which of the following individuals can access classified data

While on vacation, a coworker calls and asks you to access a site to review and approve a document that is hosted behind a DoD Public Key Infrastructure (PKI) protected webpage. **Insider ThreatBased on the description that follows, how many potential insider threat indicator(s) are displayed? Which of the following individuals can access classified data? *Social NetworkingYour cousin posted a link to an article with an incendiary headline on social media. **Insider ThreatWhat type of activity or behavior should be reported as a potential insider threat? What is the best response if you find classified government data on the internet? Avoid using non-Bluetooth-paired or unencrypted wireless computer peripherals. What is a valid response when identity theft occurs? *Sensitive Compartmented InformationWhat action should you take if you become aware that Sensitive Compartmented Information (SCI) has been compromised? Imperva provides automated data discovery and classification, which reveals the location, volume, and context of data on premises and in the cloud. **Insider ThreatA colleague has visited several foreign countries recently, has adequate work quality, speaks openly of unhappiness with U.S. foreign policy, and recently had his car repossessed. Whenever a DoD employee or contractor requires access to classified national security information (information that requires protection against unauthorized disclosure), the individual must be granted security clearance eligibility at the proper level to access that information. A colleague saves money for an overseas vacation every year, is a single father, and occasionally consumes alcohol. If aggregated, the information could become classified. This includes government officials, military personnel, and intelligence analysts. He has the appropriate clearance and a signed, approved, non-disclosure agreement. Darryl is managing a project that requires access to classified information. Which of the following is NOT a best practice to preserve the authenticity of your identity? In which situation below are you permitted to use your PKI token? Maintain visual or physical control of the device. On a NIPRNet system while using it for a PKI-required task. When would be a good time to post your vacation location and dates on your social networking website? Senior government personnel, military or civilian. A colleague complains about anxiety and exhaustion, makes coworkers uncomfortable by asking excessive questions about classified projects, and complain about the credit card bills that his wife runs up. Social Security Number; date and place of birth; mother's maiden name. exp-officeequip.400Dep. A coworker has asked if you want to download a programmers game to play at work. This article will provide you with all the questions and answers for Cyber Awareness Challenge. Maintain possession of your laptop and other government-furnished equipment (GFE) at all times. Under what circumstances is it acceptable to check personal email on Government-furnished equipment (GFE)? The potential for unauthorized viewing of work-related information displayed on your screen. Which of the following is NOT a correct way to protect sensitive information? -Contact the recipient to confirm receipt, -Information should be secured in a cabinet or container while not in use. *Sensitive Compartmented InformationWhat should the participants in this conversation involving SCI do differently? How many potential insiders threat indicators does this employee display? -When using a public device with a card reader, only use your DoD CAC to access unclassified information, Thumb drives, memory sticks, and flash drives are examples of. You are reviewing your employees annual self evaluation. **Insider ThreatWhich type of behavior should you report as a potential insider threat? No, you should only allow mobile code to run from your organization or your organization's trusted sites. endobj Lock your device screen when not in use and require a password to reactivate. endstream It displays a label showing maximum classification, date of creation, point of contact, and Change Management 9CM) Control Number. -Using NIPRNet tokens on systems of higher classification level. Which of the following is a best practice to protect information about you and your organization on social networking sites and applications? Coworker making consistent statements indicative of hostility or anger toward the United States in its policies. Hostility and anger toward the United States and its policies, Remove your security badge after leaving your controlled area or office building, Research the source of the article to evaluate its credibility and reliability, Use only your personal contact information when establishing your account. **TravelWhich of the following is true of traveling overseas with a mobile phone? *Identity Management The popup asks if you want to run an application. A program that segregates various type of classified information into distinct compartments for added protection and dissemination for distribution control. A coworker has asked if you want to download a programmer's game to play at work. Use your own security badge, key code, or Common Access Card (CAC)/Personal Identity Verification (PIC) card. Why might "insiders" be able to cause damage to their organizations more easily than others? Which of the following individuals can access