which of the following is true about unclassified data

When expanded it provides a list of search options that will switch the search inputs to match the current selection. How can you protect yourself from social engineering? You must have permission from your organization. Ensure proper labeling by appropriately marking all classified material. What should you do to protect yourself while on social networks? Is it okay to run it? NARA has the authority and responsibility to manage the CUI Program across the Federal government. Always check to make sure you are using the correct network for the level of data. The CUI Registry is the Government-wide online repository for Federal-level guidance regarding CUI policy and practice. 1.1 Standard Challenge Answers. CPCON 1 (Very High: Critical Functions) Classified Information can only be accessed by individuals with. What should Sara do when publicly available Internet, such as hotel Wi-Fi? Spillage because classified data was moved to a lower classification level system without authorization. When operationally necessary, owned by your organization, and approved by the appropriate authority. Maintain possession of your laptop and other government-furnished equipment (GFE) at all times. When teleworking, you should always use authorized and software. What is considered ethical use of the Government email system? Avoid using non-Bluetooth-paired or unencrypted wireless computer peripherals. Use the classified network for all work, including unclassified work. You must have your organization's permission to telework. What level of damage to national security could reasonably be expected if unauthorized disclosure of Top Secret information occurred? Which of the following individuals can access classified data? ~All documents should be appropriately marked, regardless of format, sensitivity, or classification. 10-3 X-ray Interaction with Matter, Fundamentals of Engineering Economic Analysis, David Besanko, Mark Shanley, Scott Schaefer. Government-owned PEDs when expressly authorized by your agency. Which may be a security issue with compressed Uniform Resource Locators (URLs)? You must have your organization's permission to telework c. You may use unauthorized software as long as your computer's antivirus software is up to date. **Home Computer Security What should you consider when using a wireless keyboard with your home computer? You believe that you are a victim of identity theft. Let us have a look at your work and suggest how to improve it! Phishing can be an email with a hyperlink as bait. (Correct)-It does not affect the safety of Government missions.-It never requires classification markings. Use only personal contact information when establishing personal social networking accounts, never use Government contact information. What is an individual's Personally Identifiable Information (PII) or Protected Health Information (PHI) considered? Which of the following statements is true? Which of the following information is a security risk when posted publicly on your social networking profile? CUI may be stored only on authorized systems or approved devices. Since the URL does not start with https, do not provide you credit card information. **Use of GFE What is a critical consideration on using cloud-based file sharing and storage applications on your Government-furnished equipment (GFE)? Remove your security badge, common access card (CAC), or personal identity verification (PIV) card. You are having lunch at a local restaurant outside the installation, and you find a cd labeled favorite song. (Sensitive Compartmented Information) What portable electronic devices (PEDs) are allow in a Secure Compartmented Information Facility (SCIF)? (Sensitive Information) What guidance is available from marking Sensitive Information information (SCI)? Note the websites URL and report the situation to your security point of contact. If you participate in or condone it at any time. Classified material must be appropriately marked. Which is a best practice that can prevent viruses and other malicious code from being downloaded when checking your e-mail? correct. Infographic - Text version Infographic [PDF - 594 KB] Report a problem or mistake on this page Date modified: 2020-12-14 A program that segregates various type of classified information into distinct compartments for added protection and dissemination for distribution control. tell your colleague that it needs to be secured in a cabinet or container. *Spillage You find information that you know to be classified on the Internet. On a NIPRNet system while using it for a PKI-required task, Something you possess, like a CAC, and something you know, like a PIN or password. Which of these is true of unclassified data? Be aware of classification markings and all handling caveats. Note any identifying information, such as the websites URL, and report the situation to your security POC. What should be your response? Which of the following should be reported as a potential security incident (in accordance with your Agencys insider threat policy)? Correct. Historically, each agency developed its own practices for sensitive unclassified information, resulting in a patchwork of systems across the Executive branch, in which similar information might be defined or labeled differently, or where dissimilar information might share a definition and/or label. **Insider Threat A colleague vacations at the beach every year, is married and a father of four, his work quality is sometimes poor, and he is pleasant to work with. **Social Engineering How can you protect yourself from internet hoaxes? Using webmail may bypass built in security features. What should you consider when using a wireless keyboard with your home computer? Is this safe? What is best practice while traveling with mobile computing devices? *Controlled Unclassified Information Which of the following is NOT an example of CUI? NARA has the authority and responsibility to manage the CUI Program across the Federal government. Which is NOT a way to protect removable media? *Sensitive Compartmented Information When is it appropriate to have your security badge visible? Sensitive information. Decline So That You Maintain Physical Control of Your Government-Issued Laptop. A coworker has asked if you want to download a programmer's game to play at work. 1 Answer/Comment. How many potential insider threat indicators does this employee display? **Identity Management Which of the following is the nest description of two-factor authentication? Report the crime to local law enforcement. Which of the following should be reported as a potential security incident? Attempting to access sensitive information without need-to-know, Avoid talking about work outside of the workplace or with people without a need-to-know, Report the suspicious behavior in accordance with their organizations insider threat policy. What should be done to protect against insider threats? **Identity management Which of the following is NOT a best practice to preserve the authenticity of your