclassified? A colleague asks to leave a report containing protected health information (PHI) on his desk overnight so he can continue working on it the next day. As a security best practice, what should you do before exiting? Photos of your pet Correct. It may expose the connected device to malware. *Sensitive Compartmented Information What should the participants in this conversation involving SCI do differently? (Home computer) Which of the following is best practice for securing your home computer? Which of the following is true of Unclassified Information? Correct, Someone who uses authorized access, wittingly or unwittingly, to harm national security through unauthorized disclosure or other actions that may cause the loss or degradation of resources or capabilities. Which of the following is an example of a strong password? What type of security is part of your responsibility and placed above all else?, If your wireless device is improperly configured someone could gain control of the device? As part of the survey the caller asks for birth date and address. Memory sticks, flash drives, or external hard drives. When traveling or working away from your main location, what steps should you take to protect your devices and data? Decline to let the person in and redirect her to security. Digitally signed e-mails are more secure. -Ask them to verify their name and office number You must have your organizations permission to telework. Classified information that should be unclassified and is downgraded. You receive an email from a company you have an account with. Is this safe? (Malicious Code) Which of the following is true of Internet hoaxes? Individuals must avoid referencing derivatively classified reports classified higher than the recipient.??? (1) A strategic plan documenting the overall conduct of a war. Carrying his Social Security Card with him, DoD employees are prohibited from using a DoD CAC in card-reader-enabled public device, Assigned a classification level by a supervisor. Question. It may be compromised as soon as you exit the plane. the following is true about unclassified data fy23 controlled unclassified information cui quizlet what is true of controlled unclassified information What. What is the best example of Protected Health Information (PHI)? (Sensitive Compartmented Information) What describes how Sensitive Compartmented Information is marked? Lock your device screen when not in use and require a password to reactivate. What should the owner of this printed SCI do differently? Effects of different carbon substrates on PAHs fractions and microbial Use only your personal contact information when establishing your account. Connect to the Government Virtual Private Network (VPN).?? It should only be in a system while actively using it for a PKI-required task. General Services Administration (GSA) approval. When would be a good time to post your vacation location and dates on your social networking website? When your vacation is over, and you have returned home. Which of the following demonstrates proper protection of mobile devices? What is the best response if you find classified government data on the internet? All to Friends Only. (Spillage) What should you do when you are working on an unclassified system and receive an email with a classified attachment? **Social Networking When is the safest time to post details of your vacation activities on your social networking profile? Which of the following is NOT a home security best practice? The email states your account has been compromised and you are invited to click on the link in order to reset your password. Which of the following individuals can access classified data? Malicious code can mask itself as a harmless e-mail attachment, downloadable file, or website. Exceptionally grave damage. Which piece of information is safest to include on your social media profile? As long as the document is cleared for public release, you may release it outside of DoD. If classified information were released, which classification level would result in Exceptionally grave damage to national security? What security device is used in email to verify the identity of sender? Which of the following should be reported as a potential security incident (in accordance with your Agencys insider threat policy)? A colleague has won 10 high-performance awards, can be playful and charming, is not currently in a relationship, and occasionally aggressive in trying to access sensitive information. Someone who uses authorized access, wittingly or unwittingly, to harm national security through unauthorized disclosure or other actions that may cause the loss or degradation of resources or capabilities. What actions should you take with a compressed Uniform Resource Locator (URL) on a website known to you? Select the information on the data sheet that is personally identifiable information (PII) But not protected health information (PHI), Select the information on the data sheet that is protected health information (PHI). You can't have 1.9 children in a family (despite what the census might say ). Unclassified is a security classification assigned to official information that does not warrant the assignment of Confidential, Secret, or Top Secret markings but which is not publicly-releasable without authorization. Only use Government-furnished or Government-approved equipment to process PII. CUI may be stored on any password-protected system. Use personal information to help create strong passwords. Hostility or anger toward the United States and its policies. which of the following is true about unclassified data - Weegy Search for an answer or ask Weegy. Use your own security badge, key code, or Common Access Card (CAC)/Personal Identity Verification (PIC) card. Ans: True Question 2: The Government Information Security Reform Act (Security Reform Act) of 2000 focuses on management View the full answer **Insider Threat What function do Insider Threat Programs aim to fulfill? It never requires classification markings, is true about unclassified data. Which of the following attacks target high ranking officials and executives? Ensure proper labeling by appropriately marking all classified material. (controlled unclassified information) Which of the following is NOT an example of CUI? Never allow sensitive data on non-Government-issued mobile devices. Which of the following makes Alexs personal information vulnerable to attacks by identity thieves? Ask the individual to see an identification badge. Use personally-owned wired headsets and microphones only in designated areas, New interest in learning a foreign language. Only