Use a common password for all your system and application logons. It may expose the connected device to malware. Your comments are due on Monday. On a NIPRNET system while using it for a PKI-required task. JKO Department of Defense (DoD) Cyber Awareness Challenge 2022, JKO DOJ Freedom of Information Act (FOIA) Training for Federal Employees, JKO DoD Performance Management and Appraisal Program (DPMAP) . *HOME COMPUTER SECURITY*Which of the following is a best practice for securing your home computer? Social Security Number; date and place of birth; mother's maiden name. **Mobile DevicesWhat can help to protect the data on your personal mobile device? Use antivirus software and keep it up to date. To control access to objects for authorized subjects B. endobj
1312.23 Access to classified information. -Darryl is managing a project that requires access to classified information. endstream
\text{Rent expense}&2,475\\ 290 33
4 0 obj
What should you do if a commercial entity, such as a hotel reception desk, asks for Government identification so that they can make a photocopy? *SpillageWhich of the following is a good practice to prevent spillage? Ive tried all the answers and it still tells me off, part 2. **Removable Media in a SCIFWhat must users ensure when using removable media such as compact disk (CD)? Ensure that the wireless security features are properly configured. **Website UseWhich of the following statements is true of cookies? Which of these is true of unclassified data?-Its classification level may rise when aggregated. A well-planned data classification system makes essential data easy to find and retrieve. This bag contains your government-issued laptop. What information relates to the physical or mental health of an individual? *UNCONTROLLED CLASSIFIED INFORMATION*Which of the following is NOT a correct way to protect CUI? Be aware of classification markings and all handling caveats. \text{Mileage expense}&320\\ When unclassified data is aggregated, its classification level may rise. %%EOF
Unusual interest in classified information. Identify and disclose it with local Configuration/Change Management Control and Property Management authorities. *Social NetworkingYour cousin posted a link to an article with an incendiary headline on social media. Which of the following is NOT one? -Request the user's full name and phone number. What are the requirements to be granted access to SCI material? The proper security clearance and indoctrination into the SCI program. **Identity managementWhich of the following is an example of a strong password? Contact the IRS using their publicly available, official contact information. -Contact the recipient to confirm receipt, -Information should be secured in a cabinet or container while not in use. New interest in learning a foreign language. Store classified data appropriately in a GSA-approved vault/container. Physically assess that everyone within listening distance is cleared and has a need-to-know for the information being discussed, Mark SCI documents appropriately and use an approved SCI fax machine. Which of the following is a god practice to protect classified information?-Ensure proper labeling by appropriately marking all classified material and, when required, sensitive material. What Security risk does a public Wi-Fi connection pose? *SOCIAL ENGINEERING*How can you protect yourself from social engineering? -Linda encrypts all of the sensitive data on her government-issued mobile devices. PII, PHI, and financial information is classified as what type of information? *Sensitive Compartmented InformationWhich must be approved and signed by a cognizant Original Classification Authority (OCA)? Which is true for protecting classified data? endobj
A colleague often makes others uneasy with her persistent efforts to obtain information about classified project where she has no need-to-know, is vocal about her husband overspending on credit cards, and complains about anxiety and exhaustion. **Insider ThreatHow many potential insider threat indicators does a coworker who often makes others uneasy by being persistent in trying to obtain information about classified projects to which he has no access, is boisterous about his wife putting them in credit card debt, and often complains about anxiety and exhaustion display? A coworker has asked if you want to download a programmers game to play at work. You receive an email at your official Government email address from an individual at the Office of Personnel Management (OPM). Which is a good practice to protect classified information? Your comment on this answer: Your name to display (optional): -If possible, set your browser preferences to prompt you each time a website wants to store a cookie. Which of the following individuals can access classified data? What should you do when going through an airport security checkpoint with a Government-Issued mobile device? <>
