New interest in learning another language? *Sensitive Compartmented Information What should the participants in this conversation involving SCI do differently? Infographic - Text version Infographic [PDF - 594 KB] Report a problem or mistake on this page Date modified: 2020-12-14 *Sensitive Compartmented Information When should documents be marked within a Sensitive Compartmented Information Facility (SCIF). NARA has the authority and responsibility to manage the CUI Program across the Federal government. Use personally-owned wired headsets and microphones only in designated areas, New interest in learning a foreign language. Is this safe? (Sensitive Information) What should you do if a commercial entity, such as a hotel reception desk, asks to make a photocopy of your Common Access Card (CAC) for proof of Federal Government employment? f. Get an answer. A Common Access Card and Personal Identification Number. (Malicious Code) While you are registering for a conference, you arrive at the website http://www.dcsecurityconference.org/registration/. internet-quiz. A smartphone that transmits credit card payment information when held in proximity to a credit card reader. CUI may be stored only on authorized systems or approved devices. DOD Cyber Awareness 2021 (DOD-IAA-V18.0) Know, RT202: Ch. Who can be permitted access to classified data? On September 14, 2016, NARA issued a final rule amending 32 CFR Part 2002 to establish a uniform policy for all Federal agencies and prescribe Government-wide program implementation standards, including designating, safeguarding, disseminating, marking, decontrolling, and disposing of CUI; self-inspection and oversight requirements; and other facets of the CUI Program. Ask them to verify their name and office number. Immediately notify your security point of contact. Correct. Looking at your MOTHER, and screaming THERE SHE BLOWS! Historically, each agency developed its own practices for sensitive unclassified information, resulting in a patchwork of systems across the Executive branch, in which similar information might be defined or labeled differently, or where dissimilar information might share a definition and/or label. a. The website requires a credit card for registration. Preventing an authorized reader of an object from deleting that object B. Which of the following is true of protecting classified data? Of the following, which is NOT a security awareness tip? Always take your CAC when you leave your workstation. You should remove and take your CAC/PIV card whenever you leave your workstation. Correct A colleague vacations at the beach every year, is married and a father of four, sometimes has poor work quality, and works well with his team. "Unclassified" or a lack of security marking denotes non-sensitive information. What is a valid response when identity theft occurs? What is a security best practice to employ on your home computer? Which type of information includes personal, payroll, medical, and operational information? Telework is only authorized for unclassified and confidential information. Search by Subject Or Level. 8. Refer the vendor to the appropriate personnel. correct. When using your government-issued laptop in public environments, with which of the following should you be concerned? Explain. On a NIPRNet system while using it for a PKI-required task, Something you possess, like a CAC, and something you know, like a PIN or password. Which may be a security issue with compressed urls? In unsupervised machine learning, clustering is the most common process used to identify and group similar entities or items together. *Controlled Unclassified Information Which is a best practice for protecting Controlled Unclassified Information (CUI)? In which situation below are you permitted to use your PKI token? An official website of the United States government. *Spillage What should you do if you suspect spillage has occurred? Ensure there are no identifiable landmarks visible in any photos taken in a work setting that you post. When is it appropriate to have your security badge visible? What is a best practice to protect data on your mobile computing device? There are no choices provides which make it hard to pick the untrue statement about unclassified data. (Malicious Code) A coworker has asked if you want to download a programmers game to play at work. In setting up your personal social networking service account, what email address should you use? -TRUE What action is recommended when somebody calls you to inquire about your work environment or specific account information? Which of the following is true of Unclassified information? (Sensitive Information) What type of unclassified material should always be marked with a special handling caveat? *Sensitive Compartmented Information What is a Sensitive Compartmented Information (SCI) program? A headset with a microphone through a Universal Serial Bus (USB) port. Mark SCI documents appropriately and use an approved SCI fax machine. It is not corporate intellectual property unless created for or included in requirements related to a government contract. Which of the following is true about unclassified data? Which of the following definitions is true about disclosure of confidential information? **Classified Data Which of the following is true of telework? (Sensitive Compartmented Information) What describes how Sensitive Compartmented Information is marked? A coworker has asked if you want to download a programmer's game to play at work. When is it okay to charge a personal mobile device using government-furnished equipment (GFE)? Ask for information about the website, including the URL. Executive Order 13526 Classified National Security Information, PersonallyIdentifiable Information (PII), Sensitive Personally Identifiable Information (SPII), Proprietary Business Information (PBI) or currently known within EPA as Confidential Business Information (CBI), Unclassified Controlled Technical Information (UCTI). The National Archives and Records Administration (NARA) serves as the Controlled Unclassified Information (CUI) Executive Agent (EA). asked in Internet by voice (265k points) Question : Which of the following is true about unclassified data? The proper security clearance and indoctrination into the SCI program. 