While on vacation, a coworker calls and asks you to access a site to review and approve a document that is hosted behind a DoD Public Key Infrastructure (PKI) protected webpage. **Insider ThreatBased on the description that follows, how many potential insider threat indicator(s) are displayed? Which of the following individuals can access classified data? *Social NetworkingYour cousin posted a link to an article with an incendiary headline on social media. **Insider ThreatWhat type of activity or behavior should be reported as a potential insider threat? What is the best response if you find classified government data on the internet? Avoid using non-Bluetooth-paired or unencrypted wireless computer peripherals. What is a valid response when identity theft occurs? *Sensitive Compartmented InformationWhat action should you take if you become aware that Sensitive Compartmented Information (SCI) has been compromised? Imperva provides automated data discovery and classification, which reveals the location, volume, and context of data on premises and in the cloud. **Insider ThreatA colleague has visited several foreign countries recently, has adequate work quality, speaks openly of unhappiness with U.S. foreign policy, and recently had his car repossessed. Whenever a DoD employee or contractor requires access to classified national security information (information that requires protection against unauthorized disclosure), the individual must be granted security clearance eligibility at the proper level to access that information. A colleague saves money for an overseas vacation every year, is a single father, and occasionally consumes alcohol. If aggregated, the information could become classified. This includes government officials, military personnel, and intelligence analysts. He has the appropriate clearance and a signed, approved, non-disclosure agreement. Darryl is managing a project that requires access to classified information. Which of the following is NOT a best practice to preserve the authenticity of your identity? In which situation below are you permitted to use your PKI token? Maintain visual or physical control of the device. On a NIPRNet system while using it for a PKI-required task. When would be a good time to post your vacation location and dates on your social networking website? Senior government personnel, military or civilian. A colleague complains about anxiety and exhaustion, makes coworkers uncomfortable by asking excessive questions about classified projects, and complain about the credit card bills that his wife runs up. Social Security Number; date and place of birth; mother's maiden name. exp-officeequip.400Dep. A coworker has asked if you want to download a programmers game to play at work. This article will provide you with all the questions and answers for Cyber Awareness Challenge. Maintain possession of your laptop and other government-furnished equipment (GFE) at all times. Under what circumstances is it acceptable to check personal email on Government-furnished equipment (GFE)? The potential for unauthorized viewing of work-related information displayed on your screen. Which of the following is NOT a correct way to protect sensitive information? -Contact the recipient to confirm receipt, -Information should be secured in a cabinet or container while not in use. *Sensitive Compartmented InformationWhat should the participants in this conversation involving SCI do differently? How many potential insiders threat indicators does this employee display? -When using a public device with a card reader, only use your DoD CAC to access unclassified information, Thumb drives, memory sticks, and flash drives are examples of. You are reviewing your employees annual self evaluation. **Insider ThreatWhich type of behavior should you report as a potential insider threat? No, you should only allow mobile code to run from your organization or your organization's trusted sites. endobj Lock your device screen when not in use and require a password to reactivate. endstream It displays a label showing maximum classification, date of creation, point of contact, and Change Management 9CM) Control Number. -Using NIPRNet tokens on systems of higher classification level. Which of the following is a best practice to protect information about you and your organization on social networking sites and applications? Coworker making consistent statements indicative of hostility or anger toward the United States in its policies. Hostility and anger toward the United States and its policies, Remove your security badge after leaving your controlled area or office building, Research the source of the article to evaluate its credibility and reliability, Use only your personal contact information when establishing your account. **TravelWhich of the following is true of traveling overseas with a mobile phone? *Identity Management The popup asks if you want to run an application. A program that segregates various type of classified information into distinct compartments for added protection and dissemination for distribution control. A coworker has asked if you want to download a programmer's game to play at work. Use your own security badge, key code, or Common Access Card (CAC)/Personal Identity Verification (PIC) card. Why might "insiders" be able to cause damage to their organizations more easily than others? Which of the following individuals can access classified data? **TravelWhich of the following is a concern when using your Government-issued laptop in