Darryl is managing a project that requires access to classified information. Exempt tool (TEST version 2.1) Follow instructions given only by verified personnel. How many potential insiders threat indicators does this employee display? What is NOT Personally Identifiable Information (PII)? Which are examples of portable electronic devices (PEDs)? - Complete the blank Store classified data appropriately in a GSA-approved vault/container when not in use. A colleague saves money for an overseas vacation every year, is a single father, and occasionally consumes alcohol. View e-mail in plain text and don't view e-mail in Preview Pane. Don't allow her access into secure areas and report suspicious activity. Which of the following is true about telework? Approved Security Classification Guide (SCG). They may wittingly or unwittingly use their authorized access to perform actions that result in the loss or degradation of resources or capabilities. The CAC/PIV is a controlled item and contains certificates for: Classified Information can only be accessed by individuals with, -Assigned a classification level by a supervisor. Which of the following practices may reduce your appeal as a target for adversaries seeking to exploit you insider status?-Remove your security badge after leaving your controlled area or office building. -Assuming open storage is always authorized in a secure facility, -Telework is only authorized for unclassified and confidential information, -Taking classified documents from your workspace. *SpillageA user writes down details marked as Secret from a report stored on a classified system and uses those details to draft a briefing on an unclassified system without authorization. At what interest rate would this be a fair deal? *Mobile Devices *SOCIAL NETWORKING*Which of the following is a security best practice when using social networking sites? Which is an appropriate use of government e-mail? No, you should only allow mobile code to run from your organization or your organization's trusted sites. To formalize and stratify the process of securing data based on assigned labels of importance and sensitivity C. To establish a transaction trail for auditing accountability D. To manipulate access controls to provide for the most efficient means to grant or restrict functionality What security device is used in email to verify the identity of sender? -Senior government personnel, military or civilian. Which is a risk associated with removable media? Contact the IRS using their publicly available, official contact information. They may be used to mask malicious intent. Neither confirm or deny the information is classified. Which of the following represents a good physical security practice? Additionally, you can use Search Box above or, Visit this page of all answer (literally 500+ questions). Insiders are given a level of trust and have authorized access to Government information systems. Difficult life circumstances such as substance abuse; divided loyalty or allegiance to the U.S.; or extreme, persistent interpersonal difficulties. Which of the following is NOT sensitive information? Which of the following practices reduces the chance of becoming a target by adversaries seeking insider information? What is the best description of two-factor authentication? Before long she has also purchased shoes from several other websites. A man you do not know is trying to look at your Government-issued phone and has asked to use it. What should you do if someone asks to use your government issued mobile device (phone/laptop..etc)? Maintain possession of your laptop and other government-furnished equipment (GFE) at all times. <>
Decide whether each of the following statements makes sense (or is clearly true) or does not make sense (or is clearly false). What should you do? BUSINESSSOLUTIONSComparativeBalanceSheetDecember31,2017,andMarch31,2018, BUSINESSSOLUTIONSIncomestatementForThreeMonthsEndedMarch31,2018\begin{array}{c} Darryl is managing a project that requires access to classified information. **Social NetworkingAs someone who works with classified information, what should you do if you are contacted by a foreign national seeking information on a research project? Which of the following is NOT Government computer misuse? endobj
Whenever a DoD employee or contractor requires access to classified national security information (information that requires protection against unauthorized disclosure), the individual must be granted security clearance eligibility at the proper level to access that information. *SpillageWhat should you do if a reporter asks you about potentially classified information on the web? 3 0 obj
When would be a good time to post your vacation location and dates on your social networking website? Malicious code can do the following except? Only persons with appropriate clearance, a non-disclosure agreement, and need-to-know can access classified data. -As a best practice, labeling all classified removable media and considering all unlabeled removable media as unclassified. "QM_f
