BMW crash victim Alaa Al-Siddiq was on Cotswolds birthday weekend Which of the following is NOT a correct way to protect CUI? Not correct A colleague complains about anxiety and exhaustion, makes coworkers uncomfortable by asking excessive questions about classified projects, and complain about the credit card bills that his wife runs up. Store your Common Access Card (CAC) or Personal Identity Verification (PIV) card in a shielded sleeve ~Write your password down on a device that only you access (e.g., your smartphone) Change your password at least every 3 months Enable two-factor authentication whenever available, even for personal accounts. It is getting late on Friday. A colleague saves money for an overseas vacation every year, is a . For programmatic questions regarding Controlled Unclassified Information (CUI), including any challenges to CUI marked by EPA, pleasecontact EPA's CUI Program Office. What type of social engineering targets senior officials? Follow procedures for transferring data to and from outside agency and non-Government networks. Which of the following actions is appropriate after finding classified Government information on the internet? correct. Which of these is true of unclassified data? Correct Which of these is true of unclassified data? *Sensitive Compartmented Information What should the participants in this conversation involving SCI do differently? What should be your response? **Classified Data How should you protect a printed classified document when it is not in use? **Website Use How should you respond to the theft of your identity? T/F. Bob, a coworker, has been going through a divorce, has financial difficulties and is displaying hostile behavior. Filter by: All $ Off % Off Free Online Offline. Social Security Number, date and place of birth, mothers maiden name. When traveling or working away from your main location, what steps should you take to protect your devices and data? Phishing can be an email with a hyperlink as bait. Which type of information includes personal, payroll, medical, and operational information? Unknown data is categorized by the system; an analyst then reviews the results Correct. **Social Engineering What action should you take with an e-mail from a friend containing a compressed Uniform Resource Locator (URL)? Explain. Found a mistake? If you participate in or condone it at any time. Which of the following represents a good physical security practice? (controlled unclassified information) Which of the following is NOT an example of CUI? CUI may be stored on any password-protected system. Use only personal contact information when establishing personal social networking accounts, never use Government contact information. Your DoD Common Access Card (CAC) has a Public Key Infrastructure (PKI) token approves for access to the NIPRNET. When classified data is not in use, how can you protect it? PDF Unauthorized Disclosure of Classified Information and Controlled - CDSE What is required for an individual to access classified data? Retrieve classified documents promptly from printers. Remove security badge as you enter a restaurant or retail establishment. A type of phishing targeted at high-level personnel such as senior officials. Upon connecting your Government- issued laptop to a public wireless connection, what should you immediately do? As long as the document is cleared for public release, you may share it outside of DoD. Correct. What is the response to an incident such as opening an uncontrolled DVD on a computer in a SCIF. f. Get an answer. Connect to the Government Virtual Private Network (VPN). correct. not correct. Of the following, which is NOT an intelligence community mandate for passwords? Correct. It does not require markings or distribution controls. The following practices help prevent viruses and the downloading of malicious code except. The email provides a link to a personnel portal where you must enter your personal information as part of an effort to standardize recordkeeping. internet-quiz. CPCON 3 (Medium: Critical, Essential, and Support Functions) *Sensitive Information What is the best example of Personally Identifiable Information (PII)? Controlled Unclassified Information (CUI) and Covered Defense (Sensitive Information) What guidance is available from marking Sensitive Information information (SCI)? A measure of how much useful work each unit of input energy provides. What is a best practice to protect data on your mobile computing device? A coworker wants to send you a sensitive document to review while you are at lunch and you only have your personal tablet. Setting weekly time for virus scan when you are not on the computer and it is powered off. What information should you avoid posting on social networking sites? **Classified Data Which of the following must you do before using and unclassified laptop and peripherals in a collateral environment? Linda encrypts all of the sensitive data on her government issued mobile devices. Follow the steps enlisted below to use WEKA for identifying real values and nominal attributes in the dataset. All to Friends Only. When checking in at the airline counter for a business trip, you are asked if you would like to check your laptop bag. Identify and disclose it with local Configuration/Change Management Control and Property Management authorities. (Sensitive Information) Which of the following represents a good physical security practice? Which Is True Of Unclassified Information - faqcourse.com correct. Transmit classified information via fax machine only Not correct ALways mark classified information appropriately and retrieve classified documents promptly from the printer. Controlled Unclassified Information (CUI) Program Frequently Asked On a NIPRNET system while using it for a PKI-required task. **Insider Threat Which of the following should be reported as a potential security incident (in accordance with you Agencys insider threat policy)? Use only your personal contact information when establishing your account. Why might "insiders" be able to cause damage to their organizations more easily than others? A passenger in the Land Rover Freelander that T-boned the hatchback said the BMW had been driven out of the unclassified road towards Shipton-under-Wychwood 'like a bat out of hell' - giving . Which of the following is true of Internet of Things (IoT) devices? Ask the individual to see an identification badge. What is the best choice to describe what has occurred? How do you respond? (Spillage) Which of the following is a best practice to protect information about you and your organization on social networking sites and applications? CPCON 2 (High: Critical and Essential Functions) What should you do? Which of the following may help to prevent spillage? *Sensitive Compartmented Information When is it appropriate to have your security badge visible? Do not use any personally owned/non-organizational removable media on your organizations systems. How many potential insiders threat indicators does this employee display? Correct. Note any identifying information, such as the website's URL, and report the situation to your security POC. What should you do if someone asks to use your government issued mobile device (phone/laptop..etc)? Which of the following is a good practice to prevent spillage? (social networking) Which of the following is a security best practice when using social networking sites? A colleague vacations at the beach every year, is married and a father of four, sometimes has poor work quality, and works well with his team. (Malicious Code) What is a common indicator of a phishing attempt? 