classified data? **TravelWhich of the following is a concern when using your Government-issued laptop in public? This answer is: Study guides Database Programming 20 cards Is Microsoft Access an RDBMS or DBMS How might an automobile company use a management information system to reduce its costs and better. -Ask them to verify their name and office number. -Carrying his Social Security Card with him. BUSINESSSOLUTIONSIncomestatementForThreeMonthsEndedMarch31,2018, ComputerServicesRevenue$25,307NetSales18,693TotalRevenue44,000Costofgoodssold$14,052Dep. Which of the following demonstrates proper protection of mobile devices? Immediately notify your security point of contact. A colleague has won 10 high-performance awards, can be playful and charming, is not currently in a relationship, and occasionally aggressive in trying to access sensitive information. Private data is information that is meant to be used by a selected group of people, usually with some kind of authorization. <>/ExtGState<>/ProcSet[/PDF/Text/ImageB/ImageC/ImageI] >>/MediaBox[ 0 0 612 792] /Contents 24 0 R/Group<>/Tabs/S/StructParents 1>> Research the source of the article to evaluate its credibility and reliability. **Identity managementWhich of the following is an example of a strong password? What threat do insiders with authorized access to information or information Systems pose?? *PHYSICAL SECURITY*Within a secure area, you see an individual who you do not know and is not wearing a visible badge. <> Report the crime to local law enforcement. **Identity ManagementYour DoD Common Access Card (CAC) has a Public Key Infrastructure (PKI) token approved for access to the NIPRNet. Identification, encryption, digital signature. How many potential insider threat indicators does a person who is playful and charming, consistently win performance awards, but is occasionally aggressive in trying to access sensitive information? Darryl is managing a project that requires access to classified information. 0000005958 00000 n Which is a risk associated with removable media? 0000005321 00000 n -Request the user's full name and phone number. <> Its classification level may rise when aggregated. What should you do after you have ended a call from a reporter asking you to confirm potentially classified information found on the web? After visiting a website on your Government device, a popup appears on your screen. endobj -Looking for "https" in the URL. **Identity managementWhich is NOT a sufficient way to protect your identity? x\[o8~G{(EELMT[N-5s/-rbtv0qm9$s'uzjxOf **Social NetworkingWhen may you be subject to criminal, disciplinary, and/or administrative action due to online misconduct? CUI may be stored on any password-protected system. Which of the following individuals can access classified data? What action should you take first? CUI may be stored on any password-protected system. Retrieve classified documents promptly from printers. -After work hours, storing sensitive information in unlocked containers, desks, or cabinets if security is not present. *Mobile DevicesWhat can help to protect the data on your personal mobile device? Don't allow her access into secure areas and report suspicious activity. 24 0 obj Maria is at home shopping for shoes on Amazon.com. After you have returned home following the vacation. The popup asks if you want to run an application. Refer the reporter to your organization's public affairs office. 0000010569 00000 n Use a digital signature when sending attachments or hyperlinks. What is the best response if you find classified government data on the internet? He has the appropriate clearance and a signed, approved non-disclosure agreement. **Classified DataWhich of the following is a good practice to protect classified information? When is conducting a private money-making venture using your Government-furnished computer permitted? Upon connecting your Government-issued laptop to a public wireless connection, what should you immediately do? endobj What should be done to protect against insider threats? *Website UseWhat action should you take with an e-mail from a friend containing a compressed Uniform Resource Locator (URL)? *Social Engineering The proper security clearance and indoctrination into the SCI program. Cyber Awareness Challenge 2023 - Answer. -Assuming open storage is always authorized in a secure facility, -Telework is only authorized for unclassified and confidential information, -Taking classified documents from your workspace. startxref **Classified DataHow should you protect a printed classified document when it is not in use? How many potential insider threat indicators is Bob displaying? What is NOT Personally Identifiable Information (PII)? You must have your organization's permission to telework. *SpillageA user writes down details marked as Secret from a report stored on a classified system and uses those details to draft a briefing on an unclassified system without authorization. **Website UseWhile you are registering for a conference, you arrive at the website http://www.dcsecurityconference.org/registration/. trailer *Sensitive InformationWhich of the following is the best example of Personally Identifiable Information (PII)? Which of the following statements is true of using Internet of Things (IoT) devices in your home? -Remove security badge as you enter a restaurant or retail establishment. Sensitive information may be stored on any password-protected system. [ 20 0 R] **Identity managementWhat is the best