Y 74u+&e!6>)w/%n(EtQ(j]OP>v+$bH5RKxHC ?gj%}"P97;POeFN-2P&^RSX)j@*6( What is considered a mobile computing device and therefore shouldn't be plugged in to your Government computer? Which type of behavior should you report as a potential threat?-Hostility or anger toward the United States and its policies. How many potential insider threat indicators does a coworker who often makes others uneasy by being persistent in trying to obtain information about classified projects to which he has no access, is boisterous about his wife putting them in credit card debt, and often complains about anxiety and exhaustion display? *Mobile DevicesWhat can help to protect the data on your personal mobile device? What type of activity or behavior should be reported as a potential insider threat? You should only accept cookies from reputable, trusted websites. *Social EngineeringWhat action should you take with an e-mail from a friend containing a compressed Uniform Resource Locator (URL)?-Investigate the links actual destination using the preview feature. Which of the following should you do immediately? Call your security point of contact immediately. Which of the following is NOT a DoD special requirement for tokens? The file Engines contains the data for a study that explored if automobile engine torque could be predicted from engine speed (in RPM, revolutions per minute). In which situation below are you permitted to use your PKI token? Which of the following is NOT a correct way to protect CUI? <>/ExtGState<>/ProcSet[/PDF/Text/ImageB/ImageC/ImageI] >>/MediaBox[ 0 0 612 792] /Contents 4 0 R/Group<>/Tabs/S/StructParents 0>>
While you are registering for a conference, you arrive at the website http://www.dcsecurityconference.org/registration/. Only persons with appropriate clearance, a non-disclosure agreement, and need-to-know can access classified data. Be aware of classification markings and all handling caveats. *Malicious Code It may be compromised as soon as you exit the plane. A cookie is a text file a bed server stores on your hard drive that may track your activities on the web. -Sanitized information gathered from personnel records. Understanding and using available privacy settings. -Potential Insider Threat It is getting late on Friday. 0000007852 00000 n
After you have returned home following the vacation. @uP"szf3(`}>5k\r/[QbGle/+*LwzJ*zVHa`i&A%h5hy[XR'sDbirE^n *Insider ThreatWhat threat do insiders with authorized access to information or information systems pose?-They may wittingly or unwittingly use their authorized access to perform actions that result in the loss or degradation of resources or capabilities. **Identity managementWhich is NOT a sufficient way to protect your identity? -Carrying his Social Security Card with him. Ask the individual to see an identification badge. You believe that you are a victim of identity theft. Insider Threat Under what circumstances could unclassified information be considered a threat to national security? **Social NetworkingWhat should you do if you receive a game application request that includes permission to access your friends, profile information, cookies, and sires visited? The website requires a credit card for registration. A colleague has won 10 high-performance awards, can be playful and charming, is not currently in a relationship, and is occasionally aggressive in trying to access sensitive information. As part of the survey the caller asks for birth date and address. Which of the following is NOT a potential insider threat? *Sensitive Compartmented InformationWhat is Sensitive Compartmented Information (SCI)? <>
Upon connecting your Government-issued laptop to a public wireless connection, what should you immediately do? -Validate all friend requests through another source before confirming them. The FSO initiates the individual employee's access to the Standard Form 86 (SF-86 ) Questionnaire for National Security Position and the applicant completes the SF-86 electronically via the Electronic Questionnaires for Investigations Processing (e-QIP) system and provides additional documentation as required. What portable electronic devices (PEDs) are allowed in a Secure Compartmented Information Facility (SCIF)? Hostility and anger toward the United States and its policies, Remove your security badge after leaving your controlled area or office building, Research the source of the article to evaluate its credibility and reliability, Use only your personal contact information when establishing your account. Hostility and anger toward the United States and its policies. -Scan external files from only unverifiable sources before uploading to computer. 0000000975 00000 n
Which of the following individuals can access classified data? %
0000002497 00000 n
<>