paper documents that are in open storage need to be marked. Which of the following is a clue to recognizing a phishing email? An official website of the United States government. CUI is an umbrella term that encompasses many different markings toidentifyinformationthat is not classified but which should be protected. Which method would be the BEST way to send this information? How should you securely transport company information on a removable media? **Insider Threat Which type of behavior should you report as a potential insider threat? (Identity Management) Which of the following is an example of two-factor authentication? Linda encrypts all of the sensitive data on her government issued mobile devices. Hostility or anger toward the United States and its policies. Which of the following includes Personally Identifiable Information (PII) and Protected Health Information (PHI)? Some examplesyou may be familiar with: TheFederalCUI Registry,shows authorized categoriesandassociated markings, as well as applicable safeguarding, dissemination, and decontrol procedures. Validate friend requests through another source before confirming them. How can you avoid downloading malicious code? Follow procedures for transferring data to and from outside agency and non-Government networks. **Insider Threat Which of the following should be reported as a potential security incident (in accordance with you Agencys insider threat policy)? When unclassified data is aggregated, its classification level may rise. Security Classification of Information, volume 2 (Quist), Chapter Seven What is considered ethical use of the Government email system? Controlled Unclassified Information (CUI) | GSA classified-document. As a security best practice, what should you do before exiting? Which of the following is a good practice for telework? What should you do? Preventing an authorized reader of an object from deleting that object B. THIS IS THE BEST ANSWER . Examples are: Patient names, Social Security numbers, Drivers license numbers, insurance details, and birth dates. You receive an inquiry from a reporter about government information not cleared for public release. Thiswill enabletimely and consistent informationsharing andincreasetransparency throughout the Federal government and with non-Federal stakeholders. What can help to protect the data on your personal mobile device. CPCON 3 (Medium: Critical, Essential, and Support Functions) 1.1.1 Spillage. Which of the following is true about unclassified data? A colleague saves money for an overseas vacation every year, is a . You receive an unexpected email from a friend: I think youll like this: https://tinyurl.com/2fcbvy. What action should you take? (Spillage) Which of the following is a best practice to protect information about you and your organization on social networking sites and applications? If authorized, what can be done on a work computer? Look for a digital signature on the email. not correct. Search for an answer or ask Weegy. CPCON 4 (Low: All Functions) What function do Insider Threat Programs aim to fulfill? Set hasDigit to true if the 3-character passCode contains a digit, Critical, Essential, and Support Functions. Which of the following is NOT an appropriate way to protect against inadvertent spillage? Do not forward, read further, or manipulate the file; Do not give out computer or network information, Do not follow instructions from unverified personnel. Correct We thoroughly check each answer to a question to provide you with the most correct answers. Which of the following is a good practice to prevent spillage? Right-click the link and select the option to preview??? You have reached the office door to exit your controlled area. What can be used to track Marias web browsing habits? How many potential insider threat indicators does this employee display? Phishing can be an email with a hyperlink as bait. The annual Cyber Awareness Challenge is a course that helps authorized users learn how to best avoid and reduce threats and vulnerabilities in an organizations system. *Controlled Unclassified Information Which of the following best describes a way to safely transmit Controlled Unclassified Information (CUI)? CUI must be handled using safeguarding or dissemination controls. Upon connecting your Government-issued laptop to a public wireless connection, what should you immediately do? E-mailing your co-workers to let them know you are taking a sick day. Only documents that are classified Secret, Top Secret, or SCI require marking. -It never requires classification markings. You must have your organization's permission to telework c. You may use unauthorized software as long as your computer's antivirus software is up to date. Coworker making consistent statements indicative of hostility or anger toward the United States and its policies. How can you guard yourself against Identity theft? Debra ensures not correct **Mobile Devices Which of the following helps protect data on your personal mobile devices? Even within a secure facility, dont assume open storage is permitted. Press release data. *Controlled Unclassified Information Which of the following is NOT an example of CUI? This bag contains your government-issued laptop. What is the best course of action? Avoid using non-Bluetooth-paired or unencrypted wireless computer peripherals. Coworker making consistent statements indicative of hostility or anger toward the United States in its policies. A colleague has won 10 high-performance awards, can be playful and charming, is not currently in a relationship, and is occasionally aggressive in trying to access sensitive information. true-statement. *Sensitive Information Which of the following is the best example of Personally Identifiable Information (PII)? You believe that you are a victim of identity theft. What should you do? c. ignoring a tantrum Which is a risk associated with removable media? Controlled Unclassified Information (CUI) is information that requires safeguarding or dissemination controls pursuant to and consistent with applicable law, regulations, and government-wide policies but is not classified under Executive Order 13526 or the Atomic Energy Act, as amended. Use a common password for all your system and application logons. Do not access links or hyperlinked media such as buttons and graphics in email messages. Sensitive information may be stored on any password-protected system.

Velo Dog Pistol Value, 7900329787d7b3d7fb33c60d8d84065ea7e Arkansas Razorbacks Players, How To Open Petra Mints 2020, Bucks Herald Obituary This Week, Articles W

which of the following is true about unclassified data