4. Classified information that should be unclassified and is downgraded. Of the following, which is NOT a problem or concern of an Internet hoax? (Home computer) Which of the following is best practice for securing your home computer? You should only accept cookies from reputable, trusted websites. Taking classified documents from your workspace. a. Photos of your pet Correct. (Malicious Code) Which are examples of portable electronic devices (PEDs)? Some examplesyou may be familiar with: TheFederalCUI Registry,shows authorized categoriesandassociated markings, as well as applicable safeguarding, dissemination, and decontrol procedures. Discuss why gases, such as barbecue propane gas, are sold by mass and not by volume. Enable automatic screen locking after a period of inactivity. A .gov website belongs to an official government organization in the United States. **Insider Threat What function do Insider Threat Programs aim to fulfill? What portable electronic devices (PEDs) are permitted in a SCIF? (GFE) When can you check personal e-mail on your Government-furnished equipment (GFE)? There are many travel tips for mobile computing. This bag contains your government-issued laptop. Which of the following is NOT a social engineering tip? Which of the following is NOT Government computer misuse? **Use of GFE What is a critical consideration on using cloud-based file sharing and storage applications on your Government-furnished equipment (GFE)? Store it in a locked desk drawer after working hours. Write your password down on a device that only you access. Controlled Unclassified Information (CUI) - National Archives (Malicious Code) What are some examples of removable media? Correct. Which of the following practices reduces the chance of becoming a target by adversaries seeking insider information? Should you always label your removable media? Which of the following is a security best practice when using social networking sites? Correct Ensure proper labeling by appropriately marking all classified material and, when required, sensitive material. Controlled Unclassified Information (CUI) Purpose of the CUI Program. What should you do? Effects of different carbon substrates on PAHs fractions and microbial Reviewing and configuring the available security features, including encryption. Which of the following is NOT Protected Health Information (PHI)? Spillage because classified data was moved to a lower classification level system without authorization. (Malicious Code) Which email attachments are generally SAFE to open? As a best practice, labeling all classified removable media and considering all unlabeled removable media as unclassified. true-statement. When unclassified data is aggregated, its classification level may rise. Ensure proper labeling by appropriately marking all classified material and, when required, sensitive material. correct. What is the best way to protect your Common Access Card (CAC) or Personal Identity Verification (PIV) card? Only documents that are classified Secret, Top Secret, or SCI require marking. Directives issued by the Director of National Intelligence. 1.1.2 Classified Data. Which Cyber Protection Condition (CPCON) establishes a protection priority focus on critical functions only? Not correct **Social Networking Your cousin posted a link to an article with an incendiary headline on social media. What type of social engineering targets particular individuals, groups of people, or organizations? Ensure proper labeling by appropriately marking all classified material. Physically assess that everyone within listening distance is cleared and has a need-to-know for the information being discussed. Asked 8/5/2020 6:29:36 PM. Everything you need to know aboutControlled UnclassifiedInformation(CUI). *Sensitive Compartmented Information Which must be approved and signed by a cognizant Original Classification Authority (OCA)? They provide guidance on reasons for and duration of classification of information. A coworker wants to send you a sensitive document to review while you are at lunch and you only have your personal tablet. Infographic - Text version Infographic [PDF - 594 KB] Report a problem or mistake on this page Date modified: 2020-12-14 Not correct. Request the users full name and phone number. By Quizzma Team / Technology. Accepting the default privacy settings. How can you protect yourself from social engineering? **Classified Data Which of the following can an unauthorized disclosure of information classified as Confidential reasonably be expected to cause? **Insider Threat A colleague vacations at the beach every year, is married and a father of four, his work quality is sometimes poor, and he is pleasant to work with. Always use DoD PKI tokens within their designated classification level. 5. Log in for more information. ~A coworker brings a personal electronic device into a prohibited area. Click on "Open File". Which of the following is true of the Common Access Card (CAC) or Personal Identity Verification (PIV) card? Maintain visual or physical control of the device. An investment in knowledge pays the best interest.. What is an individual's Personally Identifiable Information (PII) or Protected Health Information (PHI) considered? A vendor conducting a pilot program with your organization contacts you for organizational data to use in a prototype. If classified information were released, which classification level would result in Exceptionally grave damage to national security? *Sensitive Information Which of the following is an example of Protected Health Information (PHI)? The website requires a credit card for registration. Which of the following is true of Unclassified information? **Social Engineering Which is a best practice that can prevent viruses and other malicious code from being downloaded when checking your e-mail? correct. When can you check personal email on your government furnished equipment? Attempting to access sensitive information without need-to-know, Avoid talking about work outside of the workplace or with people without a need-to-know, Report the suspicious behavior in accordance with their organizations insider threat policy.