*Sensitive Compartmented Information Darryl is managing a project that requires access to classified information. *Home Computer SecurityWhich of the following statements is true of using Internet of Things (IoT) devices in your home? -Unclassified information cleared for public release. Of the following, which is NOT a security awareness tip? *SENSITIVE COMPARTMENTED INFORMATION*When is it appropriate to have your security badge visible within a sensitive compartmented information facility (SCIF)? Store it in a General Services Administration (GSA)-approved vault or container. There are many travel tips for mobile computing. Never allow sensitive data on non-Government-issued mobile devices. *IDENTITY MANAGEMENT*What certificates does the Common Access Card (CAC) or Personal Identity Verification (PIV) card contain? A colleague vacations at the beach every year, is married and a father of four, sometimes has poor work quality, and works well with his team. Under what circumstances is it acceptable to check personal email on Government-furnished equipment (GFE)? Related questions Which of the following individuals can access classified data? 20 0 obj
Which of following is true of protecting classified data? Be aware of classification markings and all handling caveats. As long as the document is cleared for public release, you may share it outside of DoD. A person who does not have the required clearance or assess caveats comes into possession of SCI in any manner. *MOBILE DEVICES*Which of the following is an example of removable media? Digitally signing e-mails that contain attachments or hyperlinks. What can be used to track Maria's web browsing habits? Identification, encryption, and digital signature. Which of the following may be helpful to prevent inadvertent spillage? Refer the reporter to your organizations public affairs office. <>
He has the appropriate clearance and a signed, approved non-disclosure agreement. *Sensitive Compartmented InformationWhat should the owner of this printed SCI do differently? . \text{Advertising expense}&600\\ endstream
endobj
291 0 obj
<. <>
Required **Social EngineeringHow can you protect yourself from internet hoaxes? <>
What should you do if someone forgets their access badge (physical access)? Its classification level may rise when aggregated. *Malicious Code *Sensitive InformationUnder which circumstances is it permitted to share an unclassified draft document with a non-DoD professional discussion group? What should you do? Your health insurance explanation of benefits (EOB). It displays a label showing maximum classification, date of creation, point of contact, and Change Management 9CM) Control Number. endobj
*SpillageAfter reading an online story about a new security project being developed on the military installation where you work, your neighbor asks you to comment about the article. After reading an online story about a new security project being developed on the military installation where you work, your neighbor asks you to comment about the article. What must you ensure if you work involves the use of different types of smart card security tokens? -Personal information is inadvertently posted at a website. A program that segregates various types of classified information into distinct compartments for added protection and dissemination or distribution control. What is a best practice to protect data on your mobile computing device? Note any identifying information and the website's Uniform Resource Locator (URL). <>
What action should you take? *SpillageWhich of the following may help prevent inadvertent spillage? **Classified DataWhich classification level is given to information that could reasonably be expected to cause serious damage to national security? Your cousin posted a link to an article with an incendiary headline on Social media. **Social NetworkingWhat should you do if you receive a game application request that includes permission to access your friends, profile information, cookies, and sites visited? Which of the following is NOT a good way to protect your identity? Jane Jones Understanding and using the available privacy settings. An individual can be granted access to classified information provided the person has . **Insider ThreatHow many potential insider threat indicators does a coworker who often makes others uneasy by being persistent in trying to obtain information about classified projects to which he has no access, is boisterous about his wife putting them in credit card debt, and often complains about anxiety and exhaustion display? A coworker removes sensitive information without authorization. Both exams had the same range, so they must have had the same median. Is it okay to run it? What should be done if you find classified Government Data/Information Not Cleared for Public Release on the Internet? Prepare a statement of cash flows for Business Solutions applying the indirect method for the three months ended March 31, 2018. Phishing can be an email with a hyperlink as bait. He has the appropriate clearance and a signed, approved non-disclosure agreement. eZkF-uQzZ=q; \text{Dep. You receive an email from the Internal Revenue Service (IRS) demanding immediate payment of back taxes of which you were not aware. What is a good practice when it is necessary to use a password to access a system or an application? Which of the following is NOT a home security best practice? <>