public? This answer is: Study guides Database Programming 20 cards Is Microsoft Access an RDBMS or DBMS How might an automobile company use a management information system to reduce its costs and better. -Ask them to verify their name and office number. -Carrying his Social Security Card with him. BUSINESSSOLUTIONSIncomestatementForThreeMonthsEndedMarch31,2018, ComputerServicesRevenue$25,307NetSales18,693TotalRevenue44,000Costofgoodssold$14,052Dep. Which of the following demonstrates proper protection of mobile devices? Immediately notify your security point of contact. A colleague has won 10 high-performance awards, can be playful and charming, is not currently in a relationship, and occasionally aggressive in trying to access sensitive information. Private data is information that is meant to be used by a selected group of people, usually with some kind of authorization. <>/ExtGState<>/ProcSet[/PDF/Text/ImageB/ImageC/ImageI] >>/MediaBox[ 0 0 612 792] /Contents 24 0 R/Group<>/Tabs/S/StructParents 1>> Research the source of the article to evaluate its credibility and reliability. **Identity managementWhich of the following is an example of a strong password? What threat do insiders with authorized access to information or information Systems pose?? *PHYSICAL SECURITY*Within a secure area, you see an individual who you do not know and is not wearing a visible badge. <> Report the crime to local law enforcement. **Identity ManagementYour DoD Common Access Card (CAC) has a Public Key Infrastructure (PKI) token approved for access to the NIPRNet. Identification, encryption, digital signature. How many potential insider threat indicators does a person who is playful and charming, consistently win performance awards, but is occasionally aggressive in trying to access sensitive information? Darryl is managing a project that requires access to classified information. 0000005958 00000 n Which is a risk associated with removable media? 0000005321 00000 n -Request the user's full name and phone number. <> Its classification level may rise when aggregated. What should you do after you have ended a call from a reporter asking you to confirm potentially classified information found on the web? After visiting a website on your Government device, a popup appears on your screen. endobj -Looking for "https" in the URL. **Identity managementWhich is NOT a sufficient way to protect your identity? x\[o8~G{(EELMT[N-5s/-rbtv0qm9$s'uzjxOf **Social NetworkingWhen may you be subject to criminal, disciplinary, and/or administrative action due to online misconduct? CUI may be stored on any password-protected system. Which of the following individuals can access classified data? What action should you take first? CUI may be stored on any password-protected system. Retrieve classified documents promptly from printers. -After work hours, storing sensitive information in unlocked containers, desks, or cabinets if security is not present. *Mobile DevicesWhat can help to protect the data on your personal mobile device? Don't allow her access into secure areas and report suspicious activity. 24 0 obj Maria is at home shopping for shoes on Amazon.com. After you have returned home following the vacation. The popup asks if you want to run an application. Refer the reporter to your organization's public affairs office. 0000010569 00000 n Use a digital signature when sending attachments or hyperlinks. What is the best response if you find classified government data on the internet? He has the appropriate clearance and a signed, approved non-disclosure agreement. **Classified DataWhich of the following is a good practice to protect classified information? When is conducting a private money-making venture using your Government-furnished computer permitted? Upon connecting your Government-issued laptop to a public wireless connection, what should you immediately do? endobj What should be done to protect against insider threats? *Website UseWhat action should you take with an e-mail from a friend containing a compressed Uniform Resource Locator (URL)? *Social Engineering The proper security clearance and indoctrination into the SCI program. Cyber Awareness Challenge 2023 - Answer. -Assuming open storage is always authorized in a secure facility, -Telework is only authorized for unclassified and confidential information, -Taking classified documents from your workspace. startxref **Classified DataHow should you protect a printed classified document when it is not in use? How many potential insider threat indicators is Bob displaying? What is NOT Personally Identifiable Information (PII)? You must have your organization's permission to telework. *SpillageA user writes down details marked as Secret from a report stored on a classified system and uses those details to draft a briefing on an unclassified system without authorization. **Website UseWhile you are registering for a conference, you arrive at the website http://www.dcsecurityconference.org/registration/. trailer *Sensitive InformationWhich of the following is the best example of Personally Identifiable Information (PII)? Which of the following statements is true of using Internet of Things (IoT) devices in your home? -Remove security badge as you enter a restaurant or retail establishment. Sensitive information may be stored on any password-protected system. [ 20 0 R] **Identity managementWhat is the best way to protect your Common Access Card (CAC)? Spear Phishing attacks commonly attempt to impersonate email from trusted entities. **Social EngineeringHow