5. You know that this project is classified. Follow procedures for transferring data to and from outside agency and non-Government networks. Which of the following is NOT considered sensitive information? Senior government personnel, military or civilian. Which of the following is true of using DoD Public key Infrastructure (PKI) token? (Home computer) Which of the following is best practice for securing your home computer? Not correct. Which may be a security issue with compressed Uniform Resource Locators (URLs)? Linda encrypts all of the sensitive data on her government-issued mobile devices. (Spillage) After reading an online story about a new security project being developed on the military installation where you work, your neighbor asks you to comment about the article. **Insider Threat What type of activity or behavior should be reported as a potential insider threat? (Sensitive Information) Which of the following is true about unclassified data? What should the owner of this printed SCI do differently? If you participate in or condone it at any time. Which of the following is NOT true of traveling overseas with a mobile phone? If you participate in or condone it at any time. Use online sites to confirm or expose potential hoaxes, Follow instructions given only by verified personnel, Investigate the links actual destination using the preview feature, Determine if the software or service is authorized. Mark SCI documents appropriately and use an approved SCI fax machine. What should you do? -It must be released to the public immediately. Have your permissions from your organization, follow your organization guideline, use authorized equipment and software, employ cyber security best practice, perform telework in dedicated when home. Official websites use .gov Updated 8/5/2020 8:06:16 PM. Here you can find answers to the DoD Cyber Awareness Challenge. PII, PHI, and financial information is classified as what type of information? Never allow sensitive data on non-Government-issued mobile devices. d. giving a spanking or a scolding. What type of activity or behavior should be reported as a potential insider threat? Unauthorized Disclosure of Classified Information for DoD, Security Awareness: Derivative Classification Answers, CITI Ethics, Responsible Conduct, RCR, Law, HTH And IRB Answers, EVERFI Achieve Consumer Financial Education Answers, Security Pro: Chapter 3 (3.1.8) & 4.1 Security Policies Answers, CITI Module #3 Research in Public Elementary and Secondary Schools, Answers to CTS Unit 7 Lab 7-2: Protocols and Services SNMP, Google Analytics Individual Qualification Exam Answers, Everfi Module 4 Credit Scores Quiz Answers, Which Of The Following Is Not Considered A Potential Insider Threat Indicator. Remove your security badge after leaving your controlled area or office building. Position your monitor so that it is not facing others or easily observed by others when in use Correct. (Sensitive Information) What certificates are contained on the Common Access Card (CAC)? classified-document. Which of the following can an unauthorized disclosure of information classified as Confidential reasonably be expected to cause? How can you protect your organization on social networking sites? How many potential insider threat indicators does this employee display? **Mobile Devices What should you do when going through an airport security checkpoint with a Government-issued mobile device? a. The email provides a link to a personnel portal where you must enter your personal information as part of an effort to standardize recordkeeping. Of the following, which is NOT a characteristic of a phishing attempt? What should you do? (Spillage) What should you do if a reporter asks you about potentially classified information on the web? cyber. correct. At EPA, the CUI Program is housed in the Libraries and Accessibility Division (LAD) within the Office of Mission Supports (OMS), Office of Enterprise Information Programs (OEIP). 1 Cyber Awareness Challenge 2023 Answers. Ensure that the wireless security features are properly configured. Which of the following is NOT true concerning a computer labeled SECRET? John submits CUI to his organizations security office to transmit it on his behalf. When vacation is over, after you have returned home. Which of the following is not Controlled Unclassified Information (CUI)? After clicking on a link on a website, a box pops up and asks if you want to run an application. (Sensitive Compartmented Information) Which of the following best describes the compromise of Sensitive Compartmented Information (SCI)? Attempting to access sensitive information without need-to-know, Avoid talking about work outside of the workplace or with people without a need-to-know, Report the suspicious behavior in accordance with their organizations insider threat policy. *Insider Threat Which of the following is a reportable insider threat activity? A colleague complains about anxiety and exhaustion, makes coworkers uncomfortable by asking excessive questions about classified projects, and complains about the credit card bills that his wife runs up. Maybe Which of the following actions can help to protect your identity? d. How do the size and shape of a human epithelial cell differ from those of the Elodea and onion cells that you examined earlier? A colleague has won 10 high-performance awards, can be playful and charming, is not currently in a relationship, and occasionally aggressive in trying to access sensitive information. Maintain visual or physical control of the device. Changes to various data systems that store and sometimes share sensitive information outside EPA. A coworker wants to send you a sensitive document to review while you are at lunch and you only have your personal tablet. If you receive a phone call from a stranger asking for information about your invoice payment process, you should: Crucial information about a user or organization can be gained through. Mobile devices and applications can track your location without your knowledge or consent. -TRUE The use of webmail is -is only allowed if the organization permits it Using webmail may bypass built in security features. -Its classification level may rise when aggregated. You have reached the office door to exit your controlled area. b. taking away a toy or treat Search for an answer or ask Weegy. not correct. Where. Spillage because classified data was moved to a lower classification level system without authorization. #1) Open WEKA and select "Explorer" under 'Applications'. Personal information is inadvertently posted at a website. Using webmail may bypass built in security features. (social networking) When may you be subjected to criminal, disciplinary, and/or administrative action due to online misconduct? Attempting to access sensitive information without need-to-know. **Social Engineering What action should you take with an e-mail from a friend containing a compressed Uniform Resource Locator (URL)? What is the best choice to describe what has occurred? Appropriate clearance; signed and approved non-disclosure agreement; and need-to-know. Amendments to a variety of policy documents as well as others referencing Confidential Business Information (CBI) submissions or handling, Changes to paper and e-forms and instructions for their submission to EPA. asked in Internet by voice (265k points) internet. (Spillage) Which type of information could reasonably be expected to cause serious damage to national security if disclosed without authorization? Do not access website links in e-mail messages. What can be used to track Marias web browsing habits? What is the danger of using public Wi-Fi connections? Under What Circumstances Could Unclassified? **Insider Threat Which of the following is NOT considered a potential insider threat indicator? *Sensitive Compartmented Information Which of the following best describes the compromise of Sensitive Compartmented Information (SCI)? Sanitized information gathered from personnel records. How should you protect your Common Access Card (CAC) or Personal Identity Verification (PIV) card? (social networking) When is the safest time to post details of your vacation activities on your social networking profile?
Portia Myers Davis, Port Aransas Pier Fishing Report, Articles W