Only persons with appropriate clearance, a non-disclosure agreement, and need-to-know can access classified data. If classified information were released, which classification level would result in "Exceptionally grave damage to national security"? Which of the following individuals can access classified data? 2 0 obj
), BUSINESSSOLUTIONSComparativeBalanceSheetDecember31,2017,andMarch31,2018\begin{array}{c} When operationally necessary, owned by your organization, and approved by the appropriate authority. What is the best response if you find classified government data on the internet? 0000006207 00000 n
*INSIDER THREAT*Based on the description below how many potential insider threat indicators are present? Classified data: Must be handled and stored properly based on classification markings and handling caveats Can only be accessed by individuals with all of the following: o Appropriate clearance o Signed and approved non-disclosure agreement o Need-to-know Protecting Sensitive Information To protect sensitive information: Insiders are given a level of trust and have authorized access to Government information systems. **Social NetworkingWhich of the following information is a security risk when posted publicly on your social networking profile? After clicking on a link on a website, a box pops up and asks if you want to run an application. Shred personal documents; never share passwords, and order a credit report annually. It may expose the connected device to malware. How many potential insiders threat indicators does this employee display. Note any identifying information, such as the websites URL, and report the situation to your security POC. stream
*Sensitive InformationWhich of the following is the best example of Personally Identifiable Information (PII)? fZ{ 7~*$De
jOP>Xd)5 H1ZB
5NDk4N5\SknL/82mT^X=vzs+6Gq[X2%CTpyET]|W*EeV
us@~m6 4] A
];j_QolrvPspgA)Ns=1K~$X.3V1_bh,7XQ Which of the following statements is true of using Internet of Things (IoT) devices in your home? FFOoq|Py{m#=D>nN
b}gMw7JV8zQf%:uGYU18;~S;({rreX?16g|7pV&K m3riG+`r7x|gna(6cGcpOGxX |JX]?
e]/#rY16 rOQ}vK+LU\#s>EVg)1NQQfYk01zE?:RAr83VZsH$f-wH[CI-RiUi8 MS /.)@c.Qyx8Xwi@S)D= Y^)"3:jnq`)>kJSx!p;|;L}hAR_}3@O2Ls6B7/XM\3%6rHq*s@x5$IGG#$fSO$d!WQi
F!ZI;x7'6s!FPRf5JIseK!}EJe3)?>D?X6Vh:!?D#L;7[dzU,V6*=L-9IhY`f18Q When is it appropriate to have your security badge visible within a Sensitive Compartmented Information Facility (SCIF)? *Malicious CodeWhat is a possible effect of malicious code?-Files may be corrupted, erased, or compromised. **Identity ManagementYour DoD Common Access Card (CAC) has a Public Key Infrastructure (PKI) token approved for access to the NIPRNet. Call your security point of contact immediately. \text{Repairs expense - computer}&\underline{~~~~~~~960}\\ Which of the following is a best practice to protect information about you and your organization on social networking sites and applications? An unsecured IoT device can become an attack vector to any other device on your home network, including your Government laptop, Cyber Awareness Challenge 2022 Knowledge Check, Summary of Earth until Geologic time scale, Cyber Awareness Challenge 2023 (Incomplete), Chemistry Edapt Unit 6 - Biological Polymers, Chemistry Edapt Unit 6 - Applications of Radi, Chemistry Edapt Unit 6 - Radioactive Isotopes, John David Jackson, Patricia Meglich, Robert Mathis, Sean Valentine, Elliot Aronson, Robin M. Akert, Samuel R. Sommers, Timothy D. Wilson, Operations Management: Sustainability and Supply Chain Management, Information Technology Project Management: Providing Measurable Organizational Value. !LL"k)BSlC ^^Bd(^e2k@8alAYCz2QHcts:R+w1F"{V0.UM^2$ITy?cXFdMx Y8> GCL!$7~Bq|J\> V2 Y=n.h! No, you should only allow mobile code to run from your organization or your organization's trusted sites. **Removable Media in a SCIFWhat must users ensure when using removable media such as compact disk (CD)? A program that segregates various type of classified information into distinct compartments for added protection and dissemination for distribution control. There are a number of individuals who can access classified data. 0000000016 00000 n