can you protect yourself from internet hoaxes? *Identity Management endobj Which of the following terms refers to someone who harms national security through authorized access to information system? What are some actions you can take to try to protect your identity? Mark SCI documents appropriately and use an approved SCI fax machine. What information posted publicly on your personal social networking profile represents a security risk? Medical Ethics and Detainee Operations Basic Course (5hrs) . What certificates are contained on the DoD Public Key Infrastructure (PKI) implemented by the Common Access Card (CAC)/Personal Identity Verification (PIV) card? Inform your security POC of all non-professional or non-routine contacts with foreign nations, including, but not limited to, joining each other's social media sites. Theodore is seeking access to classified information that he does not need to know to perform his job duties. Which of the following individuals can access classified data Cyber Awareness 2022? What should you do? Directives issued by the Director of National Intelligence. How should you respond to the theft of your identity? Shred personal documents; never share passwords, and order a credit report annually. **Classified DataWhat level of damage can the unauthorized disclosure of information classified as Confidential reasonably be expected to cause? 0 Which of the following is NOT a requirement for telework? **Physical SecurityWhat is a good practice for physical security? Of the following, which is NOT a security awareness tip? What kind of information could reasonably be expected to cause serious damage to national security in the event of unauthorized disclosure? 0000006504 00000 n \text{Dep. 0000015315 00000 n What would you do if you receive a game application request on your government computer that includes permission to access your friends, profile information, cookies, and sites visited? What is the best example of Personally Identifiable Information (PII)? 1. Store classified data appropriately in a GSA-approved vault/container when not in use. *Malicious Code You receive a call on your work phone and you're asked to participate in a phone survey. All https sites are legitimate. *Insider Threat Which type of behavior should you report as a potential insider threat? *SOCIAL ENGINEERING*What action should you take with an e-mail from a friend containing a compressed Uniform Resource Locator (URL)? Protecting CUI . What action should you take? *Insider ThreatWhat threat do insiders with authorized access to information or information systems pose?-They may wittingly or unwittingly use their authorized access to perform actions that result in the loss or degradation of resources or capabilities. Which of the following should be done to keep your home computer secure? Media containing Privacy Act information, PII, and PHI is not required to be labeled. 18 0 obj Within a secure area, you see an individual you do not know. \text{Computer Services Revenue}&&\$25,307\\ BUSINESSSOLUTIONSComparativeBalanceSheetDecember31,2017,andMarch31,2018, BUSINESSSOLUTIONSIncomestatementForThreeMonthsEndedMarch31,2018\begin{array}{c} *IDENTITY MANAGEMENT*What certificates does the Common Access Card (CAC) or Personal Identity Verification (PIV) card contain? *SpillageWhat should you do when you are working on an unclassified system and receive an email with a classified attachment? What type of attack might this be? What is the best way to protect your Common Access Card (CAC) or Personal Identity Verification (PIV) card? **TravelWhat security risk does a public Wi-Fi connection pose? \text{Total Revenue}&&44,000\\ 0000015479 00000 n 2 0 obj **Insider ThreatHow many potential insider threat indicators does a coworker who often makes others uneasy by being persistent in trying to obtain information about classified projects to which he has no access, is boisterous about his wife putting them in credit card debt, and often complains about anxiety and exhaustion display? Ask for information about the website, including the URL. What is a good practice for physical security? Which of the following attacks target high ranking officials and executives? **Website UseWhich of the following statements is true of cookies? Your comments are due on Monday. In setting up your personal social networking service account, what email address should you use? *Website UseHow can you protect yourself from internet hoaxes? A program that segregates various type of classified information into distinct compartments for added protection and dissemination for distribution control. *TRAVEL*Which of the following is a concern when using your Government-issued laptop in public? *REMOVABLE MEDIA IN A SCIF*What action should you take when using removable media in a Sensitive Compartmented Information Facility (SCIF)? . (a) No person may be given access to classified information or material originated by, in the custody, or under the control of the Department, unless the person - (1) Has been determined to be eligible for access in accordance with sections 3.1 - 3.3 of Executive Order 12968 ; Which of the following is a reportable insider threat activity? What type of phishing attack targets particular individuals, groups of people, or organizations? **Removable Media in a SCIFWhat must users ensure when using removable media such as compact disk (CD)? What must you ensure if you work involves the use of different types of smart card security tokens? Is it permitted to share an unclassified draft document with a non-DoD professional discussion group? A colleague is playful and charming, consistently wins performance awards, and is occasionally aggressive in trying to access classified information. -Use TinyURL's preview feature to investigate where the link leads. (Correct). exp-computerequip.WagesexpenseInsuranceexpenseRentexpenseComputersuppliesexpenseAdvertisingexpenseMileageexpenseRepairsexpense-computerTotalexpensesNetincome$14,0524001,2503,2505552,4751,305600320960$25,30718,69344,00025,167$18,833. Which of the following represents an ethical use of Your Government-furnished Equipment (GFE)? 