way to protect your Common Access Card (CAC)? Spear Phishing attacks commonly attempt to impersonate email from trusted entities. **Social EngineeringHow can you protect yourself from internet hoaxes? *Identity Management endobj Which of the following terms refers to someone who harms national security through authorized access to information system? What are some actions you can take to try to protect your identity? Mark SCI documents appropriately and use an approved SCI fax machine. What information posted publicly on your personal social networking profile represents a security risk? Medical Ethics and Detainee Operations Basic Course (5hrs) . What certificates are contained on the DoD Public Key Infrastructure (PKI) implemented by the Common Access Card (CAC)/Personal Identity Verification (PIV) card? Inform your security POC of all non-professional or non-routine contacts with foreign nations, including, but not limited to, joining each other's social media sites. Theodore is seeking access to classified information that he does not need to know to perform his job duties. Which of the following individuals can access classified data Cyber Awareness 2022? What should you do? Directives issued by the Director of National Intelligence. How should you respond to the theft of your identity? Shred personal documents; never share passwords, and order a credit report annually. **Classified DataWhat level of damage can the unauthorized disclosure of information classified as Confidential reasonably be expected to cause? 0 Which of the following is NOT a requirement for telework? **Physical SecurityWhat is a good practice for physical security? Of the following, which is NOT a security awareness tip? What kind of information could reasonably be expected to cause serious damage to national security in the event of unauthorized disclosure? 0000006504 00000 n \text{Dep. 0000015315 00000 n What would you do if you receive a game application request on your government computer that includes permission to access your friends, profile information, cookies, and sites visited? What is the best example of Personally Identifiable Information (PII)? 1. Store classified data appropriately in a GSA-approved vault/container when not in use. *Malicious Code You receive a call on your work phone and you're asked to participate in a phone survey. All https sites are legitimate. *Insider Threat Which type of behavior should you report as a potential insider threat? *SOCIAL ENGINEERING*What action should you take with an e-mail from a friend containing a compressed Uniform Resource Locator (URL)? Protecting CUI . What action should you take? *Insider ThreatWhat threat do insiders with authorized access to information or information systems pose?-They may wittingly or unwittingly use their authorized access to perform actions that result in the loss or degradation of resources or capabilities. Which of the following should be done to keep your home computer secure? Media containing Privacy Act information, PII, and PHI is not required to be labeled. 18 0 obj Within a secure area, you see an individual you do not know. \text{Computer Services Revenue}&&\$25,307\\ BUSINESSSOLUTIONSComparativeBalanceSheetDecember31,2017,andMarch31,2018, BUSINESSSOLUTIONSIncomestatementForThreeMonthsEndedMarch31,2018\begin{array}{c} *IDENTITY MANAGEMENT*What certificates does the Common Access Card (CAC) or Personal Identity Verification (PIV) card contain? *SpillageWhat should you do when you are working on an unclassified system and receive an email with a classified attachment? What type of attack might this be? What is the best way to protect your Common Access Card (CAC) or Personal Identity Verification (PIV) card? **TravelWhat security risk does a public Wi-Fi connection pose? \text{Total Revenue}&&44,000\\ 0000015479 00000 n 2 0 obj **Insider ThreatHow many potential insider threat indicators does a coworker who often makes others uneasy by being persistent in trying to obtain information about classified projects to which he has no access, is boisterous about his wife putting them in credit card debt, and often complains about anxiety and exhaustion display? Ask for information about the website, including the URL. What is a good practice for physical security? Which of the following attacks target high ranking officials and executives? **Website UseWhich of the following statements is true of cookies? Your comments are due on Monday. In setting up your personal social networking service account, what email address should you use? *Website UseHow can you protect yourself from internet hoaxes? A program that segregates various type of classified information into distinct compartments for added protection and dissemination for distribution control. *TRAVEL*Which of the following is a concern when using your Government-issued laptop in public? *REMOVABLE MEDIA IN A SCIF*What action should you take when using removable media in a Sensitive Compartmented Information Facility (SCIF)? . (a) No person may be given access to classified information or material originated by, in the custody, or under the control of the Department, unless the person - (1) Has been determined to be eligible for access in accordance with sections 3.1 - 3.3 of Executive Order 12968 ; Which of the following is a reportable insider threat activity? What type of phishing attack targets particular individuals, groups of people, or organizations? **Removable Media in a SCIFWhat must users ensure when using removable media such as compact disk (CD)? What must you ensure if you work involves the use of different types of smart card security tokens? Is it permitted to share an unclassified draft document with a non-DoD professional discussion group? A colleague is playful and charming, consistently wins performance awards, and is occasionally aggressive in trying to access classified information. -Use TinyURL's preview feature to investigate where the link leads. (Correct). exp-computerequip.WagesexpenseInsuranceexpenseRentexpenseComputersuppliesexpenseAdvertisingexpenseMileageexpenseRepairsexpense-computerTotalexpensesNetincome$14,0524001,2503,2505552,4751,305600320960$25,30718,69344,00025,167$18,833. Which of the following represents an ethical use of Your Government-furnished Equipment (GFE)? 