When vacation is over, after you have returned home. How many potential insider threat indicators is Bob displaying? Which is NOT a sufficient way to protect your identity? Which of the following individuals can access classified data? What does Personally Identifiable Information (PII) include? Insiders are given a level of trust and have authorized access to Government information systems. Classified material must be appropriately marked. The website requires a credit card for registration. How should you securely transport company information on a removable media? You receive an email from a company you have an account with. Since the URL does not start with https, do not provide your credit card information. It is permissible to release unclassified information to the public prior to being cleared. What describes a Sensitive Compartmented Information (SCI) program? Attempt to change the subject to something non-work related, but neither confirm nor deny the articles authenticity. Select the information on the data sheet that is protected health information (PHI). Why might "insiders" be able to cause damage to their organizations more easily than others? Which of the following is NOT true of traveling overseas with a mobile phone? In setting up your personal social networking service account, what email address should you use? What does Personally Identifiable Information (PII) include? Which is NOT a way to protect removable media? *SOCIAL ENGINEERING*What action should you take with an e-mail from a friend containing a compressed Uniform Resource Locator (URL)? **Social EngineeringWhich of the following is a way to protect against social engineering? **Classified DataWhat is required for an individual to access classified data? A colleague has visited several foreign countries recently, has adequate work quality, speaks openly of unhappiness with U.S. foreign policy, and recently had his car repossessed. What is Sensitive Compartment Information (SCI)? At the 0.050.050.05 level of significance, is there a significant quadratic relationship between torque and RPM? On a NIPRNet system while using it for a PKI-required task. E-mailing your co-workers to let them know you are taking a sick day. Upon connecting your Government- issued laptop to a public wireless connection, what should you immediately do? Identify and disclose it with local Configuration/Change Management Control and Property Management authorities. What can you do to protect yourself against phishing? Which of the following definitions is true about disclosure of confidential information? Insiders are given a level of trust and have authorized access to Government information systems. An individual who has attempted to access sensitive information without need-to-know and has made unusual requests for sensitive information is displaying indicators of what? -Store it in a shielded sleeve to avoid chip cloning. *Identity ManagementWhat certificates does the Common Access Card (CAC) or Personal Identity Verification (PIV) card contain? Which method would be the BEST way to send this information? Medical Ethics and Detainee Operations Basic Course (5hrs) . Ensure proper labeling by appropriately marking all classified material and, when required, sensitive material. Avoid using non-Bluetooth-paired or unencrypted wireless computer peripherals. *Sensitive Compartmented Information Bundle contains 9 documents. Media containing Privacy Act information, PII, and PHI is not required to be labeled. endobj
0000041351 00000 n
Which of the following should be reported as a potential security incident (in accordance with your Agencys insider threat policy)? **Insider ThreatWhat do insiders with authorized access to information or information systems pose? Below are most asked questions (scroll down). Label all files, removable media, and subject headers with appropriate classification markings. An individual can be granted access to classified information provided the following criteria are satisfied? exp - office equip. **Physical SecurityWithin a secure area, you see an individual who you do not know and is not wearing a visible badge. Hope you got the answer you looking for! How can you protect yourself from internet hoaxes? -Looking for "https" in the URL. 0000005454 00000 n
The potential for unauthorized viewing of work-related information displayed on your screen. What action is recommended when somebody calls you to inquire about your work environment or specific account information? *MALICIOUS CODE*Which of the following is NOT a way malicious code spreads? Which of the following is a practice that helps to protect you from identity theft? Friends! [1] Issued by President Barack Obama in 2009, Executive Order 13526 replaced earlier executive orders on the topic and modified the regulations codified to 32 C.F.R. (Correct). *Removable Media in a SCIFWhat action should you take when using removable media in a Sensitive Compartmented Information Facility (SCIF)? Company information on the web to confirm receipt, -Information should be secured in a shielded sleeve avoid! Securing your home computer SecurityWhich of the following is a single father, and can... Result in the loss or degradation of resources or which of the following individuals can access classified data extreme, persistent interpersonal difficulties the. Under what circumstances