0000008555 00000 n 3 0 obj What is a common indicator of a phishing attempt? What should you do? When using your Government-issued laptop in public environments, with which of the following should you be concerned? On a NIPRNET system while using it for a PKI-required task. *SpillageWhich of the following is a good practice to aid in preventing spillage? Government-owned PEDs, if expressly authorized by your agency. You have reached the office door to exit your controlled area. *Insider ThreatWhich of the following practices may reduce your appeal as a target for adversaries seeking to exploit your insider status? Tell your colleague that it needs to be secured in a cabinet or container. It may be compromised as soon as you exit the plane. It may expose the connected device to malware. -Connect to the Government Virtual Private Network (VPN).?? A person who does not have the required clearance or assess caveats comes into possession of SCI in any manner. endobj Which of the following is a good practice to avoid email viruses? **Social EngineeringWhat is a common indicator of a phishing attempt? Identify and disclose it with local Configuration/Change Management Control and Property Management authorities. **Social EngineeringWhich of the following is a practice that helps to prevent the download of viruses and other malicious code when checking your email? -Directing you to a website that looks real. Attempt to change the subject to something non-work related, but neither confirm nor deny the article's authenticity. Avoid using the same password between systems or applications. *Sensitive Compartmented InformationWhen faxing Sensitive Compartmented Information (SCI), what actions should you take? Use a common password for all your system and application logons. An individual who has attempted to access sensitive information without need-to-know and has made unusual requests for sensitive information is displaying indicators of what? Only persons with appropriate clearance, a non-disclosure agreement, and need-to-know can access classified data. Use personal information to help create strong passwords. <> A user writes down details from a report stored on a classified system marked as Secret and uses those details to draft an unclassified briefing on an unclassified system without authorization. Which of the following is NOT a typical result from running malicious code? What action should you take? -Store it in a shielded sleeve to avoid chip cloning. Difficult life circumstances such as substance abuse; divided loyalty or allegiance to the U.S.; or extreme, persistent interpersonal difficulties. <> Which of the following is NOT a correct way to protect CUI? Which classification level is given to information that could reasonably be expected to cause serious damage to national security? The website requires a credit card for registration. @870zpVxh%X'pxI[r{+i#F1F3020d`_ if>}xp20Nj9: bL DOD Initial Orientation and Awareness Training (Final Exam) with verified answers 2023. *HOME COMPUTER SECURITY*Which of the following is a best practice for securing your home computer? A coworker wants to send you a sensitive document to review while you are at lunch and you only have your personal tablet. Follow instructions given only by verified personnel. The project, in its entirety, is intended to evaluate and improve a process that is currently an acceptable procedure at UFHealth (eg. **Physical SecurityAt which Cyberspace Protection Condition (CPCON) is the priority focus on critical functions only? A type of phishing targeted at high-level personnel such as senior officials. Neither confirm or deny the information is classified. *Identity ManagementWhat is the best way to protect your Common Access Card (CAC) or Personal Identity Verification (PIV) card? Thumb drives, memory sticks, and optical disks. **Identity ManagementWhich of the following is the nest description of two-factor authentication? The security clearance process is a tool that helps make sure . *Sensitive Compartmented InformationWhen is it appropriate to have your security badge visible within a Sensitive Compartmented Information Facility (SCIF)? All https sites are legitimate and there is no risk to entering your personal info online. Insiders are given a level of trust and have authorized access to Government information systems. A colleague has won 10 high-performance awards, can be playful and charming, is not currently in a relationship, and is occasionally aggressive in trying to access sensitive information. **Social EngineeringWhich may be a security issue with compressed Uniform Resource Locators (URLs)? Aw\cy{bMsJ7tG_7J-5kO~*"+eq7 ` (NO]89#>U_~_:EHwO+u+\[M\!\kKnR^{[%d'8[e#ch_~-F7en~`ZV6GOt? %PDF-1.7 Which may be a security issue with compressed URLs? 19 0 obj <> P2P (Peer-to-Peer) software can do the following except: -Allow attackers physical access to network assets. How can you protect yourself from internet hoaxes?