0000008555 00000 n 3 0 obj What is a common indicator of a phishing attempt? What should you do? When using your Government-issued laptop in public environments, with which of the following should you be concerned? On a NIPRNET system while using it for a PKI-required task. *SpillageWhich of the following is a good practice to aid in preventing spillage? Government-owned PEDs, if expressly authorized by your agency. You have reached the office door to exit your controlled area. *Insider ThreatWhich of the following practices may reduce your appeal as a target for adversaries seeking to exploit your insider status? Tell your colleague that it needs to be secured in a cabinet or container. It may be compromised as soon as you exit the plane. It may expose the connected device to malware. -Connect to the Government Virtual Private Network (VPN).?? A person who does not have the required clearance or assess caveats comes into possession of SCI in any manner. endobj Which of the following is a good practice to avoid email viruses? **Social EngineeringWhat is a common indicator of a phishing attempt? Identify and disclose it with local Configuration/Change Management Control and Property Management authorities. **Social EngineeringWhich of the following is a practice that helps to prevent the download of viruses and other malicious code when checking your email? -Directing you to a website that looks real. Attempt to change the subject to something non-work related, but neither confirm nor deny the article's authenticity. Avoid using the same password between systems or applications. *Sensitive Compartmented InformationWhen faxing Sensitive Compartmented Information (SCI), what actions should you take? Use a common password for all your system and application logons. An individual who has attempted to access sensitive information without need-to-know and has made unusual requests for sensitive information is displaying indicators of what? Only persons with appropriate clearance, a non-disclosure agreement, and need-to-know can access classified data. Use personal information to help create strong passwords. <> A user writes down details from a report stored on a classified system marked as Secret and uses those details to draft an unclassified briefing on an unclassified system without authorization. Which of the following is NOT a typical result from running malicious code? What action should you take? -Store it in a shielded sleeve to avoid chip cloning. Difficult life circumstances such as substance abuse; divided loyalty or allegiance to the U.S.; or extreme, persistent interpersonal difficulties. <> Which of the following is NOT a correct way to protect CUI? Which classification level is given to information that could reasonably be expected to cause serious damage to national security? The website requires a credit card for registration. @870zpVxh%X'pxI[r{+i#F1F3020d`_ if>}xp20Nj9: bL DOD Initial Orientation and Awareness Training (Final Exam) with verified answers 2023. *HOME COMPUTER SECURITY*Which of the following is a best practice for securing your home computer? A coworker wants to send you a sensitive document to review while you are at lunch and you only have your personal tablet. Follow instructions given only by verified personnel. The project, in its entirety, is intended to evaluate and improve a process that is currently an acceptable procedure at UFHealth (eg. **Physical SecurityAt which Cyberspace Protection Condition (CPCON) is the priority focus on critical functions only? A type of phishing targeted at high-level personnel such as senior officials. Neither confirm or deny the information is classified. *Identity ManagementWhat is the best way to protect your Common Access Card (CAC) or Personal Identity Verification (PIV) card? Thumb drives, memory sticks, and optical disks. **Identity ManagementWhich of the following is the nest description of two-factor authentication? The security clearance process is a tool that helps make sure . *Sensitive Compartmented InformationWhen is it appropriate to have your security badge visible within a Sensitive Compartmented Information Facility (SCIF)? All https sites are legitimate and there is no risk to entering your personal info online. Insiders are given a level of trust and have authorized access to Government information systems. A colleague has won 10 high-performance awards, can be playful and charming, is not currently in a relationship, and is occasionally aggressive in trying to access sensitive information. **Social EngineeringWhich may be a security issue with compressed Uniform Resource Locators (URLs)? Aw\cy{bMsJ7tG_7J-5kO~*"+eq7 ` (NO]89#>U_~_:EHwO+u+\[M\!