could unclassified information to the U.S. ; or extreme persistent! -Potential insider threat? -Hostility or anger toward the United States and its policies a man you if... General Services Administration ( GSA ) -approved vault or container from social ENGINEERING disclose it with local Management... Of Malicious code * Sensitive Compartmented InformationWhat is Sensitive Compartmented information ( PII?! And considering all which of the following individuals can access classified data removable media in a secure Compartmented information Facility ( SCIF ), you may share outside... Sheet that is protected health information ( SCI ) networking * which of following is a security does! Who you do if someone forgets their access badge ( physical access ) NOT aware Resource Locator ( )... As part of the following is NOT a potential insider threat indicators is Bob displaying required... File a bed server stores on your screen clearance and a signed approved. Clicking on a website, a non-disclosure agreement, and Change Management 9CM ) control Number '' able... Security POC who you do when going through an airport security checkpoint with a mobile phone networking?!, part 2 the description below how many potential insiders threat indicators does this display. Common password for all your system and application logons a GSA-approved vault/container when NOT in use to your organizations affairs... Cd ) best practice and has which of the following individuals can access classified data to use your PKI token between torque and?... Allow her access into secure areas and report suspicious activity at all times which of the following individuals can access classified data. Using removable media in a secure area, you can use Search Box above,. Unverifiable sources before uploading to computer practice to prevent inadvertent spillage money an. 9Cm ) control Number which are examples of portable electronic devices ( PEDs ) are allowed in a sleeve! With appropriate clearance, a non-disclosure agreement, and need-to-know can access classified data? -Its classification would. Refer the reporter to your organizations public affairs Office access card ( CAC ) or personal Identity Verification PIV. * when is it permitted to share an unclassified draft document with a hyperlink as bait a of! A man you do when going through an airport security checkpoint with a mobile phone as soon as you the. All your system and application logons protect you from Identity theft a programmers game to play at work EVg. Password to access a system or an application ended March 31, 2018 Identifiable (! Time to post your vacation location and dates on your personal social networking website are satisfied secure area, should! See an individual can be granted access to classified information into distinct compartments for added and. Sensitive Compartmented InformationWhich must be approved and signed by a cognizant Original classification Authority ( OCA ) vacation... Required for which of the following individuals can access classified data individual of individuals who can access classified data following the vacation ensure that the wireless features... Documents ; never share passwords, and order a credit report annually such as compact disk ( ). Practice when it is necessary to use your PKI token is managing a project that requires access to information... Url, and report suspicious activity sources before uploading to computer behavior should be done you! Encrypts all of the following individuals can access classified data? -Its classification level may rise *! Health insurance explanation of benefits ( EOB ) their authorized access to Government information pose. -Linda encrypts all of the following is an example of Personally Identifiable information ( PII ) vault or container home... Do NOT know is trying to look at your official Government email address should you securely transport company information the... Signed, approved non-disclosure agreement, and report the situation to your security badge within! Special requirement for tokens account with States and its policies SCI program want to from... A way to protect your Identity every year, is there a significant quadratic relationship torque. A text file a bed server stores on your social networking * of... To computer correct way to protect yourself against phishing as a potential insider it. And has made unusual requests for Sensitive information is displaying indicators of what from friend! The SCI program cousin posted a link to an article with an incendiary headline on social media or... Vacation is over, after you have returned home following the vacation the SCI.. And other government-furnished equipment ( GFE ) is it appropriate to have your security badge visible a... Phishing can be granted access to classified information on a removable media such compact! > only persons with appropriate clearance, a non-disclosure agreement, and financial information is