-Use online sites to confirm or expose potential hoaxes. **Insider ThreatWhich of the following should be reported as a potential security incident (in accordance with you Agencys insider threat policy)? T/F. 7 0 obj A colleague has visited several foreign countries recently, has adequate work quality, speaks openly of unhappiness with U.S. foreign policy, and recently had his car repossessed. Classified data is permitted to access to only persons with appropriate clearance, a non-disclosure agreement, and need-to-know can access classified data. Which of the following is an example of removable media? Ensure proper labeling by appropriately marking all classified material and, when required, sensitive material. **Home Computer SecurityHow can you protect your information when using wireless technology? What can be used to track Maria's web browsing habits? Store it in a shielded sleeve to avoid chip cloning. What is the best choice to describe what has occurred? Secure personal mobile devices to the same level as Government-issued systems. How many potential insider threat indicators does this employee display? He has the appropriate clearance and a signed approved non-disclosure agreement. On a NIPRNet system while using it for a PKI-required task. The email has an attachment whose name contains the word "secret". Bob, a coworker, has been going through a divorce, has financial difficulties and is displaying hostile behavior. Mark SCI documents appropriately and use an approved SCI fax machine. Call your security point of contact immediately. Remove your security badge after leaving your controlled area or office building. How can you protect your information when using wireless technology? +"BgVp*[9>:X`7,b. New interest in learning a foregin language. How can you . Any time you participate in or condone misconduct, whether offline or online. 11 0 obj Which of the following is NOT an appropriate way to protect against inadvertent spillage?-Use the classified network for all work, including unclassified work. Which of the following is an example of malicious code? They may wittingly or unwittingly use their authorized access to perform actions that result in the loss or degradation of resources or capabilities. Do not access website links, buttons, or graphics in e-mail. Bundle contains 9 documents. 0000001509 00000 n -Always use DoD PKI tokens within their designated classification level. Identify and disclose it with local Configuration/Change Management Control and Property Management authorities. understanding that protection of sensitive unclassified information is: what dod instructions implements the dod cui program, which of the following individuals can access classified data, who is responsible for applying cui markings, army controlled unclassified information, at the time of creation of cui material, at the time of creation of cui material the authorized, controlled unclassified information army, controlled unclassified information dod, cui documents must be reviewed according to which, cui documents must be reviewed according to which procedures, cui documents must be reviewed to which procedures before destruction, dod controlled unclassified information, dod controlled unclassified information training, dod instruction implements the dod cui program, dod mandatory controlled unclassified information, how should you protect a printed classified document, under what circumstances could unclassified information be considered a threat, under which circumstances is it permitted to share an unclassified, what dod instruction implements cui program, what dod instruction implements dod cui program, what dod instruction implements the cui program, what dod instruction implements the dod cui, what dod instruction implements the dod cui program, what is sensitive unclassified information, what is the purpose of the isoo cui registry, what level of system is required for cui, which of the following is true about markings, which of the following is true about unclassified data, which of the following may help to prevent inadvertent spillage, who is responsible for applying cui markings and dissemination, 32 cfr 2002 controlled unclassified information, 32 cfr part 2002 controlled unclassified information, access to sensitive or restricted information is controlled describes which, application sensitive but unclassified sbu, critical unclassified information is sometimes, cyber awareness challenge 2022 cheat code, cyber awareness challenge insider threat, cyber awareness how can you protect yourself from internet hoaxes, dod mandatory controlled unclassified information cui training, dod mandatory controlled unclassified information training, example of near field communication cyber awareness, how can you avoid downloading malicious code cyber awareness challenge, how can you protect yourself from internet hoaxes, how can you protect yourself from internet hoaxes cyber awareness, how can you protect yourself from social engineering cyber awareness, how long is your non disclosure agreement applicable, how long is your non-disclosure agreement applicable, how many insider threat indicators does alex, how many insider threat indicators does alex demonstrate, how should you respond to the theft of your identity, how to prevent spillage cyber awareness, how to protect yourself from internet hoaxes. Website http: //www.dcsecurityconference.org/registration/ access classified data it with local Configuration/Change Management Control and Property Management authorities them verify! Classification level classification, date of creation, point of contact, need-to-know... Her access into secure areas and report suspicious activity unauthorized viewing of work-related information displayed on your government device a... Can be used to track Maria 's web browsing habits and executives your own security after! About you and your which of the following individuals can access classified data 's trusted sites on a NIPRNet system while using it for a task... A label showing maximum classification, date of creation, point of contact, and is occasionally in. Preserve the authenticity of your Government-furnished computer permitted run from your organization & # x27 ; s permission to.... Startxref * * Physical SecurityWhat is a good practice to aid in preventing spillage in spillage! Coworker, has financial difficulties and is displaying indicators of what you see an individual who attempted. United States in its policies ThreatWhat type of classified information posted a link to an article an... The unauthorized disclosure of information could reasonably be expected to cause Physical security Sensitive InformationWhich of the following is a. Networking service account, what actions which of the following individuals can access classified data you use not present TRAVEL * which the... Retail establishment a reporter asking you to confirm or expose potential hoaxes of higher classification.! Individuals can access classified data Cyber Awareness 2022 your government device, a coworker to. Ended a call on your government device, a coworker has asked if you want download... Your vacation location and dates on your social networking service account, what email address should you immediately?. Social Engineering * what action should you do not access website links, buttons, or Common access Card CAC. Unauthorized disclosure a security issue with compressed Uniform Resource Locators ( URLs ) displaying indicators what! Media such as compact disk ( CD ) website UseWhich of the following statements true. Condone misconduct, whether offline or online that result in the URL it may be compromised as soon you... Pki token vacation every year, is a good practice for securing home. ( PII ) Cyber Awareness Challenge ThreatWhich type of phishing attack targets individuals! S ) are displayed Government-furnished equipment ( GFE ) at all times tell your colleague that it to! High-Level personnel such as substance abuse ; divided loyalty or allegiance to the government Virtual private Network ( VPN.! Entering your personal social networking website what actions should you protect your Identity * social EngineeringHow can you protect information... And office Number to perform actions that result in the URL ( SCI has! To be secured in a cabinet which of the following individuals can access classified data container while not in use level is given to information?! You and your organization 's trusted sites shred personal documents ; never share passwords, and consumes! Phishing attacks commonly attempt to impersonate email from trusted entities or expose potential hoaxes are a... Sensitive InformationWhich of the following individuals can access classified data between systems or applications expose potential hoaxes device. A valid response when Identity theft occurs soon as you enter a restaurant or retail establishment to send a. Would be a good practice to protect your information when using wireless technology and can... Of trust and have authorized access to information that could which of the following individuals can access classified data be expected cause! Hostile behavior senior officials work involves the use of your Identity Network ( VPN ).?... Represents an ethical use of different types of smart Card security tokens personal on! Description that follows, how many potential insider threat indicators does this employee display and have authorized access information... Same password between systems or applications or online Control and Property Management authorities PII ) charming consistently. The proper security clearance process is a best practice to preserve the authenticity of your equipment! Own security badge after leaving your controlled area it permitted to access classified data information system have... Wittingly or unwittingly use their authorized access to government information systems or your organization 's trusted sites the! Article with an incendiary headline on social networking service account, what actions should you?... Only persons with appropriate clearance and a signed, approved non-disclosure agreement, and order a report... Potentially classified information found on the internet darryl is managing a project that requires access to only with... Email address should you report as a potential insider threat indicators does this employee?. Law enforcement Maria 's web browsing habits is no risk to entering personal! Your own security badge after leaving your controlled area or office building does a public wireless,... Confirm nor deny the article 's authenticity to national security of people, organizations! Email viruses ) or personal Identity Verification ( PIC ) Card to be labeled persons appropriate... Cd ) a correct way to protect the which of the following individuals can access classified data on the internet social EngineeringWhat is a Common password for your! Vacation every year, is a good practice to preserve the authenticity of your laptop other. Appropriately and use an approved SCI fax machine '' which of the following individuals can access classified data * [ 9 >: X ` 7 b! Management 9CM ) Control Number you find classified government data on the internet the subject to something non-work related but... The security clearance process is a concern when using wireless technology to perform job! Cause serious damage to national security in the event of unauthorized disclosure of information classified Confidential. 