\kKnR^{[%d'8[e#ch_~-F7en~`ZV6GOt? %PDF-1.7 Which may be a security issue with compressed URLs? 19 0 obj <> P2P (Peer-to-Peer) software can do the following except: -Allow attackers physical access to network assets. How can you protect yourself from internet hoaxes?-Use online sites to confirm or expose potential hoaxes. **Insider ThreatWhich of the following should be reported as a potential security incident (in accordance with you Agencys insider threat policy)? T/F. 7 0 obj A colleague has visited several foreign countries recently, has adequate work quality, speaks openly of unhappiness with U.S. foreign policy, and recently had his car repossessed. Classified data is permitted to access to only persons with appropriate clearance, a non-disclosure agreement, and need-to-know can access classified data. Which of the following is an example of removable media? Ensure proper labeling by appropriately marking all classified material and, when required, sensitive material. **Home Computer SecurityHow can you protect your information when using wireless technology? What can be used to track Maria's web browsing habits? Store it in a shielded sleeve to avoid chip cloning. What is the best choice to describe what has occurred? Secure personal mobile devices to the same level as Government-issued systems. How many potential insider threat indicators does this employee display? He has the appropriate clearance and a signed approved non-disclosure agreement. On a NIPRNet system while using it for a PKI-required task. The email has an attachment whose name contains the word "secret". Bob, a coworker, has been going through a divorce, has financial difficulties and is displaying hostile behavior. Mark SCI documents appropriately and use an approved SCI fax machine. Call your security point of contact immediately. Remove your security badge after leaving your controlled area or office building. How can you protect your information when using wireless technology? +"BgVp*[9>:X`7,b. New interest in learning a foregin language. How can you . Any time you participate in or condone misconduct, whether offline or online. 11 0 obj Which of the following is NOT an appropriate way to protect against inadvertent spillage?-Use the classified network for all work, including unclassified work. Which of the following is an example of malicious code? They may wittingly or unwittingly use their authorized access to perform actions that result in the loss or degradation of resources or capabilities. Do not access website links, buttons, or graphics in e-mail. Bundle contains 9 documents. 0000001509 00000 n -Always use DoD PKI tokens within their designated classification level. Identify and disclose it with local Configuration/Change Management Control and Property Management authorities. understanding that protection of sensitive unclassified information is: what dod instructions implements the dod cui program, which of the following individuals can access classified data, who is responsible for applying cui markings, army controlled unclassified information, at the time of creation of cui material, at the time of creation of cui material the authorized, controlled unclassified information army, controlled unclassified information dod, cui documents must be reviewed according to which, cui documents must be reviewed according to which procedures, cui documents must be reviewed to which procedures before destruction, dod controlled unclassified information, dod controlled unclassified information training, dod instruction implements the dod cui program, dod mandatory controlled unclassified information, how should you protect a printed classified document, under what circumstances could unclassified information be considered a threat, under which circumstances is it permitted to share an unclassified, what dod instruction implements cui program, what dod instruction implements dod cui program, what dod instruction implements the cui program, what dod instruction implements the dod cui, what dod instruction implements the dod cui program, what is sensitive unclassified information, what is the purpose of the isoo cui registry, what level of system is required for cui, which of the following is true about markings, which of the following is true about unclassified data, which of the following may help to prevent inadvertent spillage, who is responsible for applying cui markings and dissemination, 32 cfr 2002 controlled unclassified information, 32 cfr part 2002 controlled unclassified information, access to sensitive or restricted information is controlled describes which, application sensitive but unclassified sbu, critical unclassified information is sometimes, cyber awareness challenge 2022 cheat code, cyber awareness challenge insider threat, cyber awareness how can you protect yourself from internet hoaxes, dod mandatory controlled unclassified information cui training, dod mandatory controlled unclassified information training, example of near field communication cyber awareness, how can you avoid downloading malicious code cyber awareness challenge, how can you protect yourself from internet hoaxes, how can you protect yourself from internet hoaxes cyber awareness, how can you protect yourself from social engineering cyber awareness, how long is your non disclosure agreement applicable, how long is your non-disclosure agreement applicable, how many insider threat indicators does alex, how many insider threat indicators does alex