identity? Paul verifies that the information is CUI, includes a CUI marking in the subject header, and digitally signs an e-mail containing CUI. Which of the following best describes a way to safely transmit Controlled Unclassified Information (CUI)? Based on the description that follows, how many potential insider threat indicator(s) are displayed? Which of the following is NOT a DoD special requirement for tokens? A measure of how much useful work each unit of input energy provides. Q&A for work. **Social Engineering Which of the following is a way to protect against social engineering? Quizzma is a free online database of educational quizzes and test answers. A program that segregates various types of classified information into distinct compartments for added protection and dissemination or distribution control. Which of the following is true of transmitting Sensitive Compartmented Information (SCI)? Which of the following is true about unclassified data? How are Trojan horses, worms, and malicious scripts spread? Controlled Unclassified Information (CUI) is informationthat requires safeguarding or dissemination controls consistent with applicable laws, regulations, and Government-wide policies, but is not classified under Executive Order 13526 "Classified National Security Informat What are examples of CUI? data. It should only be in a system while actively using it for a PKI-required task. A coworker brings a personal electronic device into prohibited areas. Malicious code can do the following except? Delete email from senders you do not know. After work hours, storing sensitive information in unlocked containers, desks, or cabinets if security is not present. While it may seem safer, you should NOT use a classified network for unclassified work. Store it in a General Services Administration (GSA)-approved vault or container. Based on the description that follows how many potential insider threat indicators are displayed? **Social Networking When may you be subject to criminal, disciplinary, and/or administrative action due to online misconduct? internet-quiz. Search by Location. **Home Computer Security How can you protect your information when using wireless technology? As part of the survey the caller asks for birth date and address. Classified information that should be unclassified and is downgraded. Public service, notably service in the United States Department of Defense or DoD, is a public trust. 1.To provide opportunities for individuals and businesses to open checking accounts __________, To write rules and guidelines for financial institutions under its supervision __________, To be the lender of last resort for financial institutions __________, To conduct the nations monetary policy with the goals of maintaining full employment and price stability __________, 5. Individuals must avoid referencing derivatively classified reports classified higher than the recipient.??? Which type of information includes personal, payroll, medical, and operational information? Connect to the Government Virtual Private Network (VPN).?? *Insider Threat Which of the following is a reportable insider threat activity? Digitally signed e-mails are more secure. **Insider Threat Based on the description that follows, how many potential insider threat indicator(s) are displayed? Before long she has also purchased shoes from several other websites. Store it in a GSA approved vault or container. *Sensitive Compartmented Information When faxing Sensitive Compartmented Information (SCI), what actions should you take? It is releasable to the public without clearance. Use only your personal contact information when establishing your account. correct. Information improperly moved from a higher protection level to a lower protection level. (Identity Management) Which of the following is an example of two-factor authentication? Unusual interest in classified information. **Classified Data Which of the following can an unauthorized disclosure of information classified as Confidential reasonably be expected to cause? **Insider Threat A colleague has visited several foreign countries recently, has adequate work quality, speaks openly of unhappiness with U.S. foreign policy, and recently had his car repossessed. Connect to the Government Virtual Private Network (VPN). What should you do? Search the Registry: Categories, Markings and Controls: Category list CUI markings What should you do? Call your security point of contact immediately. *Spillage After reading an online story about a new security project being developed on the military installation where you work, your neighbor asks you to comment about the article. Aggregating it does not affect its sensitivyty level. A coworker wants to send you a sensitive document to review while you are at lunch and you only have your personal tablet. Let us know if this was helpful. The National Archives and Records Administration (NARA) serves as the Controlled Unclassified Information (CUI) Executive Agent (EA). What should be your response? Alexa May, director of accounts, received a bill for $648\$648$648, dated April 666, with sales terms 2/10,1/15,n/302/10, 1/15, n/302/10,1/15,n/30. What level of damage to national security could reasonably be expected if unauthorized disclosure of Top Secret information occurred? Correct. A colleague often makes others uneasy with her persistent efforts to obtain information about classified project where she has no need-to-know, is vocal about her husband overspending on credit cards, and complains about anxiety and exhaustion. What should you do? *Sensitive Information What type of unclassified material should always be marked with a special handling caveat? Unclassified information can become a threat to national security. Mobile devices and applications can track your location without your knowledge or consent. laptops, fitness bands, tablets, smartphones, electric readers, and Bluetooth devices. Controlled Unclassified Information (CUI): Controlled Unclassified information was defined in the Executive Order 13556 as information held by or generated for the Federal Government that requires safeguarding or dissemination controls pursuant to and consistent with applicable law, regulations and government-wide policies that isn't classified Exceptionally grave damage to national security. No, you should only allow mobile code to run from your organization or your organizations trusted sites. What are some potential insider threat indicators? The Chinese Spy Balloon Showdown The discovery of a Chinese surveillance balloon floating over the United States has added to the rising tensions between the two superpowers. Use your own security badge, key code, or Common Access Card (CAC)/Personal Identity Verification (PIV) card. Which of the following is true of Unclassified information? **Use of GFE Under what circumstances is it acceptable to use your Government-furnished computer to check personal e-mail and do other non-work-related activities?

Mary Mcclellan Hospital, Imule Awon Agba Togbona, Articles W

Please follow and like us: