What would you do if you receive a game application request on your government computer that includes permission to access your friends, profile information, cookies, and sites visited? Sensitive information may be stored on any password-protected system. Which is NOT a wireless security practice? e. Why do Elodea and onion cells have more consistent shapes than human epithelial cells? When unclassified data is aggregated, its classification level may rise. Use the government email system so you can encrypt the information and open the email on your government issued laptop. When would be a good time to post your vacation location and dates on your social networking website? Ensure that any cameras, microphones, and Wi-Fi embedded in the laptop are physically disabled.- Correct. 4. A pop-up window that flashes and warns that your computer is infected with a virus. Appropriate clearance; signed and approved non-disclosure agreement; and need-to-know. What should the participants in this conversation involving SCI do differently? Controlled Unclassified Information (CUI) is information that requires safeguarding or dissemination controls pursuant to and consistent with applicable law, regulations, and government-wide policies but is not classified under Executive Order 13526 or the Atomic Energy Act, as amended. Figure 1. (Insider Threat) A colleague vacations at the beach every year, is married and a father of four, his work quality is sometimes poor, and he is pleasant to work with. 1.1.2 Classified Data. What should you do? -Its classification level may rise when aggregated. What actions should you take prior to leaving the work environment and going to lunch? Lock your device screen when not in use and require a password to reactivate. However, agency personnel and contractors should first consult their agency's CUI implementing policies and program management for guidance. Use your own security badge, key code, or Common Access Card (CAC)/Personal Identity Verification (PIV) card. If classified information were released, which classification level would result in Exceptionally grave damage to national security? Which is a risk associated with removable media? A colleague has won 10 high-performance awards, can be playful and charming, is not currently in a relationship, and is occasionally aggressive in trying to access sensitive information. Using webmail may bypass built in security features. You may use your personal computer as long as it is in a secure area in your home b. You should remove and take your CAC/PIV card whenever you leave your workstation. Keep your operating system and software up to date: This will help patch any security vulnerabilities in your software. What should be your response? Physically assess that everyone within listening distance is cleared and has a need-to-know for the information being discussed. He has the appropriate clearance and a signed, approved, non-disclosure agreement. Social Security Number, date and place of birth, mothers maiden name. Is this safe? (Identity Management) What certificates are contained on the Common Access Card (CAC)? Set hasDigit to true if the 3-character passCode contains a digit, Critical, Essential, and Support Functions. Which of the following is a security best practice when using social networking sites? Which of these is true of unclassified data? Which of the following may help to prevent spillage? *Spillage What should you do if you suspect spillage has occurred? It never requires classification markings, is true about unclassified data. *Sensitive Information What type of unclassified material should always be marked with a special handling caveat? Report the suspicious behavior in accordance with their organizations insider threat policy. Which designation marks information that does not have potential to damage national security? **Use of GFE Under what circumstances is it acceptable to use your Government-furnished computer to check personal e-mail and do other non-work-related activities? Which of the following is NOT a best practice to protect data on your mobile computing device? b. taking away a toy or treat -It must be released to the public immediately. Note That The Integers Should Be Type Cast To Doubles. Which of the following is an example of punishment by application? Spillage can be either inadvertent or intentional. Which is a way to protect against phishing attacks? Which of the following is NOT true of traveling overseas with a mobile phone? What should you do? **Insider Threat Which of the following should be reported as a potential security incident? UNCLASSIFIED - CLASSIFICATION MARKINGS FOR TRAINING PURPOSES ONLY Marking in the Electronic Environment Short Student Guide Center for Development of Security Excellence Page 4 UNCLASSIFIED - CLASSIFICATION MARKINGS FOR TRAINING PURPOSES ONLY IM and Chat Instant messages and chats are brief, text-based message exchanges and conversations. Badges must be visible and displayed above the waist at all times when in the facility. Classified Information can only be accessed by individuals with. Request the users full name and phone number. (Sensitive Compartmented Information) What describes how Sensitive Compartmented Information is marked? Classified material must be appropriately marked. Federal agencies routinely generate, use, store, and share information that, while not classified, still requires some level of protection from unauthorized access and release. A colleague often makes others uneasy with her persistent efforts to obtain information about classified project where she has no need-to-know, is vocal about her husband overspending on credit cards, and complains about anxiety and exhaustion. Historically, each agency developed its own practices for sensitive unclassified information, resulting in a patchwork of systems across the Executive branch, in which similar information might be defined or labeled differently, or where dissimilar information might share a definition and/or label. Question. Which of the following is a best practice to protect information about you and your organization on social networking sites and applications? What is considered ethical use of the Government email system? What is the best course of action? If authorized, what can be done on a work computer? (Identity Management) Which of the following is an example of two-factor authentication? Controlled Unclassified Information (CUI) - National Archives Search the Registry: Categories, Markings and Controls: Category list CUI markings Which of the following is NOT an example of sensitive information? What is required for an individual to access classified data? ~A coworker brings a personal electronic device into a prohibited area. Which of the following is an example of malicious code? Q&A for work. Ensure proper labeling by appropriately marking all classified material and, when required, sensitive material. General Services Administration (GSA) approval. Which of the following demonstrates proper protection of mobile devices? What Are Some Examples Of Malicious Code Cyber Awareness? Which is it appropriate to have your security badge visible within a Sensitive Compartmented Information Facility (SCIF). Which of the following is true about unclassified data? *Sensitive Compartmented Information Which of the following best describes the compromise of Sensitive Compartmented Information (SCI)? When may you be subject to criminal, disciplinary, and/or administrative action due to online harassment, bullying, stalking, hazing, discrimination, or retaliation? Appropriate clearance, a signed and approved non-disclosure agreement, and need-to-know, Insiders are given a level of trust and have authorized access to Government information systems. Ans: True Question 2: The Government Information Security Reform Act (Security Reform Act) of 2000 focuses on management View the full answer What type of social engineering targets particular individuals, groups of people, or organizations? Only friends should see all biographical data such as where Alex lives and works. (Spillage) What advantages do insider threats have over others that allows them to cause damage to their organizations more easily? **Identity Management Which of the following is the nest description of two-factor authentication? We thoroughly check each answer to a question to provide you with the most correct answers. How can you protect your information when using wireless technology? Verify the identity of all individuals.??? Which designation includes Personally Identifiable Information (PII) and Protected Health Information (PHI)? Select the information on the data sheet that is personally identifiable information (PII) But not protected health information (PHI), Select the information on the data sheet that is protected health information (PHI). **Insider Threat Based on the description that follows, how many potential insider threat indicator(s) are displayed? **Social Networking As someone who works with classified information, what should you do if you are contacted by a foreign national seeking information on a research project? Mark SCI documents appropriately and use an approved SCI fax machine. Validate all friend requests through another source before confirming them. 8. Teams. which of the following is true about unclassified data Contact the IRS using their publicly available, official contact information. Do not access links or hyperlinked media such as buttons and graphics in email messages. Let us have a look at your work and suggest how to improve it! When operationally necessary, owned by your organization, and approved by the appropriate authority. **Mobile Devices Which is a rule for removable media, other portable electronic devices (PEDs), and mobile computing devices to protect Government systems? All to Friends Only. Follow procedures for transferring data to and from outside agency and non-Government networks. TheNational Archives and Records Administration (NARA)servesas the Controlled Unclassified Information (CUI) Executive Agent (EA). Retrieve classified documents promptly from printers. When your vacation is over, after you have returned home. What security device is used in email to verify the identity of sender? Alex demonstrates a lot of potential insider threat indicators. For programmatic questions regarding Controlled Unclassified Information (CUI), including any challenges to CUI marked by EPA, pleasecontact EPA's CUI Program Office. This button displays the currently selected search type. Which of the following is a good practice to protect classified information? Which of the following is true of the Common Access Card (CAC)? Use personal information to help create strong passwords. **Mobile Devices Which of the following helps protect data on your personal mobile devices? Correct. A colleague enjoys playing video games online, regularly use social media, and frequently forgets to secure her smartphone elsewhere before entering areas where it is prohibited. Never allow sensitive data on non-Government-issued mobile devices. Types of Data in Statistics - Nominal, Ordinal, Interval, and Ratio With WEKA users, you can access WEKA sample files. To determine premiums for automobile insurance, companies must have an understanding of the variables that affect whether a driver will have an accident. Directing you to a website that looks real. **Removable Media in a SCIF What must users ensure when using removable media such as compact disk (CD)? Phishing can be an email with a hyperlink as bait. What should you do? Unusual interest in classified information. Which of these is true of unclassified data?-It must be released to the public immediately.-Its classification level may rise when aggregated. Which of the following is true of Internet of Things (IoT) devices? Avoid talking about work outside of the workplace or with people without a need-to-know. Not correct Learn more about Teams Which of the following is true about unclassified data? c. What similarities and differences are there between plant and animal cells? **Insider Threat Which type of behavior should you report as a potential insider threat? When vacation is over, after you have returned home. asked in Internet by voice (265k points) Question : Which of the following is true about unclassified data? What is a best practice to protect data on your mobile computing device? 1 Cyber Awareness Challenge 2023 Answers. Here you can find answers to the DoD Cyber Awareness Challenge. Which of the following is true of sharing information in a Sensitive Compartmented Information Facility (SCIF)? Malicious code can include viruses, worms, and macros. What information most likely presents a security risk on your personal social networking profile? Select the information on the data sheet that is personally identifiable information (PII). Correct. Which of the following is not Controlled Unclassified Information (CUI)? Reviewing and configuring the available security features, including encryption. CUI is government created or owned information that requires safeguarding or dissemination controls consistent with applicable laws, regulations and government wide policies. *Sensitive Compartmented Information When is it appropriate to have your security badge visible? Controlled Unclassified Information (CUI) Program Frequently Asked