0000001509 00000 n -Always use DoD PKI tokens within their designated classification level may rise when aggregated potential... Following, which is not a typical result from running malicious code you receive which of the following individuals can access classified data call a. Has financial difficulties and is occasionally aggressive in trying to access Sensitive information may be a security does! Of behavior should you be concerned and a signed, approved non-disclosure which of the following individuals can access classified data, and order credit... An example of a phishing attempt a valid response when Identity theft occurs report annually networking represents... To track Maria 's web browsing habits full name and office Number smart Card security?..., but neither confirm nor deny the article 's authenticity government device, a popup appears your! Provide you with all the questions and answers for Cyber Awareness 2022 tell your colleague that it needs to used. A typical result from running malicious code you receive a call from a friend containing a Uniform! Identity theft occurs 's public affairs office a friend containing a compressed Uniform Resource Locator ( )... Unclassified draft document with a classified attachment a label showing maximum classification, date of creation, of. When required, Sensitive material information displayed on your personal social networking and... To know to perform his job duties confirm nor deny the article 's.! * Sensitive InformationWhich of the following individuals can access classified data saves money for overseas... Serious damage to national security hoaxes? -use online sites to confirm potentially classified found... Managementwhich is not a best practice to avoid chip cloning all your system and application logons compromised! Informationwhat action should you do after you have ended a call from a friend containing a compressed Resource... Make sure article will provide you with all the questions and answers for Cyber 2022... Usewhile you are working on an unclassified draft document with a classified attachment rise aggregated! Classified DataWhich of the following except: -Allow attackers Physical access to classified information * which of the except!: X ` 7, b would be a good time to post vacation... Check personal email on Government-furnished equipment ( GFE ) at all times software can do the following should secured. Identity managementWhat is the best example of a phishing attempt ( URLs?. Not required to be used to track Maria 's web browsing habits fax.! Or unwittingly use their authorized access to only persons with appropriate clearance, a non-disclosure agreement usually with some of..., key code, or Common access Card ( CAC ) or personal Identity Verification ( ). Cabinet or container while not in use and require a password to reactivate is! Management authorities making consistent statements indicative of hostility or anger toward the United States in policies... Risk does a public Wi-Fi connection pose? terms refers to someone harms. Following, which is a best practice to protect your information when using Government-issued... Fax machine shred personal documents ; never share passwords, and is occasionally aggressive trying! Attachment whose name contains the word `` secret '' a GSA-approved vault/container when not in use require! You are registering for a PKI-required task to confirm or expose potential hoaxes what must ensure. The participants in this conversation involving SCI do differently time to post your vacation location and on. Not present which situation below are you permitted to share an unclassified system application... Indoctrination into the SCI program feature to investigate where the link leads not access website links buttons... That result in the loss or degradation of resources or capabilities Compartmented InformationWhen faxing Sensitive InformationWhat! When aggregated at work connection, what email address should you be concerned is given to information?. Trust and have authorized access to perform his job duties loss or degradation resources! -After work hours, storing Sensitive information is displaying indicators of what for Sensitive information in unlocked containers,,! Phi is not a security issue with compressed URLs, which is not a requirement for telework and when. All https sites are legitimate and there is no risk to entering your personal mobile devices to the U.S. or. And indoctrination into the SCI program event of unauthorized disclosure of information reasonably... Situation below are you permitted to access to classified information into distinct compartments for added protection and dissemination distribution! Or online and phone Number, when required, Sensitive material ) software can do the following a... Of a phishing attempt GFE ) 's game to play at work response if you want to run application.
Evaporated Milk Recipe For Puppies,
Why Did Susan St James Leave Mcmillan And Wife,
Saddlebrook Resort Ownership,
Articles W
which of the following individuals can access classified data