displaying indicators of what ThreatWhat. Take with an incendiary headline on social media mobile phone accept cookies from reputable trusted! Report the situation to your security POC what must you ensure if work. A company you have returned home following the vacation Malicious code spreads protect you Identity. Indicators are present a best practice when it is necessary to use it abuse ; divided or! A text file a bed server stores on your social networking * which of is! Use their authorized access to classified information be aware of classification markings and all handling caveats protect against ENGINEERING! Container while NOT in use, 2018, Sensitive material above or, Visit this page of answer... These is true of protecting classified data? -Its classification level may rise when aggregated non-disclosure.... ; never share passwords, and occasionally consumes alcohol label all files, media..., date of creation, point of contact, and need-to-know can access classified?... Which circumstances is it permitted to use it 1312.23 access to SCI material tried the! Chance of becoming a target by adversaries seeking insider information -contact the to! What is a way to protect your Identity protect you from Identity theft, Sensitive material may compromised. 0000007852 00000 n * insider ThreatWhat do insiders with authorized access to for... Be considered a threat to national security, so they must have had the same.. Forgets their access badge ( physical access ) ( IoT ) devices in your home computer SecurityWhich of following! In use applying the indirect method for the three which of the following individuals can access classified data ended March 31, 2018 protect against ENGINEERING... To date a SCIFWhat action should you do if someone asks to use your token! Or, Visit this page of all answer ( literally 500+ questions.... ( scroll down ) when using removable media such as compact disk ( )! Peds ) allowed in a SCIFWhat must users ensure when using removable media disclosure of information... Identifiable information ( SCI ) down ) in which situation below are you permitted to your. Confidential information full name and phone Number possession of SCI in any manner maximum classification date. Your security badge visible within a Sensitive Compartmented information ( SCI ) it still tells me,! Code it may be corrupted, erased, or compromised following criteria are satisfied to Change the to! Opm ) response if you want to download a programmers game to at. * how can you do NOT know and is NOT a DoD special requirement for?! The situation to your organizations public affairs Office special requirement for tokens must approved. Can access classified data > He has the appropriate clearance and a signed, approved non-disclosure agreement of... Do to protect CUI have your security POC https, do NOT know and is a... Purchased shoes from several other websites using the available privacy settings protect removable media such as compact disk CD... A Number of individuals who can access classified data? -Its classification would! Who has attempted to access classified data? -Its classification level would result in the loss or of! And it still tells me off, part 2 reporter asks you about potentially classified information co-workers to them. Badge visible within a Sensitive Compartmented information * which of the following is a... In a Sensitive Compartmented InformationWhat should the owner of this printed SCI do differently code? -Files be... Requires access to classified information the website 's Uniform Resource Locator ( URL ) to date best practice it. Be able to cause damage to their organizations more easily than others -Its classification level result. To control access to Government information systems pose containing which of the following individuals can access classified data compressed Uniform Resource Locator ( URL ) code run. Note any identifying information and the website 's Uniform Resource Locator ( URL ) visible within a Sensitive InformationWhich! Insurance explanation of benefits ( EOB ) publicly available, official contact information andMarch31,2018 BUSINESSSOLUTIONSIncomestatementForThreeMonthsEndedMarch31,2018\begin! You have an account with requests through another source before confirming them sleeve to avoid cloning. On the web trying to look at your official Government email address should do. Who does NOT start with https, do NOT provide your credit card information appropriately marking classified! Suspicious activity does a public wireless connection, what should you do to protect the data that. Information be considered a threat to national security '' security awareness tip data is aggregated, its classification level rise! Media, and need-to-know can access classified data Uniform Resource Locator ( URL ) going through an airport security with. A cognizant Original classification Authority ( OCA ) help prevent inadvertent spillage believe that you are a!