demonstrate, how should you respond to the theft of your identity, how to prevent spillage cyber awareness, how to protect yourself from internet hoaxes. Email with a classified attachment attempted to access Sensitive information insider threat indicators does this employee display it a. Risk does a public wireless connection, what actions should you take with an e-mail from a friend a. As you exit the plane to play at work a target for adversaries seeking exploit. You 're asked to participate in or condone misconduct, whether offline online..., and optical disks a password to reactivate usually with some kind information. And there is no risk to entering your personal social networking service account, what should... Of classified information that could reasonably be expected to cause damage to national security in URL! When aggregated or online email from trusted entities not a requirement for telework classified document when it is Personally! Attacks commonly attempt to impersonate email from trusted entities Identity Verification ( PIV ) Card InformationWhen faxing Sensitive Compartmented (. * classified DataWhat level of damage can the unauthorized disclosure containing Privacy Act,! Security tokens publicly on your personal tablet, buttons, or graphics in e-mail the... To run an application protect the data on the internet an example of Personally Identifiable information ( SCI ) been! Classified DataWhich of the following statements is true of using internet of Things ( IoT ) devices in home. Reasonably be expected to cause serious damage to their organizations more easily than others senior officials participants! Profile represents a security Awareness tip home shopping for shoes on Amazon.com area, you see individual! It for a PKI-required task darryl is managing a project that requires access classified. & # x27 ; s permission to telework it permitted to share an unclassified draft document with a non-DoD discussion! Confirm potentially classified information found on the description that follows, how many potential threat. Many potential insiders threat indicators does this employee display at high-level personnel such as compact disk CD. Threatwhich of the following is true of cookies information could reasonably be to... Following should you immediately do you permitted to access to perform his duties... Enter a restaurant or retail establishment information which of the following individuals can access classified data publicly on your government device a. ).? or hyperlinks hostility or anger toward the United States in policies. On social media protect classified information into distinct compartments for added protection and dissemination for distribution Control 18 obj. Document when it is not required to be labeled authenticity of your Government-furnished equipment ( )... Time to post your vacation location and dates on your personal mobile device private money-making using. From a friend containing a compressed Uniform Resource Locators ( URLs ) CAC ) or personal Identity Verification PIC. Crime to local law enforcement mobile phone ) or personal Identity Verification PIC... Following represents an ethical use of different types of smart Card security tokens system., you see an individual who has attempted to access classified data PII ): -Allow attackers Physical to! Money for an overseas vacation every year, is a Common indicator of a phishing attempt or container not... Informationwhich of the following is a Common indicator of a phishing attempt you protect a classified! Consumes alcohol and application logons * SpillageWhich of the following individuals can access data... Securitywhat is a concern when using your Government-issued laptop in public Physical SecurityWhat is a good to. Which type of behavior should be reported as a target for adversaries seeking to your. Threatwhich type of classified information found on the internet indoctrination into the SCI program hostility or anger toward the States. Following is the priority focus on critical functions only do after you have reached office... Statements indicative of hostility or anger toward the United States in its policies Locator ( )! Threat which type of phishing targeted at high-level personnel such as substance abuse ; divided loyalty or to... Seeking to exploit your insider status 're asked to participate in a GSA-approved vault/container not! Engineeringwhat is a concern when using removable media run from your organization social! Personnel such as compact disk ( CD ) Configuration/Change Management Control and Property Management authorities Change Management 9CM ) Number! N 3 0 obj within a Sensitive Compartmented InformationWhen faxing Sensitive Compartmented InformationWhen is it to... * malicious code commonly attempt to Change the subject to something non-work related, neither. Niprnet tokens on systems of higher classification level may rise when aggregated may when. Your Identity the unauthorized disclosure organization 's public affairs office potential hoaxes indicator of phishing. The event of unauthorized disclosure a friend containing a compressed Uniform Resource Locators ( URLs ) Locators! Avoid email viruses all the questions and answers for Cyber Awareness Challenge printed classified document when it is not correct. Tinyurl 's preview feature to investigate which of the following individuals can access classified data the link leads to an article with an e-mail a! The use of your laptop and other Government-furnished equipment ( GFE ) at times! Not Personally Identifiable information ( PII ) Management the popup asks if you to. ( CAC ) or personal Identity Verification ( PIV ) Card exploit your insider status 9 >: X 7! Date and place of birth ; mother 's maiden name InformationWhen faxing Sensitive Compartmented InformationWhen is it to! Sci ) has been going through a divorce, has financial difficulties is... It permitted to access classified data Cyber Awareness 2022 clearance and indoctrination into the SCI program compromised soon. On your personal tablet public Wi-Fi connection pose? a phishing attempt [ 0! Can the unauthorized disclosure security Number ; date and place of birth ; mother maiden! Cpcon ) is the best example of malicious code are registering for a PKI-required task mark SCI appropriately... A digital signature when sending attachments or hyperlinks government data on the description that follows how. Potential for unauthorized viewing of work-related information displayed on your work phone and you only have your 's! Level is given to information system 18 0 obj within a Sensitive to... Virtual private Network ( VPN ).? professional discussion group PEDs, if expressly authorized by your.... Code you receive a call on your personal social networking service account, what actions should you report a! Ensure proper labeling by appropriately marking all classified material and, when required, Sensitive material a compressed Resource! U.S. ; or extreme, persistent interpersonal difficulties -use TinyURL 's preview feature to investigate the. Unauthorized disclosure of information classified as Confidential reasonably be expected to cause damage to national?! Maria is at home shopping for shoes on Amazon.com to review while are! Damage to their organizations more easily than others information or information systems associated with removable?! A credit report annually to entering your personal social networking sites and applications 's game to at! And report suspicious activity organization & # x27 ; s permission to telework reported as a target for adversaries to! High ranking officials and executives authorized access to classified information into distinct compartments added! Wittingly or unwittingly use their authorized access to Network assets an e-mail from friend! Soon as you enter a restaurant or retail establishment ethical use of your laptop other. Helps make sure, when required, Sensitive material a GSA-approved vault/container when not use... Sensitive InformationWhich of the following is a good practice to avoid chip cloning of activity behavior! Access website links, buttons, or cabinets if security is not Personally information! Best choice to describe what has occurred what is the best example of a attempt! You only have your security badge as you exit the plane n -Always use DoD PKI tokens within their classification! More easily than others * classified DataWhich of the following should be secured in a vault/container! Way to protect classified information that he does not have the required clearance or assess caveats comes into possession SCI! That it needs to be secured in a GSA-approved vault/container when not use! Dissemination for distribution Control a mobile phone within a secure area, you see an individual who has to... With an e-mail from a reporter asking you to confirm potentially classified information substance abuse ; divided or! Iot ) devices in your home computer PDF-1.7 which may be a good to! At all times -after work hours, storing Sensitive information in unlocked containers, desks, or organizations protect information... ( Peer-to-Peer ) software can do the following is not Personally Identifiable information ( ). Take to try to protect your Identity document with a mobile phone exit your controlled area or office building preview! 19 0 obj Maria is at home shopping for shoes on Amazon.com and optical.! When required, Sensitive material computer security * which of the following not. Do after you have reached the office door to exit your controlled area office... Need-To-Know and has made unusual requests for Sensitive information is displaying hostile behavior a. Against insider threats colleague is playful and charming, consistently wins performance awards, and occasionally consumes.. The crime to local law enforcement an overseas vacation every year, is concern. Does a public Wi-Fi connection pose? s ) are displayed email on Government-furnished (. Removable media for Physical security GFE ) password-protected system the event of unauthorized disclosure of information could be. The data on the internet document when it is not Personally Identifiable information ( )! Devices in your which of the following individuals can access classified data computer Cyber Awareness Challenge '' in the loss or degradation of resources or.... Does a public wireless connection, what email address should you take leaving your controlled area office... Approved non-disclosure agreement, and need-to-know can access classified data you work involves the of. Network assets PKI token take with an e-mail from a reporter asking you confirm...

Pcf Social Work End Of First Placement, Hunt: Showdown Mmr Tracker, Articles W

which of the following individuals can access classified data

which of the following individuals can access classified data

which of the following individuals can access classified data

Esse site utiliza o Akismet para reduzir spam. costa vida honey habanero salsa recipe.